3 | 5 | | |
---|
4 | 6 | | |
---|
5 | 7 | | A BILL TO BE ENTITLED |
---|
6 | 8 | | AN ACT |
---|
7 | 9 | | relating to matters concerning governmental entities, including |
---|
8 | 10 | | cybersecurity, governmental efficiencies, information resources, |
---|
9 | 11 | | and emergency planning. |
---|
10 | 12 | | BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
---|
11 | 13 | | SECTION 1. Section 37.108(b), Education Code, is amended to |
---|
12 | 14 | | read as follows: |
---|
13 | 15 | | (b) At least once every three years, each school district or |
---|
14 | 16 | | public junior college district shall conduct a safety and security |
---|
15 | 17 | | audit of the district's facilities, including an information |
---|
16 | 18 | | technology cybersecurity assessment. To the extent possible, a |
---|
17 | 19 | | district shall follow safety and security audit procedures |
---|
18 | 20 | | developed by the Texas School Safety Center or a comparable public |
---|
19 | 21 | | or private entity. |
---|
20 | 22 | | SECTION 2. Subchapter C, Chapter 61, Education Code, is |
---|
21 | 23 | | amended by adding Section 61.09092 to read as follows: |
---|
22 | 24 | | Sec. 61.09092. COORDINATION OF CYBERSECURITY COURSEWORK |
---|
23 | 25 | | DEVELOPMENT. (a) In this section, "lower-division institution of |
---|
24 | 26 | | higher education" means a public junior college, public state |
---|
25 | 27 | | college, or public technical institute. |
---|
26 | 28 | | (b) The board, in consultation with the Department of |
---|
27 | 29 | | Information Resources, shall coordinate with lower-division |
---|
28 | 30 | | institutions of higher education and entities that administer or |
---|
29 | 31 | | award postsecondary industry certifications or other workforce |
---|
30 | 32 | | credentials in cybersecurity to develop certificate programs or |
---|
31 | 33 | | other courses of instruction leading toward those certifications or |
---|
32 | 34 | | credentials that may be offered by lower-division institutions of |
---|
33 | 35 | | higher education. |
---|
34 | 36 | | (c) The board may adopt rules as necessary for the |
---|
35 | 37 | | administration of this section. |
---|
36 | 38 | | SECTION 3. Subchapter F, Chapter 401, Government Code, is |
---|
37 | 39 | | amended by adding Section 401.106 to read as follows: |
---|
38 | 40 | | Sec. 401.106. CHIEF INNOVATION OFFICER. (a) The governor |
---|
39 | 41 | | shall appoint a chief innovation officer. |
---|
40 | 42 | | (b) The chief innovation officer shall: |
---|
41 | 43 | | (1) develop procedures and processes to improve |
---|
42 | 44 | | internal state government efficiency and performance; |
---|
43 | 45 | | (2) develop methods to improve the experience of |
---|
44 | 46 | | residents, businesses, and local governments in interacting with |
---|
45 | 47 | | state government; |
---|
46 | 48 | | (3) in cooperation with the Department of Information |
---|
47 | 49 | | Resources, increase the use of technology by state agencies to |
---|
48 | 50 | | improve services provided by the agencies and to reduce state |
---|
49 | 51 | | expenses and inefficiencies; |
---|
50 | 52 | | (4) provide state agency personnel with training in |
---|
51 | 53 | | skills that support innovation; |
---|
52 | 54 | | (5) provide state agency managers with training to |
---|
53 | 55 | | support innovation and encourage creative thinking; and |
---|
54 | 56 | | (6) develop and apply measures to document |
---|
55 | 57 | | improvements in state government innovation and in employee skills |
---|
56 | 58 | | that support innovation. |
---|
57 | 59 | | (c) In performing the duties required under Subsection (b), |
---|
58 | 60 | | the chief innovation officer shall: |
---|
59 | 61 | | (1) use strategic innovation; |
---|
60 | 62 | | (2) promote open innovation; |
---|
61 | 63 | | (3) introduce and use group tools and processes that |
---|
62 | 64 | | encourage creative thinking; and |
---|
63 | 65 | | (4) conduct market research to determine the best |
---|
64 | 66 | | practices for increasing innovation and implement those best |
---|
65 | 67 | | practices. |
---|
66 | 68 | | SECTION 4. Section 418.004(1), Government Code, is amended |
---|
67 | 69 | | to read as follows: |
---|
68 | 70 | | (1) "Disaster" means the occurrence or imminent threat |
---|
69 | 71 | | of widespread or severe damage, injury, or loss of life or property |
---|
70 | 72 | | resulting from any natural or man-made cause, including fire, |
---|
71 | 73 | | flood, earthquake, wind, storm, wave action, oil spill or other |
---|
72 | 74 | | water contamination, volcanic activity, epidemic, air |
---|
73 | 75 | | contamination, blight, drought, infestation, explosion, riot, |
---|
74 | 76 | | hostile military or paramilitary action, extreme heat, cyber |
---|
75 | 77 | | attack, other public calamity requiring emergency action, or energy |
---|
76 | 78 | | emergency. |
---|
77 | 79 | | SECTION 5. Subchapter B, Chapter 421, Government Code, is |
---|
78 | 80 | | amended by adding Section 421.027 to read as follows: |
---|
79 | 81 | | Sec. 421.027. CYBER INCIDENT STUDY AND RESPONSE PLAN. (a) |
---|
80 | 82 | | In this section: |
---|
81 | 83 | | (1) "Cyber incident" means an event occurring on or |
---|
82 | 84 | | conducted through a computer network that actually or imminently |
---|
83 | 85 | | jeopardizes the integrity, confidentiality, or availability of |
---|
84 | 86 | | computers, information or communications systems or networks, |
---|
85 | 87 | | physical or virtual infrastructure controlled by computers or |
---|
86 | 88 | | information systems, or information on the computers or systems. |
---|
87 | 89 | | The term includes a vulnerability in implementation or in an |
---|
88 | 90 | | information system, system security procedure, or internal control |
---|
89 | 91 | | that could be exploited by a threat source. |
---|
90 | 92 | | (2) "Significant cyber incident" means a cyber |
---|
91 | 93 | | incident, or a group of related cyber incidents, likely to result in |
---|
92 | 94 | | demonstrable harm to state security interests, foreign relations, |
---|
93 | 95 | | or the economy of this state or to the public confidence, civil |
---|
94 | 96 | | liberties, or public health and safety of the residents of this |
---|
95 | 97 | | state. |
---|
96 | 98 | | (b) The council, in cooperation with the Department of |
---|
99 | 100 | | (1) conduct a study regarding cyber incidents and |
---|
100 | 101 | | significant cyber incidents affecting state agencies and critical |
---|
101 | 102 | | infrastructure that is owned, operated, or controlled by agencies; |
---|
102 | 103 | | and |
---|
103 | 104 | | (2) develop a comprehensive state response plan to |
---|
104 | 105 | | provide a format for each state agency to develop an |
---|
105 | 106 | | agency-specific response plan and to implement the plan into the |
---|
106 | 107 | | agency's information security plan required under Section 2054.133 |
---|
107 | 108 | | to be implemented by the agency in the event of a cyber incident or |
---|
108 | 109 | | significant cyber incident affecting the agency or critical |
---|
109 | 110 | | infrastructure that is owned, operated, or controlled by the |
---|
110 | 111 | | agency. |
---|
111 | 112 | | (c) Not later than September 1, 2020, the council shall |
---|
112 | 113 | | deliver the response plan and a report on the findings of the study |
---|
113 | 114 | | to: |
---|
114 | 115 | | (1) the public safety director of the Department of |
---|
115 | 116 | | Public Safety; |
---|
116 | 117 | | (2) the governor; |
---|
117 | 118 | | (3) the lieutenant governor; |
---|
118 | 119 | | (4) the speaker of the house of representatives; |
---|
119 | 120 | | (5) the chair of the committee of the senate having |
---|
120 | 121 | | primary jurisdiction over homeland security matters; and |
---|
121 | 122 | | (6) the chair of the committee of the house of |
---|
122 | 123 | | representatives having primary jurisdiction over homeland security |
---|
123 | 124 | | matters. |
---|
124 | 125 | | (d) The response plan required by Subsection (b) and the |
---|
125 | 126 | | report required by Subsection (c) are not public information for |
---|
126 | 127 | | purposes of Chapter 552. |
---|
127 | 128 | | (e) This section expires December 1, 2020. |
---|
128 | 129 | | SECTION 6. Subchapter F, Chapter 437, Government Code, is |
---|
129 | 130 | | amended by adding Section 437.255 to read as follows: |
---|
130 | 131 | | Sec. 437.255. ASSISTING TEXAS STATE GUARD WITH CYBER |
---|
131 | 132 | | OPERATIONS. To serve the state and safeguard the public from |
---|
132 | 133 | | malicious cyber activity, the governor may command the Texas |
---|
133 | 134 | | National Guard to assist the Texas State Guard with defending the |
---|
134 | 135 | | state's cyber operations. |
---|
162 | | - | SECTION 10. Chapter 2051, Government Code, is amended by |
---|
163 | | - | adding Subchapter E to read as follows: |
---|
164 | | - | SUBCHAPTER E. UNIFORM ELECTRONIC LEGAL MATERIAL ACT |
---|
165 | | - | Sec. 2051.151. SHORT TITLE. This subchapter may be cited as |
---|
166 | | - | the Uniform Electronic Legal Material Act. |
---|
167 | | - | Sec. 2051.152. DEFINITIONS. In this subchapter: |
---|
168 | | - | (1) "Electronic" means relating to technology having |
---|
169 | | - | electrical, digital, magnetic, wireless, optical, electromagnetic, |
---|
170 | | - | or similar capabilities. |
---|
171 | | - | (2) "Legal material" means, whether or not in effect: |
---|
172 | | - | (A) the constitution of this state; |
---|
173 | | - | (B) the general or special laws passed in a |
---|
174 | | - | regular or special session of the Texas Legislature; and |
---|
175 | | - | (C) a state agency rule adopted in accordance |
---|
176 | | - | with Chapter 2001. |
---|
177 | | - | (3) "Official publisher" means: |
---|
178 | | - | (A) for legal material described by Subdivision |
---|
179 | | - | (2)(A), the Texas Legislative Council; and |
---|
180 | | - | (B) for legal material described by Subdivision |
---|
181 | | - | (2)(B) or (C), the secretary of state. |
---|
182 | | - | (4) "Publish" means displaying, presenting, or |
---|
183 | | - | releasing to the public, or causing to be displayed, presented, or |
---|
184 | | - | released to the public, legal material by the official publisher. |
---|
185 | | - | (5) "Record" means information that is inscribed on a |
---|
186 | | - | tangible medium or that is stored in an electronic or other medium |
---|
187 | | - | and is retrievable in perceivable form. |
---|
188 | | - | Sec. 2051.153. APPLICABILITY. (a) This subchapter applies |
---|
189 | | - | to all legal material in an electronic record that is: |
---|
190 | | - | (1) designated as official by the official publisher |
---|
191 | | - | under Section 2051.154; and |
---|
192 | | - | (2) first published electronically by the official |
---|
193 | | - | publisher on or after January 1, 2021. |
---|
194 | | - | (b) The official publisher is not required to publish legal |
---|
195 | | - | material on or before the date on which the legal material takes |
---|
196 | | - | effect. |
---|
197 | | - | Sec. 2051.154. LEGAL MATERIAL IN OFFICIAL ELECTRONIC |
---|
198 | | - | RECORD. (a) If the official publisher publishes legal material |
---|
199 | | - | only in an electronic record, the official publisher shall: |
---|
200 | | - | (1) designate the electronic record as official; and |
---|
201 | | - | (2) comply with Sections 2051.155, 2051.157, and |
---|
202 | | - | 2051.158. |
---|
203 | | - | (b) If the official publisher publishes legal material in an |
---|
204 | | - | electronic record and also publishes the material in a record other |
---|
205 | | - | than an electronic record, the official publisher may designate the |
---|
206 | | - | electronic record as official if the official publisher complies |
---|
207 | | - | with Sections 2051.155, 2051.157, and 2051.158. |
---|
208 | | - | Sec. 2051.155. AUTHENTICATION OF OFFICIAL ELECTRONIC |
---|
209 | | - | RECORD. (a) If the official publisher designates an electronic |
---|
210 | | - | record as official in accordance with Section 2051.154, the |
---|
211 | | - | official publisher shall authenticate the record. |
---|
212 | | - | (b) The official publisher authenticates an electronic |
---|
213 | | - | record by providing a method with which a person viewing the |
---|
214 | | - | electronic record is able to determine that the electronic record |
---|
215 | | - | is unaltered from the official record published by the official |
---|
216 | | - | publisher. |
---|
217 | | - | Sec. 2051.156. EFFECT OF AUTHENTICATION. (a) Legal |
---|
218 | | - | material in an electronic record that is authenticated as provided |
---|
219 | | - | by Section 2051.155 is presumed to be an accurate copy of the legal |
---|
220 | | - | material. |
---|
221 | | - | (b) If another state has adopted a law that is substantially |
---|
222 | | - | similar to this subchapter, legal material in an electronic record |
---|
223 | | - | that is authenticated in that state is presumed to be an accurate |
---|
224 | | - | copy of the legal material. |
---|
225 | | - | (c) A party contesting the authenticity of legal material in |
---|
226 | | - | an electronic record authenticated as provided by Section 2051.155 |
---|
227 | | - | has the burden of proving by a preponderance of the evidence that |
---|
228 | | - | the record is not authentic. |
---|
229 | | - | Sec. 2051.157. PRESERVATION AND SECURITY OF LEGAL MATERIAL |
---|
230 | | - | IN OFFICIAL ELECTRONIC RECORD. (a) The official publisher of legal |
---|
231 | | - | material in an electronic record designated as official in |
---|
232 | | - | accordance with Section 2051.154 shall provide for the preservation |
---|
233 | | - | and security of the record in an electronic form or in a form that is |
---|
234 | | - | not electronic. |
---|
235 | | - | (b) If legal material is preserved under Subsection (a) in |
---|
236 | | - | an electronic record, the official publisher shall: |
---|
237 | | - | (1) ensure the integrity of the record; |
---|
238 | | - | (2) provide for backup and disaster recovery of the |
---|
239 | | - | record; and |
---|
240 | | - | (3) ensure the continuing usability of the legal |
---|
241 | | - | material in the record. |
---|
242 | | - | Sec. 2051.158. PUBLIC ACCESS. The official publisher of |
---|
243 | | - | legal material in an electronic record that is required to be |
---|
244 | | - | preserved under Section 2051.157 shall ensure that the material is |
---|
245 | | - | reasonably available for use by the public on a permanent basis. |
---|
246 | | - | Sec. 2051.159. STANDARDS. In implementing this subchapter, |
---|
247 | | - | the official publisher of legal material in an electronic record |
---|
248 | | - | shall consider: |
---|
249 | | - | (1) the standards and practices of other |
---|
250 | | - | jurisdictions; |
---|
251 | | - | (2) the most recent standards regarding |
---|
252 | | - | authentication, preservation, and security of and public access to |
---|
253 | | - | legal material in an electronic record and other electronic |
---|
254 | | - | records, as adopted by national standard-setting bodies; |
---|
255 | | - | (3) the needs of users of legal material in electronic |
---|
256 | | - | records; |
---|
257 | | - | (4) the views of governmental officials and entities |
---|
258 | | - | and other interested persons; and |
---|
259 | | - | (5) to the extent practicable, the methods and |
---|
260 | | - | technologies for the authentication, preservation, and security of |
---|
261 | | - | and public access to legal material that are compatible with the |
---|
262 | | - | methods and technologies used by official publishers in other |
---|
263 | | - | states that have adopted a law that is substantially similar to this |
---|
264 | | - | subchapter. |
---|
265 | | - | Sec. 2051.160. UNIFORMITY OF APPLICATION AND CONSTRUCTION. |
---|
266 | | - | In applying and construing this subchapter, consideration must be |
---|
267 | | - | given to the need to promote uniformity of the law with respect to |
---|
268 | | - | the subject matter of this subchapter among states that enact a law |
---|
269 | | - | similar to this subchapter. |
---|
270 | | - | Sec. 2051.161. RELATION TO ELECTRONIC SIGNATURES IN GLOBAL |
---|
271 | | - | AND NATIONAL COMMERCE ACT. This subchapter modifies, limits, and |
---|
272 | | - | supersedes the federal Electronic Signatures in Global and National |
---|
273 | | - | Commerce Act (15 U.S.C. Section 7001 et seq.) but does not modify, |
---|
274 | | - | limit, or supersede Section 101(c) of that Act (15 U.S.C. Section |
---|
275 | | - | 7001(c)) or authorize electronic delivery of any of the notices |
---|
276 | | - | described in Section 103(b) of that Act (15 U.S.C. Section |
---|
277 | | - | 7003(b)). |
---|
278 | | - | SECTION 11. Section 2054.059, Government Code, is amended |
---|
279 | | - | to read as follows: |
---|
| 147 | + | SECTION 9. Section 2054.059, Government Code, is amended to |
---|
| 148 | + | read as follows: |
---|
314 | | - | SECTION 13. Section 2054.1184, Government Code, is amended |
---|
315 | | - | to read as follows: |
---|
316 | | - | Sec. 2054.1184. ASSESSMENT OF MAJOR INFORMATION RESOURCES |
---|
317 | | - | PROJECT. (a) A state agency proposing to spend appropriated funds |
---|
318 | | - | for a major information resources project must first conduct an |
---|
319 | | - | evidence-based execution capability assessment using a scoring |
---|
320 | | - | method delivered by an independent third party to: |
---|
321 | | - | (1) determine the agency's capability for implementing |
---|
322 | | - | the project; |
---|
323 | | - | (2) reduce the agency's financial risk in implementing |
---|
324 | | - | the project; and |
---|
325 | | - | (3) increase the probability of the agency's |
---|
326 | | - | successful implementation of the project. |
---|
327 | | - | (b) A state agency shall submit to the department, the |
---|
328 | | - | quality assurance team established under Section 2054.158, and the |
---|
329 | | - | Legislative Budget Board a detailed report that includes |
---|
330 | | - | measurement and corrective actions for [identifies] the agency's |
---|
331 | | - | operational and technical [organizational] strengths and any |
---|
332 | | - | weaknesses that will be addressed before the agency initially |
---|
333 | | - | spends appropriated funds for a major information resources |
---|
334 | | - | project. |
---|
335 | | - | (c) Based on project costs, risks, and technical |
---|
336 | | - | difficulty, the department may require a [A] state agency to [may] |
---|
337 | | - | contract with an independent third party to conduct the assessment |
---|
338 | | - | under Subsection (a) and prepare the report described by Subsection |
---|
339 | | - | (b). |
---|
340 | | - | (d) The department may allow state agencies to purchase an |
---|
341 | | - | execution capability assessment using the purchasing method |
---|
342 | | - | described by Section 2157.068 for commodity items. |
---|
343 | | - | SECTION 14. Subchapter F, Chapter 2054, Government Code, is |
---|
| 181 | + | SECTION 11. Subchapter F, Chapter 2054, Government Code, is |
---|
344 | 182 | | amended by adding Sections 2054.137, 2054.138, and 2054.139 to read |
---|
345 | 183 | | as follows: |
---|
346 | 184 | | Sec. 2054.137. INFORMATION SECURITY CONTINUOUS MONITORING |
---|
347 | 185 | | PROGRAM. (a) In this section: |
---|
348 | 186 | | (1) "Common control" means a security control that is |
---|
349 | 187 | | inherited by one or more information resources technologies. |
---|
350 | 188 | | (2) "Program" means the information security |
---|
351 | 189 | | continuous monitoring program described by this section. |
---|
352 | 190 | | (b) Each state agency shall: |
---|
353 | 191 | | (1) develop and maintain an information security |
---|
354 | 192 | | continuous monitoring program that: |
---|
355 | 193 | | (A) allows the agency to maintain ongoing |
---|
356 | 194 | | awareness of the security and vulnerabilities of and threats to the |
---|
357 | 195 | | agency's information resources; |
---|
358 | 196 | | (B) provides a clear understanding of |
---|
359 | 197 | | organizational risk and helps the agency set priorities and manage |
---|
360 | 198 | | the risk consistently; |
---|
361 | 199 | | (C) addresses how the agency conducts ongoing |
---|
362 | 200 | | authorizations of information resources technologies and the |
---|
363 | 201 | | environments in which those technologies operate, including the |
---|
364 | 202 | | agency's use of common controls; |
---|
365 | 203 | | (D) aligns with the continuous monitoring |
---|
366 | 204 | | guidance, cybersecurity framework, and risk management framework |
---|
367 | 205 | | published in Special Publications 800-137 and 800-53 by the United |
---|
368 | 206 | | States Department of Commerce National Institute of Standards and |
---|
369 | 207 | | Technology; |
---|
370 | 208 | | (E) addresses critical security controls, |
---|
371 | 209 | | including hardware asset management, software asset management, |
---|
372 | 210 | | configuration management, and vulnerability management; and |
---|
373 | 211 | | (F) requires the integration of cybersecurity |
---|
374 | 212 | | products; |
---|
375 | 213 | | (2) establish a strategy and plan to implement a |
---|
376 | 214 | | program for the agency; |
---|
377 | 215 | | (3) to the extent practicable, establish information |
---|
378 | 216 | | security continuous monitoring as an agency-wide solution and |
---|
379 | 217 | | deploy enterprise information security continuous monitoring |
---|
380 | 218 | | products and services; |
---|
475 | 309 | | that identifies systematic or pervasive security risk |
---|
476 | 310 | | vulnerabilities across state agencies and recommendations for |
---|
477 | 311 | | addressing the vulnerabilities but does not contain any information |
---|
478 | 312 | | the release of which may compromise any state agency's information |
---|
479 | 313 | | resources system. |
---|
480 | 314 | | Sec. 2054.519. VENDOR RESPONSIBILITY FOR CYBERSECURITY. A |
---|
481 | 315 | | vendor that contracts with this state to provide information |
---|
482 | 316 | | resources technology for a state agency at a cost to the agency of |
---|
483 | 317 | | $1 million or more is responsible for addressing known |
---|
484 | 318 | | cybersecurity risks associated with the technology and is |
---|
485 | 319 | | responsible for any cost associated with addressing the identified |
---|
486 | 320 | | cybersecurity risks. For a major information resources project, |
---|
487 | 321 | | the vendor shall provide to state agency contracting personnel: |
---|
488 | 322 | | (1) a written attestation that: |
---|
489 | 323 | | (A) the vendor has a cybersecurity risk |
---|
490 | 324 | | management program consistent with: |
---|
491 | 325 | | (i) the cybersecurity framework |
---|
492 | 326 | | established by the National Institute of Standards and Technology; |
---|
493 | 327 | | (ii) the 27000 series standards for |
---|
494 | 328 | | information security published by the International Organization |
---|
495 | 329 | | for Standardization; or |
---|
496 | 330 | | (iii) other widely accepted security risk |
---|
497 | 331 | | management frameworks; |
---|
498 | 332 | | (B) the vendor's cybersecurity risk management |
---|
499 | 333 | | program includes appropriate training and certifications for the |
---|
500 | 334 | | employees performing work under the contract; and |
---|
501 | 335 | | (C) the vendor has a vulnerability management |
---|
502 | 336 | | program that addresses vulnerability identification, mitigation, |
---|
503 | 337 | | and responsible disclosure, as appropriate; and |
---|
504 | 338 | | (2) an initial summary of any costs associated with |
---|
505 | 339 | | addressing or remediating the identified technology or |
---|
506 | 340 | | personnel-related cybersecurity risks as identified in |
---|
507 | 341 | | collaboration with this state following a risk assessment. |
---|
508 | 342 | | Sec. 2054.5191. CYBERSTAR PROGRAM; CERTIFICATE OF |
---|
509 | 343 | | APPROVAL. (a) The state cybersecurity coordinator, in |
---|
510 | 344 | | collaboration with the cybersecurity council and public and private |
---|
511 | 345 | | entities in this state, shall develop best practices for |
---|
512 | 346 | | cybersecurity that include: |
---|
513 | 347 | | (1) measureable, flexible, and voluntary |
---|
514 | 348 | | cybersecurity risk management programs for public and private |
---|
515 | 349 | | entities to adopt to prepare for and respond to cyber incidents that |
---|
516 | 350 | | compromise the confidentiality, integrity, and availability of the |
---|
517 | 351 | | entities' information systems; |
---|
518 | 352 | | (2) appropriate training and information for |
---|
519 | 353 | | employees or other individuals who are most responsible for |
---|
520 | 354 | | maintaining security of the entities' information systems; |
---|
521 | 355 | | (3) consistency with: |
---|
522 | 356 | | (A) for a municipality or county, the multihazard |
---|
523 | 357 | | emergency operations plan and the safety and security audit |
---|
524 | 358 | | required under Section 364.0101, Local Government Code; and |
---|
525 | 359 | | (B) the National Institute of Standards and |
---|
526 | 360 | | Technology standards for cybersecurity; |
---|
527 | 361 | | (4) public service announcements to encourage |
---|
528 | 362 | | cybersecurity awareness; and |
---|
529 | 363 | | (5) coordination with local and state governmental |
---|
530 | 364 | | entities. |
---|
531 | 365 | | (b) The state cybersecurity coordinator shall establish a |
---|
532 | 366 | | cyberstar certificate program to recognize public and private |
---|
533 | 367 | | entities that implement the best practices for cybersecurity |
---|
534 | 368 | | developed in accordance with Subsection (a). The program must |
---|
535 | 369 | | allow a public or private entity to submit to the department a form |
---|
536 | 370 | | certifying that the entity has complied with the best practices and |
---|
537 | 371 | | the department to issue a certificate of approval to the entity. |
---|
538 | 372 | | The entity may include the certificate of approval in |
---|
539 | 373 | | advertisements and other public communications. |
---|
540 | 374 | | (c) The state cybersecurity coordinator shall conduct an |
---|
541 | 375 | | annual public event to promote best practices for cybersecurity. |
---|
542 | 376 | | Sec. 2054.5192. ENCRYPTED SECURE LAYER SERVICES REQUIRED. |
---|
543 | 377 | | Each state agency that maintains a publicly accessible Internet |
---|
544 | 378 | | website that requires the submission of sensitive personally |
---|
545 | 379 | | identifiable information shall use an encrypted secure |
---|
546 | 380 | | communication protocol, including a secure hypertext transfer |
---|
547 | 381 | | protocol. |
---|
548 | | - | SECTION 17. Subchapter Q, Chapter 2054, Government Code, is |
---|
549 | | - | amended by adding Section 2054.577 to read as follows: |
---|
550 | | - | Sec. 2054.577. TEXAS INNOVATION FUND AND STATE AGENCY |
---|
551 | | - | TECHNOLOGY UPGRADES ACCOUNT. (a) In this section: |
---|
552 | | - | (1) "Account" means the state agency technology |
---|
553 | | - | upgrades account. |
---|
554 | | - | (2) "Board" means the Texas innovation fund board. |
---|
555 | | - | (3) "Cloud computing service" has the meaning assigned |
---|
556 | | - | by Section 2157.007. |
---|
557 | | - | (4) "Device-as-a-service" means a managed service in |
---|
558 | | - | which hardware that belongs to a managed service provider is |
---|
559 | | - | installed at a state agency and a service level agreement defines |
---|
560 | | - | the responsibilities of each party to the agreement. |
---|
561 | | - | (5) "Fund" means the Texas innovation fund. |
---|
562 | | - | (6) "Information technology system" means any |
---|
563 | | - | equipment or interconnected system or subsystem of equipment used |
---|
564 | | - | by a state agency, or a person under a contract with a state agency |
---|
565 | | - | if the contract requires use of the equipment, to acquire, store, |
---|
566 | | - | analyze, evaluate, manipulate, manage, move, control, display, |
---|
567 | | - | switch, interchange, transmit, print, copy, scan, or receive data |
---|
568 | | - | or other information. The term: |
---|
569 | | - | (A) includes a computer, a device-as-a-service |
---|
570 | | - | solution, ancillary computer equipment such as imaging, printing, |
---|
571 | | - | scanning, and copying peripherals and input, output, and storage |
---|
572 | | - | devices necessary for security and surveillance, peripheral |
---|
573 | | - | equipment designed to be controlled by the central processing unit |
---|
574 | | - | of a computer, software and firmware and similar procedures, and |
---|
575 | | - | services, including support services, and related resources; and |
---|
576 | | - | (B) does not include equipment acquired by a |
---|
577 | | - | contractor incidental to a state contract. |
---|
578 | | - | (7) "Legacy information technology system" means an |
---|
579 | | - | information technology system that is operated with obsolete or |
---|
580 | | - | inefficient hardware or software technology. |
---|
581 | | - | (8) "Qualifying information technology modernization |
---|
582 | | - | project" means a project by a state agency to: |
---|
583 | | - | (A) replace the agency's information technology |
---|
584 | | - | systems; |
---|
585 | | - | (B) transition the agency's legacy information |
---|
586 | | - | technology systems to a cloud computing service or other innovative |
---|
587 | | - | commercial platform or technology; or |
---|
588 | | - | (C) develop and implement a method to provide |
---|
589 | | - | adequate, risk-based, and cost-effective information technology |
---|
590 | | - | responses to threats to the agency's information security. |
---|
591 | | - | (9) "State agency" has the meaning assigned by Section |
---|
592 | | - | 2254.151, notwithstanding Section 2054.003. |
---|
593 | | - | (b) The Texas innovation fund board is established to |
---|
594 | | - | administer the Texas innovation fund and the state agency |
---|
595 | | - | technology upgrades account and to make awards of financial |
---|
596 | | - | assistance to state agencies from the fund or account for |
---|
597 | | - | qualifying information technology modernization projects. The |
---|
598 | | - | board is composed of: |
---|
599 | | - | (1) one member who is a representative of the |
---|
600 | | - | department, appointed by the presiding officer of the governing |
---|
601 | | - | board of the department; |
---|
602 | | - | (2) one member who is a representative of the office of |
---|
603 | | - | the governor, appointed by the governor; |
---|
604 | | - | (3) two members of the senate, appointed by the |
---|
605 | | - | lieutenant governor; |
---|
606 | | - | (4) two members of the house of representatives, |
---|
607 | | - | appointed by the presiding officer of the governing board of the |
---|
608 | | - | department from a list provided by the speaker of the house of |
---|
609 | | - | representatives; and |
---|
610 | | - | (5) one public member, appointed by the governor. |
---|
611 | | - | (c) Members of the board serve staggered six-year terms. A |
---|
612 | | - | board member is not entitled to compensation for service on the |
---|
613 | | - | board but is entitled to reimbursement of expenses incurred while |
---|
614 | | - | performing duties as a board member. |
---|
615 | | - | (d) The Texas innovation fund and the state agency |
---|
616 | | - | technology upgrades account are special funds outside the state |
---|
617 | | - | treasury to be used by the board, without further legislative |
---|
618 | | - | appropriation, as provided by this section. |
---|
619 | | - | (e) The fund consists of: |
---|
620 | | - | (1) money appropriated, credited, or transferred to |
---|
621 | | - | the fund by the legislature; |
---|
622 | | - | (2) money received by the board for the repayment of a |
---|
623 | | - | loan made from the fund; and |
---|
624 | | - | (3) interest and other earnings earned on deposits and |
---|
625 | | - | investments of money in the fund. |
---|
626 | | - | (f) The account consists of: |
---|
627 | | - | (1) money deposited to the account by the comptroller |
---|
628 | | - | in the manner prescribed by Subsection (h); and |
---|
629 | | - | (2) interest and other earnings earned on deposits and |
---|
630 | | - | investments of money in the account. |
---|
631 | | - | (g) The department by rule shall establish a loan program to |
---|
632 | | - | authorize the board to use money from the fund to provide loans to |
---|
633 | | - | state agencies for qualifying information technology modernization |
---|
634 | | - | projects. A state agency must apply to the board for a loan from the |
---|
635 | | - | fund. The application must include a description of the qualifying |
---|
636 | | - | information technology modernization project for which the state |
---|
637 | | - | agency is requesting a loan. A loan agreement entered into under |
---|
638 | | - | this subsection must require the state agency to: |
---|
639 | | - | (1) repay the loan to the board within seven years of |
---|
640 | | - | the date the loan is made to the agency; and |
---|
641 | | - | (2) make annual reports to the board identifying cost |
---|
642 | | - | savings realized by the agency as a result of the project for which |
---|
643 | | - | the agency received the loan. |
---|
644 | | - | (h) At the end of each state fiscal year, on the written |
---|
645 | | - | request of a state agency, the comptroller shall deposit to the |
---|
646 | | - | account the unexpended balance of any money appropriated to the |
---|
647 | | - | agency for that state fiscal year that is budgeted by the agency for |
---|
648 | | - | information technology services or cybersecurity purposes. A state |
---|
649 | | - | agency may request money from the account from the board at any time |
---|
650 | | - | for a qualifying information technology modernization project. |
---|
651 | | - | This subsection does not apply to the unexpended balance of any |
---|
652 | | - | money appropriated to a state agency from federal funds or from a |
---|
653 | | - | fund created by the constitution of this state. |
---|
654 | | - | (i) The comptroller shall separately account for the amount |
---|
655 | | - | of money deposited to the account at the request of each state |
---|
656 | | - | agency under Subsection (h). Money deposited to the account under |
---|
657 | | - | Subsection (h) and any interest and other earnings on that money may |
---|
658 | | - | be provided only to the state agency for which the comptroller |
---|
659 | | - | deposited the money to the account and may be used by the agency |
---|
660 | | - | only for a qualifying information technology modernization |
---|
661 | | - | project. |
---|
662 | | - | (j) Any money deposited to the account at the request of a |
---|
663 | | - | state agency under Subsection (h) that is not requested by the |
---|
664 | | - | agency within two years from the date the money is deposited shall |
---|
665 | | - | be transferred by the comptroller to the general revenue fund to be |
---|
666 | | - | used in accordance with legislative appropriation. |
---|
667 | | - | (k) A state agency that receives money from the fund or the |
---|
668 | | - | account may collaborate with one or more other state agencies that |
---|
669 | | - | also receive money from the fund or the account to purchase |
---|
670 | | - | information technology systems that may be shared between the |
---|
671 | | - | agencies. |
---|
672 | | - | (l) The department and the comptroller may adopt rules to |
---|
673 | | - | implement and administer this section. |
---|
674 | | - | SECTION 18. Chapter 2054, Government Code, is amended by |
---|
| 382 | + | SECTION 14. Chapter 2054, Government Code, is amended by |
---|
675 | 383 | | adding Subchapter R to read as follows: |
---|
676 | 384 | | SUBCHAPTER R. INFORMATION RESOURCES OF GOVERNMENTAL ENTITIES |
---|
677 | 385 | | Sec. 2054.601. USE OF NEXT GENERATION TECHNOLOGY. Each |
---|
678 | 386 | | state agency and local government shall, in the administration of |
---|
679 | 387 | | the agency or local government, consider using next generation |
---|
680 | 388 | | technologies, including cryptocurrency, blockchain technology, and |
---|
681 | 389 | | artificial intelligence. |
---|
682 | 390 | | Sec. 2054.602. LIABILITY EXEMPTION. A person who in good |
---|
683 | 391 | | faith discloses to a state agency or other governmental entity |
---|
684 | 392 | | information regarding a potential security issue with respect to |
---|
685 | 393 | | the agency's or entity's information resources technologies is not |
---|
686 | 394 | | liable for any civil damages resulting from disclosing the |
---|
687 | 395 | | information unless the person stole, retained, or sold any data |
---|
688 | 396 | | obtained as a result of the security issue. |
---|
689 | 397 | | Sec. 2054.603. MATCHING GRANTS FOR LOCAL CYBERSECURITY |
---|
690 | 398 | | PROJECTS. (a) In this section, "local governmental entity" means a |
---|
691 | 399 | | political subdivision of the state, including a: |
---|
692 | 400 | | (1) county; |
---|
693 | 401 | | (2) municipality; |
---|
694 | 402 | | (3) public school district; or |
---|
695 | 403 | | (4) special-purpose district or authority. |
---|
696 | 404 | | (b) Using available funds, the governor shall establish and |
---|
697 | 405 | | administer a cybersecurity matching grant program to award grants |
---|
698 | 406 | | to local governmental entities to defray the costs of cybersecurity |
---|
699 | 407 | | projects. |
---|
700 | 408 | | (c) A local governmental entity that applies to the office |
---|
701 | 409 | | of the governor for a matching grant under this section must |
---|
702 | 410 | | identify the source and amount of the local governmental entity's |
---|
703 | 411 | | matching funds. If the office approves a grant application, the |
---|
704 | 412 | | office shall award to the local governmental entity a grant amount |
---|
705 | 413 | | equal to 150 percent of the amount committed by the entity. |
---|
706 | 414 | | (d) The office may set a deadline for grant applications for |
---|
707 | 415 | | each state fiscal year. |
---|
708 | 416 | | (e) The governor shall adopt rules to implement the grant |
---|
709 | 417 | | program created under this section. |
---|
710 | 418 | | Sec. 2054.604. CYBERSECURITY THREAT ASSESSMENT. The |
---|
711 | 419 | | department shall develop a cybersecurity threat assessment for |
---|
712 | 420 | | local governments that provides best practices for preventing |
---|
713 | 421 | | cybersecurity attacks. |
---|
714 | 422 | | Sec. 2054.605. REPOSITORY FOR CYBERSECURITY EDUCATION AND |
---|
715 | 423 | | TRAINING. The department, in conjunction with institutions of |
---|
716 | 424 | | higher education as defined by Section 61.003, Education Code, |
---|
717 | 425 | | shall maintain and promote a centralized repository of information |
---|
718 | 426 | | on cybersecurity education and training that is available to any |
---|
719 | 427 | | governmental entity in this state. |
---|
746 | | - | SECTION 21. Section 2157.007, Government Code, is amended |
---|
747 | | - | by amending Subsections (a) and (b) and adding Subsections (b-1), |
---|
748 | | - | (b-2), and (f) to read as follows: |
---|
749 | | - | (a) In this section: |
---|
750 | | - | (1) "Cloud computing service" has the meaning assigned |
---|
751 | | - | by Special Publication 800-145 issued by the United States |
---|
752 | | - | Department of Commerce National Institute of Standards and |
---|
753 | | - | Technology, as the definition existed on January 1, 2015. |
---|
754 | | - | (2) "Major information resources project" has the |
---|
755 | | - | meaning assigned by Section 2054.003. |
---|
756 | | - | (b) Except as provided by Subsection (b-1), a [A] state |
---|
757 | | - | agency shall ensure [consider cloud computing service options, |
---|
758 | | - | including any security benefits and cost savings associated with |
---|
759 | | - | purchasing those service options from a cloud computing service |
---|
760 | | - | provider and from a statewide technology center established by the |
---|
761 | | - | department], when making purchases for an automated information |
---|
762 | | - | system or a major information resources project, that the system or |
---|
763 | | - | project is capable of being deployed and run on cloud computing |
---|
764 | | - | services [under Section 2054.118]. |
---|
765 | | - | (b-1) When making a purchase for an automated information |
---|
766 | | - | system or a major information resources project, a state agency may |
---|
767 | | - | determine that, due to integration limitations with legacy systems, |
---|
768 | | - | security risks, costs, or other relevant considerations, the agency |
---|
769 | | - | is unable to purchase a system or project capable of being deployed |
---|
770 | | - | and run on cloud computing services. |
---|
771 | | - | (b-2) At least 14 days before the date a state agency |
---|
772 | | - | solicits bids, proposals, offers, or other applicable expressions |
---|
773 | | - | of interest for a purchase described by Subsection (b-1), the |
---|
774 | | - | agency shall submit to the Legislative Budget Board for the |
---|
775 | | - | purchase of an automated information system or to the quality |
---|
776 | | - | assurance team as defined by Section 2054.003 for the purchase of a |
---|
777 | | - | major information resources project a report that describes the |
---|
778 | | - | purchase and the agency's reasoning for making the purchase. |
---|
| 444 | + | SECTION 17. Section 2157.007, Government Code, is amended |
---|
| 445 | + | by amending Subsection (b) and adding Subsection (f) to read as |
---|
| 446 | + | follows: |
---|
| 447 | + | (b) A state agency shall ensure [consider cloud computing |
---|
| 448 | + | service options, including any security benefits and cost savings |
---|
| 449 | + | associated with purchasing those service options from a cloud |
---|
| 450 | + | computing service provider and from a statewide technology center |
---|
| 451 | + | established by the department], when making purchases for an |
---|
| 452 | + | automated information system or a major information resources |
---|
| 453 | + | project under Section 2054.118, that the system or project is |
---|
| 454 | + | capable of being deployed and run on cloud computing services. |
---|
804 | 480 | | amended by adding Chapter 364 to read as follows: |
---|
805 | 481 | | CHAPTER 364. LOCAL GOVERNMENT CYBERSECURITY AND EMERGENCY PLANNING |
---|
806 | 482 | | AND RESPONSE |
---|
807 | 483 | | SUBCHAPTER A. GENERAL PROVISIONS |
---|
808 | 484 | | Sec. 364.0001. DEFINITIONS. In this chapter: |
---|
809 | 485 | | (1) "Breach of system security" has the meaning |
---|
810 | 486 | | assigned by Section 521.053, Business & Commerce Code. |
---|
811 | 487 | | (2) "Cybersecurity coordinator" means the state |
---|
812 | 488 | | cybersecurity coordinator designated under Section 2054.511, |
---|
813 | 489 | | Government Code. |
---|
814 | 490 | | (3) "Cybersecurity council" means the council |
---|
815 | 491 | | established by the cybersecurity coordinator under Section |
---|
816 | 492 | | 2054.512, Government Code. |
---|
817 | 493 | | (4) "Sensitive personal information" has the meaning |
---|
818 | 494 | | assigned by Section 521.002, Business & Commerce Code. |
---|
819 | 495 | | SUBCHAPTER B. REGIONAL INFORMATION SHARING AND ANALYSIS CENTERS |
---|
820 | 496 | | Sec. 364.0051. ESTABLISHMENT. (a) The cybersecurity |
---|
821 | 497 | | coordinator shall provide for the establishment and operation of |
---|
822 | 498 | | not more than 20 regional information sharing and analysis centers. |
---|
823 | 499 | | (b) Regional information sharing and analysis centers shall |
---|
824 | 500 | | be located throughout the state so that the boundaries for each |
---|
825 | 501 | | center are coextensive with the regional education service centers |
---|
826 | 502 | | established under Chapter 8, Education Code. |
---|
827 | 503 | | Sec. 364.0052. MEMBERSHIP. Each municipality with a |
---|
828 | 504 | | population of more than 25,000 shall join the regional information |
---|
829 | 505 | | sharing and analysis center in which the municipality is |
---|
830 | 506 | | predominantly located. Any other political subdivision may join |
---|
831 | 507 | | the regional information sharing and analysis center in which the |
---|
832 | 508 | | political subdivision is predominantly located. |
---|
833 | 509 | | Sec. 364.0053. SECURITY BREACH NOTIFICATION. (a) Not |
---|
834 | 510 | | later than 48 hours after a political subdivision discovers a |
---|
835 | 511 | | breach or suspected breach of system security or an unauthorized |
---|
836 | 512 | | exposure of sensitive personal information, the political |
---|
837 | 513 | | subdivision shall notify the regional information sharing and |
---|
838 | 514 | | analysis center of the breach. The notification must describe the |
---|
839 | 515 | | breach, suspected breach, or unauthorized exposure. |
---|
840 | 516 | | (b) A regional information sharing and analysis center |
---|
841 | 517 | | shall report to the Department of Information Resources any breach |
---|
842 | 518 | | of system security reported by a political subdivision in which the |
---|
843 | 519 | | person responsible for the breach: |
---|
844 | 520 | | (1) obtained or modified specific critical or |
---|
845 | 521 | | sensitive personal information; |
---|
846 | 522 | | (2) established access to the political subdivision's |
---|
847 | 523 | | information systems or infrastructure; or |
---|
848 | 524 | | (3) undermined, severely disrupted, or destroyed a |
---|
849 | 525 | | core service, program, or function of the political subdivision, or |
---|
850 | 526 | | placed the person in a position to do so in the future. |
---|
851 | 527 | | Sec. 364.0054. RULEMAKING. The cybersecurity coordinator |
---|
852 | 528 | | may adopt rules necessary to implement this subchapter. |
---|
853 | 529 | | SUBCHAPTER C. EMERGENCY PLANNING AND RESPONSE |
---|
854 | 530 | | Sec. 364.0101. MULTIHAZARD EMERGENCY OPERATIONS PLAN; |
---|
855 | 531 | | SAFETY AND SECURITY AUDIT. (a) This section applies to a |
---|
856 | 532 | | municipality or county with a population of more than 100,000. |
---|
857 | 533 | | (b) Each municipality and county shall adopt and implement a |
---|
858 | 534 | | multihazard emergency operations plan for use in the municipality's |
---|
859 | 535 | | and county's facilities. The plan must address mitigation, |
---|
860 | 536 | | preparedness, response, and recovery as determined by the |
---|
861 | 537 | | cybersecurity council and the governor's office of homeland |
---|
862 | 538 | | security. The plan must provide for: |
---|
863 | 539 | | (1) municipal or county employee training in |
---|
864 | 540 | | responding to an emergency; |
---|
865 | 541 | | (2) measures to ensure coordination with the |
---|
866 | 542 | | Department of State Health Services, Department of Information |
---|
867 | 543 | | Resources, local emergency management agencies, law enforcement |
---|
868 | 544 | | agencies, local health departments, and fire departments in the |
---|
869 | 545 | | event of an emergency; and |
---|
870 | 546 | | (3) the implementation of a safety and security audit |
---|
871 | 547 | | as required by Subsection (c). |
---|
872 | 548 | | (c) At least once every three years, each municipality and |
---|
873 | 549 | | county shall conduct a safety and security audit of the |
---|
874 | 550 | | municipality's or county's information technology infrastructure. |
---|
875 | 551 | | To the extent possible, a municipality or county shall follow |
---|
876 | 552 | | safety and security audit procedures developed by the cybersecurity |
---|
877 | 553 | | council or a comparable public or private entity. |
---|
878 | 554 | | (d) A municipality or county shall report the results of the |
---|
879 | 555 | | safety and security audit conducted under Subsection (c): |
---|
880 | 556 | | (1) to the municipality's or county's governing body; |
---|
881 | 557 | | and |
---|
882 | 558 | | (2) in the manner required by the cybersecurity |
---|
883 | 559 | | council, to the cybersecurity council. |
---|
884 | 560 | | (e) Except as provided by Subsection (f), any document or |
---|
885 | 561 | | information collected, developed, or produced during a safety and |
---|
886 | 562 | | security audit conducted under Subsection (c) is not subject to |
---|
887 | 563 | | disclosure under Chapter 552, Government Code. |
---|
888 | 564 | | (f) A document relating to a municipality's or county's |
---|
889 | 565 | | multihazard emergency operations plan is subject to disclosure if |
---|
890 | 566 | | the document enables a person to: |
---|
891 | 567 | | (1) verify that the municipality or county has |
---|
892 | 568 | | established a plan and determine the agencies involved in the |
---|
893 | 569 | | development of the plan and the agencies coordinating with the |
---|
894 | 570 | | municipality or county to respond to an emergency; |
---|
895 | 571 | | (2) verify that the municipality's or county's plan |
---|
896 | 572 | | was reviewed within the last 12 months and determine the specific |
---|
897 | 573 | | review dates; |
---|
898 | 574 | | (3) verify that the plan addresses the phases of |
---|
899 | 575 | | emergency management under Subsection (b); |
---|
900 | 576 | | (4) verify that municipal or county employees have |
---|
901 | 577 | | been trained to respond to an emergency and determine the types of |
---|
902 | 578 | | training, the number of employees trained, and the person |
---|
903 | 579 | | conducting the training; |
---|
904 | 580 | | (5) verify that the municipality or county has |
---|
905 | 581 | | completed a safety and security audit under Subsection (c) and |
---|
906 | 582 | | determine the date the audit was conducted, the person conducting |
---|
907 | 583 | | the audit, and the date the municipality or county presented the |
---|
908 | 584 | | results of the audit to the municipality's or county's governing |
---|
909 | 585 | | body; and |
---|
910 | 586 | | (6) verify that the municipality or county has |
---|
911 | 587 | | addressed any recommendations by the municipality's or county's |
---|
912 | 588 | | governing body for improvement of the plan and determine the |
---|
913 | 589 | | municipality's or county's progress within the last 12 months. |
---|
914 | 590 | | Sec. 364.0102. RANSOMWARE PAYMENT. (a) In this section, |
---|
915 | 591 | | "ransomware" has the meaning assigned by Section 33.023, Penal |
---|
916 | 592 | | Code. |
---|
917 | 593 | | (b) Not later than 48 hours after the time a political |
---|
918 | 594 | | subdivision makes a ransomware payment, the political subdivision |
---|
919 | 595 | | shall notify the cybersecurity coordinator of the payment. |
---|
928 | 604 | | Senate Select Committee on Cybersecurity and the speaker of the |
---|
929 | 605 | | house of representatives shall establish a House Select Committee |
---|
930 | 606 | | on Cybersecurity to, jointly or separately, study: |
---|
931 | 607 | | (1) cybersecurity in this state; |
---|
932 | 608 | | (2) the information security plans of each state |
---|
933 | 609 | | agency; |
---|
934 | 610 | | (3) the risks and vulnerabilities of state agency |
---|
935 | 611 | | cybersecurity; and |
---|
936 | 612 | | (4) information technology procurement. |
---|
937 | 613 | | (b) Not later than November 30, 2019: |
---|
938 | 614 | | (1) the lieutenant governor shall appoint five |
---|
939 | 615 | | senators to the Senate Select Committee on Cybersecurity, one of |
---|
940 | 616 | | whom shall be designated as chair; and |
---|
941 | 617 | | (2) the speaker of the house of representatives shall |
---|
942 | 618 | | appoint five state representatives to the House Select Committee on |
---|
943 | 619 | | Cybersecurity, one of whom shall be designated as chair. |
---|
944 | 620 | | (c) The committees established under this section shall |
---|
945 | 621 | | convene separately at the call of the chair of the respective |
---|
946 | 622 | | committees, or jointly at the call of both chairs. In joint |
---|
947 | 623 | | meetings, the chairs of each committee shall act as joint chairs. |
---|
948 | 624 | | (d) Following consideration of the issues listed in |
---|
949 | 625 | | Subsection (a) of this section, the committees established under |
---|
950 | 626 | | this section shall jointly adopt recommendations on state |
---|
951 | 627 | | cybersecurity and report in writing to the legislature any findings |
---|
952 | 628 | | and adopted recommendations not later than January 12, 2021. |
---|
953 | 629 | | (e) This section expires September 1, 2021. |
---|
958 | | - | SECTION 28. (a) An official publisher in the executive |
---|
959 | | - | branch of state government shall comply with the applicable |
---|
960 | | - | provisions of Subchapter E, Chapter 2051, Government Code, as added |
---|
961 | | - | by this Act, in accordance with an implementation plan developed |
---|
962 | | - | under Subsection (b) of this section. |
---|
963 | | - | (b) The Texas State Library and Archives Commission and an |
---|
964 | | - | official publisher in the executive branch of state government are |
---|
965 | | - | jointly responsible for developing an implementation plan for the |
---|
966 | | - | applicable provisions of Subchapter E, Chapter 2051, Government |
---|
967 | | - | Code, as added by this Act. The implementation plan must: |
---|
968 | | - | (1) for each applicable type of legal material defined |
---|
969 | | - | by Subchapter E, Chapter 2051, Government Code, as added by this |
---|
970 | | - | Act, advise as to the method by which the legal material may be |
---|
971 | | - | authenticated, preserved, and made available on a permanent basis; |
---|
972 | | - | and |
---|
973 | | - | (2) establish a timeline for the official publisher to |
---|
974 | | - | comply with Sections 2051.154, 2051.155, 2051.157, and 2051.158, |
---|
975 | | - | Government Code, as added by this Act. |
---|
976 | | - | (c) The implementation plan developed under Subsection (b) |
---|
977 | | - | of this section may provide for compliance by an official publisher |
---|
978 | | - | in the executive branch of state government with Sections 2051.154, |
---|
979 | | - | 2051.155, 2051.157, and 2051.158, Government Code, as added by this |
---|
980 | | - | Act, to be phased in over a period of time. |
---|
981 | | - | (d) The Texas State Library and Archives Commission shall |
---|
982 | | - | provide the implementation plan developed under Subsection (b) of |
---|
983 | | - | this section to the legislature not later than September 1, 2020. |
---|
984 | | - | SECTION 29. (a) An official publisher in the legislative |
---|
985 | | - | branch of state government shall comply with the applicable |
---|
986 | | - | provisions of Subchapter E, Chapter 2051, Government Code, as added |
---|
987 | | - | by this Act, in accordance with an implementation plan developed |
---|
988 | | - | under Subsection (b) of this section. |
---|
989 | | - | (b) An official publisher in the legislative branch of state |
---|
990 | | - | government, in consultation with the lieutenant governor, the |
---|
991 | | - | speaker of the house of representatives, the Senate Committee on |
---|
992 | | - | Administration, and the House Committee on Administration, shall |
---|
993 | | - | develop an implementation plan for the applicable provisions of |
---|
994 | | - | Subchapter E, Chapter 2051, Government Code, as added by this Act. |
---|
995 | | - | The implementation plan must: |
---|
996 | | - | (1) for each applicable type of legal material defined |
---|
997 | | - | by Subchapter E, Chapter 2051, Government Code, as added by this |
---|
998 | | - | Act, recommend the method by which the legal material may be |
---|
999 | | - | authenticated, preserved, and made available on a permanent basis; |
---|
1000 | | - | and |
---|
1001 | | - | (2) establish a timeline for the official publisher to |
---|
1002 | | - | comply with Sections 2051.154, 2051.155, 2051.157, and 2051.158, |
---|
1003 | | - | Government Code, as added by this Act. |
---|
1004 | | - | (c) The implementation plan developed under Subsection (b) |
---|
1005 | | - | of this section may provide for compliance by an official publisher |
---|
1006 | | - | in the legislative branch of state government with Sections |
---|
1007 | | - | 2051.154, 2051.155, 2051.157, and 2051.158, Government Code, as |
---|
1008 | | - | added by this Act, to be phased in over a period of time. |
---|
1009 | | - | (d) An official publisher in the legislative branch of state |
---|
1010 | | - | government shall provide the implementation plan developed under |
---|
1011 | | - | Subsection (b) of this section to the lieutenant governor and |
---|
1012 | | - | speaker of the house of representatives not later than September 1, |
---|
1013 | | - | 2020. |
---|
1014 | | - | SECTION 30. Section 2054.139, Government Code, as added by |
---|
| 634 | + | SECTION 24. Section 2054.139, Government Code, as added by |
---|