Florida Senate - 2025                                    SB 1576
       
       
        
       By Senator DiCeglie
       
       
       
       
       
       18-01077B-25                                          20251576__
    1                        A bill to be entitled                      
    2         An act relating to cybersecurity incident liability;
    3         creating s. 768.401, F.S.; defining terms; providing
    4         that a county, municipality, other political
    5         subdivision of the state, covered entity, or third
    6         party agent that complies with certain requirements is
    7         not liable in connection with a cybersecurity incident
    8         under certain circumstances; requiring covered
    9         entities and third-party agents to align their
   10         cybersecurity programs with any revised frameworks,
   11         standards, laws, or regulations within a specified
   12         time period; providing that a private cause of action
   13         is not established; providing that certain failures
   14         are not evidence of negligence, do not constitute
   15         negligence per se, and cannot be used as evidence of
   16         fault; specifying that the defendant in certain
   17         actions has a certain burden of proof; providing
   18         applicability; providing an effective date.
   19          
   20  Be It Enacted by the Legislature of the State of Florida:
   21  
   22         Section 1. Section 768.401, Florida Statutes, is created to
   23  read:
   24         768.401Limitation on liability for cybersecurity
   25  incidents.—
   26         (1)As used in this section, the term:
   27         (a)“Covered entity” means a sole proprietorship,
   28  partnership, corporation, trust, estate, cooperative,
   29  association, or other commercial entity.
   30         (b)“Cybersecurity standards or frameworks” means one or
   31  more of the following:
   32         1.The National Institute of Standards and Technology
   33  (NIST) Framework for Improving Critical Infrastructure
   34  Cybersecurity;
   35         2.NIST special publication 800-171;
   36         3.NIST special publications 800-53 and 800-53A;
   37         4.The Federal Risk and Authorization Management Program
   38  security assessment framework;
   39         5.The Center for Internet Security (CIS) Critical Security
   40  Controls;
   41         6.The International Organization for
   42  Standardization/International Electrotechnical Commission 27000
   43  57 series (ISO/IEC 27000) family of standards;
   44         7.HITRUST Common Security Framework (CSF);
   45         8.Service Organization Control Type 2 Framework (SOC 2);
   46         9.Secure Controls Framework; or
   47         10.Other similar industry frameworks or standards, or a
   48  reasonable combination of one or more of the above.
   49         (c)“Third-party agent” means an entity that has been
   50  contracted to maintain, store, or process personal information
   51  on behalf of a covered entity.
   52         (2)A county or municipality is not liable in connection
   53  with a cybersecurity incident if the county or municipality has:
   54         (a)1.One or more policies that substantially align with
   55  cybersecurity standards or frameworks;
   56         2.Disaster recovery plans for cybersecurity incidents; and
   57         3.Multi-factor authentication as required by the
   58  cybersecurity standards or frameworks relied on in sub
   59  subparagraph (3)(b)1.a.; or
   60         (b)Applied to the Local Government Cybersecurity Grant
   61  Program and shares telemetry data with the state’s cybersecurity
   62  operations center.
   63         (3)A covered entity or third-party agent that acquires,
   64  maintains, stores, processes, or uses personal information is
   65  not liable in a class action resulting from a cybersecurity
   66  incident if the covered entity or third-party agent does all of
   67  the following, as applicable:
   68         (a)Substantially complies with s. 501.171(3)-(6), as
   69  applicable.
   70         (b)Has adopted or implemented:
   71         1.a.One or more policies that substantially align with
   72  cybersecurity standards or frameworks;
   73         b.A disaster recovery plan for cybersecurity incidents;
   74  and
   75         c.Multi-factor authentication as required by the
   76  cybersecurity standards or frameworks relied on in sub
   77  subparagraph a.; or
   78         2.If regulated by the state or Federal Government, or
   79  both, or if otherwise subject to the requirements of any of the
   80  following laws and regulations, a cybersecurity program that
   81  substantially aligns with the current version of the following,
   82  as applicable:
   83         a.The Health Insurance Portability and Accountability Act
   84  of 1996 security requirements in 45 C.F.R. part 160 and part 164
   85  subparts A and C.
   86         b.Title V of the Gramm-Leach-Bliley Act of 1999, Pub. L.
   87  No. 106-102, as amended, and its implementing regulations.
   88         c.The Federal Information Security Modernization Act of
   89  2014, Pub. L. No. 113-283.
   90         d.The Health Information Technology for Economic and
   91  Clinical Health Act requirements in 45 C.F.R. parts 160 and 164.
   92         e.The Criminal Justice Information Services (CJIS)
   93  Security Policy.
   94         f.Other similar requirements mandated by state or federal
   95  law or regulation.
   96         (4)A covered entity’s or third-party agent’s substantial
   97  alignment with a framework or standard under subparagraph
   98  (3)(b)1. or with a law or regulation under subparagraph (3)(b)2.
   99  may be demonstrated by providing documentation or other evidence
  100  of an assessment, conducted internally or by a third-party,
  101  reflecting that the covered entity’s or third-party agent’s
  102  cybersecurity program is substantially aligned with the relevant
  103  framework or standard or with the applicable state or federal
  104  law or regulation.
  105         (5)Any covered entity or third-party agent must
  106  substantially align its cybersecurity program with any revisions
  107  of relevant frameworks or standards or of applicable state or
  108  federal laws or regulations within 1 year after the latest
  109  publication date stated in any such revisions in order to retain
  110  protection from liability.
  111         (6)This section does not establish a private cause of
  112  action.
  113         (7)Failure of a county, municipality, other political
  114  subdivision of the state, covered entity, or third-party agent
  115  to substantially implement a cybersecurity program that is in
  116  compliance with this section is not evidence of negligence, does
  117  not constitute negligence per se, and cannot be used as evidence
  118  of fault under any other theory of liability.
  119         (8)In an action relating to a cybersecurity incident, if
  120  the defendant is a county, municipality, or political
  121  subdivision covered by subsection (2) or a covered entity or
  122  third-party agent covered by subsection (3), the defendant has
  123  the burden of proof to establish substantial compliance.
  124         Section 2. The amendments made by this act apply to any
  125  putative class action filed on or after the effective date of
  126  this act.
  127         Section 3. This act shall take effect upon becoming a law.