Florida Senate - 2016 CS for SB 7050
By the Committees on Appropriations; and Governmental Oversight
1 A bill to be entitled
2 An act relating to information technology security;
3 amending s. 20.61, F.S.; revising the membership of
4 the Technology Advisory Council to include a
5 cybersecurity expert; amending s. 282.318, F.S.;
6 revising the duties of the Agency for State
7 Technology; providing that risk assessments and
8 security audits may be completed by a private vendor;
9 providing for the establishment of computer security
10 incident response teams within state agencies;
11 providing for the establishment of an information
12 technology security incident reporting process;
13 providing for information technology security and
14 cybersecurity awareness training; revising duties of
15 state agency heads; establishing computer security
16 incident response team responsibilities; establishing
17 notification procedures and reporting timelines for an
18 information technology security incident or breach;
19 providing an effective date.
21 Be It Enacted by the Legislature of the State of Florida:
23 Section 1. Subsection (3) of section 20.61, Florida
24 Statutes, is amended to read:
25 20.61 Agency for State Technology.—The Agency for State
26 Technology is created within the Department of Management
27 Services. The agency is a separate budget program and is not
28 subject to control, supervision, or direction by the Department
29 of Management Services, including, but not limited to,
30 purchasing, transactions involving real or personal property,
31 personnel, or budgetary matters.
32 (3) The Technology Advisory Council, consisting of seven
33 members, is established within the Agency for State Technology
34 and shall be maintained pursuant to s. 20.052. Four members of
35 the council shall be appointed by the Governor, two of whom must
36 be from the private sector and one of whom must be a
37 cybersecurity expert. The President of the Senate and the
38 Speaker of the House of Representatives shall each appoint one
39 member of the council. The Attorney General, the Commissioner of
and Consumer Services, and the Chief Financial
41 Officer shall jointly appoint one member by agreement of a
42 majority of these officers. Upon initial establishment of the
43 council, two of the Governor’s appointments shall be for 2-year
44 terms. Thereafter, all appointments shall be for 4-year terms.
45 (a) The council shall consider and make recommendations to
46 the executive director on such matters as enterprise information
47 technology policies, standards, services, and architecture. The
48 council may also identify and recommend opportunities for the
49 establishment of public-private partnerships when considering
50 technology infrastructure and services in order to accelerate
51 project delivery and provide a source of new or increased
52 project funding.
53 (b) The executive director shall consult with the council
54 with regard to executing the duties and responsibilities of the
55 agency related to statewide information technology strategic
56 planning and policy.
57 (c) The council shall be governed by the Code of Ethics for
58 Public Officers and Employees as set forth in part III of
59 chapter 112, and each member must file a statement of financial
60 interests pursuant to s. 112.3145.
61 Section 2. Subsections (3) and (4) of section 282.318,
62 Florida Statutes, are amended to read:
63 282.318 Security of data and information technology.—
64 (3) The Agency for State Technology is responsible for
65 establishing standards and processes consistent with generally
66 accepted best practices for information technology security, to
67 include cybersecurity, and adopting rules that safeguard an
68 agency’s data, information, and information technology resources
69 to ensure availability, confidentiality, and integrity and to
70 mitigate risks. The agency shall also:
71 (a) Develop, and annually update by February 1, a statewide
72 information technology security strategic plan that includes
73 security goals and objectives for the strategic issues of
74 information technology security policy, risk management,
75 training, incident management, and disaster recovery planning.
76 (b) Develop and publish for use by state agencies an
77 information technology security framework that, at a minimum,
78 includes guidelines and processes for:
79 1. Establishing asset management procedures to ensure that
80 an agency’s information technology resources are identified and
81 managed consistent with their relative importance to the
82 agency’s business objectives.
83 2. Using a standard risk assessment methodology that
84 includes the identification of an agency’s priorities,
85 constraints, risk tolerances, and assumptions necessary to
86 support operational risk decisions.
87 3. Completing comprehensive risk assessments and
88 information technology security audits, which may be completed
89 by a private sector vendor, and submitting completed assessments
90 and audits to the Agency for State Technology.
91 4. Identifying protection procedures to manage the
92 protection of an agency’s information, data, and information
93 technology resources.
94 5. Establishing procedures for accessing information and
95 data to ensure the confidentiality, integrity, and availability
96 of such information and data.
97 6. Detecting threats through proactive monitoring of
98 events, continuous security monitoring, and defined detection
100 7. Establishing agency computer security incident response
101 teams and describing their responsibilities for responding to
102 information technology security incidents, including breaches of
103 personal information containing confidential or exempt data.
104 8. Recovering information and data in response to an
105 information technology security incident. The recovery may
106 include recommended improvements to the agency processes,
107 policies, or guidelines.
108 9. Establishing an information technology security incident
109 reporting process that includes procedures and tiered reporting
110 timeframes for notifying the Agency for State Technology and the
111 Department of Law Enforcement of information technology security
112 incidents. The tiered reporting timeframes shall be based upon
113 the level of severity of the information technology security
114 incidents being reported.
115 10. Incorporating information obtained through detection
116 and response activities into the agency’s information technology
117 security incident response plans.
118 11. 9. Developing agency strategic and operational
119 information technology security plans required pursuant to this
121 12. 10. Establishing the managerial, operational, and
122 technical safeguards for protecting state government data and
123 information technology resources that align with the state
124 agency risk management strategy and that protect the
125 confidentiality, integrity, and availability of information and
127 (c) Assist state agencies in complying with this section.
128 (d) In collaboration with the Cybercrime Office of the
129 Department of Law Enforcement, annually provide training for
130 state agency information security managers and computer security
131 incident response team members that contains training on
132 information technology security, including cybersecurity,
133 threats, trends, and best practices.
134 (e) Annually review the strategic and operational
135 information technology security plans of executive branch
137 (4) Each state agency head shall, at a minimum:
138 (a) Designate an information security manager to administer
139 the information technology security program of the state agency.
140 This designation must be provided annually in writing to the
141 Agency for State Technology by January 1. A state agency’s
142 information security manager, for purposes of these information
143 security duties, shall report directly to the agency head.
144 (b) In consultation with the Agency for State Technology
145 and the Cybercrime Office of the Department of Law Enforcement,
146 establish an agency computer security incident response team to
147 respond to an information technology security incident. The
148 agency computer security incident response team shall convene
149 immediately upon notification of an information technology
150 security incident and must comply with all applicable guidelines
151 and processes established pursuant to paragraph (3)(b).
152 (c) (b) Submit to the Agency for State Technology annually
153 by July 31, the state agency’s strategic and operational
154 information technology security plans developed pursuant to
155 rules and guidelines established by the Agency for State
157 1. The state agency strategic information technology
158 security plan must cover a 3-year period and, at a minimum,
159 define security goals, intermediate objectives, and projected
160 agency costs for the strategic issues of agency information
161 security policy, risk management, security training, security
162 incident response, and disaster recovery. The plan must be based
163 on the statewide information technology security strategic plan
164 created by the Agency for State Technology and include
165 performance metrics that can be objectively measured to reflect
166 the status of the state agency’s progress in meeting security
167 goals and objectives identified in the agency’s strategic
168 information security plan.
169 2. The state agency operational information technology
170 security plan must include a progress report that objectively
171 measures progress made towards the prior operational information
172 technology security plan and a project plan that includes
173 activities, timelines, and deliverables for security objectives
174 that the state agency will implement during the current fiscal
176 (d) (c) Conduct, and update every 3 years, a comprehensive
177 risk assessment, which may be completed by a private sector
178 vendor, to determine the security threats to the data,
179 information, and information technology resources, including
180 mobile devices and print environments, of the agency. The risk
181 assessment must comply with the risk assessment methodology
182 developed by the Agency for State Technology and is confidential
183 and exempt from s. 119.07(1), except that such information shall
184 be available to the Auditor General, the Agency for State
185 Technology, the Cybercrime Office of the Department of Law
186 Enforcement, and, for state agencies under the jurisdiction of
187 the Governor, the Chief Inspector General.
188 (e) (d) Develop, and periodically update, written internal
189 policies and procedures, which include procedures for reporting
190 information technology security incidents and breaches to the
191 Cybercrime Office of the Department of Law Enforcement and the
192 Agency for State Technology. Such policies and procedures must
193 be consistent with the rules, guidelines, and processes
194 established by the Agency for State Technology to ensure the
195 security of the data, information, and information technology
196 resources of the agency. The internal policies and procedures
197 that, if disclosed, could facilitate the unauthorized
198 modification, disclosure, or destruction of data or information
199 technology resources are confidential information and exempt
200 from s. 119.07(1), except that such information shall be
201 available to the Auditor General, the Cybercrime Office of the
202 Department of Law Enforcement, the Agency for State Technology,
203 and, for state agencies under the jurisdiction of the Governor,
204 the Chief Inspector General.
205 (f) (e) Implement managerial, operational, and technical
206 safeguards and risk assessment remediation plans recommended
207 established by the Agency for State Technology to address
208 identified risks to the data, information, and information
209 technology resources of the agency.
210 (g) (f) Ensure that periodic internal audits and evaluations
211 of the agency’s information technology security program for the
212 data, information, and information technology resources of the
213 agency are conducted. The results of such audits and evaluations
214 are confidential information and exempt from s. 119.07(1),
215 except that such information shall be available to the Auditor
216 General, the Cybercrime Office of the Department of Law
217 Enforcement, the Agency for State Technology, and, for agencies
218 under the jurisdiction of the Governor, the Chief Inspector
220 (h) (g) Include appropriate information technology security
221 requirements in the written specifications for the solicitation
222 of information technology and information technology resources
223 and services, which are consistent with the rules and guidelines
224 established by the Agency for State Technology in collaboration
225 with the Department of Management Services.
226 (i) (h) Provide information technology security and
227 cybersecurity awareness training to all state agency employees
228 in the first 30 days after commencing employment concerning
229 information technology security risks and the responsibility of
230 employees to comply with policies, standards, guidelines, and
231 operating procedures adopted by the state agency to reduce those
232 risks. The training may be provided in collaboration with the
233 Cybercrime Office of the Department of Law Enforcement.
234 (j) (i) Develop a process for detecting, reporting, and
235 responding to threats, breaches, or information technology
236 security incidents that are consistent with the security rules,
237 guidelines, and processes established by the Agency for State
239 1. All information technology security incidents and
240 breaches must be reported to the Agency for State Technology and
241 the Cybercrime Office of the Department of Law Enforcement and
242 must comply with the notification procedures and reporting
243 timeframes established pursuant to paragraph (3)(b).
244 2. For information technology security breaches, state
245 agencies shall provide notice in accordance with s. 501.171.
246 Section 3. This act shall take effect July 1, 2016.