By: Capriglione H.B. No. 3892 A BILL TO BE ENTITLED AN ACT relating to matters concerning governmental entities, including cybersecurity, governmental efficiencies, information resources, and emergency planning. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: SECTION 1. Section 37.108(b), Education Code, is amended to read as follows: (b) At least once every three years, each school district or public junior college district shall conduct a safety and security audit of the district's facilities, including an information technology cybersecurity assessment. To the extent possible, a district shall follow safety and security audit procedures developed by the Texas School Safety Center or a person included in the registry established by the Texas School Safety Center under Section 37.2091. SECTION 2. Subchapter A, Chapter 31, Election Code, is amended by adding Section 31.017 to read as follows: Sec. 31.017. STUDY ON USE OF ARTIFICIAL INTELLIGENCE FOR SIGNATURE VERIFICATION. (a) The secretary of state shall conduct a study on the use of artificial intelligence to verify signatures on carrier envelope certificates for early voting ballots voted by mail. In conducting the study, the secretary of state must consider other states' experiences using that method of signature verification, as well as other studies published on the subject. (b) Not later than September 1, 2022, the secretary of state shall prepare and deliver a report on the study's findings to the committees of each house of the legislature with primary jurisdiction over elections. (c) This section expires December 1, 2022. SECTION 3. Subchapter B, Chapter 421, Government Code, is amended by adding Section 421.027 to read as follows: Sec. 421.027. CYBER INCIDENT STUDY AND RESPONSE PLAN. (a) In this section: (1) "Cyber incident" means an event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information on the computers or systems. The term includes a vulnerability in implementation or in an information system, system security procedure, or internal control that could be exploited by a threat source. (2) "Significant cyber incident" means a cyber incident, or a group of related cyber incidents, likely to result in demonstrable harm to state security interests, foreign relations, or the economy of this state or to the public confidence, civil liberties, or public health and safety of the residents of this state. (b) The council, in cooperation with the Department of Information Resources, shall: (1) conduct a study regarding cyber incidents and significant cyber incidents affecting state agencies and critical infrastructure that is owned, operated, or controlled by agencies; and (2) develop a comprehensive state response plan to provide a format for each state agency to develop an agency-specific response plan and to implement the plan into the agency's information security plan required under Section 2054.133 to be implemented by the agency in the event of a cyber incident or significant cyber incident affecting the agency or critical infrastructure that is owned, operated, or controlled by the agency. (c) Not later than September 1, 2022, the council shall deliver the response plan and a report on the findings of the study to: (1) the public safety director of the Department of Public Safety; (2) the governor; (3) the lieutenant governor; (4) the speaker of the house of representatives; (5) the chair of the committee of the senate having primary jurisdiction over homeland security matters; and (6) the chair of the committee of the house of representatives having primary jurisdiction over homeland security matters. (d) The response plan required by Subsection (b) and the report required by Subsection (c) are not public information for purposes of Chapter 552. (e) This section expires December 1, 2022. SECTION 4. Subchapter L, Chapter 441, Government Code, is amended by adding Sections 441.1825 and 441.1856 to read as follows: Sec. 441.1825. STATE INFORMATION GOVERNANCE COORDINATOR. (a) The director and librarian shall employ a state information governance coordinator in the commission's records management division. (b) The state information governance coordinator shall: (1) ensure records management programs are implemented by state agencies for all media types; (2) assist state agencies in complying with the agencies' records management programs; and (3) increase overall awareness and outreach for state agency records management programs. Sec. 441.1856. TEXAS DIGITAL ARCHIVE. (a) The commission shall maintain and operate a digital repository for the preservation of and access to permanently valuable archival state records, reports, and publications. (b) The commission, in collaboration with the Department of Information Resources, shall develop a strategy, consistent with state records management and archival practices, for state agencies to transfer appropriate archival state records that are in electronic format to the commission for inclusion in the digital repository described by Subsection (a). SECTION 5. Section 441.183, Government Code, is amended to read as follows: Sec. 441.183. RECORDS MANAGEMENT PROGRAMS IN STATE AGENCIES. (a) The agency head of each state agency shall: (1) establish and maintain a records management program on a continuing and active basis; (2) create and maintain records containing adequate and proper documentation of the organization, functions, policies, decisions, procedures, and essential transactions of the agency designed to furnish information to protect the financial and legal rights of the state and any person affected by the activities of the agency; (3) make certain that all records of the agency are passed to the agency head's successor in the position of agency head; (4) identify and take adequate steps to protect confidential and vital state records; (5) cooperate with the commission in the conduct of state agency records management surveys; and (6) cooperate with the commission, the director and librarian, and any other authorized designee of the director and librarian in fulfilling their duties under this subchapter. (b) This subsection applies only to a state agency that is a department, commission, board, office, or other agency in the executive branch of state government. This subsection does not apply to an institution of higher education, as defined by Section 61.003, Education Code. As part of a records management program established under Subsection (a), the agency head of a state agency to which this subsection applies shall require training for agency employees, annually and on employment with the agency, regarding the records management program, including the agency's approved records retention schedule. SECTION 6. Subchapter C, Chapter 2054, Government Code, is amended by adding Section 2054.0695 to read as follows: Sec. 2054.0695. SECURITY PROGRAM FOR INTERNET CONNECTIVITY OF CERTAIN OBJECTS. (a) The department, in consultation with representatives of the information technology industry and voluntary standards organizations and the 10 state agencies that received the most state appropriations for that state fiscal year as determined by the Legislative Budget Board, shall develop a comprehensive risk management program that identifies baseline security features for the Internet connectivity of computing devices embedded in objects used or purchased by state agencies. (b) In developing the program under Subsection (a), the department shall identify and use existing international security standards and best practices and any known security gaps for a range of deployments, including critical systems and consumer usage. SECTION 7. Section 2054.512(d), Government Code, is amended to read as follows: (d) The cybersecurity council shall: (1) consider the costs and benefits of establishing a computer emergency readiness team to address cyber attacks occurring in this state during routine and emergency situations; (2) establish criteria and priorities for addressing cybersecurity threats to critical state installations; (3) consolidate and synthesize best practices to assist state agencies in understanding and implementing cybersecurity measures that are most beneficial to this state; [and] (4) assess the knowledge, skills, and capabilities of the existing information technology and cybersecurity workforce to mitigate and respond to cyber threats and develop recommendations for addressing immediate workforce deficiencies and ensuring a long-term pool of qualified applicants; and (5) ensure all middle and high schools have knowledge of and access to: (A) free cybersecurity courses and curriculum approved by the Texas Education Agency; (B) state and regional information sharing and analysis centers; and (C) contracting benefits, including as provided by Section 2054.0565. SECTION 8. Subchapter N-1, Chapter 2054, Government Code, is amended by adding Sections 2054.517 and 2054.5172 to read as follows: Sec. 2054.517. VENDOR RESPONSIBILITY FOR CYBERSECURITY. A vendor that contracts with this state to provide information resources technology for a state agency at a cost to the agency of $1 million or more is responsible for addressing known cybersecurity risks associated with the technology and is responsible for any cost associated with addressing the identified cybersecurity risks. For a major information resources project, the vendor shall provide to state agency contracting personnel: (1) a written attestation that: (A) the vendor has a cybersecurity risk management program consistent with: (i) the cybersecurity framework established by the National Institute of Standards and Technology; (ii) the 27000 series standards for information security published by the International Organization for Standardization; or (iii) other widely accepted security risk management frameworks; (B) the vendor's cybersecurity risk management program includes appropriate training and certifications for the employees performing work under the contract; and (C) the vendor has a vulnerability management program that addresses vulnerability identification, mitigation, and responsible disclosure, as appropriate; and (2) an initial summary of any costs associated with addressing or remediating the identified technology or personnel-related cybersecurity risks as identified in collaboration with this state following a risk assessment. Sec. 2054.5172. ENCRYPTED SECURE LAYER SERVICES REQUIRED. Each state agency that maintains a publicly accessible Internet website that requires the submission of sensitive personally identifiable information shall use an encrypted secure communication protocol, including a secure hypertext transfer protocol. SECTION 9. Subchapter B, Chapter 2155, Government Code, is amended by adding Section 2155.092 to read as follows: Sec. 2155.092. VENDOR CERTIFICATION FOR CERTAIN GOODS. (a) This section does not apply to a good provided as part of a major information resources project as defined by Section 2054.003. (b) A vendor offering to sell to the state a good embedded with a computing device capable of Internet connectivity must include with each bid, offer, proposal, or other expression of interest a written certification providing that the good does not contain, at the time of submitting the bid, offer, proposal, or expression of interest, a hardware, software, or firmware component with any known security vulnerability or defect. SECTION 10. Section 205.010(b), Local Government Code, is amended to read as follows: (b) A local government that owns, licenses, or maintains computerized data that includes sensitive personal information shall comply, in the event of a breach of system security, with the notification requirements of: (1) Sections 364.0051 and 364.0102 of this code; and (2) Section 521.053, Business & Commerce Code, to the same extent as a person who conducts business in this state. SECTION 11. Subtitle C, Title 11, Local Government Code, is amended by adding Chapter 364 to read as follows: CHAPTER 364. LOCAL GOVERNMENT CYBERSECURITY AND EMERGENCY PLANNING AND RESPONSE SUBCHAPTER A. GENERAL PROVISIONS Sec. 364.0001. DEFINITIONS. In this chapter: (1) "Breach of system security" has the meaning assigned by Section 521.053, Business & Commerce Code. (2) "Cybersecurity coordinator" means the state cybersecurity coordinator designated under Section 2054.511, Government Code. (3) "Cybersecurity council" means the council established by the cybersecurity coordinator under Section 2054.512, Government Code. (4) "Sensitive personal information" has the meaning assigned by Section 521.002, Business & Commerce Code. SUBCHAPTER B. SECURITY BREACH NOTIFICATION Sec. 364.0051. NOTICE TO CYBERSECURITY COORDINATOR. Not later than 48 hours after a political subdivision discovers a breach or suspected breach of system security or an unauthorized exposure of sensitive personal information, the political subdivision shall notify the cybersecurity coordinator of the breach. The notification must describe the breach, suspected breach, or unauthorized exposure. Sec. 364.0052. REPORT TO DEPARTMENT OF INFORMATION RESOURCES. The cybersecurity coordinator shall report to the Department of Information Resources any breach of system security reported by a political subdivision in which the person responsible for the breach: (1) obtained or modified specific critical or sensitive personal information; (2) established access to the political subdivision's information systems or infrastructure; or (3) undermined, severely disrupted, or destroyed a core service, program, or function of the political subdivision, or placed the person in a position to do so in the future. Sec. 364.0053. RULEMAKING. The cybersecurity coordinator may adopt rules necessary to implement this subchapter. SUBCHAPTER C. EMERGENCY PLANNING AND RESPONSE Sec. 364.0101. MULTIHAZARD EMERGENCY OPERATIONS PLAN; SAFETY AND SECURITY AUDIT. (a) This section applies to a municipality or county with a population of more than 100,000. (b) Each municipality and county shall adopt and implement a multihazard emergency operations plan for use in the municipality's and county's facilities. The plan must address mitigation, preparedness, response, and recovery as determined by the cybersecurity council and the governor's public safety office. The plan must provide for: (1) municipal or county employee training in responding to an emergency; (2) measures to ensure coordination with the Department of State Health Services, Department of Information Resources, local emergency management agencies, law enforcement agencies, local health departments, and fire departments in the event of an emergency; and (3) the implementation of a safety and security audit as required by Subsection (c). (c) At least once every three years, each municipality and county shall conduct a safety and security audit of the municipality's or county's information technology infrastructure. To the extent possible, a municipality or county shall follow safety and security audit procedures developed by the cybersecurity council or a comparable public or private entity. (d) A municipality or county shall report the results of the safety and security audit conducted under Subsection (c): (1) to the municipality's or county's governing body; and (2) in the manner required by the cybersecurity council, to the cybersecurity council. (e) Except as provided by Subsection (f), any document or information collected, developed, or produced during a safety and security audit conducted under Subsection (c) is not subject to disclosure under Chapter 552, Government Code. (f) A document relating to a municipality's or county's multihazard emergency operations plan is subject to disclosure if the document enables a person to: (1) verify that the municipality or county has established a plan and determine the agencies involved in the development of the plan and the agencies coordinating with the municipality or county to respond to an emergency; (2) verify that the municipality's or county's plan was reviewed within the last 12 months and determine the specific review dates; (3) verify that the plan addresses the phases of emergency management under Subsection (b); (4) verify that municipal or county employees have been trained to respond to an emergency and determine the types of training, the number of employees trained, and the person conducting the training; (5) verify that the municipality or county has completed a safety and security audit under Subsection (c) and determine the date the audit was conducted, the person conducting the audit, and the date the municipality or county presented the results of the audit to the municipality's or county's governing body; and (6) verify that the municipality or county has addressed any recommendations by the municipality's or county's governing body for improvement of the plan and determine the municipality's or county's progress within the last 12 months. Sec. 364.0102. RANSOMWARE PAYMENTS PROHIBITED. (a) In this section, "ransomware" has the meaning assigned by Section 33.023, Penal Code. (b) A political subdivision may not make a ransomware payment related to a ransomware cyber attack. (c) As soon as practicable after discovering a ransomware cyber attack, a political subdivision shall report the attack to the office of the attorney general and to the information sharing and analysis organization established by the Department of Information Resources under Sec. 2054.0594, Government Code. SECTION 12. Section 2155.092, Government Code, as added by this Act, applies only in relation to a contract for which a state agency first advertises or otherwise solicits bids, offers, proposals, or other expressions of interest on or after the effective date of this Act. SECTION 13. (a) Except as provided by Subsection (b) of this section, this Act takes effect September 1, 2021. (b) Section 364.0102, Local Government Code, as added by this Act, takes effect September 1, 2022.