Florida Senate - 2016                             CS for SB 7050
       
       
        
       By the Committees on Appropriations; and Governmental Oversight
       and Accountability
       
       576-04526-16                                          20167050c1
    1                        A bill to be entitled                      
    2         An act relating to information technology security;
    3         amending s. 20.61, F.S.; revising the membership of
    4         the Technology Advisory Council to include a
    5         cybersecurity expert; amending s. 282.318, F.S.;
    6         revising the duties of the Agency for State
    7         Technology; providing that risk assessments and
    8         security audits may be completed by a private vendor;
    9         providing for the establishment of computer security
   10         incident response teams within state agencies;
   11         providing for the establishment of an information
   12         technology security incident reporting process;
   13         providing for information technology security and
   14         cybersecurity awareness training; revising duties of
   15         state agency heads; establishing computer security
   16         incident response team responsibilities; establishing
   17         notification procedures and reporting timelines for an
   18         information technology security incident or breach;
   19         providing an effective date.
   20          
   21  Be It Enacted by the Legislature of the State of Florida:
   22  
   23         Section 1. Subsection (3) of section 20.61, Florida
   24  Statutes, is amended to read:
   25         20.61 Agency for State Technology.—The Agency for State
   26  Technology is created within the Department of Management
   27  Services. The agency is a separate budget program and is not
   28  subject to control, supervision, or direction by the Department
   29  of Management Services, including, but not limited to,
   30  purchasing, transactions involving real or personal property,
   31  personnel, or budgetary matters.
   32         (3) The Technology Advisory Council, consisting of seven
   33  members, is established within the Agency for State Technology
   34  and shall be maintained pursuant to s. 20.052. Four members of
   35  the council shall be appointed by the Governor, two of whom must
   36  be from the private sector and one of whom must be a
   37  cybersecurity expert. The President of the Senate and the
   38  Speaker of the House of Representatives shall each appoint one
   39  member of the council. The Attorney General, the Commissioner of
   40  Agriculture and Consumer Services, and the Chief Financial
   41  Officer shall jointly appoint one member by agreement of a
   42  majority of these officers. Upon initial establishment of the
   43  council, two of the Governor’s appointments shall be for 2-year
   44  terms. Thereafter, all appointments shall be for 4-year terms.
   45         (a) The council shall consider and make recommendations to
   46  the executive director on such matters as enterprise information
   47  technology policies, standards, services, and architecture. The
   48  council may also identify and recommend opportunities for the
   49  establishment of public-private partnerships when considering
   50  technology infrastructure and services in order to accelerate
   51  project delivery and provide a source of new or increased
   52  project funding.
   53         (b) The executive director shall consult with the council
   54  with regard to executing the duties and responsibilities of the
   55  agency related to statewide information technology strategic
   56  planning and policy.
   57         (c) The council shall be governed by the Code of Ethics for
   58  Public Officers and Employees as set forth in part III of
   59  chapter 112, and each member must file a statement of financial
   60  interests pursuant to s. 112.3145.
   61         Section 2. Subsections (3) and (4) of section 282.318,
   62  Florida Statutes, are amended to read:
   63         282.318 Security of data and information technology.—
   64         (3) The Agency for State Technology is responsible for
   65  establishing standards and processes consistent with generally
   66  accepted best practices for information technology security, to
   67  include cybersecurity, and adopting rules that safeguard an
   68  agency’s data, information, and information technology resources
   69  to ensure availability, confidentiality, and integrity and to
   70  mitigate risks. The agency shall also:
   71         (a) Develop, and annually update by February 1, a statewide
   72  information technology security strategic plan that includes
   73  security goals and objectives for the strategic issues of
   74  information technology security policy, risk management,
   75  training, incident management, and disaster recovery planning.
   76         (b) Develop and publish for use by state agencies an
   77  information technology security framework that, at a minimum,
   78  includes guidelines and processes for:
   79         1. Establishing asset management procedures to ensure that
   80  an agency’s information technology resources are identified and
   81  managed consistent with their relative importance to the
   82  agency’s business objectives.
   83         2. Using a standard risk assessment methodology that
   84  includes the identification of an agency’s priorities,
   85  constraints, risk tolerances, and assumptions necessary to
   86  support operational risk decisions.
   87         3. Completing comprehensive risk assessments and
   88  information technology security audits, which may be completed
   89  by a private sector vendor, and submitting completed assessments
   90  and audits to the Agency for State Technology.
   91         4. Identifying protection procedures to manage the
   92  protection of an agency’s information, data, and information
   93  technology resources.
   94         5. Establishing procedures for accessing information and
   95  data to ensure the confidentiality, integrity, and availability
   96  of such information and data.
   97         6. Detecting threats through proactive monitoring of
   98  events, continuous security monitoring, and defined detection
   99  processes.
  100         7. Establishing agency computer security incident response
  101  teams and describing their responsibilities for responding to
  102  information technology security incidents, including breaches of
  103  personal information containing confidential or exempt data.
  104         8. Recovering information and data in response to an
  105  information technology security incident. The recovery may
  106  include recommended improvements to the agency processes,
  107  policies, or guidelines.
  108         9.Establishing an information technology security incident
  109  reporting process that includes procedures and tiered reporting
  110  timeframes for notifying the Agency for State Technology and the
  111  Department of Law Enforcement of information technology security
  112  incidents. The tiered reporting timeframes shall be based upon
  113  the level of severity of the information technology security
  114  incidents being reported.
  115         10.Incorporating information obtained through detection
  116  and response activities into the agency’s information technology
  117  security incident response plans.
  118         11.9. Developing agency strategic and operational
  119  information technology security plans required pursuant to this
  120  section.
  121         12.10. Establishing the managerial, operational, and
  122  technical safeguards for protecting state government data and
  123  information technology resources that align with the state
  124  agency risk management strategy and that protect the
  125  confidentiality, integrity, and availability of information and
  126  data.
  127         (c) Assist state agencies in complying with this section.
  128         (d) In collaboration with the Cybercrime Office of the
  129  Department of Law Enforcement, annually provide training for
  130  state agency information security managers and computer security
  131  incident response team members that contains training on
  132  information technology security, including cybersecurity,
  133  threats, trends, and best practices.
  134         (e) Annually review the strategic and operational
  135  information technology security plans of executive branch
  136  agencies.
  137         (4) Each state agency head shall, at a minimum:
  138         (a) Designate an information security manager to administer
  139  the information technology security program of the state agency.
  140  This designation must be provided annually in writing to the
  141  Agency for State Technology by January 1. A state agency’s
  142  information security manager, for purposes of these information
  143  security duties, shall report directly to the agency head.
  144         (b)In consultation with the Agency for State Technology
  145  and the Cybercrime Office of the Department of Law Enforcement,
  146  establish an agency computer security incident response team to
  147  respond to an information technology security incident. The
  148  agency computer security incident response team shall convene
  149  immediately upon notification of an information technology
  150  security incident and must comply with all applicable guidelines
  151  and processes established pursuant to paragraph (3)(b).
  152         (c)(b) Submit to the Agency for State Technology annually
  153  by July 31, the state agency’s strategic and operational
  154  information technology security plans developed pursuant to
  155  rules and guidelines established by the Agency for State
  156  Technology.
  157         1. The state agency strategic information technology
  158  security plan must cover a 3-year period and, at a minimum,
  159  define security goals, intermediate objectives, and projected
  160  agency costs for the strategic issues of agency information
  161  security policy, risk management, security training, security
  162  incident response, and disaster recovery. The plan must be based
  163  on the statewide information technology security strategic plan
  164  created by the Agency for State Technology and include
  165  performance metrics that can be objectively measured to reflect
  166  the status of the state agency’s progress in meeting security
  167  goals and objectives identified in the agency’s strategic
  168  information security plan.
  169         2. The state agency operational information technology
  170  security plan must include a progress report that objectively
  171  measures progress made towards the prior operational information
  172  technology security plan and a project plan that includes
  173  activities, timelines, and deliverables for security objectives
  174  that the state agency will implement during the current fiscal
  175  year.
  176         (d)(c) Conduct, and update every 3 years, a comprehensive
  177  risk assessment, which may be completed by a private sector
  178  vendor, to determine the security threats to the data,
  179  information, and information technology resources, including
  180  mobile devices and print environments, of the agency. The risk
  181  assessment must comply with the risk assessment methodology
  182  developed by the Agency for State Technology and is confidential
  183  and exempt from s. 119.07(1), except that such information shall
  184  be available to the Auditor General, the Agency for State
  185  Technology, the Cybercrime Office of the Department of Law
  186  Enforcement, and, for state agencies under the jurisdiction of
  187  the Governor, the Chief Inspector General.
  188         (e)(d) Develop, and periodically update, written internal
  189  policies and procedures, which include procedures for reporting
  190  information technology security incidents and breaches to the
  191  Cybercrime Office of the Department of Law Enforcement and the
  192  Agency for State Technology. Such policies and procedures must
  193  be consistent with the rules, guidelines, and processes
  194  established by the Agency for State Technology to ensure the
  195  security of the data, information, and information technology
  196  resources of the agency. The internal policies and procedures
  197  that, if disclosed, could facilitate the unauthorized
  198  modification, disclosure, or destruction of data or information
  199  technology resources are confidential information and exempt
  200  from s. 119.07(1), except that such information shall be
  201  available to the Auditor General, the Cybercrime Office of the
  202  Department of Law Enforcement, the Agency for State Technology,
  203  and, for state agencies under the jurisdiction of the Governor,
  204  the Chief Inspector General.
  205         (f)(e) Implement managerial, operational, and technical
  206  safeguards and risk assessment remediation plans recommended
  207  established by the Agency for State Technology to address
  208  identified risks to the data, information, and information
  209  technology resources of the agency.
  210         (g)(f) Ensure that periodic internal audits and evaluations
  211  of the agency’s information technology security program for the
  212  data, information, and information technology resources of the
  213  agency are conducted. The results of such audits and evaluations
  214  are confidential information and exempt from s. 119.07(1),
  215  except that such information shall be available to the Auditor
  216  General, the Cybercrime Office of the Department of Law
  217  Enforcement, the Agency for State Technology, and, for agencies
  218  under the jurisdiction of the Governor, the Chief Inspector
  219  General.
  220         (h)(g) Include appropriate information technology security
  221  requirements in the written specifications for the solicitation
  222  of information technology and information technology resources
  223  and services, which are consistent with the rules and guidelines
  224  established by the Agency for State Technology in collaboration
  225  with the Department of Management Services.
  226         (i)(h) Provide information technology security and
  227  cybersecurity awareness training to all state agency employees
  228  in the first 30 days after commencing employment concerning
  229  information technology security risks and the responsibility of
  230  employees to comply with policies, standards, guidelines, and
  231  operating procedures adopted by the state agency to reduce those
  232  risks. The training may be provided in collaboration with the
  233  Cybercrime Office of the Department of Law Enforcement.
  234         (j)(i) Develop a process for detecting, reporting, and
  235  responding to threats, breaches, or information technology
  236  security incidents that are consistent with the security rules,
  237  guidelines, and processes established by the Agency for State
  238  Technology.
  239         1. All information technology security incidents and
  240  breaches must be reported to the Agency for State Technology and
  241  the Cybercrime Office of the Department of Law Enforcement and
  242  must comply with the notification procedures and reporting
  243  timeframes established pursuant to paragraph (3)(b).
  244         2. For information technology security breaches, state
  245  agencies shall provide notice in accordance with s. 501.171.
  246         Section 3. This act shall take effect July 1, 2016.