1 | 1 | | 85R7997 AAF-D |
---|
2 | 2 | | By: Zaffirini S.B. No. 1470 |
---|
3 | 3 | | |
---|
4 | 4 | | |
---|
5 | 5 | | A BILL TO BE ENTITLED |
---|
6 | 6 | | AN ACT |
---|
7 | 7 | | relating to the powers and duties of the Department of Information |
---|
8 | 8 | | Resources regarding cybersecurity. |
---|
9 | 9 | | BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
---|
10 | 10 | | SECTION 1. Subchapter C, Chapter 2054, Government Code, is |
---|
11 | 11 | | amended by adding Sections 2054.0591 and 2054.0592 to read as |
---|
12 | 12 | | follows: |
---|
13 | 13 | | Sec. 2054.0591. CYBERSECURITY REPORT. Not later than |
---|
14 | 14 | | August 31 of each even-numbered year, the department shall submit |
---|
15 | 15 | | to the governor, the lieutenant governor, and the legislature a |
---|
16 | 16 | | report identifying preventive and recovery efforts the state can |
---|
17 | 17 | | undertake to improve cybersecurity in this state. The report must |
---|
18 | 18 | | include: |
---|
19 | 19 | | (1) an assessment of the resources available to |
---|
20 | 20 | | address the operational and financial impacts of a cybersecurity |
---|
21 | 21 | | event; |
---|
22 | 22 | | (2) a review of existing statutes regarding |
---|
23 | 23 | | cybersecurity and information resources technologies; |
---|
24 | 24 | | (3) recommendations for legislative action to |
---|
25 | 25 | | increase the state's cybersecurity and protect against adverse |
---|
26 | 26 | | impacts from a cybersecurity event; |
---|
27 | 27 | | (4) an evaluation of the costs and benefits of |
---|
28 | 28 | | cybersecurity insurance; and |
---|
29 | 29 | | (5) an evaluation of tertiary disaster recovery |
---|
30 | 30 | | options. |
---|
31 | 31 | | Sec. 2054.0592. CYBERSECURITY EMERGENCY FUNDING. If a |
---|
32 | 32 | | cybersecurity event creates a need for emergency funding, the |
---|
33 | 33 | | department may request that the governor or Legislative Budget |
---|
34 | 34 | | Board make a proposal under Chapter 317 to provide funding to manage |
---|
35 | 35 | | the operational and financial impacts from the cybersecurity event. |
---|
36 | 36 | | SECTION 2. This Act takes effect September 1, 2017. |
---|