{"id":9135,"date":"2013-02-08T11:55:26","date_gmt":"2013-02-08T16:55:26","guid":{"rendered":"http:\/\/www.kevinbryant.com\/?p=9135"},"modified":"2013-02-08T12:08:38","modified_gmt":"2013-02-08T17:08:38","slug":"s-335-cyber-security","status":"publish","type":"post","link":"https:\/\/www.kevinbryant.com\/kbarchive\/s-335-cyber-security\/","title":{"rendered":"s. 335 cyber security"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/www.kevinbryant.com\/kbarchive\/wp-content\/uploads\/2012\/11\/data-breach.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"8870\" data-permalink=\"https:\/\/www.kevinbryant.com\/kbarchive\/senate-committee-to-investigate-security-breach\/data-breach\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.kevinbryant.com\/kbarchive\/wp-content\/uploads\/2012\/11\/data-breach.jpg?fit=200%2C180&amp;ssl=1\" data-orig-size=\"200,180\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"data-breach\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.kevinbryant.com\/kbarchive\/wp-content\/uploads\/2012\/11\/data-breach.jpg?fit=200%2C180&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.kevinbryant.com\/kbarchive\/wp-content\/uploads\/2012\/11\/data-breach.jpg?fit=200%2C180&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.kevinbryant.com\/kbarchive\/wp-content\/uploads\/2012\/11\/data-breach.jpg?resize=150%2C150\" alt=\"data-breach\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-8870\" \/><\/a><a href=\"http:\/\/scstatehouse.gov\/sess120_2013-2014\/bills\/334.htm\" target=\"_blank\">S. 335<\/a> was introduced this week in the Senate. This is simply a set of proposals that may be changed during the legislative process. I look forward to the debate.<br \/>\nCYBER SECURITY AND IDENTITY THEFT PROTECTIONS BILL<br \/>\nI. Whereas Clauses Sets forth the necessity for the bill (primarily relating to the cyber security breach at DOR) based on subcommittee findings, including:<br \/>\nThe period of time that lapsed between the beginning of the hackers attack and discovery of the breach and the disconnect in the organizational structure of DOR; The need for &#8220;identity theft&#8221; protections for affected citizens beyond the expiration of the one-year Experian contract; and The need for a centralized statewide cyber security program with the authority to establish standard practices and policies among all state agencies related to information security.<br \/>\nII. Section 1-Lifetime Protection &#038; Fraud Resolution Services to Eligible Persons as a result of the DOR Cyber Security Breach<br \/>\nRequires the Governor to develop a protection plan with &#8220;identity theft&#8221; services free of charge to eligible citizens affected by the DOR breach.  Taxpayers, excluding those enrolled in free state protection or those claiming as business expense (can&#8217;t double dip), are eligible for a tax deduction if they purchase their own protection (capped at $200 or individuals and $300 for joint returns or returns with dependents).  This deduction sunsets after the 2018 tax year.<br \/>\nRequires the Governor to develop a policy to protect personally identifiable information at DOR.<br \/>\nMandates that no service may be procured for a cost if the same service is available to eligible persons for free under state or federal law.<br \/>\nRequires that any contract entered into by the Governor not exceed a term of 5 years and requires the Governor, upon expiration of any contract, to issue a report to the General Assembly with findings and recommendations concerning the ongoing risk to eligible persons.  Based on the report, the Governor may extend services  for an additional period of up to 5 years.  The bill, therefore, authorizes the provision of services and protection for up to 10 years.<br \/>\nRequires any contract entered into by the Governor to be procured through MMO following standard procurement processes.<br \/>\nRequires the Governor to include the estimated costs of implementation in the executive budget and any agency charged with implementing any portion of the plan to account for its estimated expenses in their annual budget request.<br \/>\nIII. Section 2-Creation of an Identity Theft Unit within the Department of Consumer Affairs<br \/>\nEstablishes the Identity Theft Unit in order to educate the public regarding identity theft and fraud and provide identity theft and fraud resolution services to victims.<br \/>\nProvides that the Identity Theft Unit will work with law enforcement agencies, track statistical data relating to instances of identity theft and fraud, and will submit an annual report with recommended changes to law, including the State&#8217;s Consumer Protection Code, that would reduce instances of identity theft and fraud.<br \/>\nIV.Section 3-Creation of the Department of Information Security<br \/>\nEstablishes the Chief Information Security Officer (CISO) of the State as the Director of the cabinet-level Department of Information Security, who shall serve for 4-year terms.<br \/>\nRequires the Department to develop statewide policies, standards, programs and services related to cyber security and information systems.<br \/>\nAuthorizes the CISO to develop salaries and compensation plans for IT employees at the Department to be competitive with the private sector.<br \/>\nRequires all agencies to adopt and implement the policies established by the CISO and to provide all information requested of the CISO.<br \/>\nV. Section 4-Creation of the Technology Investment Council<br \/>\nEstablishes a seven-member council consisting of the director of DSIT, the CISO, and appointees of the Governor, Pres. Pro Tempore of the Senate, Speaker of the House, Chairman of Senate Finance and Chairman of House Ways and Means.<br \/>\nResponsible for the publication of an annual statewide technology plan with recommendations regarding funding of technology for each fiscal year.<br \/>\nResponsible for overseeing the enforcement of active projects and developing minimum standards required for technology projects.<br \/>\nVI. Section 5-Creation of the Joint Information Security Oversight Committee<\/p>\n<p>Establishes a nine-member joint oversight committee consisting of the CISO and appointees of the Governor (2), Pres. Pro Tempore of the Senate, Speaker of the House, Chairman of Senate Finance (2) and Chairman of House Ways and Means (2).<br \/>\nRequires the Committee to continually study state cyber security laws in order to make recommendations, through an annual report,  for modifications to such laws.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S. 335 was introduced this week in the Senate. This is simply a set of proposals that may be changed during the legislative process. I look forward to the debate. CYBER SECURITY AND IDENTITY THEFT PROTECTIONS BILL I. Whereas Clauses Sets forth the necessity for the bill (primarily relating to the cyber security breach at [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":{"0":"post-9135","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2gEQ0-2nl","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/posts\/9135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/comments?post=9135"}],"version-history":[{"count":4,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/posts\/9135\/revisions"}],"predecessor-version":[{"id":9139,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/posts\/9135\/revisions\/9139"}],"wp:attachment":[{"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/media?parent=9135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/categories?post=9135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kevinbryant.com\/kbarchive\/wp-json\/wp\/v2\/tags?post=9135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}