Bill Text: FL S1708 | 2023 | Regular Session | Comm Sub


Bill Title: Cybersecurity

Spectrum: Bipartisan Bill

Status: (Failed) 2023-05-05 - Died in Appropriations Committee on Agriculture, Environment, and General Government [S1708 Detail]

Download: Florida-2023-S1708-Comm_Sub.html
       Florida Senate - 2023                             CS for SB 1708
       
       
        
       By the Committee on Governmental Oversight and Accountability;
       and Senator DiCeglie
       
       
       
       
       585-03244A-23                                         20231708c1
    1                        A bill to be entitled                      
    2         An act relating to cybersecurity; providing a short
    3         title; amending s. 110.205, F.S.; exempting certain
    4         personnel from the career service; amending s.
    5         282.0041, F.S.; defining terms; revising the
    6         definition of the term “incident”; amending s.
    7         282.0051, F.S.; requiring the Florida Digital Service
    8         to ensure that independent project oversight is
    9         performed in a certain manner and to take certain
   10         actions relating to the procurement of project
   11         oversight as a service; requiring the Florida Digital
   12         Service to provide certain reports by certain dates;
   13         requiring the Florida Digital Service to establish an
   14         operations committee for a certain purpose and
   15         composed of certain members; requiring the Governor to
   16         appoint a state chief information officer subject to
   17         confirmation by the Senate; requiring the state chief
   18         information officer to designate a state chief
   19         technology officer; providing duties of the state
   20         chief technology officer; amending s. 282.201, F.S.;
   21         requiring that the state data center be overseen by
   22         and accountable to the Department of Management
   23         Services in consultation with certain officers;
   24         providing requirements for certain state data center
   25         procurements; requiring the state chief information
   26         officer to assume responsibility for a certain
   27         contract; requiring that the Florida Digital Service
   28         be provided with full access to state data center
   29         infrastructure, systems, applications, and other means
   30         of hosting, supporting, and managing certain data;
   31         requiring the state data center to submit a certain
   32         report to the department and the Florida Digital
   33         Service; amending s. 282.318, F.S.; requiring a state
   34         agency to report ransomware and cybersecurity
   35         incidents within a certain time period; requiring the
   36         Florida Digital Service to notify the Governor and
   37         Legislature of certain incidents; requiring that
   38         certain notification be provided in a secure
   39         environment; requiring the Florida Digital Service to
   40         provide cybersecurity briefings to certain legislative
   41         committees; authorizing the Florida Digital Service to
   42         respond to certain cybersecurity incidents; requiring
   43         a state agency head to designate a chief information
   44         security officer for the agency; revising the purpose
   45         of an agency’s information security manager and the
   46         date by which he or she must be designated; revising
   47         the frequency of a comprehensive risk assessment;
   48         authorizing the department to facilitate and providing
   49         requirements for such assessment; authorizing certain
   50         legislative committees to hold closed meetings to
   51         receive certain briefings; requiring such committees
   52         to maintain the confidential and exempt status of
   53         certain records; amending s. 282.3185, F.S.; requiring
   54         a local government to report ransomware and
   55         cybersecurity incidents within a certain time period;
   56         requiring the Florida Digital Service to notify the
   57         Governor and Legislature of certain incidents;
   58         requiring that certain notification be provided in a
   59         secure environment; amending s. 282.319, F.S.;
   60         revising the membership of the Florida Cybersecurity
   61         Advisory Council; creating s. 768.401, F.S.; providing
   62         that a county, municipality, or commercial entity that
   63         complies with certain requirements is not liable in
   64         connection with a cybersecurity incident; requiring
   65         certain entities to adopt certain revised frameworks
   66         or standards within a specified time period; providing
   67         that a private cause of action is not established;
   68         providing that certain failures are not evidence of
   69         negligence and do not constitute negligence per se;
   70         specifying that the defendant in certain actions has a
   71         certain burden of proof; providing an effective date.
   72          
   73  Be It Enacted by the Legislature of the State of Florida:
   74  
   75         Section 1. This act may be cited as the “Florida Cyber
   76  Protection Act.”
   77         Section 2. Paragraph (y) is added to subsection (2) of
   78  section 110.205, Florida Statutes, to read:
   79         110.205 Career service; exemptions.—
   80         (2) EXEMPT POSITIONS.—The exempt positions that are not
   81  covered by this part include the following:
   82         (y)Personnel employed by or reporting to the state chief
   83  information security officer, the state chief data officer, a
   84  chief information security officer, and an agency information
   85  security manager.
   86         Section 3. Present subsections (3) through (5), (6) through
   87  (19), and (20) through (38) of section 282.0041, Florida
   88  Statutes, are redesignated as subsections (4) through (6), (8)
   89  through (21), and (24) through (42), respectively, new
   90  subsections (3), (7), (22), and (23) are added to that section,
   91  and present subsection (19) is amended, to read:
   92         282.0041 Definitions.—As used in this chapter, the term:
   93         (3)“As a service” means the contracting with or
   94  outsourcing to a third-party of a defined role or function as a
   95  means of delivery.
   96         (7)“Cloud provider” has the same meaning as provided in
   97  Special Publication 800-145 issued by the National Institute of
   98  Standards and Technology.
   99         (21)(19) “Incident” means a violation or an imminent threat
  100  of violation, whether such violation is accidental or
  101  deliberate, of information technology resources, security,
  102  policies, or practices, or which may jeopardize the
  103  confidentiality, integrity, or availability of an information
  104  technology system or the information the system processes,
  105  stores, or transmits. An imminent threat of violation refers to
  106  a situation in which a state agency, county, or municipality has
  107  a factual basis for believing that a specific incident is about
  108  to occur.
  109         (22)“Independent” means, for an entity providing
  110  independent verification and validation, having no technical,
  111  managerial, or financial interest in the relevant technology
  112  project; no relationship to the relevant agency; and no
  113  responsibility for or participation in any aspect of the
  114  project, which includes project oversight by the Florida Digital
  115  Service.
  116         (23)“Independent verification and validation” means third
  117  party support services that provide a completely independent and
  118  impartial assessment of the progress and work products of a
  119  technology project from concept to business case and throughout
  120  the project life cycle.
  121         Section 4. Section 282.0051, Florida Statutes, is amended
  122  to read:
  123         282.0051 Department of Management Services; Florida Digital
  124  Service; powers, duties, and functions.—
  125         (1) The Florida Digital Service is has been created within
  126  the department to propose innovative solutions that securely
  127  modernize state government, including technology and information
  128  services, to achieve value through digital transformation and
  129  interoperability, and to fully support the cloud-first policy as
  130  specified in s. 282.206. The department, through the Florida
  131  Digital Service, shall have the following powers, duties, and
  132  functions:
  133         (a) Develop and publish information technology policy for
  134  the management of the state’s information technology resources.
  135         (b) Develop an enterprise architecture that:
  136         1. Acknowledges the unique needs of the entities within the
  137  enterprise in the development and publication of standards and
  138  terminologies to facilitate digital interoperability;
  139         2. Supports the cloud-first policy as specified in s.
  140  282.206; and
  141         3. Addresses how information technology infrastructure may
  142  be modernized to achieve cloud-first objectives.
  143         (c) Establish project management and oversight standards
  144  with which state agencies must comply when implementing
  145  information technology projects. The department, acting through
  146  the Florida Digital Service, shall provide training
  147  opportunities to state agencies to assist in the adoption of the
  148  project management and oversight standards. To support data
  149  driven decisionmaking, the standards must include, but are not
  150  limited to:
  151         1. Performance measurements and metrics that objectively
  152  reflect the status of an information technology project based on
  153  a defined and documented project scope, cost, and schedule.
  154         2. Methodologies for calculating acceptable variances in
  155  the projected versus actual scope, schedule, or cost of an
  156  information technology project.
  157         3. Reporting requirements, including requirements designed
  158  to alert all defined stakeholders that an information technology
  159  project has exceeded acceptable variances defined and documented
  160  in a project plan.
  161         4. Content, format, and frequency of project updates.
  162         5. Technical standards to ensure an information technology
  163  project complies with the enterprise architecture.
  164         (d) Ensure that independent Perform project oversight on
  165  all state agency information technology projects that have total
  166  project costs of $10 million or more and that are funded in the
  167  General Appropriations Act or any other law is performed and in
  168  compliance with applicable state and federal law.
  169         1.The department may not be considered independent for
  170  purposes of project oversight under this paragraph on a project
  171  for which the department has provided or may be asked to provide
  172  any operational or technical support, including, but not limited
  173  to, providing advice or conducting any review.
  174         2.The department shall establish an appropriate contract
  175  vehicle to facilitate procurement of project oversight as a
  176  service by the enterprise and ensure that the contract vehicle
  177  includes offerings that incorporate the ability to comply with
  178  applicable state and federal law, including any independent
  179  verification and validation requirements. An entity that
  180  provides project oversight as a service must provide a project
  181  oversight report to the department.
  182         3.An agency may request the department to procure project
  183  oversight as a service for a project that is subject to this
  184  paragraph. Such procurement by the department does not violate
  185  the requirement that the project oversight must be independent.
  186         4.The department, acting through the Florida Digital
  187  Service, shall at least quarterly review received project
  188  oversight reports and, upon acceptance of the contents of such
  189  reports, provide the reports to the Executive Office of the
  190  Governor, the President of the Senate, and the Speaker of the
  191  House of Representatives.
  192         5. The department, acting through the Florida Digital
  193  Service, shall report at least quarterly to the Executive Office
  194  of the Governor, the President of the Senate, and the Speaker of
  195  the House of Representatives on any information technology
  196  project that the department identifies as high-risk due to the
  197  project exceeding acceptable variance ranges defined and
  198  documented in a project plan. The report must include a risk
  199  assessment, including fiscal risks, associated with proceeding
  200  to the next stage of the project, and a recommendation for
  201  corrective actions required, including suspension or termination
  202  of the project.
  203         (e) Identify opportunities for standardization and
  204  consolidation of information technology services that support
  205  interoperability and the cloud-first policy, as specified in s.
  206  282.206, and business functions and operations, including
  207  administrative functions such as purchasing, accounting and
  208  reporting, cash management, and personnel, and that are common
  209  across state agencies. The department, acting through the
  210  Florida Digital Service, shall biennially on January 15 1 of
  211  each even-numbered year provide recommendations for
  212  standardization and consolidation to the Executive Office of the
  213  Governor, the President of the Senate, and the Speaker of the
  214  House of Representatives.
  215         (f) Establish best practices for the procurement of
  216  information technology products and cloud-computing services in
  217  order to reduce costs, increase the quality of data center
  218  services, or improve government services.
  219         (g) Develop standards for information technology reports
  220  and updates, including, but not limited to, operational work
  221  plans, project spend plans, and project status reports, for use
  222  by state agencies.
  223         (h) Upon request, assist state agencies in the development
  224  of information technology-related legislative budget requests.
  225         (i) Conduct annual assessments of state agencies to
  226  determine compliance with all information technology standards
  227  and guidelines developed and published by the department and
  228  provide results of the assessments to the Executive Office of
  229  the Governor, the President of the Senate, and the Speaker of
  230  the House of Representatives.
  231         (j) Conduct a market analysis not less frequently than
  232  every 3 years beginning in 2021 to determine whether the
  233  information technology resources within the enterprise are
  234  utilized in the most cost-effective and cost-efficient manner,
  235  while recognizing that the replacement of certain legacy
  236  information technology systems within the enterprise may be cost
  237  prohibitive or cost inefficient due to the remaining useful life
  238  of those resources; whether the enterprise is complying with the
  239  cloud-first policy specified in s. 282.206; and whether the
  240  enterprise is utilizing best practices with respect to
  241  information technology, information services, and the
  242  acquisition of emerging technologies and information services.
  243  Each market analysis shall be used to prepare a strategic plan
  244  for continued and future information technology and information
  245  services for the enterprise, including, but not limited to,
  246  proposed acquisition of new services or technologies and
  247  approaches to the implementation of any new services or
  248  technologies. Copies of each market analysis and accompanying
  249  strategic plan must be submitted to the Executive Office of the
  250  Governor, the President of the Senate, and the Speaker of the
  251  House of Representatives not later than December 31 of each year
  252  that a market analysis is conducted.
  253         (k) Recommend other information technology services that
  254  should be designed, delivered, and managed as enterprise
  255  information technology services. Recommendations must include
  256  the identification of existing information technology resources
  257  associated with the services, if existing services must be
  258  transferred as a result of being delivered and managed as
  259  enterprise information technology services.
  260         (l) In consultation with state agencies, propose a
  261  methodology and approach for identifying and collecting both
  262  current and planned information technology expenditure data at
  263  the state agency level.
  264         (m)1. Notwithstanding any other law, provide project
  265  oversight on any information technology project of the
  266  Department of Financial Services, the Department of Legal
  267  Affairs, and the Department of Agriculture and Consumer Services
  268  which has a total project cost of $20 million or more. Such
  269  information technology projects must also comply with the
  270  applicable information technology architecture, project
  271  management and oversight, and reporting standards established by
  272  the department, acting through the Florida Digital Service.
  273         2. When performing the project oversight function specified
  274  in subparagraph 1., report by the 15th day after the end of each
  275  quarter at least quarterly to the Executive Office of the
  276  Governor, the President of the Senate, and the Speaker of the
  277  House of Representatives on any information technology project
  278  that the department, acting through the Florida Digital Service,
  279  identifies as high-risk due to the project exceeding acceptable
  280  variance ranges defined and documented in the project plan. The
  281  report shall include a risk assessment, including fiscal risks,
  282  associated with proceeding to the next stage of the project and
  283  a recommendation for corrective actions required, including
  284  suspension or termination of the project.
  285         (n) If an information technology project implemented by a
  286  state agency must be connected to or otherwise accommodated by
  287  an information technology system administered by the Department
  288  of Financial Services, the Department of Legal Affairs, or the
  289  Department of Agriculture and Consumer Services, consult with
  290  these departments regarding the risks and other effects of such
  291  projects on their information technology systems and work
  292  cooperatively with these departments regarding the connections,
  293  interfaces, timing, or accommodations required to implement such
  294  projects.
  295         (o) If adherence to standards or policies adopted by or
  296  established pursuant to this section causes conflict with
  297  federal regulations or requirements imposed on an entity within
  298  the enterprise and results in adverse action against an entity
  299  or federal funding, work with the entity to provide alternative
  300  standards, policies, or requirements that do not conflict with
  301  the federal regulation or requirement. The department, acting
  302  through the Florida Digital Service, shall annually by January
  303  15 report such alternative standards to the Executive Office of
  304  the Governor, the President of the Senate, and the Speaker of
  305  the House of Representatives.
  306         (p)1. Establish an information technology policy for all
  307  information technology-related state contracts, including state
  308  term contracts for information technology commodities,
  309  consultant services, and staff augmentation services. The
  310  information technology policy must include:
  311         a. Identification of the information technology product and
  312  service categories to be included in state term contracts.
  313         b. Requirements to be included in solicitations for state
  314  term contracts.
  315         c. Evaluation criteria for the award of information
  316  technology-related state term contracts.
  317         d. The term of each information technology-related state
  318  term contract.
  319         e. The maximum number of vendors authorized on each state
  320  term contract.
  321         f. At a minimum, a requirement that any contract for
  322  information technology commodities or services meet the National
  323  Institute of Standards and Technology Cybersecurity Framework.
  324         g. For an information technology project wherein project
  325  oversight is required pursuant to paragraph (d) or paragraph
  326  (m), a requirement that independent verification and validation
  327  be employed throughout the project life cycle with the primary
  328  objective of independent verification and validation being to
  329  provide an objective assessment of products and processes
  330  throughout the project life cycle. An entity providing
  331  independent verification and validation may not have technical,
  332  managerial, or financial interest in the project and may not
  333  have responsibility for, or participate in, any other aspect of
  334  the project.
  335         2. Evaluate vendor responses for information technology
  336  related state term contract solicitations and invitations to
  337  negotiate.
  338         3. Answer vendor questions on information technology
  339  related state term contract solicitations.
  340         4. Ensure that the information technology policy
  341  established pursuant to subparagraph 1. is included in all
  342  solicitations and contracts that are administratively executed
  343  by the department.
  344         (q) Recommend potential methods for standardizing data
  345  across state agencies which will promote interoperability and
  346  reduce the collection of duplicative data.
  347         (r) Recommend open data technical standards and
  348  terminologies for use by the enterprise.
  349         (s) Ensure that enterprise information technology solutions
  350  are capable of utilizing an electronic credential and comply
  351  with the enterprise architecture standards.
  352         (t)Establish an operations committee that shall meet as
  353  necessary for the purpose of developing collaborative efforts
  354  between agencies and other governmental entities relating to
  355  cybersecurity issues, including the coordination of preparedness
  356  and response efforts relating to cybersecurity incidents and
  357  issues relating to the interoperability of agency projects. The
  358  Secretary of Management Services shall serve as the executive
  359  director of the committee. The committee shall be composed of
  360  the following members:
  361         1.The state chief information officer, or his or her
  362  designee.
  363         2.The Attorney General, or his or her designee.
  364         3.The Secretary of State, or his or her designee.
  365         4.The executive director of the Department of Law
  366  Enforcement, or his or her designee.
  367         5.The Secretary of Transportation, or his or her designee.
  368         6.The director of the Division of Emergency Management, or
  369  his or her designee.
  370         7.The Secretary of Health Care Administration, or his or
  371  her designee.
  372         8.The Commissioner of Education, or his or her designee.
  373         9.The executive director of the Department of Highway
  374  Safety and Motor Vehicles, or his or her designee.
  375         10.The chair of the Public Service Commission, or his or
  376  her designee.
  377         11.The director of the Florida State Guard, or his or her
  378  designee.
  379         12.The Adjutant General of the Florida National Guard, or
  380  his or her designee.
  381         13.Any other agency head appointed by the Governor.
  382         (2)(a) The Governor shall appoint Secretary of Management
  383  Services shall designate a state chief information officer,
  384  subject to confirmation by the Senate, who shall administer the
  385  Florida Digital Service. The state chief information officer,
  386  before prior to appointment, must have at least 5 years of
  387  experience in the development of information system strategic
  388  planning and development or information technology policy, and,
  389  preferably, have leadership-level experience in the design,
  390  development, and deployment of interoperable software and data
  391  solutions.
  392         (b) The state chief information officer, in consultation
  393  with the Secretary of Management Services, shall designate a
  394  state chief data officer. The chief data officer must be a
  395  proven and effective administrator who must have significant and
  396  substantive experience in data management, data governance,
  397  interoperability, and security.
  398         (c)The state chief information officer shall designate a
  399  state chief technology officer who shall be responsible for:
  400         1.Exploring technology solutions to meet the enterprise
  401  need;
  402         2.The deployments of adopted enterprise solutions;
  403         3.Compliance with the cloud-first policy specified in s.
  404  282.206;
  405         4.Recommending best practices to increase the likelihood
  406  of technology project success;
  407         5.Developing strategic partnerships with the private
  408  sector; and
  409         6.Directly supporting enterprise cybersecurity and data
  410  interoperability initiatives.
  411  
  412  The state chief technology officer may acquire cloud migration
  413  as a service to comply with this section as it pertains to the
  414  implementation across the enterprise of the cloud-first policy.
  415         (3) The department, acting through the Florida Digital
  416  Service and from funds appropriated to the Florida Digital
  417  Service, shall:
  418         (a) Create, not later than December 1, 2022, and maintain a
  419  comprehensive indexed data catalog in collaboration with the
  420  enterprise that lists the data elements housed within the
  421  enterprise and the legacy system or application in which these
  422  data elements are located. The data catalog must, at a minimum,
  423  specifically identify all data that is restricted from public
  424  disclosure based on federal or state laws and regulations and
  425  require that all such information be protected in accordance
  426  with s. 282.318.
  427         (b) Develop and publish, not later than December 1, 2022,
  428  in collaboration with the enterprise, a data dictionary for each
  429  agency that reflects the nomenclature in the comprehensive
  430  indexed data catalog.
  431         (c) Adopt, by rule, standards that support the creation and
  432  deployment of an application programming interface to facilitate
  433  integration throughout the enterprise.
  434         (d) Adopt, by rule, standards necessary to facilitate a
  435  secure ecosystem of data interoperability that is compliant with
  436  the enterprise architecture.
  437         (e) Adopt, by rule, standards that facilitate the
  438  deployment of applications or solutions to the existing
  439  enterprise system in a controlled and phased approach.
  440         (f) After submission of documented use cases developed in
  441  conjunction with the affected agencies, assist the affected
  442  agencies with the deployment, contingent upon a specific
  443  appropriation therefor, of new interoperable applications and
  444  solutions:
  445         1. For the Department of Health, the Agency for Health Care
  446  Administration, the Agency for Persons with Disabilities, the
  447  Department of Education, the Department of Elderly Affairs, and
  448  the Department of Children and Families.
  449         2. To support military members, veterans, and their
  450  families.
  451         (4) For information technology projects that have a total
  452  project costs cost of $10 million or more:
  453         (a) State agencies must provide the Florida Digital Service
  454  with written notice of any planned procurement of an information
  455  technology project.
  456         (b) The Florida Digital Service must participate in the
  457  development of specifications and recommend modifications to any
  458  planned procurement of an information technology project by
  459  state agencies so that the procurement complies with the
  460  enterprise architecture.
  461         (c) The Florida Digital Service must participate in post
  462  award contract monitoring.
  463         (5) The department, acting through the Florida Digital
  464  Service, may not retrieve or disclose any data without a shared
  465  data agreement in place between the department and the
  466  enterprise entity that has primary custodial responsibility of,
  467  or data-sharing responsibility for, that data.
  468         (6) The department, acting through the Florida Digital
  469  Service, shall adopt rules to administer this section.
  470         Section 5. Section 282.201, Florida Statutes, is amended to
  471  read:
  472         282.201 State data center.—The state data center is
  473  established within the department and shall be overseen by and
  474  accountable to the department in consultation with the state
  475  chief information officer, the state chief data officer, the
  476  state chief information security officer, and the state chief
  477  technology officer. Any procurement or purchase of enterprise
  478  architecture which is comparable to a project that would be
  479  subject to requirements under s. 282.0051(4) if the total
  480  project cost was $10 million or more and which may be consumed
  481  by an enterprise must be provided to the department and the
  482  Florida Digital Service for review before publication. The
  483  provision of data center services must comply with applicable
  484  state and federal laws, regulations, and policies, including all
  485  applicable security, privacy, and auditing requirements. The
  486  Florida Digital Service department shall appoint a director of
  487  the state data center who has experience in leading data center
  488  facilities and has expertise in cloud-computing management.
  489         (1) STATE DATA CENTER DUTIES.—The state data center shall:
  490         (a) Offer, develop, and support the services and
  491  applications defined in service-level agreements executed with
  492  its customer entities.
  493         (b) Maintain performance of the state data center by
  494  ensuring proper data backup; data backup recovery; disaster
  495  recovery; and appropriate security, power, cooling, fire
  496  suppression, and capacity.
  497         (c) Develop and implement business continuity and disaster
  498  recovery plans, and annually conduct a live exercise of each
  499  plan.
  500         (d) Enter into a service-level agreement with each customer
  501  entity to provide the required type and level of service or
  502  services. If a customer entity fails to execute an agreement
  503  within 60 days after commencement of a service, the state data
  504  center may cease service. A service-level agreement may not have
  505  a term exceeding 3 years and at a minimum must:
  506         1. Identify the parties and their roles, duties, and
  507  responsibilities under the agreement.
  508         2. State the duration of the contract term and specify the
  509  conditions for renewal.
  510         3. Identify the scope of work.
  511         4. Identify the products or services to be delivered with
  512  sufficient specificity to permit an external financial or
  513  performance audit.
  514         5. Establish the services to be provided, the business
  515  standards that must be met for each service, the cost of each
  516  service by agency application, and the metrics and processes by
  517  which the business standards for each service are to be
  518  objectively measured and reported.
  519         6. Provide a timely billing methodology to recover the
  520  costs of services provided to the customer entity pursuant to s.
  521  215.422.
  522         7. Provide a procedure for modifying the service-level
  523  agreement based on changes in the type, level, and cost of a
  524  service.
  525         8. Include a right-to-audit clause to ensure that the
  526  parties to the agreement have access to records for audit
  527  purposes during the term of the service-level agreement.
  528         9. Provide that a service-level agreement may be terminated
  529  by either party for cause only after giving the other party and
  530  the department notice in writing of the cause for termination
  531  and an opportunity for the other party to resolve the identified
  532  cause within a reasonable period.
  533         10. Provide for mediation of disputes by the Division of
  534  Administrative Hearings pursuant to s. 120.573.
  535         (e) For purposes of chapter 273, be the custodian of
  536  resources and equipment located in and operated, supported, and
  537  managed by the state data center.
  538         (f) Assume administrative access rights to resources and
  539  equipment, including servers, network components, and other
  540  devices, consolidated into the state data center.
  541         1. Upon consolidation, a state agency shall relinquish
  542  administrative rights to consolidated resources and equipment.
  543  State agencies required to comply with federal and state
  544  criminal justice information security rules and policies shall
  545  retain administrative access rights sufficient to comply with
  546  the management control provisions of those rules and policies;
  547  however, the state data center shall have the appropriate type
  548  or level of rights to allow the center to comply with its duties
  549  pursuant to this section. The Department of Law Enforcement
  550  shall serve as the arbiter of disputes pertaining to the
  551  appropriate type and level of administrative access rights
  552  pertaining to the provision of management control in accordance
  553  with the federal criminal justice information guidelines.
  554         2. The state data center shall provide customer entities
  555  with access to applications, servers, network components, and
  556  other devices necessary for entities to perform business
  557  activities and functions, and as defined and documented in a
  558  service-level agreement.
  559         (g) In its procurement process, show preference for cloud
  560  computing solutions that minimize or do not require the
  561  purchasing, financing, or leasing of state data center
  562  infrastructure, and that meet the needs of customer agencies,
  563  that reduce costs, and that meet or exceed the applicable state
  564  and federal laws, regulations, and standards for cybersecurity.
  565         (h) Assist customer entities in transitioning from state
  566  data center services to the Northwest Regional Data Center or
  567  other third-party cloud-computing services procured by a
  568  customer entity or by the Northwest Regional Data Center on
  569  behalf of a customer entity.
  570         (2) USE OF THE STATE DATA CENTER.—The following are exempt
  571  from the use of the state data center: the Department of Law
  572  Enforcement, the Department of the Lottery’s Gaming System,
  573  Systems Design and Development in the Office of Policy and
  574  Budget, the regional traffic management centers as described in
  575  s. 335.14(2) and the Office of Toll Operations of the Department
  576  of Transportation, the State Board of Administration, state
  577  attorneys, public defenders, criminal conflict and civil
  578  regional counsel, capital collateral regional counsel, and the
  579  Florida Housing Finance Corporation.
  580         (3) AGENCY LIMITATIONS.—Unless exempt from the use of the
  581  state data center pursuant to this section or authorized by the
  582  Legislature, a state agency may not:
  583         (a) Create a new agency computing facility or data center,
  584  or expand the capability to support additional computer
  585  equipment in an existing agency computing facility or data
  586  center; or
  587         (b) Terminate services with the state data center without
  588  giving written notice of intent to terminate services 180 days
  589  before such termination.
  590         (4) DEPARTMENT RESPONSIBILITIES.—The department shall
  591  provide operational management and oversight of the state data
  592  center, which includes:
  593         (a) Implementing industry standards and best practices for
  594  the state data center’s facilities, operations, maintenance,
  595  planning, and management processes.
  596         (b) Developing and implementing cost-recovery mechanisms
  597  that recover the full direct and indirect cost of services
  598  through charges to applicable customer entities. Such cost
  599  recovery mechanisms must comply with applicable state and
  600  federal regulations concerning distribution and use of funds and
  601  must ensure that, for any fiscal year, no service or customer
  602  entity subsidizes another service or customer entity. The
  603  department may recommend other payment mechanisms to the
  604  Executive Office of the Governor, the President of the Senate,
  605  and the Speaker of the House of Representatives. Such mechanisms
  606  may be implemented only if specifically authorized by the
  607  Legislature.
  608         (c) Developing and implementing appropriate operating
  609  guidelines and procedures necessary for the state data center to
  610  perform its duties pursuant to subsection (1). The guidelines
  611  and procedures must comply with applicable state and federal
  612  laws, regulations, and policies and conform to generally
  613  accepted governmental accounting and auditing standards. The
  614  guidelines and procedures must include, but need not be limited
  615  to:
  616         1. Implementing a consolidated administrative support
  617  structure responsible for providing financial management,
  618  procurement, transactions involving real or personal property,
  619  human resources, and operational support.
  620         2. Implementing an annual reconciliation process to ensure
  621  that each customer entity is paying for the full direct and
  622  indirect cost of each service as determined by the customer
  623  entity’s use of each service.
  624         3. Providing rebates that may be credited against future
  625  billings to customer entities when revenues exceed costs.
  626         4. Requiring customer entities to validate that sufficient
  627  funds exist before implementation of a customer entity’s request
  628  for a change in the type or level of service provided, if such
  629  change results in a net increase to the customer entity’s cost
  630  for that fiscal year.
  631         5. By November 15 of each year, providing to the Office of
  632  Policy and Budget in the Executive Office of the Governor and to
  633  the chairs of the legislative appropriations committees the
  634  projected costs of providing data center services for the
  635  following fiscal year.
  636         6. Providing a plan for consideration by the Legislative
  637  Budget Commission if the cost of a service is increased for a
  638  reason other than a customer entity’s request made pursuant to
  639  subparagraph 4. Such a plan is required only if the service cost
  640  increase results in a net increase to a customer entity for that
  641  fiscal year.
  642         7. Standardizing and consolidating procurement and
  643  contracting practices.
  644         (d) In collaboration with the Department of Law Enforcement
  645  and the Florida Digital Service, developing and implementing a
  646  process for detecting, reporting, and responding to
  647  cybersecurity incidents, breaches, and threats.
  648         (e) Adopting rules relating to the operation of the state
  649  data center, including, but not limited to, budgeting and
  650  accounting procedures, cost-recovery methodologies, and
  651  operating procedures.
  652         (5) NORTHWEST REGIONAL DATA CENTER CONTRACT.—In order for
  653  the department to carry out its duties and responsibilities
  654  relating to the state data center, the state chief information
  655  officer shall assume responsibility for the contract entered
  656  into by the secretary of the department shall contract by July
  657  1, 2022, with the Northwest Regional Data Center pursuant to s.
  658  287.057(11). The contract shall provide that the Northwest
  659  Regional Data Center will manage the operations of the state
  660  data center and provide data center services to state agencies.
  661  Notwithstanding the terms of the contract, the Northwest
  662  Regional Data Center must provide the Florida Digital Service
  663  with access to information regarding the operations of the state
  664  data center.
  665         (a) The department shall provide contract oversight,
  666  including, but not limited to, reviewing invoices provided by
  667  the Northwest Regional Data Center for services provided to
  668  state agency customers.
  669         (b) The department shall approve or request updates to
  670  invoices within 10 business days after receipt. If the
  671  department does not respond to the Northwest Regional Data
  672  Center, the invoice will be approved by default. The Northwest
  673  Regional Data Center must submit approved invoices directly to
  674  state agency customers.
  675         (6)FLORIDA DIGITAL SERVICE ACCESS.—The state data center,
  676  and any successor entity assuming the responsibilities of the
  677  state data center, including, but not limited to, the Northwest
  678  Regional Data Center, shall provide the Florida Digital Service
  679  with full access to any infrastructure, system, application, or
  680  other means that hosts, supports, or manages data in the custody
  681  of an enterprise. For any such infrastructure, system,
  682  application, or other means, the state data center or a
  683  successor entity shall fully integrate with the Cybersecurity
  684  Operations Center.
  685         (7)STATE DATA CENTER REPORT.—Subject to s. 119.0725, the
  686  state data center and any successor entity must submit to the
  687  department and the Florida Digital Service a quarterly report
  688  that provides, relating to infrastructure servicing enterprise
  689  customers and data, the number of:
  690         (a)Technology assets which are within 1 year of end of
  691  life as defined by the manufacturer.
  692         (b)Technology assets which are beyond end of life as
  693  defined by the manufacturer.
  694         (c)Technology assets which are within 2 years of being
  695  unsupported by the manufacturer.
  696         (d)Technology assets which are currently unsupported by
  697  the manufacturer.
  698         (e)Workloads which are hosted by a commercial cloud
  699  service provider as defined in the National Institute of
  700  Standards and Technology publication 500-292.
  701         (f)Workloads which are not hosted by a commercial entity
  702  which is a cloud service provider as defined in the National
  703  Institute of Standards and Technology publication 500-292.
  704         (g)Service level disruptions and average duration of
  705  disruption.
  706         Section 6. Present subsection (10) of section 282.318,
  707  Florida Statutes, is redesignated as subsection (11), a new
  708  subsection (10) is added to that section, and subsections (3)
  709  and (4) of that section are amended, to read:
  710         282.318 Cybersecurity.—
  711         (3) The department, acting through the Florida Digital
  712  Service, is the lead entity responsible for establishing
  713  standards and processes for assessing state agency cybersecurity
  714  risks and determining appropriate security measures. Such
  715  standards and processes must be consistent with generally
  716  accepted technology best practices, including the National
  717  Institute for Standards and Technology Cybersecurity Framework,
  718  for cybersecurity. The department, acting through the Florida
  719  Digital Service, shall adopt rules that mitigate risks;
  720  safeguard state agency digital assets, data, information, and
  721  information technology resources to ensure availability,
  722  confidentiality, and integrity; and support a security
  723  governance framework. The department, acting through the Florida
  724  Digital Service, shall also:
  725         (a) Designate an employee of the Florida Digital Service as
  726  the state chief information security officer. The state chief
  727  information security officer must have experience and expertise
  728  in security and risk management for communications and
  729  information technology resources. The state chief information
  730  security officer is responsible for the development, operation,
  731  and oversight of cybersecurity for state technology systems. The
  732  state chief information security officer shall be notified of
  733  all confirmed or suspected incidents or threats of state agency
  734  information technology resources and must report such incidents
  735  or threats to the state chief information officer and the
  736  Governor.
  737         (b) Develop, and annually update by February 1, a statewide
  738  cybersecurity strategic plan that includes security goals and
  739  objectives for cybersecurity, including the identification and
  740  mitigation of risk, proactive protections against threats,
  741  tactical risk detection, threat reporting, and response and
  742  recovery protocols for a cyber incident.
  743         (c) Develop and publish for use by state agencies a
  744  cybersecurity governance framework that, at a minimum, includes
  745  guidelines and processes for:
  746         1. Establishing asset management procedures to ensure that
  747  an agency’s information technology resources are identified and
  748  managed consistent with their relative importance to the
  749  agency’s business objectives.
  750         2. Using a standard risk assessment methodology that
  751  includes the identification of an agency’s priorities,
  752  constraints, risk tolerances, and assumptions necessary to
  753  support operational risk decisions.
  754         3. Completing comprehensive risk assessments and
  755  cybersecurity audits, which may be completed by a private sector
  756  vendor, and submitting completed assessments and audits to the
  757  department.
  758         4. Identifying protection procedures to manage the
  759  protection of an agency’s information, data, and information
  760  technology resources.
  761         5. Establishing procedures for accessing information and
  762  data to ensure the confidentiality, integrity, and availability
  763  of such information and data.
  764         6. Detecting threats through proactive monitoring of
  765  events, continuous security monitoring, and defined detection
  766  processes.
  767         7. Establishing agency cybersecurity incident response
  768  teams and describing their responsibilities for responding to
  769  cybersecurity incidents, including breaches of personal
  770  information containing confidential or exempt data.
  771         8. Recovering information and data in response to a
  772  cybersecurity incident. The recovery may include recommended
  773  improvements to the agency processes, policies, or guidelines.
  774         9. Establishing a cybersecurity incident reporting process
  775  that includes procedures for notifying the department and the
  776  Department of Law Enforcement of cybersecurity incidents.
  777         a. The level of severity of the cybersecurity incident is
  778  defined by the National Cyber Incident Response Plan of the
  779  United States Department of Homeland Security as follows:
  780         (I) Level 5 is an emergency-level incident within the
  781  specified jurisdiction that poses an imminent threat to the
  782  provision of wide-scale critical infrastructure services;
  783  national, state, or local government security; or the lives of
  784  the country’s, state’s, or local government’s residents.
  785         (II) Level 4 is a severe-level incident that is likely to
  786  result in a significant impact in the affected jurisdiction to
  787  public health or safety; national, state, or local security;
  788  economic security; or civil liberties.
  789         (III) Level 3 is a high-level incident that is likely to
  790  result in a demonstrable impact in the affected jurisdiction to
  791  public health or safety; national, state, or local security;
  792  economic security; civil liberties; or public confidence.
  793         (IV) Level 2 is a medium-level incident that may impact
  794  public health or safety; national, state, or local security;
  795  economic security; civil liberties; or public confidence.
  796         (V) Level 1 is a low-level incident that is unlikely to
  797  impact public health or safety; national, state, or local
  798  security; economic security; civil liberties; or public
  799  confidence.
  800         b. The cybersecurity incident reporting process must
  801  specify the information that must be reported by a state agency
  802  following a cybersecurity incident or ransomware incident,
  803  which, at a minimum, must include the following:
  804         (I) A summary of the facts surrounding the cybersecurity
  805  incident or ransomware incident.
  806         (II) The date on which the state agency most recently
  807  backed up its data; the physical location of the backup, if the
  808  backup was affected; and if the backup was created using cloud
  809  computing.
  810         (III) The types of data compromised by the cybersecurity
  811  incident or ransomware incident.
  812         (IV) The estimated fiscal impact of the cybersecurity
  813  incident or ransomware incident.
  814         (V) In the case of a ransomware incident, the details of
  815  the ransom demanded.
  816         c.(I) A state agency shall report all ransomware incidents
  817  and any cybersecurity incidents incident determined by the state
  818  agency to be of severity level 3, 4, or 5 to the Florida Digital
  819  Service, the Cybersecurity Operations Center, and the Cybercrime
  820  Office of the Department of Law Enforcement as soon as possible
  821  but no later than 4 48 hours after discovery of the
  822  cybersecurity incident and no later than 2 12 hours after
  823  discovery of the ransomware incident. The report must contain
  824  the information required in sub-subparagraph b. The Florida
  825  Digital Service shall notify the Governor, the President of the
  826  Senate, and the Speaker of the House of Representatives of any
  827  incident discovered by a state agency but not timely reported
  828  under this sub-sub-subparagraph.
  829         (II) The Cybersecurity Operations Center shall notify the
  830  President of the Senate and the Speaker of the House of
  831  Representatives of any severity level 3, 4, or 5 incident as
  832  soon as possible but no later than 12 hours after receiving a
  833  state agency’s incident report. The notification must include a
  834  high-level description of the incident and the likely effects
  835  and must be provided in a secure environment.
  836         d. A state agency shall report a cybersecurity incident
  837  determined by the state agency to be of severity level 1 or 2 to
  838  the Cybersecurity Operations Center and the Cybercrime Office of
  839  the Department of Law Enforcement as soon as possible. The
  840  report must contain the information required in sub-subparagraph
  841  b.
  842         e. The Cybersecurity Operations Center shall provide a
  843  consolidated incident report by the 15th day after the end of
  844  each quarter on a quarterly basis to the President of the
  845  Senate, the Speaker of the House of Representatives, and the
  846  Florida Cybersecurity Advisory Council. The report provided to
  847  the Florida Cybersecurity Advisory Council may not contain the
  848  name of any agency, network information, or system identifying
  849  information but must contain sufficient relevant information to
  850  allow the Florida Cybersecurity Advisory Council to fulfill its
  851  responsibilities as required in s. 282.319(9).
  852         10. Incorporating information obtained through detection
  853  and response activities into the agency’s cybersecurity incident
  854  response plans.
  855         11. Developing agency strategic and operational
  856  cybersecurity plans required pursuant to this section.
  857         12. Establishing the managerial, operational, and technical
  858  safeguards for protecting state government data and information
  859  technology resources that align with the state agency risk
  860  management strategy and that protect the confidentiality,
  861  integrity, and availability of information and data.
  862         13. Establishing procedures for procuring information
  863  technology commodities and services that require the commodity
  864  or service to meet the National Institute of Standards and
  865  Technology Cybersecurity Framework.
  866         14. Submitting after-action reports following a
  867  cybersecurity incident or ransomware incident. Such guidelines
  868  and processes for submitting after-action reports must be
  869  developed and published by December 1, 2022.
  870         (d) Assist state agencies in complying with this section.
  871         (e) In collaboration with the Cybercrime Office of the
  872  Department of Law Enforcement, annually provide training for
  873  state agency information security managers and computer security
  874  incident response team members that contains training on
  875  cybersecurity, including cybersecurity threats, trends, and best
  876  practices.
  877         (f) Annually review the strategic and operational
  878  cybersecurity plans of state agencies.
  879         (g) Annually provide cybersecurity training to all state
  880  agency technology professionals and employees with access to
  881  highly sensitive information which develops, assesses, and
  882  documents competencies by role and skill level. The
  883  cybersecurity training curriculum must include training on the
  884  identification of each cybersecurity incident severity level
  885  referenced in sub-subparagraph (c)9.a. The training may be
  886  provided in collaboration with the Cybercrime Office of the
  887  Department of Law Enforcement, a private sector entity, or an
  888  institution of the State University System.
  889         (h) Operate and maintain a Cybersecurity Operations Center
  890  led by the state chief information security officer, which must
  891  be primarily virtual and staffed with tactical detection and
  892  incident response personnel. The Cybersecurity Operations Center
  893  shall serve as a clearinghouse for threat information and
  894  coordinate with the Department of Law Enforcement to support
  895  state agencies and their response to any confirmed or suspected
  896  cybersecurity incident.
  897         (i) Lead an Emergency Support Function, ESF CYBER and
  898  digital, under the state comprehensive emergency management plan
  899  as described in s. 252.35.
  900         (j)Provide cybersecurity briefings to the members of any
  901  legislative committee or subcommittee responsible for policy
  902  matters relating to cybersecurity.
  903         (k)Have the authority to respond to any state agency
  904  cybersecurity incident.
  905         (4) Each state agency head shall, at a minimum:
  906         (a)Designate a chief information security officer to
  907  integrate the agency’s technical and operational cybersecurity
  908  efforts with the Cybersecurity Operations Center. This
  909  designation must be provided annually in writing to the Florida
  910  Digital Service by January 1. An agency’s chief information
  911  security officer shall report to the agency’s chief information
  912  officer. An agency may request the department to procure a chief
  913  information security officer as a service to fulfill the
  914  agency’s duties under this paragraph.
  915         (b)(a) Designate an information security manager to ensure
  916  compliance with cybersecurity governance, manage risk, and
  917  ensure compliance with the state’s incident response plan
  918  administer the cybersecurity program of the state agency. This
  919  designation must be provided annually in writing to the
  920  department by January 15 1. A state agency’s information
  921  security manager, for purposes of these information security
  922  duties, shall report directly to the agency head.
  923         (c)(b) In consultation with the department, through the
  924  Florida Digital Service, and the Cybercrime Office of the
  925  Department of Law Enforcement, and incorporating the resources
  926  of the Florida State Guard as appropriate, establish an agency
  927  cybersecurity response team to respond to a cybersecurity
  928  incident. The agency cybersecurity response team shall convene
  929  upon notification of a cybersecurity incident and must
  930  immediately report all confirmed or suspected incidents to the
  931  state chief information security officer, or his or her
  932  designee, and comply with all applicable guidelines and
  933  processes established pursuant to paragraph (3)(c).
  934         (d)(c) Submit to the department annually by July 31, the
  935  state agency’s strategic and operational cybersecurity plans
  936  developed pursuant to rules and guidelines established by the
  937  department, through the Florida Digital Service.
  938         1. The state agency strategic cybersecurity plan must cover
  939  a 3-year period and, at a minimum, define security goals,
  940  intermediate objectives, and projected agency costs for the
  941  strategic issues of agency information security policy, risk
  942  management, security training, security incident response, and
  943  disaster recovery. The plan must be based on the statewide
  944  cybersecurity strategic plan created by the department and
  945  include performance metrics that can be objectively measured to
  946  reflect the status of the state agency’s progress in meeting
  947  security goals and objectives identified in the agency’s
  948  strategic information security plan.
  949         2. The state agency operational cybersecurity plan must
  950  include a progress report that objectively measures progress
  951  made towards the prior operational cybersecurity plan and a
  952  project plan that includes activities, timelines, and
  953  deliverables for security objectives that the state agency will
  954  implement during the current fiscal year.
  955         (e)(d) Conduct, and update annually by April 30 every 3
  956  years, a comprehensive risk assessment, which may be facilitated
  957  by the department or completed by a private sector vendor, to
  958  determine the security threats to the data, information, and
  959  information technology resources, including mobile devices and
  960  print environments, of the agency. The risk assessment must
  961  comply with the risk assessment criteria, methodology, and scope
  962  developed by the state chief information security officer. The
  963  risk assessment findings must be signed by the agency head or
  964  the agency head’s designee and the Florida Digital Service. The
  965  risk assessment methodology developed by the department and is
  966  confidential and exempt from s. 119.07(1), except that such
  967  information shall be available to the Auditor General, the
  968  Florida Digital Service within the department, the Cybercrime
  969  Office of the Department of Law Enforcement, and, for state
  970  agencies under the jurisdiction of the Governor, the Chief
  971  Inspector General. If a private sector vendor is used to
  972  complete a comprehensive risk assessment, it must attest to the
  973  validity of the risk assessment findings.
  974         (f)(e) Develop, and periodically update, written internal
  975  policies and procedures, which include procedures for reporting
  976  cybersecurity incidents and breaches to the Cybercrime Office of
  977  the Department of Law Enforcement and the Florida Digital
  978  Service within the department. Such policies and procedures must
  979  be consistent with the rules, guidelines, and processes
  980  established by the department to ensure the security of the
  981  data, information, and information technology resources of the
  982  agency. The internal policies and procedures that, if disclosed,
  983  could facilitate the unauthorized modification, disclosure, or
  984  destruction of data or information technology resources are
  985  confidential information and exempt from s. 119.07(1), except
  986  that such information shall be available to the Auditor General,
  987  the Cybercrime Office of the Department of Law Enforcement, the
  988  Florida Digital Service within the department, and, for state
  989  agencies under the jurisdiction of the Governor, the Chief
  990  Inspector General.
  991         (g)(f) Implement managerial, operational, and technical
  992  safeguards and risk assessment remediation plans recommended by
  993  the department to address identified risks to the data,
  994  information, and information technology resources of the agency.
  995  The department, through the Florida Digital Service, shall track
  996  implementation by state agencies upon development of such
  997  remediation plans in coordination with agency inspectors
  998  general.
  999         (h)(g) Ensure that periodic internal audits and evaluations
 1000  of the agency’s cybersecurity program for the data, information,
 1001  and information technology resources of the agency are
 1002  conducted. The results of such audits and evaluations are
 1003  confidential information and exempt from s. 119.07(1), except
 1004  that such information shall be available to the Auditor General,
 1005  the Cybercrime Office of the Department of Law Enforcement, the
 1006  Florida Digital Service within the department, and, for agencies
 1007  under the jurisdiction of the Governor, the Chief Inspector
 1008  General.
 1009         (i)(h) Ensure that the cybersecurity requirements in the
 1010  written specifications for the solicitation, contracts, and
 1011  service-level agreement of information technology and
 1012  information technology resources and services meet or exceed the
 1013  applicable state and federal laws, regulations, and standards
 1014  for cybersecurity, including the National Institute of Standards
 1015  and Technology Cybersecurity Framework. Service-level agreements
 1016  must identify service provider and state agency responsibilities
 1017  for privacy and security, protection of government data,
 1018  personnel background screening, and security deliverables with
 1019  associated frequencies.
 1020         (j)(i) Provide cybersecurity awareness training to all
 1021  state agency employees within 30 days after commencing
 1022  employment, and annually thereafter, concerning cybersecurity
 1023  risks and the responsibility of employees to comply with
 1024  policies, standards, guidelines, and operating procedures
 1025  adopted by the state agency to reduce those risks. The training
 1026  may be provided in collaboration with the Cybercrime Office of
 1027  the Department of Law Enforcement, a private sector entity, or
 1028  an institution of the State University System.
 1029         (k)(j) Develop a process for detecting, reporting, and
 1030  responding to threats, breaches, or cybersecurity incidents
 1031  which is consistent with the security rules, guidelines, and
 1032  processes established by the department through the Florida
 1033  Digital Service.
 1034         1. All cybersecurity incidents and ransomware incidents
 1035  must be reported by state agencies. Such reports must comply
 1036  with the notification procedures and reporting timeframes
 1037  established pursuant to paragraph (3)(c).
 1038         2. For cybersecurity breaches, state agencies shall provide
 1039  notice in accordance with s. 501.171.
 1040         (l)(k) Submit to the Florida Digital Service, within 1 week
 1041  after the remediation of a cybersecurity incident or ransomware
 1042  incident, an after-action report that summarizes the incident,
 1043  the incident’s resolution, and any insights gained as a result
 1044  of the incident.
 1045         (10)Any legislative committee or subcommittee responsible
 1046  for policy matters relating to cybersecurity may hold meetings
 1047  closed by the respective legislative body under the rules of
 1048  such legislative body at which such committee or subcommittee is
 1049  briefed on records made confidential and exempt under
 1050  subsections (5) and (6). The committee or subcommittee must
 1051  maintain the confidential and exempt status of such records.
 1052         Section 7. Paragraphs (b) and (c) of subsection (5) of
 1053  section 282.3185, Florida Statutes, are amended to read:
 1054         282.3185 Local government cybersecurity.—
 1055         (5) INCIDENT NOTIFICATION.—
 1056         (b)1. A local government shall report all ransomware
 1057  incidents and any cybersecurity incidents incident determined by
 1058  the local government to be of severity level 3, 4, or 5 as
 1059  provided in s. 282.318(3)(c) to the Florida Digital Service, the
 1060  Cybersecurity Operations Center, the Cybercrime Office of the
 1061  Department of Law Enforcement, and the sheriff who has
 1062  jurisdiction over the local government as soon as possible but
 1063  no later than 4 48 hours after discovery of the cybersecurity
 1064  incident and no later than 2 12 hours after discovery of the
 1065  ransomware incident. The report must contain the information
 1066  required in paragraph (a). The Florida Digital Service shall
 1067  notify the Governor, the President of the Senate, and the
 1068  Speaker of the House of Representatives of any incident
 1069  discovered by a local government but not timely reported under
 1070  this subparagraph.
 1071         2. The Cybersecurity Operations Center shall notify the
 1072  President of the Senate and the Speaker of the House of
 1073  Representatives of any severity level 3, 4, or 5 incident as
 1074  soon as possible but no later than 12 hours after receiving a
 1075  local government’s incident report. The notification must
 1076  include a high-level description of the incident and the likely
 1077  effects and must be provided in a secure environment.
 1078         (c)A local government may report a cybersecurity incident
 1079  determined by the local government to be of severity level 1 or
 1080  2 as provided in s. 282.318(3)(c) to the Cybersecurity
 1081  Operations Center, the Cybercrime Office of the Department of
 1082  Law Enforcement, and the sheriff who has jurisdiction over the
 1083  local government. The report shall contain the information
 1084  required in paragraph (a).
 1085         Section 8. Paragraph (j) of subsection (4) of section
 1086  282.319, Florida Statutes, is amended to read:
 1087         282.319 Florida Cybersecurity Advisory Council.—
 1088         (4) The council shall be comprised of the following
 1089  members:
 1090         (j) Three representatives from critical infrastructure
 1091  sectors, one of whom must be from a water treatment facility,
 1092  appointed by the Governor.
 1093         Section 9. Section 768.401, Florida Statutes, is created to
 1094  read:
 1095         768.401Limitation on liability for cybersecurity
 1096  incidents.—
 1097         (1)A county or municipality that substantially complies
 1098  with s. 282.3185 is not liable in connection with a
 1099  cybersecurity incident.
 1100         (2)A sole proprietorship, partnership, corporation, trust,
 1101  estate, cooperative, association, or other commercial entity
 1102  that acquires, maintains, stores, or uses personal information
 1103  is not liable in connection with a cybersecurity incident if the
 1104  entity substantially complies with s. 501.171, if applicable,
 1105  and has:
 1106         (a)Adopted a cybersecurity program that substantially
 1107  aligns with the current version of any of the following
 1108  standards:
 1109         1.The National Institute of Standards and Technology
 1110  (NIST) Framework for Improving Critical Infrastructure
 1111  Cybersecurity.
 1112         2.NIST special publication 800-171.
 1113         3.NIST special publications 800-53 and 800-53A.
 1114         4.The Federal Risk and Authorization Management Program
 1115  security assessment framework.
 1116         5.CIS Critical Security Controls.
 1117         6.The International Organization for
 1118  Standardization/International Electrotechnical Commission 27000
 1119  series family of standards; or
 1120         (b)If regulated by the state or Federal Government, or
 1121  both, or if otherwise subject to the requirements of any of the
 1122  following laws and regulations, substantially complied its
 1123  cybersecurity program to the current version of the following,
 1124  as applicable:
 1125         1.The security requirements of the Health Insurance
 1126  Portability and Accountability Act of 1996, 45 C.F.R. part 164
 1127  subpart C.
 1128         2.Title V of the Gramm-Leach-Bliley Act of 1999, Pub. L.
 1129  No. 106-102, as amended.
 1130         3.The Federal Information Security Modernization Act of
 1131  2014, Pub. L. No. 113-283.
 1132         4.The Health Information Technology for Economic and
 1133  Clinical Health Act, 45 C.F.R. part 162.
 1134         (3)The scale and scope of compliance with a standard, law,
 1135  or regulation under paragraph (2)(a) or paragraph (2)(b) by a
 1136  covered entity, as applicable, is appropriate if it is based on
 1137  all of the following factors:
 1138         (a)The size and complexity of the covered entity;
 1139         (b)The nature and scope of the activities of the covered
 1140  entity; and
 1141         (c)The sensitivity of the information to be protected.
 1142         (4)Any commercial entity covered by subsection (2) that
 1143  substantially complies with a combination of industry-recognized
 1144  cybersecurity frameworks or standards, including the payment
 1145  card industry data security standard, to gain the presumption
 1146  against liability pursuant to subsection (2) must, upon the
 1147  revision of two or more of the frameworks or standards with
 1148  which the entity complies, adopt the revised frameworks or
 1149  standards within 1 year after the latest publication date stated
 1150  in the revisions.
 1151         (5)This section does not establish a private cause of
 1152  action. Failure of a county, municipality, or commercial entity
 1153  to substantially implement a cybersecurity program that is in
 1154  compliance with this section is not evidence of negligence and
 1155  does not constitute negligence per se.
 1156         (6)In an action in connection with a cybersecurity
 1157  incident, if the defendant is an entity covered by subsection
 1158  (1) or subsection (2), the defendant has the burden of proof to
 1159  establish substantial compliance.
 1160         Section 10. This act shall take effect July 1, 2023.

feedback