Florida 2023 2023 Regular Session

Florida Senate Bill S1708 Analysis / Analysis

Filed 03/30/2023

                    The Florida Senate 
BILL ANALYSIS AND FISCAL IMPACT STATEMENT 
(This document is based on the provisions contained in the legislation as of the latest date listed below.) 
Prepared By: The Professional Staff of the Committee on Governmental Oversight and Accountability  
 
BILL: CS/SB 1708 
INTRODUCER:  Governmental Oversight and Accountability Committee and Senator DiCeglie 
SUBJECT:  Cybersecurity 
DATE: March 30, 2023 
 
 ANALYST STAFF DIRECTOR  REFERENCE  	ACTION 
1. Harmsen McVaney GO Fav/CS 
2.     AEG   
3.     AP  
4.     RC  
 
Please see Section IX. for Additional Information: 
COMMITTEE SUBSTITUTE - Substantial Changes 
 
I. Summary: 
CS/SB 1708, which may be called the “Florida Cyber Protection Act,” makes several changes to 
laws regarding state information technology and cybersecurity governance. The bill:  
 Requires the Department of Management Services (DMS), through the Florida Digital 
Service (FLDS), to ensure independent oversight of state agency IT procurements;  
 Establishes an operations committee that will develop collaborative efforts between agencies 
and other governmental entities relating to cybersecurity issues;  
 Creates the position of state chief technology officer, who will explore technology solutions, 
and support cybersecurity and interoperability initiatives, among other duties; 
 Expands oversight and management duties of the state data center, and grants the FLDS full 
access to its infrastructure;  
 Provides that the state data center, or its successor entity, must fully integrate with the 
Cybersecurity Operations Center; 
 Requires agencies and local governments to notify the FLDS of any cybersecurity or 
ransomware incident; 
 Grants the FLDS the ability to respond to any state agency cybersecurity incident; and  
 Allows the FLDS to brief members of a legislative committee or subcommittee that is 
responsible for cybersecurity issues 
 
REVISED:   BILL: CS/SB 1708   	Page 2 
 
The state chief information officer (CIO), who serves as head of the FLDS, will now be 
appointed by the Governor and subject to Senate confirmation. 
 
The bill provides that local governments and private businesses cannot be liable for torts related 
to cybersecurity breaches if they adhere to specific cybersecurity protocol, and update their 
protocol according to provisions adopted in the bill. 
 
The bill does not have a fiscal impact on state or local government revenues or local government 
expenditures. The bill may increase state expenditures. 
 
The bill takes effect on July 1, 2023. 
II. Present Situation: 
State Information Technology Management 
The Department of Management Services (DMS) oversees information technology (IT) 
governance and security for the executive branch of the State government.
1
 The Florida Digital 
Service (FLDS) within the DMS was established by the Legislature in 2020
2
 to replace the 
Division of State Technology. The FLDS works subordinate to the DMS to implement policies 
for IT and agency cybersecurity, and to fully support Florida’s cloud first policy.
3
  
 
The FLDS was created to modernize state government technology and information services.
4
 
Accordingly, the DMS, through the FLDS, has the following powers, duties, and functions: 
 Develop IT policy for the management of the state’s IT resources; 
 Develop an enterprise architecture that facilitates interoperability between agencies and 
supports the cloud-first policy; 
 Establish IT project management and oversight standards for state agencies; 
 Oversee state agency IT projects that cost $10 million or more and that are funded in the 
General Appropriations Act or any other law;
5
 and 
 Standardize and consolidate IT services that support interoperability, Florida’s cloud first 
policy, and other common business functions and operations. 
 
The head of FLDS is appointed by the Secretary of DMS and serves as the state chief 
information officer (CIO).
6
 The CIO must have at least 5 years of experience in the development 
of IT system strategic planning and IT policy, and preferably have leadership-level experience in 
the design, development, and deployment of interoperable software and data solutions.
7
 
 
                                                
1
 Section 282.0051, F.S. 
2
 Ch. 2020-161, Laws of Fla. 
3
 Section 282.0051(1), F.S. 
4
 Section 282.0051(1), F.S. 
5
 The FLDS provides project oversight on IT projects that have a total cost of $20 million or more for the Department of 
Financial Services, the Department of Legal Affairs, and the Department of Agriculture and Consumer Services. Section 
282.0051(1)(m), F.S. 
6
 Section 282.0051(2)(a), F.S. 
7
 Id.  BILL: CS/SB 1708   	Page 3 
 
State Data Center 
Present Situation 
In 2022 the State Data Center (SDC) was moved from FLDS to DMS, which now operates and 
maintains the SDC.
8
 The SDC provides data center services that comply with applicable state 
and federal laws, regulations, and policies, including all applicable security, privacy, and 
auditing requirements.
9
 The standards used by the SDC are created through the Information 
Technology Infrastructure Library (ITIL); the International Organization for Standardization; 
and the International Electrotechnical Commission (ISO/IEC) 27,000; and the Project 
Management Institute’s (PMI) best practices. 
 
Northwest Regional Data Center 
The Northwest Regional Data Center (NWRDC) is the leading computing provider for 
educational and governmental communities in Florida. In 2022, NWRDC (located at Florida 
State University) was declared an official state data center, and the current SDC resources, 
contracts, and assets were transferred to NWRDC, through contract.
10
 This allows for NWRDC 
to provide services from the SDC facility. The NWRDC offers services and 24/7 management 
support for various IT support solutions, including: public/private cloud services, backup and 
recovery, storage, managed services, Tallahassee fiber loop, Florida LambdaRail, MyFloridaNet, 
Florida Power and Light Fibernet, CenturyLink Connectivity, security services, multi-site 
colocation, and disaster recovery.
11
  
 
State Cybersecurity Act 
Agency Cybersecurity Standards 
The State Cybersecurity Act
12
 requires the DMS and the heads of state agencies to meet certain 
requirements to enhance state agencies’ cybersecurity.
13
 Specifically, the DMS, acting through 
the FLDS, must:
14
 
 Assess state agency cybersecurity risks and determine appropriate security measures 
consistent with generally accepted best practices for cybersecurity. 
 Adopt rules to mitigate risk, support a security governance framework, and safeguard state 
agency digital assets, data, information, and IT resources
15
 to ensure availability, 
confidentiality, and integrity. 
 Designate a chief information security officer (CISO) who must develop, operate, and 
oversee state technology systems’ cybersecurity. The CISO must be notified of all confirmed 
                                                
8
 Ch. 2022-153, Laws of Fla. 
9
 Section 282.201(1), F.S. 
10
 Section 282.201(5), F.S. 
11
 NWRDC: Florida’s Cloud Broker, About Northwest Regional Data Center, https://www.nwrdc.fsu.edu/about (last visited 
Mar. 29, 2023). 
12
 Section 282.318, F.S. 
13
 “Cybersecurity” means the protection afforded to an automated information system in order to attain the applicable 
objectives of preserving the confidentiality, integrity, and availability of data, information, and information technology 
resources. Section 282.0041(8), F.S. 
14
 Section 282.318(3), F.S. 
15
 “Information technology resources” means data processing hardware and software and services, communications, supplies, 
personnel, facility resources, maintenance, and training. Section 282.0041(22), F.S.  BILL: CS/SB 1708   	Page 4 
 
or suspected incidents or threats of state agency IT resources and must report such 
information to the CIO and the Governor. 
 Develop and annually update a statewide cybersecurity strategic plan that includes security 
goals and objectives for cybersecurity, including the identification and mitigation of risk, 
proactive protections against threats, tactical risk detection, threat reporting, and response 
and recovery protocols for cyber incidents. 
 Develop a cybersecurity governance framework and publish it for state agency use. 
 Assist state agencies in complying with the State Cybersecurity Act. 
 Train state agency information security managers and computer security incident response 
team members, in collaboration with the Florida Department of Law Enforcement (FDLE) 
Cybercrime Office, on issues relating to cybersecurity, including cybersecurity threats, 
trends, and best practices. 
 Provide cybersecurity training to all state agency technology professionals that develop, 
assess, and document competencies by role and skill level. The training may be provided in 
collaboration with the Cybercrime Office, a private sector entity, or an institution of the state 
university system. 
 Annually review state agencies’ strategic and operational cybersecurity plans. 
 Track, in coordination with agency inspectors general, state agencies’ implementation of 
remediation plans. 
 Operate and maintain a Cybersecurity Operations Center led by the CISO to serve as a 
clearinghouse for threat information and to coordinate with the FDLE to support state agency 
response to cybersecurity incidents. 
 Lead an Emergency Support Function under the state comprehensive emergency 
management plan. 
 
The State Cybersecurity Act requires the head of each state agency to designate an information 
security manager to administer the cybersecurity program of the state agency.
16
 In addition, 
agency heads must: 
 Establish an agency cybersecurity incident response team, which must report any confirmed 
or suspected cybersecurity incidents to the CISO. 
 Submit an annual strategic and operational cybersecurity plan to the DMS. 
 Conduct a triennial comprehensive risk assessment to determine the security threats to the 
data, information, and IT resources of the state agency. 
 Develop and update internal policies and procedures, including procedures for reporting 
cybersecurity incidents and breaches to the FLDS and the Cybercrime Office. 
 Implement managerial, operational, and technical safeguards and risk assessment 
remediation plans recommended by the DMS to address identified risks to the data, 
information, and IT resources of the agency. 
 Ensure periodic internal audits and evaluations of the agency’s cybersecurity program. 
 Ensure that cybersecurity contract requirements of IT and IT resources and services meet or 
exceed applicable state and federal laws, regulations, and standards for cybersecurity, 
including the NIST cybersecurity framework. 
 Provide cybersecurity awareness training to all state agency employees concerning 
cybersecurity risks and the responsibility of employees to comply with policies, standards, 
                                                
16
 Section 282.318(4)(a), F.S.  BILL: CS/SB 1708   	Page 5 
 
guidelines, and operating procedures adopted by the state agency to reduce those risks. The 
training may be provided in collaboration with the Cybercrime Office, a private sector entity, 
or an institution of the state university system. 
 Develop a process, consistent with FLDS rules and guidelines, to detect, report, and respond 
to threats, breaches, or cybersecurity incidents.  
 
Specifically, state agencies and local governments in Florida, must report all ransomware 
incidents and any cybersecurity incidents at severity levels three, four, and five incident as soon 
as possible, but no later than 48 hours after discovery of a cybersecurity incident and no later 
than 12 hours after discovery of a ransomware incident, to the Cybersecurity Operations 
Center.
17
 The Cybersecurity Operations Center shall notify the President of the Senate and the 
Speaker of the House of Representatives of any severity level three, four, or five as soon as 
possible, but no later than 12 hours after receiving the incident report from the state agency or 
local government.
18
 For state agency and local government incidents at severity levels one and 
two, they must report these to the Cybersecurity Operations Center and the Cybercrime Office at 
FDLE as soon as possible.
19
  
 
In addition, the Cybersecurity Operations Center must provide consolidated incident reports to 
the President of the Senate, Speaker of the House of Representatives, and the Advisory Council 
on a quarterly basis.
20
  
 
State agencies and local governments must also submit an after-action report to FLDS within 1 
week of the remediation of a cybersecurity or ransomware incident.
21
 The report must summarize 
the incident, state the resolution, and provide any insights from the incident. 
 
Public Record and Public Meetings Exemption for Specific Cybersecurity Records Held by 
Agencies 
The State Cybersecurity Act makes confidential and exempt from public records copying and 
inspection requirements the portions of risk assessments, evaluations, external audits, and other 
agency cybersecurity program reports that are held by an agency, if the disclosure would 
facilitate unauthorized access to, modification, disclosure, or destruction of data or IT 
resources.
22
 However, this information must be shared with the Auditor General, DLE 
Cybercrime Office, FLDS, and the Chief Inspector General. An agency may share its 
confidential and exempt documents with a local government, another agency, or a federal agency 
if given for a cybersecurity purpose, or in furtherance of the agency’s official duties.
23
  
 
The State Cybersecurity act also exempts portions of any public meeting that would reveal 
records that it makes confidential and exempt.
24
 
                                                
17
 Sections 282.318(3)(c)9.c, and 282.3185(5)(b)1., F.S. 
18
 Sections 282.318(3)(c)9.c.(II), and 282.3185(5)(b)2. F.S. 
19
  Sections 282.318(3)(c)9.d., 282.3185(5)(c), F.S. 
20
 Sections 282.318(3)(c)9.e, and 282.3185(5)(d), F.S. 
21
 Sections 282.318(4)(k), and 282.3185(6), F.S. See also, ch. 2022-220, Laws of Fla. 
22
 Section 282.318(5), F.S. 
23
 Section 282.318(7), F.S. 
24
 Section 282.318(6), F.S.  BILL: CS/SB 1708   	Page 6 
 
Florida Cybersecurity Advisory Council 
The Florida Cybersecurity Advisory Council (Advisory Council) within the DMS
25
 protects IT 
resources from cyber threats and incidents.
26
  
 
The Advisory Council’s membership must consist of:  
 The Lieutenant Governor or his or her designee. 
 The state chief information officer. 
 The state chief information security officer. 
 The director of the Division of Emergency Management or his or her designee. 
 A representative of the computer crime center of the Department of Law Enforcement, 
appointed by the executive director of the Department of Law Enforcement. 
 A representative of the Florida Fusion Center of the Department of Law Enforcement, 
appointed by the executive director of the Department of Law Enforcement. 
 The Chief Inspector General. 
 A representative from the Public Service Commission. 
 Up to two representatives from institutions of higher education located in this state, 
appointed by the Governor. 
 Three representatives from critical infrastructure sectors, one of whom must be from a water 
treatment facility, appointed by the Governor. 
 Four representatives of the private sector with senior level experience in cybersecurity or 
software engineering from within the finance, energy, health care, and transportation sectors, 
appointed by the Governor. 
 Two representatives with expertise on emerging technology, with one appointed by the 
President of the Senate and one appointed by the Speaker of the House of Representatives. 
 
The Advisory Council must assist the FLDS with the implementation of best cybersecurity 
practices, taking into consideration the final recommendations of the Florida Cybersecurity Task 
Force – a task force created to review and assess the state’s cybersecurity infrastructure, 
governance, and operations.
27
 The Advisory Council meets at least quarterly to:
28
 
 Review existing state agency cybersecurity policies. 
 Assess ongoing risks to state agency IT. 
 Recommend a reporting and information sharing system to notify state agencies of new risks. 
 Recommend data breach simulation exercises. 
 Develop cybersecurity best practice recommendations for state agencies, including 
continuous risk monitoring, password management, and protecting data in legacy and new 
systems. 
 Examine inconsistencies between state and federal law regarding cybersecurity. 
 
                                                
25
 Section 282.319(1), F.S. 
26
 Section 282.319(2), F.S. 
27
 Section 282.319(3), F.S. The Cybersecurity Task Force is no longer active. See, Florida DMS, Cybersecurity Task Force 
Overview, https://www.dms.myflorida.com/other_programs/cybersecurity_advisory_council/cybersecurity_task_force (last 
visited Mar. 29, 2023). 
28
 Section 282.319(9), F.S.  BILL: CS/SB 1708   	Page 7 
 
Beginning June 30, 2022, and each June 30 thereafter, the Advisory Council must submit 
cybersecurity recommendations to the Legislature.
29
 
 
Limitation on Liability  
Tort Liability and Negligence 
A tort is a civil legal action to recover damages for a loss, injury, or death due to the conduct of 
another. Some have characterized a tort as a civil wrong, other than a claim for breach of 
contract, in which a remedy is provided through damages.
30
 When a plaintiff files a tort claim, he 
or she alleges that the defendant’s “negligence” caused the injury. Negligence is defined as the 
failure to use reasonable care. It means the care that a reasonably careful person would use under 
similar circumstances. According to the Florida Standard Jury Instructions, negligence means 
“doing something that a reasonably careful person would not do” in a similar situation or “failing 
to do something that a reasonably careful person would do” in a similar situation.
31
 
 
When a plaintiff seeks to recover damages for a personal injury and alleges that the injury was 
caused by the defendant’s negligence, the plaintiff bears the legal burden of proving that the 
defendant’s alleged action was a breach of the duty that the defendant owed to the plaintiff.
32
  
 
Negligence Pleadings 
To establish a claim for relief and initiate a negligence lawsuit, a plaintiff must file a 
“complaint.” The complaint must state a cause of action and contain: a short and plain statement 
establishing the court’s jurisdiction, a short and plain statement of the facts showing why the 
plaintiff is entitled to relief, and a demand for judgment for relief that the plaintiff deems himself 
or herself entitled. The defendant responds with an “answer,” and provides in short and plain 
terms the defenses to each claim asserted, admitting or denying the averments in response.
33
 
 
Under the Florida Rules of Civil Procedure, there is a limited group of allegations that must be 
pled with “particularity.” These allegations include allegations of fraud, mistake, and a denial of 
performance or occurrence.
34
 
 
Four Elements of a Negligence Claim 
To establish liability, the plaintiff must prove four elements: 
 Duty – That the defendant owed a duty, or obligation, of care to the plaintiff; 
 Breach – That the defendant breached that duty by not conforming to the standard required; 
 Causation – That the breach of the duty was the legal cause of the plaintiff’s injury; and 
 Damages – That the plaintiff suffered actual harm or loss. 
 
                                                
29
 Section 282.319(11), F.S. 
30
 BLACK’S LAW DICTIONARY (11th ed. 2019). 
31
 Fla. Std. Jury Instr. Civil 401.3, Negligence. 
32
 Florida is a comparative negligence jurisdiction as provided in s. 768.81(2), F.S. In lay terms, if a plaintiff and defendant 
are both at fault, a plaintiff may still recover damages, but those damages are reduced proportionately by the degree that the 
plaintiff’s negligence caused the injury.  
33
 Fla. R. Civ. P. 1.110. 
34
 Fla. R. Civ. P. 1.120(b) and (c).  BILL: CS/SB 1708   	Page 8 
 
Burden or Standard of Proof 
A “burden of proof” is the obligation a party bears to prove a material fact. The “standard of 
proof” is the level or degree to which an issue must be proved.
35
 The plaintiff carries the burden 
of proving, by a specific legal standard, that the defendant breached the duty that was owed to 
the plaintiff that resulted in the injury. In civil cases, two standards of proof generally apply:  
 The “greater weight of the evidence” standard, which applies most often in civil cases, or  
 The “clear and convincing evidence” standard, which applies less often, and is a higher 
standard of proof.
36
 
 
However, there are certain statutory and common law presumptions
37
 that may shift the burden 
of proof from the party asserting the material fact in issue to the party defending against such 
fact.
38
 These presumptions remain in effect following the introduction of evidence rebutting the 
presumption, and the factfinder must decide if such evidence is strong enough to overcome the 
presumption.
39
 A presumption is a legal inference that can be made with knowing certain facts. 
Most presumptions are able to be rebutted, if proven to be false or thrown into sufficient doubt 
by the evidence.
40
  
 
Greater Weight of the Evidence 
The greater weight of the evidence standard of proof means “the more persuasive and convincing 
force and effect of the entire evidence in the case.”
41
 Some people explain the “greater weight of 
the evidence” concept to mean that, if each party’s evidence is placed on a balance scale, the side 
that dips down, even by the smallest amount, has met the burden of proof by the greater weight 
of the evidence. 
 
Clear and Convincing 
The clear and convincing standard, a higher standard of proof than a preponderance of the 
evidence, requires that the evidence be credible and the facts which the witness testifies to must 
be remembered distinctly. The witness’s testimony “must be precise and explicit and the 
witnesses must be lacking in confusion as to the facts in issue.” The evidence must be so strong 
that it guides the trier of fact to a firm conviction, to which there is no hesitation, that the 
allegations are true.
42
 
 
Standards of Care and Degrees of Negligence 
Courts have developed general definitions for the degrees of negligence.  
 
                                                
35
 5 Fla. Prac. Civil Practice s. 17.1, (2023 ed.)  
36
 Id. 
37
 These presumptions tend to be social policy expressions, such as the presumption that all people are sane or that all 
children born in wedlock are legitimate. 5 Florida Practice Series s. 16:1. 
38
 5 Florida Practice Series s. 16:1. 
39
 Id.  
40
 Legal Information Institute, Presumption, https://www.law.cornell.edu/wex/presumption (last visited Mar. 29, 2023). 
41
 Fla. Std. Jury Instr. 401.3, Greater Weight of the Evidence. 
42
 Slomowitz v. Walker, 429 So. 2d 797, 800 (Fla. 4
th
 DCA 1983).  BILL: CS/SB 1708   	Page 9 
 
Slight Negligence 
 
The failure to exercise great care.
43
 
Ordinary 
Negligence or 
Simple Negligence 
 
The conduct that a reasonable and prudent person would know might 
result in injury to others.
44
 
Gross Negligence A course of conduct which a reasonable and prudent person knows 
would probably and most likely result in injury to another.
45
 To prove 
gross negligence, a plaintiff must show: circumstances that, when 
taken together, create a clear and present danger; an awareness that the 
danger exists; and a conscious, voluntary act or omission to act that 
will likely result in an injury. 
 
Florida Information Protection Act (FIPA)
46
 
FIPA is a data security measure that requires governmental entities, specific business entities, 
and any third-party agent that holds or processes personal information on behalf of these entities 
to take reasonable measures to protect a consumer’s personal information. Additionally, FIPA 
requires covered business entities
47 
that are subject to data breaches to attempt to remediate the 
breach by notification to affected consumers in Florida, and in cases where more than 500 
individual’s information was breached—by additional notification to the Department of Legal 
Affairs (DLA).
48
 If the breach affected more than 1,000 individuals in Florida, the entity must 
also notify credit reporting agencies, with certain exceptions.
49
  
 
FIPA defines “personal information” as:  
 Online account information, such as security questions and answers, email addresses, and 
passwords; and 
 An individual’s first name or first initial and last name, in combination with any one or more 
of the following information regarding him or her: 
o A social security number; 
o A driver license or similar identity verification number issued on a government 
document; 
o A financial account number or credit or debit card number, in combination with any 
required security code, access code, or password that is necessary to permit access to an 
individual’s financial account;  
                                                
43
 See Faircloth v. Hill, 85 So. 2d 870 (Fla. 1956); see also Holland America Cruises, Inc. v. Underwood, 470 So. 2d 19 (Fla. 
2d DCA 1985); Werndli v. Greyhound Corp., 365 So. 2d 177 (Fla. 2d DCA 1978); 6 Florida Practice Series s. 1.2.  
44
 See De Wald v. Quarnstrom, 60 So. 2d 919 (Fla. 1952); see also Clements v. Deeb, 88 So. 2d 505 (Fla. 1956); 6 Florida 
Practice Series s. 1.2.  
45
 See Clements, 88 So. 2d 505; 6 Florida Practice Series s. 1.2.  
46
 Section 501.171, F.S.; Chapter 2014-189, Laws of Fla. (FIPA expanded and updated Florida’s data breach disclosure laws 
contained in s. 817.5681, F.S. (2013), which was adopted in 2005 and repealed in 2014). 
47
 A “covered entity” is a sole proprietorship, partnership, corporation, trust, estate, cooperative, association, or other 
commercial entity that acquires, maintains, stores, or uses personal information. Section 501.171(1)(b), F.S. 
48
 Florida Office of the Attorney General (OAG), How to Protect Yourself: Data Security, 
http://myfloridalegal.com/pages.nsf/Main/53D4216591361BCD85257F77004BE16C (last visited Mar. 29, 2023). Section 
501.171(3)-(4), F.S. 
49
 Section 501.171(3)-(6), F.S.  BILL: CS/SB 1708   	Page 10 
 
o Medical history information or health insurance identification numbers; or 
o An individual’s health insurance identification numbers.
50
 
 
Personal information does not include information: 
 About an individual that a federal, state, or local governmental entity has made publicly 
available; or 
 That is encrypted, secured, or modified to remove elements that personally identify an 
individual or that otherwise renders the information unusable.
51
 
 
FIPA does not provide a private cause of action, but authorizes the DLA to file charges against 
covered entities under Florida’s Unfair and Deceptive Trade Practices Act (FDUTPA).
52
 
 
In addition to the remedies provided for under FDUTPA, a covered entity that fails to notify the 
DLA, or an individual whose personal information was accessed, of the data breach is liable for a 
civil penalty of $1,000 per day for the first 30 days of any violation; $50,000 for each subsequent 
30-day period of violation; and up to $500,000 for any violation that continues more than 180 
days. These civil penalties apply per breach, not per individual affected by the breach. 
 
Cybersecurity Standards 
Local governments are required to adopt cybersecurity standards that safeguard the local 
government’s data, information technology, and information technology resources to ensure 
availability, confidentiality, and integrity.
53
 The standards must be consistent with generally 
accepted best practices for cybersecurity, including the NIST cybersecurity framework.
54
 Once it 
adopts the standards, the local government must notify FLDS as soon as possible.
55
 
 
The National Institute for Standards and Technology (NIST) is a non-regulatory federal agency 
housed within the U.S. Department of Commerce. NIST is charged with providing a prioritized, 
flexible, repeatable, performance-based, and cost-effective framework that helps owners and 
operators of critical infrastructure identify, assess, and manage cyber risk. While the framework 
was developed with critical infrastructure in mind, it can be used by organizations in any sector 
of the economy or society.
56
 The framework is designed to complement an organization’s own 
approach to cybersecurity risk management. As such, there are a variety of ways to use the 
framework and the decision about how to apply it is left to the implementing organization. For 
example, an organization may use its current processes and consider the framework to identify 
opportunities to strengthen its cybersecurity risk management. The framework, overall, provides 
an outline of best practices that helps organizations decide where to focus resources for 
cybersecurity protection.
57
 Other cybersecurity standards include: 
                                                
50
 Section 501.171(1)(g)1., F.S.; OAG supra note 41. 
51
 Section 501.171(1)(g)2., F.S. 
52
 Section 501.171(9), (10), F.S.; OAG supra note 41. 
53
 Section 282.3185(4)(a), F.S. 
54
 Id. 
55
 Section 282.3185(4)(d), F.S. 
56
 National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (last visited March 29, 2023).  
57
 Id.   BILL: CS/SB 1708   	Page 11 
 
 
NIST special publication 800-171 Provides recommended requirements for protecting the 
confidentiality of controlled unclassified information. If a 
manufacturer is part of a Department of Defense, General 
Services Administration, NASA, or other state or federal 
agency supply chain then they must comply with these 
security requirements.
58
 
NIST special publications 800-53 
and 800-53A 
 
A category of security and privacy controls. Covers the steps 
in the Risk Management Framework that address security 
controls for federal information systems.
59
  
The Federal Risk and 
Authorization Management 
Program security assessment 
framework 
 
Organization established by the General Services 
Administration (a Federal Government Program) that provides 
U.S. federal agencies, state agencies, and their vendors with a 
standardized set of best practices to assess, adopt, and monitor 
the use of cloud-based technology services under the Federal 
Information Security Management Act (FISMA).
60
  
CIS Critical Security Controls 
 
The Center for Internet Security Critical Security Controls 
(CIS) are a prescriptive and simplified set of best practices for 
strengthening cybersecurity for different organizations. CIS 
was created in response to extreme data losses experienced by 
organizations in the U.S. defense industrial base.
61
 
The International Organization 
for Standardization/International 
Electrotechnical Commission 
27000 – series family of standards 
ISO/IEC 27001 (ISO) enables organizations of all sectors to 
manage security of financial information, intellectual property, 
employee data and information entrusted by third parties. ISO 
has auditors and is an international standard. There are 804 
technical committees and subcommittees concerned with such 
standards of development.
62
 
 
                                                
58
 NIST, What is the NIST SP 800-171 and Who Needs to Follow It?, https://www.nist.gov/blogs/manufacturing-innovation-
blog/what-nist-sp-800-171-and-who-needs-follow-it-0#:~:text=NIST%20SP%20800-
171%20is%20a%20NIST%20Special%20Publication,protecting%20the%20confidentiality%20of%20controlled%20unclassi
fied%20information%20%28CUI%29 (last visited Mar. 29, 2023). 
59
 NIST, Selecting Security and Privacy Controls: Choosing the Right Approach, https://www.nist.gov/blogs/cybersecurity-
insights/selecting-security-and-privacy-controls-choosing-right-approach (last visited Mar. 29, 2023). 
60
 Reciprocity, How State and Local Agencies Can Use FedRAMP, https://reciprocity.com/how-state-and-local-agencies-can-
use-
fedramp/#:~:text=The%20Federal%20Risk%20and%20Authorization%20Management%20Program%20%28FedRAMP%29
,cloud%20products%20offered%20by%20cloud%20service%20providers%20%28CSPs%29 (last visited Mar. 29, 2023). 
61
 CIS Security, CIS Critical Security Controls, https://www.cisecurity.org/controls (last visited Mar. 29, 2023). 
62
 ITGovernance, ISO 27001, The International Security Standard, 
https://www.itgovernanceusa.com/iso27001#:~:text=ISO%2027001%20is%20a%20globally%20recognized%20information
%20security,trusted%20benchmark.%20Protect%20your%20data%2C%20wherever%20it%20lives (last visited Mar. 29, 
2023).  BILL: CS/SB 1708   	Page 12 
 
III. Effect of Proposed Changes: 
IT Project Oversight 
Section 4 amends s. 282.0051, F.S., to require the DMS, acting through the FLDS, to provide 
independent
63
 oversight of state agency IT projects that cost $10 million or more. Specifically:  
 The DMS cannot provide project oversight if it has provided, or may be asked to provide, 
any operational or technical advice on the project, including advice and review. However, it 
can procure project oversight for agencies and other entities; 
 The DMS must create a form contract that state agencies, the DLA, DFS, and DACS
64
 can 
use to procure project oversight services;  
 Independent entities that provide project oversight must submit a project oversight report to 
the DMS; and 
 The DMS, acting through the FLDS, must compile the project oversight reports it receives on 
a quarterly basis and submit a report to the Governor, President of the Senate, and Speaker of 
the House of Representatives. 
 
Operations Committee 
Section 4 also creates an operations committee within the FLDS that will develop collaborative 
efforts regarding cybersecurity issues between agencies, including agency responses to 
cybersecurity incidents and interoperability of agency projects. The Secretary of the DMS will 
serve as the committee’s executive director, and the committee’s membership will consist of:  
 The Attorney General, or his or her designee; 
 The Secretary of State, or his or her designee;  
 The executive director of the Department of Law Enforcement, or his or her designee; 
 The Secretary of Transportation, or his or her designee;  
 The director of the Division of Emergency Management, or his or her designee; 
 The Secretary of Health Care Administration, or his or her designee;  
 The Commissioner of Education, or his or her designee;  
 The executive director of the Department of Highway Safety and Motor Vehicles, or his or 
her designee; 
 The chair of the Public Service Commission, or his or her designee;  
 The director of the Florida State Guard, or his or her designee;  
 The adjutant General of the Florida National Guard, or his or her designee; and 
 Any other agency head appointed by the Governor. 
 
Appointments 
Section 4 also removes the DMS Secretary’s authority to appoint the FLDS CIO, and gives that 
authority to the Governor, subject to confirmation by the Senate.  
                                                
63
 Section 3 of the bill defines “independent” as, for an entity providing independent verification and validation, having no 
technical, managerial, or financial interest in the relevant technology project; no relationship to the relevant agency; and no 
responsibility for or participation in any aspect of the project, which includes project oversight by the Florida Digital 
Service.” 
64
 These entities, combined, are defined as the “enterprise” for the purposes of ch. 282, F.S. See s. 282.0041(15), F.S.  BILL: CS/SB 1708   	Page 13 
 
 
The bill removes the CIO’s duty to consult with the DMS’ Secretary to designate a state chief 
data officer. 
 
Section 4 of the bill creates the position of state chief technology officer (CTO), who is 
responsible for: 
 Exploring technology solutions to meet the enterprise’s needs;  
 The deployments of adopted enterprise solutions;  
 Compliance with the cloud-first policy, for which the CTO may acquire cloud migration 
services;  
 Recommending best practices to increase technology project success; 
 Developing strategic partnerships with the private sector; and 
 Directly supporting enterprise cybersecurity and data interoperability initiatives.  
 
The CIO will designate the CTO.  
 
State Data Center 
Section 5 amends s. 282.201, F.S., to add additional oversight structure to the state data center. 
Pursuant to the bill, the data center will be overseen and accountable to the DMS, in consultation 
with the CIO, state chief data officer, CISO, and CTO. The CIO will appoint the director of the 
data center. 
 
If the data center will procure or purchase enterprise architecture that would be comparable to a 
project subject to oversight pursuant to s. 282.0051(4), F.S., if the cost will be $10 million or 
more, and that may be consumed by an enterprise, then the data center must provide the 
procurement or purchase documents to the DMS and the FLDS before its publication.  
 
As an additional function of this oversight, the bill grants the CIO authority to assume 
responsibility for the Northwest Regional Data Center contract, and states that “notwithstanding 
the terms of the contract” the Northwest Regional Data Center must provide the FLDS with 
access to information regarding its operation of the state data center. 
 
The bill creates an additional subsection that requires the state data center and any successor 
entity, including but not limited to the Northwest Regional Data Center, to give the FLDS full 
access to any infrastructure, system, application, or other means that hosts, supports, or manages 
data held by a state agency or other enterprise member. The state data center or its successor 
must fully integrate with the Cybersecurity Operations Center.  
 
Lastly, the state data center or its successor must submit a quarterly report to the FLDS that 
provides the number of: 
 Technology assets which are within 1 year of the end of their life, or beyond the end of their 
life, as defined by their manufacturer; 
 Technology assets which are unsupported by their manufacturer, or within 2 years of being 
unsupported;  BILL: CS/SB 1708   	Page 14 
 
 Workloads which are and those which are not hosted by a commercial cloud service provider 
as defined in the NIST publication 500-292; and 
 Service level disruptions and their average duration. 
 
State Cybersecurity Act 
Agency Cybersecurity 
Section 6 amends s. 282.318, F.S., to broaden agency cybersecurity duties, requiring that each 
state agency head: 
 Designate a chief information security officer to integrate the technical and operational 
cybersecurity efforts at their agency with the Cybersecurity Operations Center (CSOC), or 
request that the FLDS procure one for them. This chief information security officer will 
report to the agency’s CIO;  
 Provide notice of the designation of a chief information security officer to the FLDS by 
January 1, annually; and 
 Incorporate the Florida State Guard resources.  
 
The bill clarifies that the role of the agency information security managers is to ensure agency 
compliance with cybersecurity governance, manage risk, and ensure compliance with the state’s 
incident response plan.  
 
State agencies must now conduct their comprehensive cybersecurity risk assessments on an 
annual basis, rather than triennially, per the criteria, methodology, and scope developed by the 
state CIO. The bill allows the risk assessment to be facilitated by the DMS, or completed by a 
private sector vendor. The agency head or his or his designee, and the FLDS must sign off on the 
risk assessment’s findings.  
 
Cybersecurity Incident Reporting Requirements 
Sections 6 and 7 broaden the FLDS’ role in reporting of cybersecurity incidents at agencies and 
local governments. The bill:  
 Grants the FLDS authority to respond to any state agency cybersecurity incident;  
 Requires an agency and local government to report any level cybersecurity incident to the 
FLDS within 4 hours of discovery of the incident; and 
 Requires an agency and local governments to report a ransomware incident to the FLDS 
within 2 hours of its discovery. 
The FLDS must notify the Governor, Senate President, and Speaker of the House of 
Representatives of an agency’s or local government’s failure to timely report a cybersecurity 
incident. The CSOC must also notify the Governor, Senate President, and Speaker of the House 
of Representatives, in a secure environment, of level 3, 4, or 5 cybersecurity incidents. 
 
The bill amends an agency’s or local government’s duty to report cybersecurity incidents to the 
DLE’s Cybercrime Office and the CSOC, whereas previously, level 1 or 2 incidents were 
required to be reported as soon as possible, now they must report within the timeframes listed 
above.   BILL: CS/SB 1708   	Page 15 
 
Emergency Support Function 
The bill clarifies the DMS’ (acting through the FLDS) role under the state comprehensive 
emergency management plan, requiring that it “lead an emergency support function, ESF 
CYBER and DIGITAL.” This refers to its responsibility to assist not only with cybersecurity, in 
accordance with ESF CYBER standards, but also to assist with any digital needs the state may 
have, such as the creation of a website, during a period of emergency.  
 
Cybersecurity Briefings 
The DMS, acting through the FLDS, is also vested with the duty to provide cybersecurity 
briefings to legislative members of committees or subcommittees that are responsible for 
cybersecurity policy.  
 
The bill also allows legislative committees or subcommittees that are responsible for 
cybersecurity-related policy to hold closed meetings for the purpose of briefing the body on 
records that are confidential and exempt pursuant to s. 282.318(5) and (6), F.S.  
 
Florida Cybersecurity Advisory Council 
Section 8 amends s. 282.319, F.S., to remove the requirement that one of the representatives 
appointed to the Florida Cybersecurity Advisory Council be from a water treatment facility. 
 
Liability for Cybersecurity Incident-Related Torts 
Section 9 amends s. 786.401, F.S., to provide that a county or municipality that substantially 
complies with incident notification requirements in s. 282.3185, F.S., is not liable for torts 
related to a cybersecurity incident. It further states that a county’s or municipality’s failure to 
substantially implement a cybersecurity program that complies with s. 282.3185, F.S., does not 
constitute evidence of negligence or negligence per se. 
 
The bill establishes the same bar on liability for private businesses
65
 that are involved in a 
cybersecurity incident, if the entity substantially complies with the data breach notice 
requirements of s. 501.171, F.S., if applicable, and have: 
 Adopted a cybersecurity program that substantially aligns with the current version of the: 
o NIST Framework for Improving Critical Infrastructure Cybersecurity;  
o NIST special publication 800-171; 
o NIST special publications 800-53 and 800-53A;  
o Federal Risk and Authorization management Program security assessment framework;  
o CIS Critical Security Controls; or 
o International Organization for Standardization/International Electrotechnical Commission 
27000-series family of standards; or 
 Substantially conformed its cybersecurity to the following laws, if regulated by state or 
Federal governments, or is otherwise subject to the requirements of any of the following laws 
and regulations: 
                                                
65
 The bill limits this to sole proprietorships, partnerships, corporations, trusts, estates, cooperatives, associations, or other 
commercial entities. Additionally, it specifically applies to businesses that acquire, maintain, store, or use personal 
information   BILL: CS/SB 1708   	Page 16 
 
o Security requirements of HIPAA; 
o Title V of the Gramm-Leach-Bliley Act of 1999;  
o Federal Information Security Modernization Act of 2014; or 
o Health Information Technology for Economic and Clinical Health Act. 
 
The following factors should be used to determine a private business’ or covered entity’s 
substantial compliance with the standards provided in the bill: 
 Size and complexity of the covered entity;  
 Nature and scope of the covered entity’s activities; and 
 Sensitivity of the information that the business protects.  
 
A commercial entity that substantially complies with a combination of industry-recognized 
cybersecurity frameworks or standards, including the payment card industry data security 
standard, is provided a presumption against liability for a cybersecurity incident only if it updates 
its compliance with the frameworks or standards outlined in subsection (2) within 1 year of the 
latest publication date stated in the revision after two or more of its pertinent frameworks or 
standards have been updated. 
 
Whether the defendant is a local government, private business, or covered entity, it has the 
burden of proof to establish their substantial compliance to reach the bar on liability. 
 
Lastly, the bill provides that s. 786.401, F.S., does not establish a private cause of action. 
 
Miscellaneous 
Section 1 provides that this Act may be entitled the “Florida Cyber Protection Act.”  
 
Section 2 amends s. 110.205, F.S., to classify personnel who are employed by or who report to 
the state chief information security officer, the state chief data officer, a chief information 
security officer, and an agency information security manager as select exempt personnel, rather 
than career services. 
 
Section 3 amends definitions used in ch. 282, F.S., to provide and amend definitions for some of 
the terms introduced by amendments to the bill.  
 
Section 10 provides that the act takes effect on July 1, 2023. 
IV. Constitutional Issues: 
A. Municipality/County Mandates Restrictions: 
Not applicable. The mandate restrictions do not apply because the bill does not require 
counties and municipalities to spend funds, reduce counties’ or municipalities’ ability to 
raise revenue, or reduce the percentage of state tax shared with counties and 
municipalities.  BILL: CS/SB 1708   	Page 17 
 
B. Public Records/Open Meetings Issues: 
None. 
C. Trust Funds Restrictions: 
None. 
D. State Tax or Fee Increases: 
None. 
E. Other Constitutional Issues: 
Open Meetings 
Meetings of the Legislature must be open and noticed as provided in article. III, section 
4(e), of the Florida Constitution, except with respect to those meetings exempted by the 
Legislature pursuant to article I, section 24, Florida Constitution, or specifically closed by 
the Constitution.
66
 The Legislature must adopt rules which provide that all legislative 
committee and subcommittee meetings of each house and joint conference committee 
meetings be open and noticed.
67
 Such rules must also provide:  
 
[A]ll prearranged gatherings, between more than two members of the 
legislature, or between the governor, the president of the senate, or the speaker 
of the house of representatives, the purpose of which is to agree upon formal 
legislative action that will be taken at a subsequent time, or at which formal 
legislative action is taken, regarding pending legislation or amendments, shall 
be reasonably open to the public. All open meetings shall be subject to order 
and decorum. This section shall be implemented and defined by the rules of 
each house, and such rules shall control admission to the floor of each 
legislative chamber and may, where reasonably necessary for security 
purposes or to protect a witness appearing before a committee, provide for the 
closure of committee meetings. Each house shall be the sole judge for the 
interpretation, implementation, and enforcement of this section. 
 
Rule 1.44 of the Florida Senate requires that all meetings at which legislative business
68
 
is discussed between two or more members of the Legislature be open to the public, 
unless, at the sole discretion of the President after consultation with appropriate 
authorities—the meeting concerns measures to address security, espionage, sabotage, 
attack, and other acts of terrorism, or for the protection of a witness as required by law. 
 
Lines 1045 through 1051 of the bill state that legislative committees or subcommittees 
that are responsible for matters that relate to cybersecurity may hold closed meetings 
                                                
66
 FLA. CONST. art. I, s. 24. 
67
 FLA. CONST. art. III, s. 4(e). 
68
 “Legislative business” is defined as “issues pending before, or upon which foreseeable action is reasonably expected to be 
taken by the Senate, a Senate committee, or a Senate subcommittee.” Fla. Senate R. 1.44.  BILL: CS/SB 1708   	Page 18 
 
closed, if approved by the respective legislative body under the rules of such legislative 
body. This is duplicative of Senate Rule 1.44. Additionally, it may conflict with article 
III, section 4(e), of the Florida Constitution, because the statute—rather than a legislative 
rule or constitutional provision—provides for the methods in which a Legislative body 
may close its meetings.  
 
Lines 352-378 create an operations committee that will consist of the CIO and many state 
agency heads, or their designees. This may present a need to notice a public meeting 
whenever the CIO discusses cybersecurity issues with any other member of the 
operations committee—whether or not it is for operations committee business.
69
 This 
may cause issues in the performance of some of the CIO’s assigned duties regarding 
oversight of agency cybersecurity operations. 
 
Access to Courts 
The State Constitution provides in Article 1, s. 21, that “[the courts shall be open to every 
person for redress of any injury, and justice shall be administered without sale, denial or 
delay.” 
 
Case law has demonstrated, however, that this provision is not absolute. In 1973, the 
Florida Supreme Court, in Kluger v. White,
70
 held that it would not completely prohibit 
the Legislature from altering a cause of action, but would not allow it to “destroy a 
traditional and long-standing cause of action upon mere legislative whim…”  
 
The case involved the abolition of a statute governing a tort action for property damage in 
an automobile accident case. When the Legislature abolished the remedy, it did not 
provide an alternative protection to the injured party. The Court was confronted with the 
issue of whether the Legislature could abolish a right of access to the courts. The Court 
determined that the Legislature may not abolish a pre-1968 common law right or a 
statutory cause of action unless the Legislature provides a reasonable alternative to that 
action or unless an overpowering public necessity exists for abolishing the right of action. 
The Court applies a three-part test to determine whether a statute violates the access to 
courts provision: 
 Does the change abolish a preexisting right of access? 
 If so, whether a reasonable alternative exists to protect that preexisting right of 
access. 
 If no reasonable alternative exists, whether an overwhelming public necessity exists.
71
  
 
Restrictions on the ability to bring a lawsuit have been upheld as constitutional, but the 
point at which a restriction becomes an unconstitutional bar is not well defined. 
 
Impairment of Contracts 
The bill unilaterally transfers a contract with a private party to a new government entity. 
The United States Constitution and the Florida Constitution prohibit the state from 
                                                
69
 See, e.g., Florida Citizens Alliance, Inc. v. School Board of Collier County, 328 So.3d 22 (Fla. 2d DCA 2021). 
70
 Kluger v. White, 281 So. 2d 1 (Fla. 1973). 
71
Eller v. Shova, 630 So. 2d 537 (Fla. 1993).  BILL: CS/SB 1708   	Page 19 
 
passing any law impairing the obligation of contracts.
72
 “[T]he first inquiry must be 
whether the state law has, in fact, operated as a substantial impairment of a contractual 
relationship. The severity of the impairment measures the height of the hurdle the state 
legislation must clear.”
73
 If a law does impair contracts, the courts will assess whether the 
law is deemed reasonable and necessary to serve an important public purpose.
74
 The 
factors that a court will consider when balancing the impairment of contracts with the 
public purpose include: 
 Whether the law was enacted to deal with a broad, generalized economic or social 
problem; 
 Whether the law operates in an area that was already subject to state regulation at the 
time the parties undertook their contractual obligations, or whether it invades an area 
never before subject to regulation; and 
 Whether the law results in a temporary alteration of the contractual relationships of 
those within its scope, or whether it permanently and immediately changes those 
contractual relationships, irrevocably and retroactively.
75
 
 
It is unclear to what extent the provisions specific to the state data center and the 
Northwest Regional Data Center contract will be impaired as a result of this bill. The 
requirement that the state data center fully integrate with the cybersecurity operations 
center could at least require an amendment to the current contract.  
V. Fiscal Impact Statement: 
A. Tax/Fee Issues: 
None. 
B. Private Sector Impact: 
Private businesses may enjoy lower cyber liability insurance premiums as a result of their 
shield from liability created by the bill. 
C. Government Sector Impact: 
The bill may increase state expenditures related to cybersecurity oversight. 
VI. Technical Deficiencies: 
The committee created on lines 282-311 of the bill is an advisory body adjunct to an executive 
agency, and therefore must be established and maintained in accordance with the requirements of 
s. 20.052, F.S. The committee must be created pursuant to a finding of necessity and public 
benefit, and be terminated when it no longer serves that purpose. Additionally, meetings of any 
                                                
72
U.S. Const. Article I, s. 10; Art. I, s. 10, Fla. Const. 
73
Pomponio v Claridge of Pompano Condominium, Inc., 378 So. 2d 774, 779 (Fla. 1979) (quoting Allied Structural Steel Co. 
v. Spannaus, 438 U.S. 234, 244-45 (1978)). See also General Motors Corp. v. Romein, 503 U.S. 181 (1992). 
74
Park Benziger & Co. v. Southern Wine & Spirits, Inc., 391 So. 2d 681, 683 (Fla. 1980); Yellow Cab Co. of Dade County v. 
Dade County, 412 So. 2d 395, 397 (Fla. 3rd DCA 1982) (citing United States Trust Co. v. New Jersey, 431 U.S. 1 (1977)). 
75
See supra note 2.  BILL: CS/SB 1708   	Page 20 
 
collegial body created by specific statutory enactment as an adjunct to an executive agency must 
be open to the public, in accordance with s. 286.011, F.S., and minutes must be maintained.  
VII. Related Issues: 
Legislative Briefing on Confidential and Exempt Subject Matter 
The bill’s provision that allows any legislative committee or subcommittee that is responsible for 
cybersecurity-related issues to hold closed meetings for the purposes of being briefed on 
confidential and exempt subject matter is duplicative of the Legislature’s current ability to do so. 
VIII. Statutes Affected: 
This bill substantially amends the following sections of the Florida Statutes: 282.0041, 282.0051, 
282.201, 282.318, 282.3185, and 282.319. 
 
This bill creates section 768.401of the Florida Statutes. 
IX. Additional Information: 
A. Committee Substitute – Statement of Substantial Changes: 
(Summarizing differences between the Committee Substitute and the prior version of the bill.) 
CS by Governmental Oversight and Accountability on March 29, 2023: 
The committee substitute: 
 Classifies personnel employed by or reporting to the state CISO, state chief data 
officer, a chief information security officer, and an agency information security 
manager as select exempt. 
 Removes language in the bill that would have shifted authority relating to 
cybersecurity governance from the DMS to the FLDS. 
 Provides DMS additional IT project and cybersecurity incident monitoring oversight. 
 Modifies the FLDS’ operations committee’s membership. 
 Requires the CIO to designate a state chief technology officer, and outlines its duties.  
 Restores the $10 million threshold for the FLDS’ oversight of agency IT projects. 
 Specifies oversight of the State Data Center and requires the FLDS rather than the 
DMS to appoint its director. 
 Requires the SDC to fully integrate with the CSOC. 
 Requires state agencies to designate a chief information technology security officer, 
in addition to their information security manager. This new position will integrate the 
agency’s technical and operational cybersecurity efforts with the CSOC. 
 Requires agencies to conduct their comprehensive risk assessment annually, rather 
than triennially, and requires that it be conducted in accordance with criteria 
developed by the CISO. 
 Removes language that required legislative members to be invited to the 
Cybersecurity Advisory Council Meetings. 
 Removes language that created the State Technology Advancement Council.  BILL: CS/SB 1708   	Page 21 
 
 Clarifies that a local government or private business that seeks the protection from 
liability created by the bill has the burden to prove substantial compliance with 
specific cybersecurity protocols. 
B. Amendments: 
None. 
This Senate Bill Analysis does not reflect the intent or official position of the bill’s introducer or the Florida Senate.