Bill Text: CA AB2200 | 2013-2014 | Regular Session | Amended
NOTE: There are more recent revisions of this legislation. Read Latest Draft
Bill Title: California Cyber Security.
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Engrossed - Dead) 2014-09-02 - In Assembly. [AB2200 Detail]
Download: California-2013-AB2200-Amended.html
Bill Title: California Cyber Security.
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Engrossed - Dead) 2014-09-02 - In Assembly. [AB2200 Detail]
Download: California-2013-AB2200-Amended.html
BILL NUMBER: AB 2200 AMENDED BILL TEXT AMENDED IN SENATE AUGUST 4, 2014 AMENDED IN SENATE JUNE 12, 2014 AMENDED IN ASSEMBLY MAY 23, 2014 INTRODUCED BY Assembly Member John A. Pérez FEBRUARY 20, 2014 An act to add and repealChapter 5.8Article 3.9 (commencing with Section11549.50)8574.50) ofPart 1Chapter 7 of Division31 of Title 2 of the Government Code, relating to cyber security. LEGISLATIVE COUNSEL'S DIGEST AB 2200, as amended, John A. Pérez. California Cyber Security Commission. Existing law establishes various advisory boards and commissions in state government with specified duties and responsibilities. Existing lawuntil January 1, 2015,establishes in state government theDepartment of Technology within the Government Operations supervised by the Director of Technology.Governor's Office of Emergency Services. This bill would create the California Cyber Security Commission in theDepartment of TechnologyGovernor's Office of Emergency Services, consisting of1215 members comprised of representatives from state government, appointed representatives fromthe private sectors inthe technology or cybersecurity industry andutility, energy, or telecommunicationsthe utility or energy industry, and an appointed representative of California's critical infrastructure interests. The bill would also authorize the commission to appoint representatives from state, local, federal, and private entities to form an advisory board in order to receive input or advice concerning the implementation of the duties of the commission. The duties of the commission would include establishing cyber-attack response strategies and performing risk assessments on state information technology systems. The bill would require the commission to meet on a quarterly basis, or as specified, and wouldrequireallow the commission to issue a reporton at least an annual basisto the Governor's Office and the Legislature that details the activities of the commission and makes recommendations to improve California's cybersecurity preparedness. The bill would abolish the commission, and repeal these provisions, on January 1, 2019. Vote: majority. Appropriation: no. Fiscal committee: yes. State-mandated local program: no. THE PEOPLE OF THE STATE OF CALIFORNIA DO ENACT AS FOLLOWS: SECTION 1.Chapter 5.8Article 3.9 (commencing with Section11549.50)8574.50) is added toPart 1Chapter 7 of Division31 of Title 2 of the Government Code, to read:CHAPTER 5.8. CALIFORNIA CYBER SECURITY COMMISSIONArticle 3.9. California Cyber Security Commission11549.50.8574.50. The Legislature finds and declares all of the following: (a) The State of California's growing dependence on technology has made it increasingly vulnerable to both foreign and domestic cyber security attacks. Thus far, there has been a fragmented approach to this issue with independent efforts occurring through federal, state, and local government, as well as in the state's universities and within private industry. For the purposes of public safety and protection of public assets, the state has a role in coordinating and improving its overall security and response capabilities. (b) The market for cyber security is estimated to be more than seventy billion dollars ($70,000,000,000) in 2014. Of that amount, sixty-seven billion dollars ($67,000,000,000) is estimated to be spent nationally by private companies for computer and network security and the United States Department of Defense is planning to spend four billion six hundred million dollars ($4,600,000,000). The United States Department of Defense is planning on spending twenty-three billion dollars ($23,000,000,000) over the next five years. Overall spending is expected to increase rapidly as recognition of threats becomes more ubiquitous. The California economy stands to greatly benefit from this industry growth. (c) The State of California has already made investments for the purpose of cyber security; examples of which are research funding for the Lawrence Livermore National Laboratory and funding to augment a cyber security assessment and response team within the California National Guard. (d) The California Cyber Security Task Force was initiated in May 2013 for the purposes of identifying critical threats, assembling primary stakeholders, and highlighting the growing importance of the issue. Among other things, this has increased awareness of the state' s compliance with the new federal National Institute of Standards and Technology (NIST) standards and the Office of Emergency Services establishing Emergency Function 18, created particularly for cyber security. (e) Over 50,000 new malicious online activities are identified every day, according to the United States Department of Defense. Incidents of sophisticated and well-coordinated attacks and data breaches are occurring more regularly, the average cost of which amounts to more than ten million dollars ($10,000,000). In 2012, a data breach to the state of South Carolina required more than twenty million dollars ($20,000,000) in response and restitution. The State of California is vulnerable technically, legally, and financially to these threats.11549.51.8574.51. (a) There is in theDepartment of TechnologyGovernor's Office of Emergency Services the California Cyber Security Commission. The commission shall consist of the following members: (1) The Director ofthe Department of Technology,Emergency Services, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to thedirector'sOffice of Emergency Service's information technology and information security dutiesset forth in Chapter 5.6 (commencing with Section 11545). (2) The Chief of the Office of Information Security, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the chief's information technology and information security duties set forth in Chapter 5.7 (commencing with Section 11549) of Part 1 of Division 3 .(3) The Director of Emergency Services, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the Office of Emergency Services's information technology and information security.(4)(3) The Attorney General, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the Department of Justice's information technology and information security.(5)(4) The Adjutant General of the Military Department, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the Military Department's information technology and information security.(6)(5) The Insurance Commissioner, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the Department of Insurance's information technology and information security.(7)(6) The Secretary of Health and Human Services, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the California Health and Human Services Agency's information technology and information security.(8)(7) TheDirector of Transportation,Secretary of the California Transportation Agency, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to theDepartment of Transportation'sagency's information technology and information security.(9)(8) The Controller, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the office of the Controller's information technology and information security. (9) The Commissioner of the California Highway Patrol, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the California Highway Patrol's information technology and information security. (10) The Commander of the State Threat Assessment Center, or his or her designee with knowledge, expertise, and decisionmaking authority with respect to the State Threat Assessment Center's information technology and information security.(10)(11) A representative from the private sector in the technology or cybersecurity industry, who shall be appointed by the Governor. (12) A representative of the state's higher education system with knowledge, expertise, and decisionmaking authority with respect to information technology and information security, who shall be appointed by the Governor. (13) A representative of the Public Utilities Commission, California Energy Commission, or California Independent System Operator with knowledge, expertise, and decisionmaking authority with respect to information technology and information security, who shall be appointed by the Governor.(11)(14) A representative from theprivate sector in the utility, energy, or telecommunicationsutility or energy industry, who shall be appointed by the Speaker of the Assembly.(12)(15) A representative of California's critical infrastructure interests, such as air traffic control, ports, and water systems, who shall be appointed by the Senate Committee on Rules. (b) (1) Each representative appointed by the Governor, Speaker of the Assembly, or Senate Committee on Rules shall be appointed to serve a two-year term. (2) Any representative may serve consecutive terms. (c) Any designee shall serve at the pleasure of the official who designated them. (d)NineEight members shall constitute a quorum for the transaction of business, and all official acts of the commission shall require the affirmative vote of a majority of its members constituting a quorum. (e) The members of the commission shall serve without compensation, except that each member of the commission shall be entitled to receive his or her actual necessary traveling expenses while on official business of the commission.11549.52.8574.52. (a) The commission may appoint representatives to form an advisory board in order to receive input or advice concerning the implementation of the duties of the commission. The commission may expand, as needed, the advisory board to accommodate the representation necessary to inform and advance the duties of the commission. (b) The advisory board may be comprised of one or more representatives from the following: (1) The United States Department of Homeland Security. (2) The National Institute for Standards and Technology. (3) State government. (4) Local government. (5) California's utility grid, both private and public. (6) Technology firms, cybersecurity firms, critical infrastructure operators, utility providers, financial firms, health care providers, and other private industries. (7) California's cybersecurity law enforcement apparatus, which includes: (A) The Attorney General's eCrimes Unit. (B) The five regional task forces of the High Technology Theft Apprehension and Prosecution Program. (C) The Department of the California Highway Patrol. (8) Entities operating with the commission to perform its duties, including: (A) The State Threat Assessment Center and fusion centers, for the purpose of sharing information that informs preventive actions. (B) The California National Guard's Computer Network Defense Team, for the purpose of coordinating comprehensive risk assessments. (C) California's public and private universities and laboratories for the purpose of directing research and best utilizing its results. (c) The commission shall appoint each representative by a majority vote of its members constituting a quorum. Each representative shall serve at the pleasure of the commission.11549.53.8574.53. The commission shall meet quarterly, or more often as determined by a majority vote of its members constituting a quorum, or in the event of an emergency.11549.54.8574.54. The duties of the commission shall include the following: (a) Developing within state government cyber prevention, defense, and response strategies and defining a hierarchy of command within the state for this purpose. This duty includes, but is not limited to, the following activities: (1) Performing comprehensive risk assessments on state information technology systems. The Chief Information Security Officer shall coordinate the process of performing risk assessments and the assessments shall be performed by such entities as the California National Guard's Computer Defense Network Team and the State Threat Assessment Center, in addition to other public and private sector entities. (2) Creating a risk profile of public assets, critical infrastructure, public networks, and private operations susceptible to cyber attacks. (3) Coordinating efforts to reduce state information technology risks and gaps in existing service. (b) Partnering with the United States Department of Homeland Security to develop an appropriate information sharing system that allows for a controlled and secure process to effectively disseminate cyber threat and response information and data to relevant private and public sector entities. This information sharing system shall reflect state priorities and target identified threat and capability gaps. (c) Providing recommendations for information technology security standards for all state agencies using, among other things, protocols established by the National Institute for Standards and Technology and reflective of appropriate state priorities. (d) Compiling and integrating, as appropriate, the research conducted by academic institutions, federal laboratories, and other cybersecurity experts into state operations and functions. (e) Expanding the state's public-private cybersecurity partnership network both domestically and internationally to assist in the state' s efforts to prevent and respond to cyber threats and cyber attacks as well as enhance overall cyber detection capability. (f) Developing and providing a training program to produce a credentialed and qualified state cybersecurity workforce. This program should include training basedin whole or in parton the requirements and protocols outlined in models such as Department of Defense Directive 8570. The commission shall work with state workforce and labor entities as well as the state's higher education systems, federal agencies, and others to provide training and develop curriculum. (g)Developing,Analyzing, in conjunction with the Department of Insurance, the development of a strategy to acquire and incorporate cyber insurance into the procurement and administrative processes of state agencies to protect state assets and information. (h) Expanding collaboration with the state's law enforcement apparatus assigned jurisdiction to prevent, deter, investigate, and prosecute cyber attacks and information technology crime, including collaboration with entities like the High-Tech Theft Apprehension Program, and its five regional task forces, the Department of the California Highway Patrol, and the Attorney General's eCrimes unit. Collaboration will include information sharing that will enhance their capabilities including assistance to better align their activities with federal and local resources, provide additional resources, and extend their efforts into regions of the state not currently represented. (i) Proposing, where appropriate, potentialgovernmental reorganization options to enhanceoperational or functional enhancement to the state's cybersecurity assessment and response capabilities , as well as investment or spending recommendation and guidance for the state's information technology budget and procurement . (j) Coordinating the pursuit of fiscal resources including federal grants and other funding opportunities to enhance the state's cybersecurity, information technology, data privacy, cyber research, and technology-based emergency response capabilities.11549.55.8574.55. The commission shall take all necessary steps to protect personal information, public and private sector data, as well as ensure consumer privacy, when implementing its duties.11549.56.8574.56. (a) The commissionshallmay issuean annuala report to the Governor's office and theLegislature, or more often if needed due to an emergency situation or time sensitive nature of a cyber event, that contains the following information:Legislature detailing the activities of the commission, including, but not limited to, progress on the commission's various tasks and actions taken and recommended in response to an incident, as appropriate.(1) Details on the activities of the commission, including, but not limited to, progress on the commission's various tasks and actions taken and recommended in response to an incident, as appropriate.(2) Policy, organizational, and investment recommendations to improve the cybersecurity preparedness of the state.(b) The reports shall be submitted in compliance with Section 9795. 8574.57. The commission may engage or accept the services of agency or department personnel, accept the services of stakeholder organizations, and accept federal, private, or other nonstate funding, to operate, manage, or conduct the business of the commission. 8574.58. The commission shall operate within the current information technology budget of each department and agency they serve. Each department and agency shall cooperate with the commission and furnish it with information and assistance that is necessary or useful to further the purposes of this article.11549.57.8574.59. Thischapterarticle shall become inoperative on January 1, 2019, and shall be repealed as of that date.