10 | 11 | | Sec. 61.09091. STRATEGIES TO INCENTIVIZE CYBERSECURITY |
---|
11 | 12 | | DEGREE PROGRAMS. (a) The board in collaboration with the |
---|
12 | 13 | | Department of Information Resources shall identify and develop |
---|
13 | 14 | | strategies to incentivize institutions of higher education to |
---|
14 | 15 | | develop degree programs in cybersecurity. |
---|
15 | 16 | | (b) The board shall consult with institutions of higher |
---|
16 | 17 | | education as necessary to carry out its duties under this section. |
---|
17 | 18 | | (c) Not later than September 1, 2020, the board shall submit |
---|
18 | 19 | | a written report detailing the strategies identified under this |
---|
19 | 20 | | section to the lieutenant governor, the speaker of the house of |
---|
20 | 21 | | representatives, the presiding officer of each legislative |
---|
21 | 22 | | standing committee with primary jurisdiction over higher |
---|
22 | 23 | | education, and each governing board of an institution of higher |
---|
23 | 24 | | education. |
---|
24 | 25 | | (d) This section expires September 1, 2021. |
---|
25 | | - | Sec. 61.09092. COORDINATION OF CYBERSECURITY COURSEWORK |
---|
26 | | - | DEVELOPMENT. (a) In this section, "lower-division institution of |
---|
27 | | - | higher education" means a public junior college, public state |
---|
28 | | - | college, or public technical institute. |
---|
29 | | - | (b) The board, in consultation with the Department of |
---|
30 | | - | Information Resources, shall coordinate with lower-division |
---|
31 | | - | institutions of higher education and entities that administer or |
---|
32 | | - | award postsecondary industry certifications or other workforce |
---|
33 | | - | credentials in cybersecurity to develop certificate programs or |
---|
34 | | - | other courses of instruction leading toward those certifications or |
---|
35 | | - | credentials that may be offered by lower-division institutions of |
---|
36 | | - | higher education. |
---|
37 | | - | (c) The board may adopt rules as necessary for the |
---|
38 | | - | administration of this section. |
---|
39 | 26 | | SECTION 2. Section 418.004(1), Government Code, is amended |
---|
40 | 27 | | to read as follows: |
---|
41 | 28 | | (1) "Disaster" means the occurrence or imminent threat |
---|
42 | 29 | | of widespread or severe damage, injury, or loss of life or property |
---|
43 | 30 | | resulting from any natural or man-made cause, including fire, |
---|
44 | 31 | | flood, earthquake, wind, storm, wave action, oil spill or other |
---|
45 | 32 | | water contamination, volcanic activity, epidemic, air |
---|
46 | 33 | | contamination, blight, drought, infestation, explosion, riot, |
---|
47 | 34 | | hostile military or paramilitary action, extreme heat, |
---|
48 | 35 | | cybersecurity event, other public calamity requiring emergency |
---|
49 | 36 | | action, or energy emergency. |
---|
50 | | - | SECTION 3. Subchapter F, Chapter 437, Government Code, is |
---|
51 | | - | amended by adding Section 437.255 to read as follows: |
---|
52 | | - | Sec. 437.255. ASSISTING TEXAS STATE GUARD WITH CYBER |
---|
53 | | - | OPERATIONS. To serve the state and safeguard the public from |
---|
54 | | - | malicious cyber activity, the governor may command the Texas |
---|
55 | | - | National Guard to assist the Texas State Guard with defending the |
---|
56 | | - | state's cyber operations. |
---|
57 | | - | SECTION 4. The heading to Section 656.047, Government Code, |
---|
58 | | - | is amended to read as follows: |
---|
59 | | - | Sec. 656.047. PAYMENT OF PROGRAM AND CERTIFICATION |
---|
60 | | - | EXAMINATION EXPENSES. |
---|
61 | | - | SECTION 5. Section 656.047, Government Code, is amended by |
---|
62 | | - | adding Subsection (a-1) to read as follows: |
---|
63 | | - | (a-1) A state agency may spend public funds as appropriate |
---|
64 | | - | to reimburse a state agency employee or administrator who serves in |
---|
65 | | - | an information technology, cybersecurity, or other cyber-related |
---|
66 | | - | position for fees associated with industry-recognized |
---|
67 | | - | certification examinations. |
---|
68 | | - | SECTION 6. Section 815.103, Government Code, is amended by |
---|
| 37 | + | SECTION 3. Section 815.103, Government Code, is amended by |
---|
74 | 43 | | amending Subsection (e) and adding Subsection (e-1) to read as |
---|
75 | 44 | | follows: |
---|
76 | 45 | | (e) Except as provided by Subsection (e-1), Chapters 2054 |
---|
77 | 46 | | and 2055 do not apply to the retirement system. The board of |
---|
78 | 47 | | trustees shall control all aspects of information technology and |
---|
79 | 48 | | associated resources relating to the retirement system, including |
---|
80 | 49 | | computer, data management, and telecommunication operations, |
---|
81 | 50 | | procurement of hardware, software, and middleware, and |
---|
82 | 51 | | telecommunication equipment and systems, location, operation, and |
---|
83 | 52 | | replacement of computers, computer systems, and telecommunication |
---|
84 | 53 | | systems, data processing, security, disaster recovery, and |
---|
85 | 54 | | storage. The Department of Information Resources shall assist the |
---|
86 | 55 | | retirement system at the request of the retirement system, and the |
---|
87 | 56 | | retirement system may use any service that is available through |
---|
88 | 57 | | that department. |
---|
89 | 58 | | (e-1) The retirement system shall comply with cybersecurity |
---|
90 | 59 | | and information security standards established by the Department of |
---|
91 | 60 | | Information Resources under Chapter 2054. |
---|
102 | 71 | | amended to read as follows: |
---|
103 | 72 | | (a) Not later than November 15 of each even-numbered year, |
---|
104 | 73 | | the department shall submit to the governor, the lieutenant |
---|
105 | 74 | | governor, the speaker of the house of representatives, and the |
---|
106 | 75 | | standing committee of each house of the legislature with primary |
---|
107 | 76 | | jurisdiction over state government operations a report identifying |
---|
108 | 77 | | preventive and recovery efforts the state can undertake to improve |
---|
109 | 78 | | cybersecurity in this state. The report must include: |
---|
110 | 79 | | (1) an assessment of the resources available to |
---|
111 | 80 | | address the operational and financial impacts of a cybersecurity |
---|
112 | 81 | | event; |
---|
113 | 82 | | (2) a review of existing statutes regarding |
---|
114 | 83 | | cybersecurity and information resources technologies; |
---|
115 | 84 | | (3) recommendations for legislative action to |
---|
116 | 85 | | increase the state's cybersecurity and protect against adverse |
---|
117 | 86 | | impacts from a cybersecurity event; and |
---|
118 | 87 | | (4) an evaluation of a program that provides an |
---|
119 | 88 | | information security officer to assist small state agencies and |
---|
120 | 89 | | local governments that are unable to justify hiring a full-time |
---|
121 | 90 | | information security officer [the costs and benefits of |
---|
122 | 91 | | cybersecurity insurance; and |
---|
123 | 92 | | [(5) an evaluation of tertiary disaster recovery |
---|
124 | 93 | | options]. |
---|
126 | 95 | | to read as follows: |
---|
127 | 96 | | Sec. 2054.0594. INFORMATION SHARING AND ANALYSIS |
---|
128 | 97 | | ORGANIZATION [CENTER]. (a) The department shall establish an |
---|
129 | 98 | | information sharing and analysis organization [center] to provide a |
---|
130 | 99 | | forum for state agencies, local governments, public and private |
---|
131 | 100 | | institutions of higher education, and the private sector to share |
---|
132 | 101 | | information regarding cybersecurity threats, best practices, and |
---|
133 | 102 | | remediation strategies. |
---|
134 | 103 | | (b) [The department shall appoint persons from appropriate |
---|
135 | 104 | | state agencies to serve as representatives to the information |
---|
136 | 105 | | sharing and analysis center. |
---|
137 | 106 | | [(c)] The department[, using funds other than funds |
---|
138 | 107 | | appropriated to the department in a general appropriations act,] |
---|
139 | 108 | | shall provide administrative support to the information sharing and |
---|
140 | 109 | | analysis organization [center]. |
---|
141 | 110 | | (c) A participant in the information sharing and analysis |
---|
142 | 111 | | organization shall assert any exception available under state or |
---|
143 | 112 | | federal law, including Section 552.139, in response to a request |
---|
144 | 113 | | for public disclosure of information shared through the |
---|
145 | 114 | | organization. Section 552.007 does not apply to information |
---|
146 | 115 | | described by this subsection. |
---|
149 | 118 | | (e) The consolidated report required by Subsection (d) |
---|
150 | 119 | | must: |
---|
151 | 120 | | (1) include an analysis and assessment of each state |
---|
152 | 121 | | agency's security and operational risks; and |
---|
153 | 122 | | (2) for a state agency found to be at higher security |
---|
154 | 123 | | and operational risks, include a detailed analysis of agency |
---|
155 | 124 | | efforts to address the risks and related vulnerabilities[, and an |
---|
156 | 125 | | estimate of the costs to implement, the: |
---|
157 | 126 | | [(A) requirements for the agency to address the |
---|
158 | 127 | | risks and related vulnerabilities; and |
---|
159 | 128 | | [(B) agency's efforts to address the risks |
---|
160 | 129 | | through the: |
---|
161 | 130 | | [(i) modernization of information |
---|
162 | 131 | | technology systems; |
---|
163 | 132 | | [(ii) use of cloud services; and |
---|
164 | 133 | | [(iii) use of a statewide technology center |
---|
165 | 134 | | established by the department]. |
---|
167 | 136 | | amended by adding Section 2054.069 to read as follows: |
---|
168 | 137 | | Sec. 2054.069. PRIORITIZED CYBERSECURITY AND LEGACY SYSTEM |
---|
169 | 138 | | PROJECTS REPORT. (a) Not later than October 1 of each |
---|
170 | 139 | | even-numbered year, the department shall submit a report to the |
---|
171 | 140 | | Legislative Budget Board that prioritizes, for the purpose of |
---|
172 | 141 | | receiving funding, state agency: |
---|
173 | 142 | | (1) cybersecurity projects; and |
---|
174 | 143 | | (2) projects to modernize or replace legacy systems, |
---|
175 | 144 | | as defined by Section 2054.571. |
---|
176 | 145 | | (b) Each state agency shall coordinate with the department |
---|
177 | 146 | | to implement this section. |
---|
178 | 147 | | (c) A state agency shall assert any exception available |
---|
179 | 148 | | under state or federal law, including Section 552.139, in response |
---|
180 | 149 | | to a request for public disclosure of information contained in or |
---|
181 | 150 | | written, produced, collected, assembled, or maintained in |
---|
182 | 151 | | connection with the report under Subsection (a). Section 552.007 |
---|
183 | 152 | | does not apply to information described by this subsection. |
---|
185 | 154 | | are amended to read as follows: |
---|
186 | 155 | | (b) The information security officer [resources manager] of |
---|
187 | 156 | | a state agency shall prepare or have prepared a report, including an |
---|
188 | 157 | | executive summary of the findings of the biennial report, not later |
---|
189 | 158 | | than October 15 of each even-numbered year, assessing the extent to |
---|
190 | 159 | | which a computer, a computer program, a computer network, a |
---|
191 | 160 | | computer system, a printer, an interface to a computer system, |
---|
192 | 161 | | including mobile and peripheral devices, computer software, or data |
---|
193 | 162 | | processing of the agency or of a contractor of the agency is |
---|
194 | 163 | | vulnerable to unauthorized access or harm, including the extent to |
---|
195 | 164 | | which the agency's or contractor's electronically stored |
---|
196 | 165 | | information is vulnerable to alteration, damage, erasure, or |
---|
197 | 166 | | inappropriate use. |
---|
198 | 167 | | (d) The information security officer [resources manager] |
---|
199 | 168 | | shall provide an electronic copy of the vulnerability report on its |
---|
200 | 169 | | completion to: |
---|
201 | 170 | | (1) the department; |
---|
202 | 171 | | (2) the state auditor; |
---|
203 | 172 | | (3) the agency's executive director; |
---|
204 | 173 | | (4) the agency's designated information resources |
---|
205 | 174 | | manager; and |
---|
206 | 175 | | (5) [(4)] any other information technology security |
---|
207 | 176 | | oversight group specifically authorized by the legislature to |
---|
208 | 177 | | receive the report. |
---|
210 | 179 | | by amending Subsection (b) and adding Subsection (c) to read as |
---|
211 | 180 | | follows: |
---|
212 | 181 | | (b) A state agency that owns, licenses, or maintains |
---|
213 | 182 | | computerized data that includes sensitive personal information, |
---|
214 | 183 | | confidential information, or information the disclosure of which is |
---|
215 | 184 | | regulated by law shall, in the event of a breach or suspected breach |
---|
216 | 185 | | of system security or an unauthorized exposure of that information: |
---|
217 | 186 | | (1) comply with the notification requirements of |
---|
218 | 187 | | Section 521.053, Business & Commerce Code, to the same extent as a |
---|
219 | 188 | | person who conducts business in this state; and |
---|
220 | 189 | | (2) not later than 48 hours after the discovery of the |
---|
221 | 190 | | breach, suspected breach, or unauthorized exposure, notify: |
---|
222 | 191 | | (A) the department, including the chief |
---|
223 | 192 | | information security officer [and the state cybersecurity |
---|
224 | 193 | | coordinator]; or |
---|
225 | 194 | | (B) if the breach, suspected breach, or |
---|
226 | 195 | | unauthorized exposure involves election data, the secretary of |
---|
227 | 196 | | state. |
---|
228 | 197 | | (c) Not later than the 10th business day after the date of |
---|
229 | 198 | | the eradication, closure, and recovery from a breach, suspected |
---|
230 | 199 | | breach, or unauthorized exposure, a state agency shall notify the |
---|
231 | 200 | | department, including the chief information security officer, of |
---|
232 | 201 | | the details of the event and include in the notification an analysis |
---|
233 | 202 | | of the cause of the event. |
---|
244 | 213 | | Chapters 683 (H.B. 8) and 955 (S.B. 1910), Acts of the 85th |
---|
245 | 214 | | Legislature, Regular Session, 2017, is reenacted and amended to |
---|
246 | 215 | | read as follows: |
---|
247 | 216 | | Sec. 2054.516. DATA SECURITY PLAN FOR ONLINE AND MOBILE |
---|
248 | 217 | | APPLICATIONS. (a) Each state agency[, other than an institution |
---|
249 | 218 | | of higher education subject to Section 2054.517,] implementing an |
---|
250 | 219 | | Internet website or mobile application that processes any sensitive |
---|
251 | 220 | | personal or personally identifiable information or confidential |
---|
252 | 221 | | information must: |
---|
253 | 222 | | (1) submit a biennial data security plan to the |
---|
254 | 223 | | department not later than October 15 of each even-numbered year to |
---|
255 | 224 | | establish planned beta testing for the website or application; and |
---|
256 | 225 | | (2) subject the website or application to a |
---|
257 | 226 | | vulnerability and penetration test and address any vulnerability |
---|
258 | 227 | | identified in the test. |
---|
259 | 228 | | (b) The department shall review each data security plan |
---|
260 | 229 | | submitted under Subsection (a) and make any recommendations for |
---|
261 | 230 | | changes to the plan to the state agency as soon as practicable after |
---|
262 | 231 | | the department reviews the plan. |
---|
263 | | - | SECTION 17. Subchapter N-1, Chapter 2054, Government Code, |
---|
264 | | - | is amended by adding Section 2054.519 to read as follows: |
---|
265 | | - | Sec. 2054.519. CYBERSTAR PROGRAM; CERTIFICATE OF APPROVAL. |
---|
266 | | - | (a) The state cybersecurity coordinator, in collaboration with |
---|
267 | | - | the cybersecurity council and public and private entities in this |
---|
268 | | - | state, shall develop best practices for cybersecurity that include: |
---|
269 | | - | (1) measureable, flexible, and voluntary |
---|
270 | | - | cybersecurity risk management programs for public and private |
---|
271 | | - | entities to adopt to prepare for and respond to cyber incidents that |
---|
272 | | - | compromise the confidentiality, integrity, and availability of the |
---|
273 | | - | entities' information systems; |
---|
274 | | - | (2) appropriate training and information for |
---|
275 | | - | employees or other individuals who are most responsible for |
---|
276 | | - | maintaining security of the entities' information systems; |
---|
277 | | - | (3) consistency with the National Institute of |
---|
278 | | - | Standards and Technology standards for cybersecurity; |
---|
279 | | - | (4) public service announcements to encourage |
---|
280 | | - | cybersecurity awareness; and |
---|
281 | | - | (5) coordination with local and state governmental |
---|
282 | | - | entities. |
---|
283 | | - | (b) The state cybersecurity coordinator shall establish a |
---|
284 | | - | cyberstar certificate program to recognize public and private |
---|
285 | | - | entities that implement the best practices for cybersecurity |
---|
286 | | - | developed in accordance with Subsection (a). The program must |
---|
287 | | - | allow a public or private entity to submit to the department a form |
---|
288 | | - | certifying that the entity has complied with the best practices and |
---|
289 | | - | the department to issue a certificate of approval to the entity. |
---|
290 | | - | The entity may include the certificate of approval in |
---|
291 | | - | advertisements and other public communications. |
---|
292 | | - | SECTION 18. Chapter 2054, Government Code, is amended by |
---|
293 | | - | adding Subchapter R to read as follows: |
---|
294 | | - | SUBCHAPTER R. INFORMATION RESOURCES OF GOVERNMENTAL ENTITIES |
---|
295 | | - | Sec. 2054.601. USE OF NEXT GENERATION TECHNOLOGY. Each |
---|
296 | | - | state agency and local government shall, in the administration of |
---|
297 | | - | the agency or local government, consider using next generation |
---|
298 | | - | technologies, including cryptocurrency, blockchain technology, and |
---|
299 | | - | artificial intelligence. |
---|
300 | | - | Sec. 2054.602. LIABILITY EXEMPTION. A person who in good |
---|
301 | | - | faith discloses to a state agency or other governmental entity |
---|
302 | | - | information regarding a potential security issue with respect to |
---|
303 | | - | the agency's or entity's information resources technologies is not |
---|
304 | | - | liable for any civil damages resulting from disclosing the |
---|
305 | | - | information unless the person stole, retained, or sold any data |
---|
306 | | - | obtained as a result of the security issue. |
---|
307 | | - | SECTION 19. Section 2059.058(b), Government Code, is |
---|
| 232 | + | SECTION 14. Section 2059.058(b), Government Code, is |
---|
308 | 233 | | amended to read as follows: |
---|
309 | 234 | | (b) In addition to the department's duty to provide network |
---|
310 | 235 | | security services to state agencies under this chapter, the |
---|
311 | 236 | | department by agreement may provide network security to: |
---|
312 | 237 | | (1) each house of the legislature; |
---|
313 | 238 | | (2) an agency that is not a state agency, including a |
---|
314 | 239 | | legislative agency; |
---|
315 | 240 | | (3) a political subdivision of this state, including a |
---|
316 | 241 | | county, municipality, or special district; [and] |
---|
317 | 242 | | (4) an independent organization, as defined by Section |
---|
318 | 243 | | 39.151, Utilities Code; and |
---|
319 | 244 | | (5) a public junior college. |
---|
339 | 265 | | Sec. 31.052. CYBERSECURITY COORDINATION PROGRAM FOR |
---|
340 | 266 | | UTILITIES. (a) The commission shall establish a program to |
---|
341 | 267 | | monitor cybersecurity efforts among utilities in this state. The |
---|
342 | 268 | | program shall: |
---|
343 | 269 | | (1) provide guidance on best practices in |
---|
344 | 270 | | cybersecurity and facilitate the sharing of cybersecurity |
---|
345 | 271 | | information between utilities; and |
---|
346 | 272 | | (2) provide guidance on best practices for |
---|
347 | 273 | | cybersecurity controls for supply chain risk management of |
---|
348 | 274 | | cybersecurity systems used by utilities, which may include, as |
---|
349 | 275 | | applicable, best practices related to: |
---|
350 | 276 | | (A) software integrity and authenticity; |
---|
351 | 277 | | (B) vendor risk management and procurement |
---|
352 | 278 | | controls, including notification by vendors of incidents related to |
---|
353 | 279 | | the vendor's products and services; and |
---|
354 | 280 | | (C) vendor remote access. |
---|
355 | 281 | | (b) The commission may collaborate with the state |
---|
356 | 282 | | cybersecurity coordinator and the cybersecurity council |
---|
357 | 283 | | established under Chapter 2054, Government Code, in implementing |
---|
358 | 284 | | the program. |
---|
360 | 286 | | adding Subsections (o) and (p) to read as follows: |
---|
361 | 287 | | (o) An independent organization certified by the commission |
---|
362 | 288 | | under this section shall: |
---|
363 | 289 | | (1) conduct internal cybersecurity risk assessment, |
---|
364 | 290 | | vulnerability testing, and employee training to the extent the |
---|
365 | 291 | | independent organization is not otherwise required to do so under |
---|
366 | 292 | | applicable state and federal cybersecurity and information |
---|
367 | 293 | | security laws; and |
---|
368 | 294 | | (2) submit a report annually to the commission on the |
---|
369 | 295 | | independent organization's compliance with applicable |
---|
370 | 296 | | cybersecurity and information security laws. |
---|
371 | 297 | | (p) Information submitted in a report under Subsection (o) |
---|
372 | 298 | | is confidential and not subject to disclosure under Chapter 552, |
---|
373 | 299 | | Government Code. |
---|
380 | | - | SECTION 26. This Act takes effect September 1, 2019. |
---|
381 | | - | ______________________________ ______________________________ |
---|
382 | | - | President of the Senate Speaker of the House |
---|
383 | | - | I hereby certify that S.B. No. 64 passed the Senate on |
---|
384 | | - | April 26, 2019, by the following vote: Yeas 30, Nays 0; and that |
---|
385 | | - | the Senate concurred in House amendments on May 24, 2019, by the |
---|
386 | | - | following vote: Yeas 31, Nays 0. |
---|
387 | | - | ______________________________ |
---|
388 | | - | Secretary of the Senate |
---|
389 | | - | I hereby certify that S.B. No. 64 passed the House, with |
---|
390 | | - | amendments, on May 22, 2019, by the following vote: Yeas 142, |
---|
391 | | - | Nays 1, two present not voting. |
---|
392 | | - | ______________________________ |
---|
393 | | - | Chief Clerk of the House |
---|
394 | | - | Approved: |
---|
395 | | - | ______________________________ |
---|
396 | | - | Date |
---|
397 | | - | ______________________________ |
---|
398 | | - | Governor |
---|
| 306 | + | SECTION 21. This Act takes effect September 1, 2019. |
---|