1 | 1 | | 85R21640 GRM-D |
---|
2 | 2 | | By: Blanco, Lucio III, H.B. No. 1452 |
---|
3 | 3 | | Gonzales of Williamson, Capriglione, |
---|
4 | 4 | | Elkins |
---|
5 | 5 | | Substitute the following for H.B. |
---|
6 | 6 | | |
---|
7 | 7 | | |
---|
8 | 8 | | A BILL TO BE ENTITLED |
---|
9 | 9 | | AN ACT |
---|
10 | 10 | | relating to a study regarding cyber attacks on election |
---|
11 | 11 | | infrastructure. |
---|
12 | 12 | | BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
---|
13 | 13 | | SECTION 1. Chapter 276, Election Code, is amended by adding |
---|
14 | 14 | | Section 276.011 to read as follows: |
---|
15 | 15 | | Sec. 276.011. ELECTION CYBER ATTACK STUDY. (a) Not later |
---|
16 | 16 | | than December 1, 2018, the secretary of state shall: |
---|
17 | 17 | | (1) conduct a study regarding cyber attacks on |
---|
18 | 18 | | election infrastructure; |
---|
19 | 19 | | (2) prepare a public summary report on the study's |
---|
20 | 20 | | findings that does not contain any information the release of which |
---|
21 | 21 | | may compromise any election; |
---|
22 | 22 | | (3) prepare a confidential report on specific findings |
---|
23 | 23 | | and vulnerabilities that is exempt from disclosure under Chapter |
---|
24 | 24 | | 552, Government Code; and |
---|
25 | 25 | | (4) submit a copy of the report required under |
---|
26 | 26 | | Subdivision (2) and a general compilation of the report required |
---|
27 | 27 | | under Subdivision (3) that does not contain any information the |
---|
28 | 28 | | release of which may compromise any election to the standing |
---|
29 | 29 | | committees of the legislature with jurisdiction over election |
---|
30 | 30 | | procedures. |
---|
31 | 31 | | (b) The study must include: |
---|
32 | 32 | | (1) an investigation of vulnerabilities and risks for |
---|
33 | 33 | | a cyber attack against a county's voting system machines or the list |
---|
34 | 34 | | of registered voters; |
---|
35 | 35 | | (2) information on any attempted cyber attack on a |
---|
36 | 36 | | county's voting system machines or the list of registered voters; |
---|
37 | 37 | | and |
---|
38 | 38 | | (3) recommendations for protecting a county's voting |
---|
39 | 39 | | system machines and list of registered voters from a cyber attack. |
---|
40 | 40 | | (c) The secretary of state, using existing resources, may |
---|
41 | 41 | | contract with a qualified vendor to conduct the study required by |
---|
42 | 42 | | this section. |
---|
43 | 43 | | (d) This section expires January 1, 2019. |
---|
44 | 44 | | SECTION 2. This Act takes effect immediately if it receives |
---|
45 | 45 | | a vote of two-thirds of all the members elected to each house, as |
---|
46 | 46 | | provided by Section 39, Article III, Texas Constitution. If this |
---|
47 | 47 | | Act does not receive the vote necessary for immediate effect, this |
---|
48 | 48 | | Act takes effect September 1, 2017. |
---|