Texas 2019 - 86th Regular

Texas House Bill HB4597 Compare Versions

Only one version of the bill is available at this time.
OldNewDifferences
11 By: Blanco H.B. No. 4597
22
33
44 A BILL TO BE ENTITLED
55 AN ACT
66 relating to cybersecurity of state agencies.
77 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
88 SECTION 1. Section 552. 139 (b), Government Code, is
99 amended to read as follows:
1010 (b) The following information is confidential:
1111 (1) a computer network vulnerability report;
1212 (2) any other assessment of the extent to which data
1313 processing operations, a computer, a computer program, network,
1414 system, or system interface, or software of a governmental body or
1515 of a contractor of a governmental body is vulnerable to
1616 unauthorized access or harm, including an assessment of the extent
1717 to which the governmental body's or contractor's electronically
1818 stored information containing sensitive or critical information is
1919 vulnerable to alteration, damage, erasure, or inappropriate use;
2020 (3) a photocopy of other copy of an identification
2121 badge issued to an official or employee of a governmental body;
2222 [and]
2323 (4) information directly arising from a governmental
2424 body's routine to prevent, detect, investigate, or mitigate a
2525 computer security incident, including information contained in or
2626 derived from an information security log; and
2727 (5) information about a state agency's cybersecurity
2828 insurance coverage, including policy provisions and coverage
2929 limits.
3030 SECTION 2. Subchapter N-1, Chapter 2054, Government Code,
3131 is amended by adding Section 2054.5172 to read as follows:
3232 Sec. 2054.5172. CYBER RANGE. (a) In this section, "cyber
3333 range" means a virtual environment used for interactive training in
3434 the defense against and response to cyberwarfare and other
3535 cybersecurity incidents.
3636 (b) The department may create a cyber range for use by
3737 public sector employees with responsibility for cybersecurity to
3838 improve this state's cybersecurity capabilities.
3939 SECTION 3. Subchapter N-1, Chapter 2054, Government Code,
4040 is amended by adding Section 2054.519, 2054.520, and 2054.521 to
4141 read as follows:
4242 Sec. 2054.519. CYBERSECURITY RESOURCES PROGRAM FOR STATE
4343 AGENCIES. (a) The department may establish a program that provides
4444 to state agencies the use of information security officers and
4545 other cybersecurity resources to assist in managing the agencies'
4646 information security.
4747 (b) The department shall adopt rules to implement this
4848 section.
4949 Sec. 2054.520. CYBERSECURITY INSURANCE. (a) The State
5050 Office of Risk Management shall evaluate the feasibility of
5151 providing cybersecurity insurance policies to state agencies.
5252 (b) The State Office of Risk Management shall develop
5353 guidance for state agencies regarding cybersecurity insurance
5454 coverage. The guidance must:
5555 (1) be based on best practices for making
5656 cybersecurity insurance coverage decisions; and
5757 (2) assist a state agency in determining whether:
5858 (A) cybersecurity insurance coverage would be
5959 beneficial to the agency; and
6060 (B) the agency should purchase a cybersecurity
6161 insurance policy from a third party or self-insure.
6262 (c) The department shall review and consider the guidance
6363 developed under this section in connection with the department's
6464 protection of statewide technology centers.
6565 Sec. 2054.521. BUG BOUNTY PROGRAM. (a) The department by
6666 rule may establish a bug bounty program, using money available for
6767 that purpose from legislative appropriations, to pay bounties to
6868 persons who uncover or resolve security flaws in state websites and
6969 applications.
7070 (b) The department may determine eligibility criteria for
7171 receiving a bounty under this section and the amount of a bounty to
7272 be paid under this section.
7373 (c) An employee of or contractor with a state agency is not
7474 eligible to receive a bounty under this section.
7575 (d) The payment of a bounty under this section does not
7676 affect a person 's civil or criminal liability for prohibited
7777 conduct related to a state website or application.
7878 SECTION 4. Section 2054.136, Government Code, is amended to
7979 read as follows:
8080 Sec. 2054.136. DESIGNATED INFORMATION SECURITY OFFICER;
8181 DUTIES. (a) In this section, "cloud computing service" has the
8282 meaning assigned by Section 2157.007.
8383 (b) Each state agency shall designate an information
8484 security officer who:
8585 (1) reports to the agency 's executive-level
8686 management;
8787 (2) has authority over information security for the
8888 entire agency;
8989 (3) possesses the training and experience required to
9090 perform the duties required by department rules; and
9191 (4) to the extent feasible, has information security
9292 duties as the officer 's primary duties.
9393 (c) A state agency 's information security officer must
9494 authorize the purchase of cloud computing services before the
9595 agency may enter into a contract for those services.
9696 SECTION 5. Section 2054.1125, Government Code, is amended
9797 by adding Subsection (c) to read as follows:
9898 (c) Not later than the 10th business day after the date of
9999 the eradication, closure, and recovery from a breach, suspected
100100 breach, or unauthorized exposure, a state agency shall notify the
101101 department, including the chief information security officer, of
102102 the details of the event.
103103 SECTION 6. The change in law made by this Act applies only
104104 to a contract for cloud computing services that is entered into on
105105 or after the effective date of this Act. A contract entered into
106106 before the effective date of this Act is governed by the law in
107107 effect on the date the contract was entered into, and the former law
108108 is continued in effect for that purpose.
109109 SECTION 7. This Act takes effect September 1, 2019.