North Carolina 2025-2026 Regular Session

North Carolina Senate Bill S562 Compare Versions

OldNewDifferences
11 GENERAL ASSEMBLY OF NORTH CAROLINA
22 SESSION 2025
3-S 1
4-SENATE BILL 562
3+S D
4+SENATE BILL DRS45291-LRa-130A
5+
56
67
78 Short Title: Cybersecurity and Quantum Resilience Study. (Public)
89 Sponsors: Senators Theodros, Salvador, and Chaudhuri (Primary Sponsors).
9-Referred to: Rules and Operations of the Senate
10-March 26, 2025
11-*S562 -v-1*
10+Referred to:
11+
12+*DRS45291 -LRa-130A*
1213 A BILL TO BE ENTITLED 1
1314 AN ACT ESTABLISHING THE NORTH CAROLINA CYBERSECURITY AND QUANTUM 2
1415 RESILIENCE STUDY COMMISSION AND APPROPRIATING FUNDS FOR THAT 3
1516 PURPOSE. 4
1617 The General Assembly of North Carolina enacts: 5
1718 SECTION 1.(a) This act shall be known and may be cited as the North Carolina 6
1819 Cybersecurity and Quantum Resilience Study Act. 7
1920 SECTION 1.(b) The North Carolina Cybersecurity and Quantum Resilience Study 8
2021 Commission (Commission) is established to investigate the potential impacts of emerging 9
2122 quantum computing technologies on the security of State systems, legacy encryption methods, 10
2223 and critical infrastructure—including the Internet of Things (IoT) and smart city initiatives. The 11
2324 Commission shall review vulnerabilities and provide recommendations on necessary future 12
2425 measures to enhance the state's cybersecurity posture. To help guide the Commission work, the 13
2526 General Assembly finds that: 14
2627 (1) Advances in quantum computing pose potential risks to traditional encryption 15
2728 methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve 16
2829 Cryptography (CC), that many State and local systems rely on. 17
2930 (2) Emerging technologies and IoT integrations, common in smart city initiatives, 18
3031 could be at risk if quantum computing breakthroughs compromise existing 19
3132 security protocols. 20
3233 (3) North Carolina is home to a robust academic and technological ecosystem 21
3334 which can contribute significantly to understanding and mitigating these risks. 22
3435 (4) A proactive study is necessary to understand the scope of these vulnerabilities 23
3536 and to inform potential legislative or administrative actions in the future. 24
3637 SECTION 1.(c) The Commission shall be composed of twenty-one (21) members, 25
3738 with seven members appointed by the Governor, seven members appointed by the President Pro 26
3839 Tempore of the Senate, and seven members appointed by the Speaker of the House of 27
3940 Representatives, as follows: 28
4041 (1) Five representatives from cabinet agencies appointed by the Governor. 29
4142 (2) Three cybersecurity experts from both the public and private sectors appointed 30
4243 by the President Pro Tempore. 31
4344 (3) Two academic experts in quantum computing and cybersecurity from North 32
4445 Carolina institutions appointed by the President Pro Tempore 33
4546 (4) Three industry representatives involved in IoT, smart infrastructure, and 34
46-cryptographic technologies appointed by the Speaker. 35 General Assembly Of North Carolina Session 2025
47-Page 2 Senate Bill 562-First Edition
47+cryptographic technologies appointed by the Speaker. 35
48+FILED SENATE
49+Mar 25, 2025
50+S.B. 562
51+PRINCIPAL CLERK General Assembly Of North Carolina Session 2025
52+Page 2 DRS45291-LRa-130A
4853 (5) Two public policy experts with experience in technology and cybersecurity 1
4954 appointed by the Speaker. 2
5055 (6) Six members of the general public knowledgeable about State government or 3
5156 information technology. 4
5257 SECTION 1.(d) The Commission is charged with the following duties: 5
5358 (1) Conducting a comprehensive review of state IT systems and critical 6
5459 infrastructure to identify vulnerabilities associated with legacy encryption 7
5560 methods. 8
5661 (2) Evaluating the potential impact of quantum computing on these systems. 9
5762 (3) Analyzing current and emerging quantum-resistant cryptographic standards. 10
5863 (4) Assessing risks in IoT and smart city implementations. 11
5964 (5) Providing a roadmap and recommendations for necessary legislative, 12
6065 regulatory, or administrative measures to bolster cybersecurity against future 13
6166 quantum threats. 14
6267 SECTION 1.(e) The Commission's tasks and deliverables include: 15
6368 (1) Risk assessment to identify and document systems and sectors most 16
6469 vulnerable to quantum-related cyber threats and evaluate the state's current 17
6570 cybersecurity measures and determine gaps in protection. 18
6671 (2) Research collaboration to engage with local universities and industry experts 19
6772 to gather insights on quantum-resistant cryptographic techniques. 20
6873 (3) Develop a recommendation roadmap to propose a timeline for transitioning to 21
6974 quantum-safe encryption methods where needed and outline potential policies 22
7075 or incentives for upgrading critical infrastructure security. 23
7176 SECTION 1.(f) The Commission shall submit a comprehensive report with findings, 24
7277 a detailed risk assessment, and recommended actions to the General Assembly by July 1, 2026. 25
7378 SECTION 2.(a) Effective July 1, 2025, there is appropriated from the General Fund 26
7479 to the General Assembly the sum of two hundred fifty thousand dollars ($250,000) to fund the 27
7580 work of the Commission, including research initiatives, public hearings, stakeholder meetings, 28
7681 and report development. The Commission may explore potential partnerships or federal grant 29
7782 opportunities to supplement research and study efforts. 30
7883 SECTION 2.(b) The Commission shall be convened within 30 days of this act's 31
7984 enactment. The Commission members shall elect a chair and vice-chair. Members of the 32
8085 Commission shall receive reimbursement as provided by Chapter 138 of the General Statutes. 33
8186 SECTION 2.(c) Sensitive information received by the Commission shall remain 34
8287 confidential and does not constitute a public record as defined by G.S. 132-1. For the purposes 35
8388 of this subsection, the chair and vice-chair of the Commission may designate jointly information 36
8489 as sensitive after balancing the need for public access against security concerns and 37
8590 confidentiality requirements. 38
8691 SECTION 2.(d) The Joint Legislative Committee on Information Technology shall 39
8792 monitor the commission's progress. The Commission's report and recommendations will be 40
8893 reviewed by the General Assembly to determine any further legislative or administrative actions 41
8994 necessary during the 2026 Regular Session of the 2025 General Assembly, with provisions for 42
9095 subsequent studies or actions as needed. 43
9196 SECTION 3. Except as otherwise provided, this act is effective when it becomes 44
9297 law. 45