Texas 2021 87th Regular

Texas Senate Bill SB475 Enrolled / Bill

Filed 05/29/2021

                    S.B. No. 475


 AN ACT
 relating to state agency and local government information
 management and security, including establishment of the state risk
 and authorization management program and the Texas volunteer
 incident response team; authorizing fees.
 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
 SECTION 1.  Subchapter B, Chapter 2054, Government Code, is
 amended by adding Section 2054.0332 to read as follows:
 Sec. 2054.0332.  DATA MANAGEMENT ADVISORY COMMITTEE. (a)
 The board shall appoint a data management advisory committee.
 (b)  The advisory committee is composed of each data
 management officer designated by a state agency under Section
 2054.137 and the department's chief data officer.
 (c)  The advisory committee shall:
 (1)  advise the board and department on establishing
 statewide data ethics, principles, goals, strategies, standards,
 and architecture;
 (2)  provide guidance and recommendations on governing
 and managing state agency data and data management systems,
 including recommendations to assist data management officers in
 fulfilling the duties assigned under Section 2054.137; and
 (3)  establish performance objectives for state
 agencies from this state's data-driven policy goals.
 (d)  Sections 2110.002 and 2110.008 do not apply to the
 advisory committee.
 SECTION 2.  Subchapter C, Chapter 2054, Government Code, is
 amended by adding Section 2054.0593 to read as follows:
 Sec. 2054.0593.  CLOUD COMPUTING STATE RISK AND
 AUTHORIZATION MANAGEMENT PROGRAM. (a)  In this section, "cloud
 computing service" has the meaning assigned by Section 2157.007.
 (b)  The department shall establish a state risk and
 authorization management program to provide a standardized
 approach for security assessment, authorization, and continuous
 monitoring of cloud computing services that process the data of a
 state agency.  The program must allow a vendor to demonstrate
 compliance by submitting documentation that shows the vendor's
 compliance with a risk and authorization management program of:
 (1)  the federal government; or
 (2)  another state that the department approves.
 (c)  The department by rule shall prescribe:
 (1)  the categories and characteristics of cloud
 computing services subject to the state risk and authorization
 management program; and
 (2)  the requirements for certification through the
 program of vendors that provide cloud computing services.
 (d)  A state agency shall require each vendor contracting
 with the agency to provide cloud computing services for the agency
 to comply with the requirements of the state risk and authorization
 management program. The department shall evaluate vendors to
 determine whether a vendor qualifies for a certification issued by
 the department reflecting compliance with program requirements.
 (e)  A state agency may not enter or renew a contract with a
 vendor to purchase cloud computing services for the agency that are
 subject to the state risk and authorization management program
 unless the vendor demonstrates compliance with program
 requirements.
 (f)  A state agency shall require a vendor contracting with
 the agency to provide cloud computing services for the agency that
 are subject to the state risk and authorization management program
 to maintain program compliance and certification throughout the
 term of the contract.
 SECTION 3.  Section 2054.0594, Government Code, is amended
 by adding Subsection (d) to read as follows:
 (d)  The department shall establish a framework for regional
 cybersecurity working groups to execute mutual aid agreements that
 allow state agencies, local governments, regional planning
 commissions, public and private institutions of higher education,
 the private sector, and the incident response team established
 under Subchapter N-2 to assist with responding to a cybersecurity
 event in this state. A working group may be established within the
 geographic area of a regional planning commission established under
 Chapter 391, Local Government Code. The working group may
 establish a list of available cybersecurity experts and share
 resources to assist in responding to the cybersecurity event and
 recovery from the event.
 SECTION 4.  Subchapter F, Chapter 2054, Government Code, is
 amended by adding Sections 2054.137 and 2054.138 to read as
 follows:
 Sec. 2054.137.  DESIGNATED DATA MANAGEMENT OFFICER. (a)
 Each state agency with more than 150 full-time employees shall
 designate a full-time employee of the agency to serve as a data
 management officer.
 (b)  The data management officer for a state agency shall:
 (1)  coordinate with the chief data officer to ensure
 the agency performs the duties assigned under Section 2054.0286;
 (2)  in accordance with department guidelines,
 establish an agency data governance program to identify the
 agency's data assets, exercise authority and management over the
 agency's data assets, and establish related processes and
 procedures to oversee the agency's data assets; and
 (3)  coordinate with the agency's information security
 officer, the agency's records management officer, and the Texas
 State Library and Archives Commission to:
 (A)  implement best practices for managing and
 securing data in accordance with state privacy laws and data
 privacy classifications;
 (B)  ensure the agency's records management
 programs apply to all types of data storage media;
 (C)  increase awareness of and outreach for the
 agency's records management programs within the agency; and
 (D)  conduct a data maturity assessment of the
 agency's data governance program in accordance with the
 requirements established by department rule.
 (c)  In accordance with department guidelines, the data
 management officer for a state agency shall post on the Texas Open
 Data Portal established by the department under Section 2054.070 at
 least three high-value data sets as defined by Section 2054.1265.
 The high-value data sets may not include information that is
 confidential or protected from disclosure under state or federal
 law.
 (d)  The data management officer for a state agency may
 delegate in writing to another agency employee the duty to:
 (1)  implement a specific requirement of Subsection (b)
 or (c); or
 (2)  participate in the advisory committee established
 under Section 2054.0332.
 Sec. 2054.138.  SECURITY CONTROLS FOR STATE AGENCY DATA.
 Each state agency entering into or renewing a contract with a vendor
 authorized to access, transmit, use, or store data for the agency
 shall include a provision in the contract requiring the vendor to
 meet the security controls the agency determines are proportionate
 with the agency's risk under the contract based on the sensitivity
 of the agency's data. The vendor must periodically provide to the
 agency evidence that the vendor meets the security controls
 required under the contract.
 SECTION 5.  Subchapter G, Chapter 2054, Government Code, is
 amended by adding Section 2054.161 to read as follows:
 Sec. 2054.161.  DATA CLASSIFICATION, SECURITY, AND
 RETENTION REQUIREMENTS. On initiation of an information resources
 technology project, including an application development project
 and any information resources projects described in this
 subchapter, a state agency shall classify the data produced from or
 used in the project and determine appropriate data security and
 applicable retention requirements under Section 441.185 for each
 classification.
 SECTION 6.  Chapter 2054, Government Code, is amended by
 adding Subchapter N-2 to read as follows:
 SUBCHAPTER N-2. TEXAS VOLUNTEER INCIDENT RESPONSE TEAM
 Sec. 2054.52001.  DEFINITIONS. In this subchapter:
 (1)  "Incident response team" means the Texas volunteer
 incident response team established under Section 2054.52002.
 (2)  "Participating entity" means a state agency,
 including an institution of higher education, or a local government
 that receives assistance under this subchapter during a
 cybersecurity event.
 (3)  "Volunteer" means an individual who provides rapid
 response assistance during a cybersecurity event under this
 subchapter.
 Sec. 2054.52002.  ESTABLISHMENT OF TEXAS VOLUNTEER INCIDENT
 RESPONSE TEAM. (a)  The department shall establish the Texas
 volunteer incident response team to provide rapid response
 assistance to a participating entity under the department's
 direction during a cybersecurity event.
 (b)  The department shall prescribe eligibility criteria for
 participation as a volunteer member of the incident response team,
 including a requirement that each volunteer have expertise in
 addressing cybersecurity events.
 Sec. 2054.52003.  CONTRACT WITH VOLUNTEERS. The department
 shall enter into a contract with each volunteer the department
 approves to provide rapid response assistance under this
 subchapter. The contract must require the volunteer to:
 (1)  acknowledge the confidentiality of information
 required by Section 2054.52010;
 (2)  protect all confidential information from
 disclosure;
 (3)  avoid conflicts of interest that might arise in a
 deployment under this subchapter;
 (4)  comply with department security policies and
 procedures regarding information resources technologies;
 (5)  consent to background screening required by the
 department; and
 (6)  attest to the volunteer's satisfaction of any
 eligibility criteria established by the department.
 Sec. 2054.52004.  VOLUNTEER QUALIFICATION. (a)  The
 department shall require criminal history record information for
 each individual who accepts an invitation to become a volunteer.
 (b)  The department may request other information relevant
 to the individual's qualification and fitness to serve as a
 volunteer.
 (c)  The department has sole discretion to determine whether
 an individual is qualified to serve as a volunteer.
 Sec. 2054.52005.  DEPLOYMENT. (a)  In response to a
 cybersecurity event that affects multiple participating entities
 or a declaration by the governor of a state of disaster caused by a
 cybersecurity event, the department on request of a participating
 entity may deploy volunteers and provide rapid response assistance
 under the department's direction and the managed security services
 framework established under Section 2054.0594(d) to assist with the
 event.
 (b)  A volunteer may only accept a deployment under this
 subchapter in writing. A volunteer may decline to accept a
 deployment for any reason.
 Sec. 2054.52006.  CYBERSECURITY COUNCIL DUTIES. The
 cybersecurity council established under Section 2054.512 shall
 review and make recommendations to the department regarding the
 policies and procedures used by the department to implement this
 subchapter. The department may consult with the council to
 implement and administer this subchapter.
 Sec. 2054.52007.  DEPARTMENT POWERS AND DUTIES. (a)  The
 department shall:
 (1)  approve the incident response tools the incident
 response team may use in responding to a cybersecurity event;
 (2)  establish the eligibility criteria an individual
 must meet to become a volunteer;
 (3)  develop and publish guidelines for operation of
 the incident response team, including the:
 (A)  standards and procedures the department uses
 to determine whether an individual is eligible to serve as a
 volunteer;
 (B)  process for an individual to apply for and
 accept incident response team membership;
 (C)  requirements for a participating entity to
 receive assistance from the incident response team; and
 (D)  process for a participating entity to request
 and obtain the assistance of the incident response team; and
 (4)  adopt rules necessary to implement this
 subchapter.
 (b)  The department may require a participating entity to
 enter into a contract as a condition for obtaining assistance from
 the incident response team. The contract must comply with the
 requirements of Chapters 771 and 791.
 (c)  The department may provide appropriate training to
 prospective and approved volunteers.
 (d)  In accordance with state law, the department may provide
 compensation for actual and necessary travel and living expenses
 incurred by a volunteer on a deployment using money available for
 that purpose.
 (e)  The department may establish a fee schedule for
 participating entities receiving incident response team
 assistance. The amount of fees collected may not exceed the
 department's costs to operate the incident response team.
 Sec. 2054.52008.  STATUS OF VOLUNTEER; LIABILITY. (a)  A
 volunteer is not an agent, employee, or independent contractor of
 this state for any purpose and has no authority to obligate this
 state to a third party.
 (b)  This state is not liable to a volunteer for personal
 injury or property damage sustained by the volunteer that arises
 from participation in the incident response team.
 Sec. 2054.52009.  CIVIL LIABILITY. A volunteer who in good
 faith provides professional services in response to a cybersecurity
 event is not liable for civil damages as a result of the volunteer's
 acts or omissions in providing the services, except for wilful and
 wanton misconduct. This immunity is limited to services provided
 during the time of deployment for a cybersecurity event.
 Sec. 2054.52010.  CONFIDENTIAL INFORMATION. Information
 written, produced, collected, assembled, or maintained by the
 department, a participating entity, the cybersecurity council, or a
 volunteer in the implementation of this subchapter is confidential
 and not subject to disclosure under Chapter 552 if the information:
 (1)  contains the contact information for a volunteer;
 (2)  identifies or provides a means of identifying a
 person who may, as a result of disclosure of the information, become
 a victim of a cybersecurity event;
 (3)  consists of a participating entity's cybersecurity
 plans or cybersecurity-related practices; or
 (4)  is obtained from a participating entity or from a
 participating entity's computer system in the course of providing
 assistance under this subchapter.
 SECTION 7.  Section 2054.515, Government Code, is amended to
 read as follows:
 Sec. 2054.515.  AGENCY INFORMATION SECURITY ASSESSMENT AND
 REPORT. (a)  At least once every two years, each state agency shall
 conduct an information security assessment of the agency's:
 (1)  information resources systems, network systems,
 digital data storage systems, digital data security measures, and
 information resources vulnerabilities; and
 (2)  data governance program with participation from
 the agency's data management officer, if applicable, and in
 accordance with requirements established by department rule.
 (b)  Not later than November 15 of each even-numbered year
 [December 1 of the year in which a state agency conducts the
 assessment under Subsection (a)], the agency shall report the
 results of the assessment to:
 (1)  the department; and
 (2)  on request, the governor, the lieutenant governor,
 and the speaker of the house of representatives.
 (c)  The department by rule shall [may] establish the
 requirements for the information security assessment and report
 required by this section.
 (d)  The report and all documentation related to the
 information security assessment and report are confidential and not
 subject to disclosure under Chapter 552. The state agency or
 department may redact or withhold the information as confidential
 under Chapter 552 without requesting a decision from the attorney
 general under Subchapter G, Chapter 552.
 SECTION 8.  Section 2054.601, Government Code, is amended to
 read as follows:
 Sec. 2054.601.  USE OF NEXT GENERATION TECHNOLOGY. Each
 state agency and local government shall, in the administration of
 the agency or local government, consider using next generation
 technologies, including cryptocurrency, blockchain technology,
 robotic process automation, and artificial intelligence.
 SECTION 9.  Chapter 2059, Government Code, is amended by
 adding Subchapter E to read as follows:
 SUBCHAPTER E. REGIONAL NETWORK SECURITY CENTERS
 Sec. 2059.201.  ELIGIBLE PARTICIPATING ENTITIES. A state
 agency or an entity listed in Sections 2059.058(b)(3)-(5) is
 eligible to participate in cybersecurity support and network
 security provided by a regional network security center under this
 subchapter.
 Sec. 2059.202.  ESTABLISHMENT OF REGIONAL NETWORK SECURITY
 CENTERS. (a)  Subject to Subsection (b), the department may
 establish regional network security centers, under the
 department's managed security services framework established by
 Section 2054.0594(d), to assist in providing cybersecurity support
 and network security to regional offices or locations for state
 agencies and other eligible entities that elect to participate in
 and receive services through the center.
 (b)  The department may establish more than one regional
 network security center only if the department determines the first
 center established by the department successfully provides to state
 agencies and other eligible entities the services the center has
 contracted to provide.
 (c)  The department shall enter into an interagency contract
 in accordance with Chapter 771 or an interlocal contract in
 accordance with Chapter 791, as appropriate, with an eligible
 participating entity that elects to participate in and receive
 services through a regional network security center.
 Sec. 2059.203.  REGIONAL NETWORK SECURITY CENTER LOCATIONS
 AND PHYSICAL SECURITY. (a)  In creating and operating a regional
 network security center, the department shall partner with a
 university system or institution of higher education as defined by
 Section 61.003, Education Code, other than a public junior college.
 The system or institution shall:
 (1)  serve as an education partner with the department
 for the regional network security center; and
 (2)  enter into an interagency contract with the
 department in accordance with Chapter 771.
 (b)  In selecting the location for a regional network
 security center, the department shall select a university system or
 institution of higher education that has supportive educational
 capabilities.
 (c)  A university system or institution of higher education
 selected to serve as a regional network security center shall
 control and monitor all entrances to and critical areas of the
 center to prevent unauthorized entry. The system or institution
 shall restrict access to the center to only authorized individuals.
 (d)  A local law enforcement entity or any entity providing
 security for a regional network security center shall monitor
 security alarms at the regional network security center subject to
 the availability of that service.
 (e)  The department and a university system or institution of
 higher education selected to serve as a regional network security
 center shall restrict operational information to only center
 personnel, except as provided by Chapter 321.
 Sec. 2059.204.  REGIONAL NETWORK SECURITY CENTERS SERVICES
 AND SUPPORT. The department may offer the following managed
 security services through a regional network security center:
 (1)  real-time network security monitoring to detect
 and respond to network security events that may jeopardize this
 state and the residents of this state;
 (2)  alerts and guidance for defeating network security
 threats, including firewall configuration, installation,
 management, and monitoring, intelligence gathering, and protocol
 analysis;
 (3)  immediate response to counter network security
 activity that exposes this state and the residents of this state to
 risk, including complete intrusion detection system installation,
 management, and monitoring for participating entities;
 (4)  development, coordination, and execution of
 statewide cybersecurity operations to isolate, contain, and
 mitigate the impact of network security incidents for participating
 entities; and
 (5)  cybersecurity educational services.
 Sec. 2059.205.  NETWORK SECURITY GUIDELINES AND STANDARD
 OPERATING PROCEDURES. (a) The department shall adopt and provide
 to each regional network security center appropriate network
 security guidelines and standard operating procedures to ensure
 efficient operation of the center with a maximum return on the
 state's investment.
 (b)  The department shall revise the standard operating
 procedures as necessary to confirm network security.
 (c)  Each eligible participating entity that elects to
 participate in a regional network security center shall comply with
 the network security guidelines and standard operating procedures.
 SECTION 10.  Subtitle B, Title 10, Government Code, is
 amended by adding Chapter 2062 to read as follows:
 CHAPTER 2062. RESTRICTIONS ON STATE AGENCY USE OF CERTAIN
 INDIVIDUAL-IDENTIFYING INFORMATION
 Sec. 2062.001.  DEFINITIONS. In this chapter:
 (1)  "Biometric identifier" has the meaning assigned by
 Section 560.001.
 (2)  "State agency" means a department, commission,
 board, office, council, authority, or other agency in the
 executive, legislative, or judicial branch of state government,
 including a university system or institution of higher education as
 defined by Section 61.003, Education Code, that is created by the
 constitution or a statute of this state.
 Sec. 2062.002.  CONSENT REQUIRED BEFORE ACQUIRING,
 RETAINING, OR DISSEMINATING CERTAIN INFORMATION; RECORDS.  (a)
 Except as provided by Subsection (b), a state agency may not:
 (1)  use global positioning system technology,
 individual contact tracing, or technology designed to obtain
 biometric identifiers to acquire information that alone or in
 conjunction with other information identifies an individual or the
 individual's location without the individual's written or
 electronic consent;
 (2)  retain information with respect to an individual
 described by Subdivision (1) without the individual's written or
 electronic consent; or
 (3)  disseminate to a person the information described
 by Subdivision (1) with respect to an individual unless the state
 agency first obtains the individual's written or electronic
 consent.
 (b)  A state agency may acquire, retain, and disseminate
 information described by Subsection (a) with respect to an
 individual without the individual's written or electronic consent
 if the acquisition, retention, or dissemination is:
 (1)  required or permitted by a federal statute or by a
 state statute other than Chapter 552; or
 (2)  made by or to a law enforcement agency for a law
 enforcement purpose.
 (c)  A state agency shall retain the written or electronic
 consent of an individual obtained as required under this section in
 the agency's records until the contract or agreement under which
 the information is acquired, retained, or disseminated expires.
 SECTION 11.  (a)  Not later than December 1, 2021, the
 Department of Information Resources shall:
 (1)  establish the state risk and authorization
 management program as required by Section 2054.0593, Government
 Code, as added by this Act;
 (2)  establish the framework for regional
 cybersecurity working groups to execute mutual aid agreements as
 required under Section 2054.0594(d), Government Code, as added by
 this Act; and
 (3)  establish the Texas volunteer incident response
 team as required by Subchapter N-2, Chapter 2054, Government Code,
 as added by this Act.
 (b)  Each state agency shall ensure that:
 (1)  each contract for cloud computing services the
 agency enters into or renews on or after January 1, 2022, complies
 with Section 2054.0593, Government Code, as added by this Act; and
 (2)  each contract subject to Section 2054.138,
 Government Code, as added by this Act, that is executed on or after
 the effective date of this Act complies with that section.
 (c)  Each state agency subject to Section 2054.137,
 Government Code, as added by this Act, shall designate a data
 management officer as soon as practicable after the effective date
 of this Act.
 (d)  Each state agency subject to Section 2054.161,
 Government Code, as added by this Act, shall ensure each
 information resources technology project initiated on or after the
 effective date of this Act complies with that section.
 SECTION 12.  Not later than October 15, 2022, the Department
 of Information Resources shall submit to the standing committees of
 the senate and house of representatives with primary jurisdiction
 over state agency cybersecurity a report on the department's
 activities and recommendations related to the Texas volunteer
 incident response team established as required by Subchapter N-2,
 Chapter 2054, Government Code, as added by this Act.
 SECTION 13.  Chapter 2062, Government Code, as added by this
 Act, applies only to information acquired, retained, or
 disseminated by a state agency to another person on or after the
 effective date of this Act.
 SECTION 14.  (a) Except as provided by Subsection (b) of
 this section, this Act takes effect immediately if it receives a
 vote of two-thirds of all the members elected to each house, as
 provided by Section 39, Article III, Texas Constitution.  If this
 Act does not receive the vote necessary for immediate effect, this
 Act takes effect September 1, 2021.
 (b)  Chapter 2062, Government Code, as added by this Act,
 takes effect September 1, 2021.
 ______________________________ ______________________________
 President of the Senate Speaker of the House
 I hereby certify that S.B. No. 475 passed the Senate on
 April 19, 2021, by the following vote: Yeas 31, Nays 0; and that
 the Senate concurred in House amendment on May 28, 2021, by the
 following vote: Yeas 31, Nays 0.
 ______________________________
 Secretary of the Senate
 I hereby certify that S.B. No. 475 passed the House, with
 amendment, on May 25, 2021, by the following vote: Yeas 147,
 Nays 0, one present not voting.
 ______________________________
 Chief Clerk of the House
 Approved:
 ______________________________
 Date
 ______________________________
 Governor