<?xml version="1.0" encoding="UTF-16"?>
<leg xml:space="preserve" billnum="HB0042" sponsor="Ryan D. Wilcox" designation="HB" otherSponsor="" otherHouse="Senate" sess="2026GS" fileno="2026FL0072" date="12/18/2025 20:12:600" printDate="12-18 20:53" subVer="0" minVer="0" office="LEGISLATIVE GENERAL COUNSEL" actionDate="" impact="code"><info><nextbuid>27</nextbuid><aminfo anum="0" effdate="05/06/2026"><seclist><sect action="A" src="code" buid="19" uid="C53G-7-S227_2026050620260506" fromuid="C53G-7-S227_2025101420251206" sort="53G07 02270020260506" mtype="section" effdate="05/06/2026">53G-7-227</sect><sect action="E" src="code" buid="6" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" mtype="section" effdate="05/06/2026">53G-8-901</sect><sect action="E" src="code" buid="7" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" mtype="section" effdate="05/06/2026">53G-8-902</sect><sect action="E" src="code" buid="8" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" mtype="section" effdate="05/06/2026">53G-8-903</sect><sect action="A" src="code" buid="22" uid="C53H-4-S213.4_2026050620260506" fromuid="C53H-4-S213.4_2025101420251206" sort="53H04 02130420260506" mtype="section" effdate="05/06/2026">53H-4-213.4</sect><sect action="A" src="code" buid="1" uid="C63A-16-S1101_2026050620260506" fromuid="C63A-16-S1101_2024050120240501" sort="63A16 11010020260506" mtype="section" effdate="05/06/2026">63A-16-1101</sect><sect action="A" src="code" buid="25" uid="C63A-16-S1102_2026050620260506" fromuid="C63A-16-S1102_2025101420251206" sort="63A16 11020020260506" mtype="section" effdate="05/06/2026">63A-16-1102</sect><sect action="A" src="code" buid="3" uid="C63A-16-S1103_2026050620260506" fromuid="C63A-16-S1103_2024050120240501" sort="63A16 11030020260506" mtype="section" effdate="05/06/2026">63A-16-1103</sect><sect action="A" src="code" buid="11" uid="C63A-19-S101_2026050620260506" fromuid="C63A-19-S101_2025032720250507" sort="63A19 01010020260506" mtype="section" effdate="05/06/2026">63A-19-101</sect><sect action="A" src="code" buid="14" uid="C63C-27-S201_2026050620260506" fromuid="C63C-27-S201_2022050420220504" sort="63C27 02010020260506" mtype="section" effdate="05/06/2026" libenddate="07/01/2032" endtype="SN">63C-27-201</sect><sect src="uncod" untype="effdate" buid="26" uid="EF0000" sort="UZEFF" mtype="uncod" effdate="05/06/2026"/></seclist></aminfo></info><tbox><sinfo><nextpairid>0</nextpairid></sinfo><st numlevel="1" lineno="1" slineno="0-1">School Cybersecurity Amendments</st><sessionhead>2026 GENERAL SESSION</sessionhead><statehead>STATE OF UTAH</statehead><sponsorhead>Chief Sponsor: Ryan D. Wilcox</sponsorhead><otherSponsorhead>Senate Sponsor: </otherSponsorhead></tbox><lt numlevel="1" lineno="2" slineno="0-2"><lthead lineno="3">LONG TITLE</lthead><cn numlevel="1" lineno="4" slineno="0-4">Committee Note:<comrec voteid="38389" comcode="INTLAW" numlevel="1" lineno="5" slineno="0-5"> The Law Enforcement and Criminal Justice Interim Committee recommended this bill.<legvote numlevel="1" lineno="6" slineno="0-6">Legislative Vote:<yes>13 voting for</yes><no>0 voting against</no><abs>3 absent</abs></legvote></comrec></cn><gdhead lineno="7">General Description:</gdhead><gd numlevel="1" lineno="8" slineno="0-8">This bill establishes minimum cybersecurity standards for local education agencies (LEAs) <ln numlevel="1" lineno="9" slineno="0-9"/>and expands the Utah Cyber Center's services to include educational institutions.</gd><hphead lineno="10">Highlighted Provisions:</hphead><hp numlevel="1" lineno="11" slineno="0-11">This bill:<hl numlevel="1" lineno="12" slineno="0-12" level="1">establishes minimum cybersecurity standards for LEAs;</hl><hl numlevel="1" lineno="13" slineno="0-13" level="1">requires LEAs to implement specific cybersecurity measures;</hl><hl numlevel="1" lineno="14" slineno="0-14" level="1">expands the Utah Cyber Center's duties to include services for LEAs;</hl><hl numlevel="1" lineno="15" slineno="0-15" level="1">requires coordination between the Utah Cyber Center, LEAs, and the Utah Education and <ln numlevel="1" lineno="16" slineno="0-16"/>Telehealth Network;</hl><hl numlevel="1" lineno="17" slineno="0-17" level="1">establishes reporting requirements for cybersecurity incidents in educational settings;</hl><hl numlevel="1" lineno="18" slineno="0-18" level="1">requires the State Board of Education to develop implementation guidelines; and</hl><hl numlevel="1" lineno="19" slineno="0-19" level="1">makes conforming changes.</hl></hp><moni numlevel="1" lineno="20" slineno="0-20" display="none">Money Appropriated in this Bill:</moni><moniNone lineno="21">None</moniNone><oc numlevel="1" lineno="22" slineno="0-22">Other Special Clauses:</oc><ocNone lineno="23">None</ocNone><sa numlevel="1" lineno="24" slineno="0-24">Utah Code Sections Affected:<saamd numlevel="1" lineno="25" slineno="0-25"><snhead>AMENDS:</snhead><sn num="53G-7-227" src="code" uid="C53G-7-S227_2026050620260506" buid="19" sort="53G07 02270020260506" numlevel="1" lineno="26" slineno="0-26"><bold>53G-7-227</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as last amended by Laws of Utah 2025, First Special <ln numlevel="1" lineno="27" slineno="0-27"/>Session, Chapter 9</sn><sn num="53H-4-213.4" src="code" uid="C53H-4-S213.4_2026050620260506" buid="22" sort="53H04 02130420260506" numlevel="1" lineno="28" slineno="0-28"><bold>53H-4-213.4</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as renumbered and amended by Laws of Utah 2025, <ln numlevel="1" lineno="29" slineno="0-29"/>First Special Session, Chapter 8</sn><sn num="63A-16-1101" src="code" uid="C63A-16-S1101_2026050620260506" buid="1" sort="63A16 11010020260506" numlevel="1" lineno="30" slineno="0-30"><bold>63A-16-1101</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as enacted by Laws of Utah 2024, Chapter 426</sn><sn num="63A-16-1102" src="code" uid="C63A-16-S1102_2026050620260506" buid="25" sort="63A16 11020020260506" numlevel="1" lineno="31" slineno="0-31"><bold>63A-16-1102</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as last amended by Laws of Utah 2025, First Special <ln numlevel="1" lineno="32" slineno="0-32"/>Session, Chapter 9</sn><sn num="63A-16-1103" src="code" uid="C63A-16-S1103_2026050620260506" buid="3" sort="63A16 11030020260506" numlevel="1" lineno="33" slineno="0-33"><bold>63A-16-1103</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as renumbered and amended by Laws of Utah 2024, <ln numlevel="1" lineno="34" slineno="0-34"/>Chapter 426</sn><sn num="63A-19-101" src="code" uid="C63A-19-S101_2026050620260506" buid="11" sort="63A19 01010020260506" numlevel="1" lineno="35" slineno="0-35"><bold>63A-19-101</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> as last amended by Laws of Utah 2025, Chapter 475</sn><sn num="63C-27-201" src="code" uid="C63C-27-S201_2026050620260506" buid="14" sort="63C27 02010020260506" numlevel="1" lineno="36" slineno="0-36"><bold>63C-27-201</bold>, <parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens> as enacted by Laws of Utah 2022, <ln numlevel="1" lineno="37" slineno="0-37"/>Chapter 153</sn></saamd><saent numlevel="1" lineno="38" slineno="0-38"><snhead>ENACTS:</snhead><sn num="53G-8-901" src="code" uid="C53G-8-S901_2026050620260506" buid="6" sort="53G08 09010020260506" numlevel="1" lineno="39" slineno="0-39"><bold>53G-8-901</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> Utah Code Annotated 1953</sn><sn num="53G-8-902" src="code" uid="C53G-8-S902_2026050620260506" buid="7" sort="53G08 09020020260506" numlevel="1" lineno="40" slineno="0-40"><bold>53G-8-902</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> Utah Code Annotated 1953</sn><sn num="53G-8-903" src="code" uid="C53G-8-S903_2026050620260506" buid="8" sort="53G08 09030020260506" numlevel="1" lineno="41" slineno="0-41"><bold>53G-8-903</bold>, <parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> Utah Code Annotated 1953</sn></saent></sa></lt><enacthead lineno="42"/><enact numlevel="1" lineno="43" slineno="0-43">Be it enacted by the Legislature of the state of Utah:</enact><bdy><bsec buid="19" num="53G-7-227" type="amend" src="code" uid="C53G-7-S227_2026050620260506" sort="53G07 02270020260506" numlevel="1" lineno="44" slineno="1-1" sn="1"><section number="53G-7-227" numlevel="1" lineno="45" slineno="1-2" type="amend"><secline lineno="44">Section 1. Section <bold>53G-7-227</bold> is amended to read:</secline><catline lineno="45"><bold>53G-7-227<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Device prohibition.</bold></catline><subsection ssid="19-null-73" dnum="1-o" numlevel="1" lineno="46" slineno="1-3" level="1" placement="noreturn"><display>(1)</display>As used in this section:<subsection ssid="19-null-74" dnum="_-o:a-i" numlevel="1" lineno="47" slineno="1-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" space="false"><display><amend anum="0" ea="amend" pairid="1001" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><subsection ssid="19-null-75" dnum="_-o:i-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" placement="sameline"><display><amend anum="0" ea="amend" pairid="1002" style="1" owner="i" level="1">(i)</amend></display><amend anum="0" ea="amend" pairid="0" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" means wearable eyewear, whether prescription or <ln numlevel="1" lineno="48" slineno="1-5"/>non-prescription, that:</amend><subsection ssid="19-null-76" dnum="_-o:A-i" numlevel="1" lineno="49" slineno="1-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1003" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="9" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="end">incorporates one or more sensors, including cameras, microphones, <ln numlevel="1" lineno="50" slineno="1-7"/>accelerometers, gyroscopes, or biometric sensors;</amend></subsection><subsection ssid="19-null-77" dnum="_-o:B-i" numlevel="1" lineno="51" slineno="1-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1004" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="14" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">uses artificial intelligence, machine learning algorithms, or neural networks to <ln numlevel="1" lineno="52" slineno="1-9"/>process, analyze, or interpret data captured by the sensors in real-time or near <ln numlevel="1" lineno="53" slineno="1-10"/>real-time;</amend></subsection><subsection ssid="19-null-78" dnum="_-o:C-i" numlevel="1" lineno="54" slineno="1-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1005" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="19" groupid="14" style="1" owner="jchristopherson" level="1" amendtag="end">provides information, overlays, translations, identification, or other augmented <ln numlevel="1" lineno="55" slineno="1-12"/>content to the wearer through visual displays, audio output, or haptic feedback; <ln numlevel="1" lineno="56" slineno="1-13"/>and</amend></subsection><subsection ssid="19-null-79" dnum="_-o:D-i" numlevel="1" lineno="57" slineno="1-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1006" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="24" groupid="18" style="1" owner="jchristopherson" level="1" amendtag="end">may transmit, store, or share data to external devices, networks, or <ln numlevel="1" lineno="58" slineno="1-15"/>cloud-based services.</amend></subsection></subsection><subsection ssid="19-null-80" dnum="_-o:ii-i" numlevel="1" lineno="59" slineno="1-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1007" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="28" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" does not include:</amend><subsection ssid="19-null-81" dnum="_-o:A-i" numlevel="1" lineno="60" slineno="1-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1008" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="33" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">prescription eyeglasses or sunglasses without electronic components;</amend></subsection><subsection ssid="19-null-82" dnum="_-o:B-i" numlevel="1" lineno="61" slineno="1-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1009" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="38" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">wearable devices used solely for reading glasses or vision correction without <ln numlevel="1" lineno="62" slineno="1-19"/>data collection or processing capabilities;</amend></subsection><subsection ssid="19-null-83" dnum="_-o:C-i" numlevel="1" lineno="63" slineno="1-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1010" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="43" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">protective eyewear that contains only passive sensors without artificial <ln numlevel="1" lineno="64" slineno="1-21"/>intelligence processing capabilities; or</amend></subsection><subsection ssid="19-null-84" dnum="_-o:D-i" numlevel="1" lineno="65" slineno="1-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1011" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="48" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">virtual reality headsets designed primarily for immersive gaming or <ln numlevel="1" lineno="66" slineno="1-23"/>entertainment that are not suitable for continuous wear in public settings.</amend></subsection></subsection></subsection><subsection ssid="19-null-85" dnum="a-o:b-i" numlevel="1" lineno="67" slineno="1-24" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1012" style="2" owner="o" level="1" deltag="both">(a)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1013" style="1" owner="i" level="1" amendtag="both" space="true">(b)</amend></display>"Cellphone" means a handheld, portable electronic device that is designed to be <ln numlevel="1" lineno="68" slineno="1-25"/>operated using one or both hands and is capable of transmitting and receiving voice, <ln numlevel="1" lineno="69" slineno="1-26"/>data, or text communication by means of:<subsection ssid="19-null-86" dnum="i-o" numlevel="1" lineno="70" slineno="1-27" level="3"><display>(i)</display>a cellular network;</subsection><subsection ssid="19-null-87" dnum="ii-o" numlevel="1" lineno="71" slineno="1-28" level="3"><display>(ii)</display>a satellite network; or</subsection><subsection ssid="19-null-88" dnum="iii-o" numlevel="1" lineno="72" slineno="1-29" level="3"><display>(iii)</display>any other wireless technology.</subsection></subsection><subsection ssid="19-null-89" dnum="b-o:c-i" numlevel="1" lineno="73" slineno="1-30" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1016" style="2" owner="o" level="1" deltag="both">(b)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1017" style="1" owner="i" level="1" amendtag="both" space="true">(c)</amend></display>"Cellphone" includes:<subsection ssid="19-null-90" dnum="i-o" numlevel="1" lineno="74" slineno="1-31" level="3"><display>(i)</display>a smartphone;</subsection><subsection ssid="19-null-91" dnum="ii-o" numlevel="1" lineno="75" slineno="1-32" level="3"><display>(ii)</display>a feature phone;</subsection><subsection ssid="19-null-92" dnum="iii-o" numlevel="1" lineno="76" slineno="1-33" level="3"><display>(iii)</display>a mobile phone;</subsection><subsection ssid="19-null-93" dnum="iv-o" numlevel="1" lineno="77" slineno="1-34" level="3"><display>(iv)</display>a satellite phone; or</subsection><subsection ssid="19-null-94" dnum="v-o" numlevel="1" lineno="78" slineno="1-35" level="3"><display>(v)</display>a personal digital assistant that incorporates capabilities similar to a smartphone, <ln numlevel="1" lineno="79" slineno="1-36"/>feature phone, mobile phone, or satellite phone.</subsection></subsection><subsection ssid="19-null-95" dnum="c-o:d-i" numlevel="1" lineno="80" slineno="1-37" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1022" style="2" owner="o" level="1" deltag="both">(c)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1023" style="1" owner="i" level="1" amendtag="both" space="true">(d)</amend></display>"Classroom hours" means:<subsection ssid="19-null-96" dnum="i-o" numlevel="1" lineno="81" slineno="1-38" level="3"><display>(i)</display>time during which a student receives scheduled, teacher-supervised instruction <ln numlevel="1" lineno="82" slineno="1-39"/>that occurs:<subsection ssid="19-null-97" dnum="A-o" numlevel="1" lineno="83" slineno="1-40" level="4"><display>(A)</display>in a physical or virtual classroom setting;</subsection><subsection ssid="19-null-98" dnum="B-o" numlevel="1" lineno="84" slineno="1-41" level="4"><display>(B)</display>during regular school operating hours; and</subsection><subsection ssid="19-null-99" dnum="C-o" numlevel="1" lineno="85" slineno="1-42" level="4"><display>(C)</display>as part of an approved educational curriculum.</subsection></subsection><subsection ssid="19-null-100" dnum="ii-o" numlevel="1" lineno="86" slineno="1-43" level="3"><display>(ii)</display>"Classroom hours" does not include:<subsection ssid="19-null-101" dnum="A-o" numlevel="1" lineno="87" slineno="1-44" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-102" dnum="B-o" numlevel="1" lineno="88" slineno="1-45" level="4"><display>(B)</display>recess;</subsection><subsection ssid="19-null-103" dnum="C-o" numlevel="1" lineno="89" slineno="1-46" level="4"><display>(C)</display>transit time between classes;</subsection><subsection ssid="19-null-104" dnum="D-o" numlevel="1" lineno="90" slineno="1-47" level="4"><display>(D)</display>study halls unless directly supervised by a qualified instructor;</subsection><subsection ssid="19-null-105" dnum="E-o" numlevel="1" lineno="91" slineno="1-48" level="4"><display>(E)</display>after-school activities unless part of an approved extended learning program; or</subsection><subsection ssid="19-null-106" dnum="F-o" numlevel="1" lineno="92" slineno="1-49" level="4"><display>(F)</display>independent study time occurring outside scheduled instruction.</subsection></subsection></subsection><subsection ssid="19-null-107" dnum="d-o:e-i" numlevel="1" lineno="93" slineno="1-50" level="2" space="false"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1034" style="2" owner="o" level="1" deltag="both">(d)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1035" style="1" owner="i" level="1" amendtag="both" space="true">(e)</amend></display><subsection ssid="19-null-108" dnum="i-o" level="3" placement="sameline"><display>(i)</display>"Emerging technology" means any other device that has or will be able to <ln numlevel="1" lineno="94" slineno="1-51"/>act in place of or as an extension of an individual's cellphone.</subsection><subsection ssid="19-null-109" dnum="ii-o" numlevel="1" lineno="95" slineno="1-52" level="3"><display>(ii)</display>"Emerging technology" does not include school provided or required devices.</subsection></subsection><subsection ssid="19-null-110" dnum="e-o:f-i" numlevel="1" lineno="96" slineno="1-53" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1037" style="2" owner="o" level="1" deltag="both">(e)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1038" style="1" owner="i" level="1" amendtag="both" space="true">(f)</amend></display>"Smart watch" means a wearable computing device that closely resembles a <ln numlevel="1" lineno="97" slineno="1-54"/>wristwatch or other time-keeping device with the capacity to act in place of or as an <ln numlevel="1" lineno="98" slineno="1-55"/>extension of an individual's cellphone.</subsection><subsection ssid="19-null-111" dnum="f-o:g-i" numlevel="1" lineno="99" slineno="1-56" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1038" style="2" owner="o" level="1" deltag="both">(f)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1039" style="1" owner="i" level="1" amendtag="both" space="true">(g)</amend></display>"Smart watch" does not include a wearable device that can only:<subsection ssid="19-null-112" dnum="i-o" numlevel="1" lineno="100" slineno="1-57" level="3"><display>(i)</display>tell time;</subsection><subsection ssid="19-null-113" dnum="ii-o" numlevel="1" lineno="101" slineno="1-58" level="3"><display>(ii)</display>monitor an individual's health informatics;</subsection><subsection ssid="19-null-114" dnum="iii-o" numlevel="1" lineno="102" slineno="1-59" level="3"><display>(iii)</display>receive and display notifications or information without the capability to <ln numlevel="1" lineno="103" slineno="1-60"/>respond; or</subsection><subsection ssid="19-null-115" dnum="iv-o" numlevel="1" lineno="104" slineno="1-61" level="3"><display>(iv)</display>track the individual's physical location.</subsection></subsection></subsection><subsection ssid="19-null-116" dnum="2-o" numlevel="1" lineno="105" slineno="1-62" level="1" space="false"><display>(2)</display><subsection ssid="19-null-117" dnum="a-o" level="2" placement="sameline"><display>(a)</display>An LEA:<subsection ssid="19-null-118" dnum="i-o" numlevel="1" lineno="106" slineno="1-63" level="3" tab="1"><display>(i)</display>shall establish a policy that allows a student to use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="49" groupid="38" style="1" owner="jchristopherson" level="1" amendtag="both">AI <ln numlevel="1" lineno="107" slineno="1-64"/>glasses, </amend>or emerging technology:<subsection ssid="19-null-119" dnum="A-o" numlevel="1" lineno="108" slineno="1-65" level="4"><display>(A)</display>to respond to an imminent threat to the health or safety of an individual;</subsection><subsection ssid="19-null-120" dnum="B-o" numlevel="1" lineno="109" slineno="1-66" level="4"><display>(B)</display>to respond to a school-wide emergency;</subsection><subsection ssid="19-null-121" dnum="C-o" numlevel="1" lineno="110" slineno="1-67" level="4"><display>(C)</display>to use the SafeUT Crisis Line described in Section <xref depth="3" refnumber="53H-4-210">53H-4-210</xref>;</subsection><subsection ssid="19-null-122" dnum="D-o" numlevel="1" lineno="111" slineno="1-68" level="4"><display>(D)</display>for a student's IEP or Section 504 accommodation plan; or</subsection><subsection ssid="19-null-123" dnum="E-o" numlevel="1" lineno="112" slineno="1-69" level="4"><display>(E)</display>to address a medical necessity; and</subsection></subsection><subsection ssid="19-null-124" dnum="ii-o" numlevel="1" lineno="113" slineno="1-70" level="3" tab="1"><display>(ii)</display>may establish a policy that provides for other circumstances when a student may <ln numlevel="1" lineno="114" slineno="1-71"/>use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="51" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology.</subsection></subsection><subsection ssid="19-null-125" dnum="b-o" numlevel="1" lineno="115" slineno="1-72" level="2"><display>(b)</display>An LEA may establish policies that:<subsection ssid="19-null-126" dnum="i-o" numlevel="1" lineno="116" slineno="1-73" level="3"><display>(i)</display>extend restrictions on student use of cellphones, smart watches, or emerging <ln numlevel="1" lineno="117" slineno="1-74"/>technologies to non-classroom hours during the school day, including:<subsection ssid="19-null-127" dnum="A-o" numlevel="1" lineno="118" slineno="1-75" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-128" dnum="B-o" numlevel="1" lineno="119" slineno="1-76" level="4"><display>(B)</display>transition times between classes; and</subsection><subsection ssid="19-null-129" dnum="C-o" numlevel="1" lineno="120" slineno="1-77" level="4"><display>(C)</display>other school-supervised activities; and</subsection></subsection><subsection ssid="19-null-130" dnum="ii-o" numlevel="1" lineno="121" slineno="1-78" level="3"><display>(ii)</display>impose additional limitations on the use of cellphones, smart watches, or <ln numlevel="1" lineno="122" slineno="1-79"/>emerging technologies beyond those required by this section.</subsection></subsection></subsection><subsection ssid="19-null-131" dnum="3-o" numlevel="1" lineno="123" slineno="1-80" level="1"><display>(3)</display>Except as provided in Subsection <xref depth="4" refnumber="53G-7-227(2)">(2)</xref>, a student may not use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="54" groupid="42" style="1" owner="jchristopherson" level="1" amendtag="both"><ln numlevel="1" lineno="124" slineno="1-81"/>AI glasses, </amend>or emerging technology at a school during classroom hours.</subsection><subsection ssid="19-null-132" dnum="4-o" numlevel="1" lineno="125" slineno="1-82" level="1"><display>(4)</display>The state board may create one or more model policies regarding when a student may <ln numlevel="1" lineno="126" slineno="1-83"/>use a student's cellphone, smart watch, <amend anum="0" ea="amend" pairid="57" groupid="44" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology in a school <ln numlevel="1" lineno="127" slineno="1-84"/>during classroom hours consistent with this section.</subsection></section></bsec><bsec buid="6" num="53G-8-901" type="enact" src="code" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" numlevel="1" lineno="128" slineno="2-1" sn="2"><section numlevel="1" lineno="130" slineno="2-3" number="53G-8-901" type="enact"><secline lineno="128">Section 2. Section <bold>53G-8-901</bold> is enacted to read:</secline><headpart number="53G-8-9" numlevel="1" lineno="129" slineno="2-2">9. LEA Cybersecurity Standards</headpart><catline lineno="130"><bold>53G-8-901<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. General provisions -- Definitions.</bold></catline><sectionText lineno="131"><para/><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both">As used in this part:</amend></sectionText><subsection ssid="6-10" dnum="_-o:1-i" numlevel="1" lineno="132" slineno="2-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1060" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">"CIS Controls" means the Center for Internet Security Critical Security Controls, a <ln numlevel="1" lineno="133" slineno="2-6"/>prioritized set of actions for cybersecurity that provide specific and actionable ways to <ln numlevel="1" lineno="134" slineno="2-7"/>defend against common cyber attack methods.</amend></subsection><subsection ssid="6-2" dnum="_-o:2-i" numlevel="1" lineno="135" slineno="2-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1061" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">"Cyber Center" means the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref>.</amend></subsection><subsection ssid="6-3" dnum="_-o:3-i" numlevel="1" lineno="136" slineno="2-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1062" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="8" style="1" owner="jchristopherson" level="1" amendtag="end">"Cyber defense plan" means a comprehensive strategy document that outlines an LEA's <ln numlevel="1" lineno="137" slineno="2-10"/>approach to preventing, detecting, responding to, and recovering from cybersecurity <ln numlevel="1" lineno="138" slineno="2-11"/>incidents.</amend></subsection><subsection ssid="6-4" dnum="_-o:4-i" numlevel="1" lineno="139" slineno="2-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1063" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">"Data breach" means the same as that term is defined in Section <xref depth="3" refnumber="63A-16-1101">63A-16-1101</xref>.</amend></subsection><subsection ssid="6-5" dnum="_-o:5-i" numlevel="1" lineno="140" slineno="2-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1064" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">"Endpoint detection and response" or "EDR" means cybersecurity technology that <ln numlevel="1" lineno="141" slineno="2-14"/>continuously monitors end-user devices to detect and respond to cyber threats.</amend></subsection><subsection ssid="6-6" dnum="_-o:6-i" numlevel="1" lineno="142" slineno="2-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1065" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">"Multi-factor authentication" or "MFA" means an authentication method that requires <ln numlevel="1" lineno="143" slineno="2-16"/>two or more verification factors to gain access to a resource.</amend></subsection><subsection ssid="6-12" dnum="_-o:7-i" numlevel="1" lineno="144" slineno="2-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1066" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="48" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">"Patch management" means the process of identifying, acquiring, testing, and installing <ln numlevel="1" lineno="145" slineno="2-18"/>updates to software and systems to fix vulnerabilities and improve security.</amend></subsection><subsection ssid="6-7" dnum="_-o:8-i" numlevel="1" lineno="146" slineno="2-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1067" style="1" owner="i" level="1" amendtag="start">(8)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">"Personal data" means the same as that term is defined in Section <xref depth="3" refnumber="63A-16-1101">63A-16-1101</xref>.</amend></subsection><subsection ssid="6-11" dnum="_-o:9-i" numlevel="1" lineno="147" slineno="2-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1068" style="1" owner="i" level="1" amendtag="start">(9)</amend></display><amend anum="0" ea="amend" pairid="45" groupid="35" style="1" owner="jchristopherson" level="1" amendtag="end">"Phishing" means a fraudulent attempt to obtain sensitive information by disguising <ln numlevel="1" lineno="148" slineno="2-21"/>oneself as a trustworthy entity in electronic communications.</amend></subsection><subsection ssid="6-8" dnum="_-o:10-i" numlevel="1" lineno="149" slineno="2-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1069" style="1" owner="i" level="1" amendtag="start">(10)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">"Strong authentication" means enhanced identity verification mechanisms that utilize <ln numlevel="1" lineno="150" slineno="2-23"/>technologies such as multi-factor authentication, passkeys, or other equivalent or <ln numlevel="1" lineno="151" slineno="2-24"/>stronger authentication mechanisms that provide comparable or improved levels of <ln numlevel="1" lineno="152" slineno="2-25"/>security assurance.</amend></subsection><subsection ssid="6-13" dnum="_-o:11-i" numlevel="1" lineno="153" slineno="2-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1070" style="1" owner="i" level="1" amendtag="start">(11)</amend></display><amend anum="0" ea="amend" pairid="51" groupid="39" style="1" owner="jchristopherson" level="1" amendtag="end">"Tabletop exercise" means a discussion-based cybersecurity exercise where team <ln numlevel="1" lineno="154" slineno="2-27"/>members meet to discuss each team member's roles and responses during an emergency <ln numlevel="1" lineno="155" slineno="2-28"/>scenario in an informal, low-stress environment.</amend></subsection><subsection ssid="6-9" dnum="_-o:12-i" numlevel="1" lineno="156" slineno="2-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1071" style="1" owner="i" level="1" amendtag="start">(12)</amend></display><amend anum="0" ea="amend" pairid="41" groupid="32" style="1" owner="jchristopherson" level="1" amendtag="end">"Utah Education and Telehealth Network" or "UETN" means the network created in <ln numlevel="1" lineno="157" slineno="2-30"/>Section <xref depth="3" refnumber="53H-4-213.4">53H-4-213.4</xref>.</amend></subsection></section></bsec><bsec buid="7" num="53G-8-902" type="enact" src="code" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" numlevel="1" lineno="158" slineno="3-1" sn="3"><section numlevel="1" lineno="159" slineno="3-2" number="53G-8-902" type="enact"><secline lineno="158">Section 3. Section <bold>53G-8-902</bold> is enacted to read:</secline><catline lineno="159"><bold>53G-8-902<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Minimum cybersecurity standards for an LEA -- <ln numlevel="1" lineno="160" slineno="3-3"/>Data breach reporting -- Coordination with Utah Cyber Center.</bold></catline><subsection ssid="7-1" dnum="_-o:1-i" numlevel="1" lineno="161" slineno="3-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1072" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">Beginning July 1, 2027, each LEA shall implement and maintain the following <ln numlevel="1" lineno="162" slineno="3-5"/>minimum cybersecurity standards:</amend><subsection ssid="7-2" dnum="_-o:a-i" numlevel="1" lineno="163" slineno="3-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1073" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">implement strong authentication for all staff, administrators, and authorized users <ln numlevel="1" lineno="164" slineno="3-7"/>accessing LEA systems containing personal data or sensitive information;</amend></subsection><subsection ssid="7-3" dnum="_-o:b-i" numlevel="1" lineno="165" slineno="3-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1074" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">designate at least one individual with defined responsibility for overseeing and <ln numlevel="1" lineno="166" slineno="3-9"/>implementing the LEA's cyber defense plan;</amend></subsection><subsection ssid="7-4" dnum="_-o:c-i" numlevel="1" lineno="167" slineno="3-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1075" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">implement endpoint detection and response or equivalent advanced endpoint <ln numlevel="1" lineno="168" slineno="3-11"/>protection across all LEA-managed devices;</amend></subsection><subsection ssid="7-5" dnum="_-o:d-i" numlevel="1" lineno="169" slineno="3-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1076" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">provide annual cybersecurity awareness training for all staff, including training on:</amend><subsection ssid="7-6" dnum="_-o:i-i" numlevel="1" lineno="170" slineno="3-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1077" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">identifying and reporting phishing attempts;</amend></subsection><subsection ssid="7-7" dnum="_-o:ii-i" numlevel="1" lineno="171" slineno="3-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1078" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">strong authentication practices;</amend></subsection><subsection ssid="7-8" dnum="_-o:iii-i" numlevel="1" lineno="172" slineno="3-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1079" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">safe data handling procedures; and</amend></subsection><subsection ssid="7-9" dnum="_-o:iv-i" numlevel="1" lineno="173" slineno="3-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1080" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="47" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">reporting suspicious activity;</amend></subsection></subsection><subsection ssid="7-10" dnum="_-o:e-i" numlevel="1" lineno="174" slineno="3-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1081" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="52" groupid="41" style="1" owner="jchristopherson" level="1" amendtag="end">establish and maintain regular patch management cycles for all operating systems <ln numlevel="1" lineno="175" slineno="3-18"/>and applications, with documentation of compliance;</amend></subsection><subsection ssid="7-11" dnum="_-o:f-i" numlevel="1" lineno="176" slineno="3-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1082" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="57" groupid="45" style="1" owner="jchristopherson" level="1" amendtag="end">maintain regular, immutable backups with:</amend><subsection ssid="7-12" dnum="_-o:i-i" numlevel="1" lineno="177" slineno="3-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1083" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="62" groupid="49" style="1" owner="jchristopherson" level="1" amendtag="end">redundant storage locations;</amend></subsection><subsection ssid="7-13" dnum="_-o:ii-i" numlevel="1" lineno="178" slineno="3-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1084" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="67" groupid="53" style="1" owner="jchristopherson" level="1" amendtag="end">encrypted backup files;</amend></subsection><subsection ssid="7-14" dnum="_-o:iii-i" numlevel="1" lineno="179" slineno="3-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1085" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="72" groupid="57" style="1" owner="jchristopherson" level="1" amendtag="end">regular testing of recovery procedures; and</amend></subsection><subsection ssid="7-15" dnum="_-o:iv-i" numlevel="1" lineno="180" slineno="3-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1086" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="77" groupid="61" style="1" owner="jchristopherson" level="1" amendtag="end">documentation of backup and recovery processes;</amend></subsection></subsection><subsection ssid="7-16" dnum="_-o:g-i" numlevel="1" lineno="181" slineno="3-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1087" style="1" owner="i" level="1" amendtag="start">(g)</amend></display><amend anum="0" ea="amend" pairid="82" groupid="65" style="1" owner="jchristopherson" level="1" amendtag="end">develop and maintain a documented incident response plan that:</amend><subsection ssid="7-17" dnum="_-o:i-i" numlevel="1" lineno="182" slineno="3-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1088" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="87" groupid="69" style="1" owner="jchristopherson" level="1" amendtag="end">aligns with the CIS Controls or equivalent cybersecurity frameworks;</amend></subsection><subsection ssid="7-18" dnum="_-o:ii-i" numlevel="1" lineno="183" slineno="3-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1089" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="92" groupid="73" style="1" owner="jchristopherson" level="1" amendtag="end">includes clear roles and responsibilities;</amend></subsection><subsection ssid="7-19" dnum="_-o:iii-i" numlevel="1" lineno="184" slineno="3-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1090" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="97" groupid="77" style="1" owner="jchristopherson" level="1" amendtag="end">establishes communication protocols with the Cyber Center; and</amend></subsection><subsection ssid="7-20" dnum="_-o:iv-i" numlevel="1" lineno="185" slineno="3-28" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1091" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="102" groupid="81" style="1" owner="jchristopherson" level="1" amendtag="end">is tested through regular tabletop exercises at least annually; and</amend></subsection></subsection><subsection ssid="7-21" dnum="_-o:h-i" numlevel="1" lineno="186" slineno="3-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1092" style="1" owner="i" level="1" amendtag="start">(h)</amend></display><amend anum="0" ea="amend" pairid="107" groupid="85" style="1" owner="jchristopherson" level="1" amendtag="end">strengthen oversight of third-party vendors by:</amend><subsection ssid="7-22" dnum="_-o:i-i" numlevel="1" lineno="187" slineno="3-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1093" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="112" groupid="89" style="1" owner="jchristopherson" level="1" amendtag="end">maintaining current inventories of all vendors with access to student or staff <ln numlevel="1" lineno="188" slineno="3-31"/>personal data;</amend></subsection><subsection ssid="7-23" dnum="_-o:ii-i" numlevel="1" lineno="189" slineno="3-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1094" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="117" groupid="93" style="1" owner="jchristopherson" level="1" amendtag="end">ensuring all vendor agreements include appropriate data protection clauses;</amend></subsection><subsection ssid="7-24" dnum="_-o:iii-i" numlevel="1" lineno="190" slineno="3-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1095" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="122" groupid="97" style="1" owner="jchristopherson" level="1" amendtag="end">conducting regular reviews of vendor security practices; and</amend></subsection><subsection ssid="7-25" dnum="_-o:iv-i" numlevel="1" lineno="191" slineno="3-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1096" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="127" groupid="101" style="1" owner="jchristopherson" level="1" amendtag="end">ensuring compliance with the state's student data privacy laws.</amend></subsection></subsection></subsection><subsection ssid="7-26" dnum="_-o:2-i" numlevel="1" lineno="192" slineno="3-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1097" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="129" groupid="103" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall report any data breach to the Cyber Center in accordance with Section <xref depth="3" refnumber="63A-19-405"><ln numlevel="1" lineno="193" slineno="3-36"/>63A-19-405</xref>.</amend></subsection><subsection ssid="7-27" dnum="_-o:3-i" numlevel="1" lineno="194" slineno="3-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1098" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="137" groupid="109" style="1" owner="jchristopherson" level="1" amendtag="end">In addition to the requirements in Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>, an LEA shall:</amend><subsection ssid="7-28" dnum="_-o:a-i" numlevel="1" lineno="195" slineno="3-38" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1099" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="142" groupid="113" style="1" owner="jchristopherson" level="1" amendtag="end">notify the state board within 24 hours of discovering the data breach;</amend></subsection><subsection ssid="7-29" dnum="_-o:b-i" numlevel="1" lineno="196" slineno="3-39" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1100" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="147" groupid="117" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with UETN if the data breach involves network infrastructure or services <ln numlevel="1" lineno="197" slineno="3-40"/>provided by UETN; and</amend></subsection><subsection ssid="7-30" dnum="_-o:c-i" numlevel="1" lineno="198" slineno="3-41" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1101" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="152" groupid="121" style="1" owner="jchristopherson" level="1" amendtag="end"> cooperate with the Cyber Center's investigation and response efforts.</amend></subsection></subsection><subsection ssid="7-31" dnum="_-o:4-i" numlevel="1" lineno="199" slineno="3-42" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1102" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="156" groupid="124" style="1" owner="jchristopherson" level="1" amendtag="end">The Cyber Center shall provide assistance to an LEA in the same manner the Cyber <ln numlevel="1" lineno="200" slineno="3-43"/>Center does for any governmental entity as described in Title 63A, Chapter 16, Part 11, <ln numlevel="1" lineno="201" slineno="3-44"/>Utah Cyber Center.</amend></subsection><subsection ssid="7-32" dnum="_-o:5-i" numlevel="1" lineno="202" slineno="3-45" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1103" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="160" groupid="127" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall:</amend><subsection ssid="7-33" dnum="_-o:a-i" numlevel="1" lineno="203" slineno="3-46" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1104" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="166" groupid="132" style="1" owner="jchristopherson" level="1" amendtag="end">participate in cybersecurity information sharing initiatives coordinated by the Cyber <ln numlevel="1" lineno="204" slineno="3-47"/>Center;</amend></subsection><subsection ssid="7-34" dnum="_-o:b-i" numlevel="1" lineno="205" slineno="3-48" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1105" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="170" groupid="135" style="1" owner="jchristopherson" level="1" amendtag="end">designate a primary point of contact for cybersecurity matters who shall interface <ln numlevel="1" lineno="206" slineno="3-49"/>with the Cyber Center and UETN; and</amend></subsection><subsection ssid="7-35" dnum="_-o:c-i" numlevel="1" lineno="207" slineno="3-50" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1106" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="175" groupid="139" style="1" owner="jchristopherson" level="1" amendtag="end">cooperate with statewide cybersecurity assessments and improvement initiatives.</amend></subsection></subsection></section></bsec><bsec buid="8" num="53G-8-903" type="enact" src="code" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" numlevel="1" lineno="208" slineno="4-1" sn="4"><section numlevel="1" lineno="209" slineno="4-2" number="53G-8-903" type="enact"><secline lineno="208">Section 4. Section <bold>53G-8-903</bold> is enacted to read:</secline><catline lineno="209"><bold>53G-8-903<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Coordination between Utah Cyber Center and <ln numlevel="1" lineno="210" slineno="4-3"/>Utah Education and Telehealth Network.</bold></catline><subsection ssid="8-1" dnum="_-o:1-i" numlevel="1" lineno="211" slineno="4-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1107" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">The Cyber Center and UETN shall coordinate each entity's respective services to an <ln numlevel="1" lineno="212" slineno="4-5"/>LEA according to the division of responsibilities described in this section.</amend></subsection><subsection ssid="8-2" dnum="_-o:2-i" numlevel="1" lineno="213" slineno="4-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1108" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="7" style="1" owner="jchristopherson" level="1" amendtag="end">In accordance with Section <xref depth="3" refnumber="53H-4-213.4">53H-4-213.4</xref>, UETN shall be responsible for network <ln numlevel="1" lineno="214" slineno="4-7"/>infrastructure and connectivity, including:</amend><subsection ssid="8-3" dnum="_-o:a-i" numlevel="1" lineno="215" slineno="4-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1109" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="end">providing and maintaining the physical network infrastructure and Internet <ln numlevel="1" lineno="216" slineno="4-9"/>connectivity for an LEA;</amend></subsection><subsection ssid="8-4" dnum="_-o:b-i" numlevel="1" lineno="217" slineno="4-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1110" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="15" style="1" owner="jchristopherson" level="1" amendtag="end">implementing network-level security controls including firewalls, network <ln numlevel="1" lineno="218" slineno="4-11"/>segmentation, and traffic monitoring at the infrastructure level;</amend></subsection><subsection ssid="8-5" dnum="_-o:c-i" numlevel="1" lineno="219" slineno="4-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1111" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="19" style="1" owner="jchristopherson" level="1" amendtag="end">procuring, installing, and maintaining telecommunication services and equipment on <ln numlevel="1" lineno="220" slineno="4-13"/>behalf of an LEA;</amend></subsection><subsection ssid="8-6" dnum="_-o:d-i" numlevel="1" lineno="221" slineno="4-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1112" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="23" style="1" owner="jchristopherson" level="1" amendtag="end">providing technical support for network connectivity issues;</amend></subsection><subsection ssid="8-7" dnum="_-o:e-i" numlevel="1" lineno="222" slineno="4-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1113" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="27" style="1" owner="jchristopherson" level="1" amendtag="end">coordinating with the Cyber Center when network infrastructure is involved in a data <ln numlevel="1" lineno="223" slineno="4-16"/>breach or security incident; and</amend></subsection><subsection ssid="8-8" dnum="_-o:f-i" numlevel="1" lineno="224" slineno="4-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1114" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="31" style="1" owner="jchristopherson" level="1" amendtag="end">implementing network-level security policies that complement the cybersecurity <ln numlevel="1" lineno="225" slineno="4-18"/>standards required under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>.</amend></subsection></subsection><subsection ssid="8-9" dnum="_-o:3-i" numlevel="1" lineno="226" slineno="4-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1115" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="46" groupid="34" style="1" owner="jchristopherson" level="1" amendtag="end">In accordance with Title 63A, Chapter 16, Part 11, Utah Cyber Center, the Cyber Center <ln numlevel="1" lineno="227" slineno="4-20"/>shall be responsible for a cybersecurity strategy and incident response, including:</amend><subsection ssid="8-10" dnum="_-o:a-i" numlevel="1" lineno="228" slineno="4-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1116" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="51" groupid="38" style="1" owner="jchristopherson" level="1" amendtag="end">developing and maintaining cybersecurity standards and best practices for an LEA as <ln numlevel="1" lineno="229" slineno="4-22"/>required under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>;</amend></subsection><subsection ssid="8-11" dnum="_-o:b-i" numlevel="1" lineno="230" slineno="4-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1117" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="56" groupid="42" style="1" owner="jchristopherson" level="1" amendtag="end">providing cybersecurity incident response services when an LEA experiences a data <ln numlevel="1" lineno="231" slineno="4-24"/>breach;</amend></subsection><subsection ssid="8-12" dnum="_-o:c-i" numlevel="1" lineno="232" slineno="4-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1118" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="61" groupid="46" style="1" owner="jchristopherson" level="1" amendtag="end">conducting cybersecurity assessments and vulnerability testing of an LEA's systems;</amend></subsection><subsection ssid="8-13" dnum="_-o:d-i" numlevel="1" lineno="233" slineno="4-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1119" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="66" groupid="50" style="1" owner="jchristopherson" level="1" amendtag="end">providing threat intelligence and security alerts to an LEA;</amend></subsection><subsection ssid="8-14" dnum="_-o:e-i" numlevel="1" lineno="234" slineno="4-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1120" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="71" groupid="54" style="1" owner="jchristopherson" level="1" amendtag="end">delivering cybersecurity awareness training and resources to an LEA and all relevant <ln numlevel="1" lineno="235" slineno="4-28"/>staff as the Cyber Center determines;</amend></subsection><subsection ssid="8-15" dnum="_-o:f-i" numlevel="1" lineno="236" slineno="4-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1121" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="76" groupid="58" style="1" owner="jchristopherson" level="1" amendtag="end">coordinating with UETN when incidents involve network infrastructure; and</amend></subsection><subsection ssid="8-16" dnum="_-o:g-i" numlevel="1" lineno="237" slineno="4-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1122" style="1" owner="i" level="1" amendtag="start">(g)</amend></display><amend anum="0" ea="amend" pairid="81" groupid="62" style="1" owner="jchristopherson" level="1" amendtag="end">maintaining the statewide incident response repository for education-related security <ln numlevel="1" lineno="238" slineno="4-31"/>breaches.</amend></subsection></subsection><subsection ssid="8-17" dnum="_-o:4-i" numlevel="1" lineno="239" slineno="4-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1123" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="115" groupid="89" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall:</amend><subsection ssid="8-30" dnum="_-o:a-i" numlevel="1" lineno="240" slineno="4-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1124" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="144" groupid="110" style="1" owner="jchristopherson" level="1" amendtag="end">comply with all cybersecurity requirements established in Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>;</amend></subsection><subsection ssid="8-31" dnum="_-o:b-i" numlevel="1" lineno="241" slineno="4-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1125" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="149" groupid="114" style="1" owner="jchristopherson" level="1" amendtag="end">designate a primary cybersecurity contact who interfaces with both the Cyber Center <ln numlevel="1" lineno="242" slineno="4-35"/>for security matters and UETN for network infrastructure matters;</amend></subsection><subsection ssid="8-32" dnum="_-o:c-i" numlevel="1" lineno="243" slineno="4-36" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1126" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="154" groupid="118" style="1" owner="jchristopherson" level="1" amendtag="end">report data breaches to the Cyber Center as required under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>;</amend></subsection><subsection ssid="8-33" dnum="_-o:d-i" numlevel="1" lineno="244" slineno="4-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1127" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="159" groupid="122" style="1" owner="jchristopherson" level="1" amendtag="end">report network infrastructure issues to UETN; and</amend></subsection><subsection ssid="8-34" dnum="_-o:e-i" numlevel="1" lineno="245" slineno="4-38" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1128" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="164" groupid="126" style="1" owner="jchristopherson" level="1" amendtag="end">participate in security initiatives coordinated by both entities within each entity's <ln numlevel="1" lineno="246" slineno="4-39"/>respective areas of responsibility.</amend></subsection></subsection><subsection ssid="8-35" dnum="_-o:5-i" numlevel="1" lineno="247" slineno="4-40" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1129" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><subsection ssid="8-36" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1130" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="171" groupid="130" style="1" owner="jchristopherson" level="1" amendtag="end">A regional education service agency, as that term is defined in Section <xref depth="3" refnumber="53G-4-410">53G-4-410</xref>, <ln numlevel="1" lineno="248" slineno="4-41"/>may serve as the designated primary cybersecurity contact for multiple LEAs within <ln numlevel="1" lineno="249" slineno="4-42"/>the service area.</amend></subsection><subsection ssid="8-37" dnum="_-o:b-i" numlevel="1" lineno="250" slineno="4-43" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1131" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="176" groupid="134" style="1" owner="jchristopherson" level="1" amendtag="end">If a regional education service agency serves as the primary contact under Subsection <xref depth="4" refnumber="53G-8-903(5)(a)"><ln numlevel="1" lineno="251" slineno="4-44"/>(5)(a)</xref>, the agency shall:</amend><subsection ssid="8-38" dnum="_-o:i-i" numlevel="1" lineno="252" slineno="4-45" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1132" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="181" groupid="138" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with the Cyber Center and UETN on behalf of the participating LEAs;</amend></subsection><subsection ssid="8-39" dnum="_-o:ii-i" numlevel="1" lineno="253" slineno="4-46" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1133" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="186" groupid="142" style="1" owner="jchristopherson" level="1" amendtag="end">ensure each participating LEA meets the requirements of Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>; and</amend></subsection><subsection ssid="8-40" dnum="_-o:iii-i" numlevel="1" lineno="254" slineno="4-47" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1134" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="191" groupid="146" style="1" owner="jchristopherson" level="1" amendtag="end">maintain documentation of cybersecurity services provided to each LEA.</amend></subsection></subsection></subsection><subsection ssid="8-24" dnum="_-o:6-i" numlevel="1" lineno="255" slineno="4-48" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1135" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="116" groupid="90" style="1" owner="jchristopherson" level="1" amendtag="end">The state board shall: </amend><subsection ssid="8-25" dnum="_-o:a-i" numlevel="1" lineno="256" slineno="4-49" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1136" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="123" groupid="95" style="1" owner="jchristopherson" level="1" amendtag="end"> in consultation with both the Cyber Center and UETN:</amend><subsection ssid="8-28" dnum="_-o:i-i" numlevel="1" lineno="257" slineno="4-50" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1137" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="135" groupid="103" style="1" owner="jchristopherson" level="1" amendtag="end">develop implementation guidelines that clearly delineate which entity provides <ln numlevel="1" lineno="258" slineno="4-51"/>specific services; and</amend></subsection><subsection ssid="8-29" dnum="_-o:ii-i" numlevel="1" lineno="259" slineno="4-52" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1138" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="139" groupid="106" style="1" owner="jchristopherson" level="1" amendtag="end">establish a method to assess compliance with this part; and</amend></subsection></subsection><subsection ssid="8-26" dnum="_-o:b-i" numlevel="1" lineno="260" slineno="4-53" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1139" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="128" groupid="99" style="1" owner="jchristopherson" level="1" amendtag="end">ensure coordination between the two entities to avoid duplication of services.</amend></subsection></subsection></section></bsec><bsec buid="22" num="53H-4-213.4" type="amend" src="code" uid="C53H-4-S213.4_2026050620260506" sort="53H04 02130420260506" numlevel="1" lineno="261" slineno="5-1" sn="5"><section number="53H-4-213.4" numlevel="1" lineno="262" slineno="5-2" type="amend"><secline lineno="261">Section 5. Section <bold>53H-4-213.4</bold> is amended to read:</secline><catline lineno="262"><bold>53H-4-213.4<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Educational telecommunications -- Utah <ln numlevel="1" lineno="263" slineno="5-3"/>Education and Telehealth Network.</bold></catline><subsection ssid="22-null-1" dnum="1-o" numlevel="1" lineno="264" slineno="5-4" level="1" placement="noreturn"><display>(1)</display>There is created the Utah Education and Telehealth Network, or UETN.</subsection><subsection ssid="22-null-2" dnum="2-o" numlevel="1" lineno="265" slineno="5-5" level="1"><display>(2)</display>UETN shall:<subsection ssid="22-null-3" dnum="a-o" numlevel="1" lineno="266" slineno="5-6" level="2"><display>(a)</display>coordinate and support the telecommunications needs of public and higher education, <ln numlevel="1" lineno="267" slineno="5-7"/>public libraries, and entities affiliated with the state systems of public and higher <ln numlevel="1" lineno="268" slineno="5-8"/>education as approved by the Utah Education and Telehealth Network Board, <ln numlevel="1" lineno="269" slineno="5-9"/>including the statewide development and implementation of a network for education, <ln numlevel="1" lineno="270" slineno="5-10"/>which utilizes satellite, microwave, fiber-optic, broadcast, and other transmission <ln numlevel="1" lineno="271" slineno="5-11"/>media;</subsection><subsection ssid="22-null-4" dnum="b-o" numlevel="1" lineno="272" slineno="5-12" level="2"><display>(b)</display>coordinate the various telecommunications technology initiatives of public and <ln numlevel="1" lineno="273" slineno="5-13"/>higher education;</subsection><subsection ssid="22-null-5" dnum="c-o" numlevel="1" lineno="274" slineno="5-14" level="2"><display>(c)</display>provide high-quality, cost-effective Internet access and appropriate interface <ln numlevel="1" lineno="275" slineno="5-15"/>equipment for schools and school systems;</subsection><subsection ssid="22-null-6" dnum="d-o" numlevel="1" lineno="276" slineno="5-16" level="2"><display>(d)</display>procure, install, and maintain telecommunication services and equipment on behalf <ln numlevel="1" lineno="277" slineno="5-17"/>of public and higher education;</subsection><subsection ssid="22-null-7" dnum="e-o" numlevel="1" lineno="278" slineno="5-18" level="2"><display>(e)</display>develop or implement other programs or services for the delivery of distance learning <ln numlevel="1" lineno="279" slineno="5-19"/>and telehealth services as directed by law;</subsection><subsection ssid="22-null-8" dnum="f-o" numlevel="1" lineno="280" slineno="5-20" level="2"><display>(f)</display>apply for state and federal funding on behalf of:<subsection ssid="22-null-9" dnum="i-o" numlevel="1" lineno="281" slineno="5-21" level="3"><display>(i)</display>public and higher education; and</subsection><subsection ssid="22-null-10" dnum="ii-o" numlevel="1" lineno="282" slineno="5-22" level="3"><display>(ii)</display>telehealth services;</subsection></subsection><subsection ssid="22-null-11" dnum="g-o" numlevel="1" lineno="283" slineno="5-23" level="2"><display>(g)</display>in consultation with health care providers from a variety of health care systems, <ln numlevel="1" lineno="284" slineno="5-24"/>explore and encourage the development of telehealth services as a means of reducing <ln numlevel="1" lineno="285" slineno="5-25"/>health care costs and increasing health care quality and access, with emphasis on <ln numlevel="1" lineno="286" slineno="5-26"/>assisting rural health care providers and special populations; <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="9" groupid="8" style="2" owner="jchristopherson" level="1" deltag="both">and</amend><amendoutend style="2"/></subsection><subsection ssid="22-null-12" dnum="h-o" numlevel="1" lineno="287" slineno="5-27" level="2"><display>(h)</display>in consultation with the Department of Health and Human Services, advise the <ln numlevel="1" lineno="288" slineno="5-28"/>governor and the Legislature on:<subsection ssid="22-null-13" dnum="i-o" numlevel="1" lineno="289" slineno="5-29" level="3"><display>(i)</display>the role of telehealth in the state;</subsection><subsection ssid="22-null-14" dnum="ii-o" numlevel="1" lineno="290" slineno="5-30" level="3"><display>(ii)</display>the policy issues related to telehealth;</subsection><subsection ssid="22-null-15" dnum="iii-o" numlevel="1" lineno="291" slineno="5-31" level="3"><display>(iii)</display>the changing telehealth needs and resources in the state; and</subsection><subsection ssid="22-null-16" dnum="iv-o" numlevel="1" lineno="292" slineno="5-32" level="3"><display>(iv)</display>state budgetary matters related to telehealth<amendoutstart style="2"/><amend anum="0" ea="erase" pairid="10" groupid="9" style="2" owner="jchristopherson" level="1" deltag="both">.</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="7" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">; and</amend></subsection></subsection><subsection ssid="22-58" dnum="_-o:i-i" numlevel="1" lineno="293" slineno="5-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1156" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref> to:</amend><subsection ssid="22-59" dnum="_-o:i-i" numlevel="1" lineno="294" slineno="5-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1157" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="end">implement network-level security controls for local education agencies;</amend></subsection><subsection ssid="22-60" dnum="_-o:ii-i" numlevel="1" lineno="295" slineno="5-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1158" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="15" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">support cybersecurity incident response when network infrastructure is affected; <ln numlevel="1" lineno="296" slineno="5-36"/>and</amend></subsection><subsection ssid="22-61" dnum="_-o:iii-i" numlevel="1" lineno="297" slineno="5-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1159" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="18" groupid="15" style="1" owner="jchristopherson" level="1" amendtag="end">ensure alignment between network infrastructure and cybersecurity standards <ln numlevel="1" lineno="298" slineno="5-38"/>required under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>.</amend></subsection></subsection></subsection><subsection ssid="22-null-17" dnum="3-o" numlevel="1" lineno="299" slineno="5-39" level="1"><display>(3)</display>In performing the duties under Subsection <xref depth="4" refnumber="53B-17-105(2)" start="0">(2)</xref>, UETN shall:<subsection ssid="22-null-18" dnum="a-o" numlevel="1" lineno="300" slineno="5-40" level="2"><display>(a)</display>provide services to schools, school districts, and the public and higher education <ln numlevel="1" lineno="301" slineno="5-41"/>systems through an open and competitive bidding process;</subsection><subsection ssid="22-null-19" dnum="b-o" numlevel="1" lineno="302" slineno="5-42" level="2"><display>(b)</display>work with the private sector to deliver high-quality, cost-effective services;</subsection><subsection ssid="22-null-20" dnum="c-o" numlevel="1" lineno="303" slineno="5-43" level="2"><display>(c)</display>avoid duplicating facilities, equipment, or services of private providers or public <ln numlevel="1" lineno="304" slineno="5-44"/>telecommunications service, as defined under Section <xref depth="3" refnumber="54-8b-2" start="0">54-8b-2</xref>;</subsection><subsection ssid="22-null-21" dnum="d-o" numlevel="1" lineno="305" slineno="5-45" level="2"><display>(d)</display>utilize statewide economic development criteria in the design and implementation of <ln numlevel="1" lineno="306" slineno="5-46"/>the educational telecommunications infrastructure; and</subsection><subsection ssid="22-null-22" dnum="e-o" numlevel="1" lineno="307" slineno="5-47" level="2"><display>(e)</display>assure that public service entities, such as educators, public service providers, and <ln numlevel="1" lineno="308" slineno="5-48"/>public broadcasters, are provided access to the telecommunications infrastructure <ln numlevel="1" lineno="309" slineno="5-49"/>developed in the state.</subsection></subsection><subsection ssid="22-null-23" dnum="4-o" numlevel="1" lineno="310" slineno="5-50" level="1"><display>(4)</display>The University of Utah shall provide administrative support for UETN.</subsection><subsection ssid="22-null-24" dnum="5-o" numlevel="1" lineno="311" slineno="5-51" level="1" space="false"><display>(5)</display><subsection ssid="22-null-25" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The Utah Education and Telehealth Network Board, which is the governing board <ln numlevel="1" lineno="312" slineno="5-52"/>for UETN, is created.</subsection><subsection ssid="22-null-26" dnum="b-o" numlevel="1" lineno="313" slineno="5-53" level="2"><display>(b)</display>The Utah Education and Telehealth Network Board shall have 13 members as <ln numlevel="1" lineno="314" slineno="5-54"/>follows:<subsection ssid="22-null-27" dnum="i-o" numlevel="1" lineno="315" slineno="5-55" level="3"><display>(i)</display>five members representing the state system of higher education, of which at least <ln numlevel="1" lineno="316" slineno="5-56"/>one member represents technical colleges, appointed by the commissioner of <ln numlevel="1" lineno="317" slineno="5-57"/>higher education;</subsection><subsection ssid="22-null-28" dnum="ii-o" numlevel="1" lineno="318" slineno="5-58" level="3"><display>(ii)</display>four members representing the state system of public education appointed by the <ln numlevel="1" lineno="319" slineno="5-59"/>State Board of Education;</subsection><subsection ssid="22-null-29" dnum="iii-o" numlevel="1" lineno="320" slineno="5-60" level="3"><display>(iii)</display>one member representing the state library appointed by the state librarian;</subsection><subsection ssid="22-null-30" dnum="iv-o" numlevel="1" lineno="321" slineno="5-61" level="3"><display>(iv)</display>two members representing hospitals as follows:<subsection ssid="22-null-31" dnum="A-o" numlevel="1" lineno="322" slineno="5-62" level="4"><display>(A)</display>the members may not be employed by the same hospital system;</subsection><subsection ssid="22-null-32" dnum="B-o" numlevel="1" lineno="323" slineno="5-63" level="4"><display>(B)</display>one member shall represent a rural hospital;</subsection><subsection ssid="22-null-33" dnum="C-o" numlevel="1" lineno="324" slineno="5-64" level="4"><display>(C)</display>one member shall represent an urban hospital; and</subsection><subsection ssid="22-null-34" dnum="D-o" numlevel="1" lineno="325" slineno="5-65" level="4"><display>(D)</display>the chief administrator or the administrator's designee for each hospital <ln numlevel="1" lineno="326" slineno="5-66"/>licensed in this state shall select the two hospital representatives; and</subsection></subsection><subsection ssid="22-null-35" dnum="v-o" numlevel="1" lineno="327" slineno="5-67" level="3"><display>(v)</display>one member representing the office of the governor, appointed by the governor.</subsection></subsection><subsection ssid="22-null-36" dnum="c-o" numlevel="1" lineno="328" slineno="5-68" level="2"><display>(c)</display>When a vacancy occurs in the membership for any reason, the replacement shall be <ln numlevel="1" lineno="329" slineno="5-69"/>appointed for the unexpired term.</subsection><subsection ssid="22-null-37" dnum="d-o" numlevel="1" lineno="330" slineno="5-70" level="2" space="false"><display>(d)</display><subsection ssid="22-null-38" dnum="i-o" level="3" placement="sameline"><display>(i)</display>The Utah Education and Telehealth Network Board shall elect a chair.</subsection><subsection ssid="22-null-39" dnum="ii-o" numlevel="1" lineno="331" slineno="5-71" level="3"><display>(ii)</display>The chair shall set the agenda for the Utah Education and Telehealth Network <ln numlevel="1" lineno="332" slineno="5-72"/>Board meetings.</subsection></subsection></subsection><subsection ssid="22-null-40" dnum="6-o" numlevel="1" lineno="333" slineno="5-73" level="1"><display>(6)</display>A member of the Utah Education and Telehealth Network Board may not receive <ln numlevel="1" lineno="334" slineno="5-74"/>compensation or benefits for the member's service, but may receive per diem and travel <ln numlevel="1" lineno="335" slineno="5-75"/>expenses in accordance with:<subsection ssid="22-null-41" dnum="a-o" numlevel="1" lineno="336" slineno="5-76" level="2"><display>(a)</display>Section <xref depth="3" refnumber="63A-3-106" start="0">63A-3-106</xref>;</subsection><subsection ssid="22-null-42" dnum="b-o" numlevel="1" lineno="337" slineno="5-77" level="2"><display>(b)</display>Section <xref depth="3" refnumber="63A-3-107" start="0">63A-3-107</xref>; and</subsection><subsection ssid="22-null-43" dnum="c-o" numlevel="1" lineno="338" slineno="5-78" level="2"><display>(c)</display>rules made by the Division of Finance pursuant to Sections <xref depth="3" refnumber="63A-3-106" start="0">63A-3-106</xref> and <xref depth="3" refnumber="63A-3-107" start="0"><ln numlevel="1" lineno="339" slineno="5-79"/>63A-3-107</xref>.</subsection></subsection><subsection ssid="22-null-44" dnum="7-o" numlevel="1" lineno="340" slineno="5-80" level="1"><display>(7)</display>The Utah Education and Telehealth Network Board:<subsection ssid="22-null-45" dnum="a-o" numlevel="1" lineno="341" slineno="5-81" level="2"><display>(a)</display>shall hire an executive director for UETN who may hire staff for UETN as permitted <ln numlevel="1" lineno="342" slineno="5-82"/>by the budget;</subsection><subsection ssid="22-null-46" dnum="b-o" numlevel="1" lineno="343" slineno="5-83" level="2"><display>(b)</display>may terminate the executive director's employment or assignment;</subsection><subsection ssid="22-null-47" dnum="c-o" numlevel="1" lineno="344" slineno="5-84" level="2"><display>(c)</display>shall determine the executive director's salary;</subsection><subsection ssid="22-null-48" dnum="d-o" numlevel="1" lineno="345" slineno="5-85" level="2"><display>(d)</display>shall annually conduct a performance evaluation of the executive director;</subsection><subsection ssid="22-null-49" dnum="e-o" numlevel="1" lineno="346" slineno="5-86" level="2"><display>(e)</display>shall establish policies the Utah Education and Telehealth Network Board determines <ln numlevel="1" lineno="347" slineno="5-87"/>are necessary for the operation of UETN and the administration of UETN's duties; <ln numlevel="1" lineno="348" slineno="5-88"/>and</subsection><subsection ssid="22-null-50" dnum="f-o" numlevel="1" lineno="349" slineno="5-89" level="2"><display>(f)</display>shall advise UETN in:<subsection ssid="22-null-51" dnum="i-o" numlevel="1" lineno="350" slineno="5-90" level="3"><display>(i)</display>the development and operation of a coordinated, statewide, multi-option <ln numlevel="1" lineno="351" slineno="5-91"/>telecommunications system to assist in the delivery of educational services and <ln numlevel="1" lineno="352" slineno="5-92"/>telehealth services throughout the state; and</subsection><subsection ssid="22-null-52" dnum="ii-o" numlevel="1" lineno="353" slineno="5-93" level="3"><display>(ii)</display>acquiring, producing, and distributing instructional content.</subsection></subsection></subsection><subsection ssid="22-null-53" dnum="8-o" numlevel="1" lineno="354" slineno="5-94" level="1"><display>(8)</display>The executive director of UETN shall be an at-will employee.</subsection><subsection ssid="22-null-54" dnum="9-o" numlevel="1" lineno="355" slineno="5-95" level="1"><display>(9)</display>UETN shall locate and maintain educational and telehealth telecommunication <ln numlevel="1" lineno="356" slineno="5-96"/>infrastructure throughout the state.</subsection><subsection ssid="22-null-55" dnum="10-o" numlevel="1" lineno="357" slineno="5-97" level="1"><display>(10)</display>Educational institutions shall manage site operations under policy established by <ln numlevel="1" lineno="358" slineno="5-98"/>UETN.</subsection><subsection ssid="22-null-56" dnum="11-o" numlevel="1" lineno="359" slineno="5-99" level="1"><display>(11)</display>Subject to future budget constraints, the Legislature shall provide an annual <ln numlevel="1" lineno="360" slineno="5-100"/>appropriation to operate UETN.</subsection><subsection ssid="22-null-57" dnum="12-o" numlevel="1" lineno="361" slineno="5-101" level="1"><display>(12)</display>If the network operated by the Division of Technology Services is not available, <ln numlevel="1" lineno="362" slineno="5-102"/>UETN may provide network connections to the central administration of counties and <ln numlevel="1" lineno="363" slineno="5-103"/>municipalities for the sole purpose of transferring data to a secure facility for backup and <ln numlevel="1" lineno="364" slineno="5-104"/>disaster recovery.</subsection></section></bsec><bsec buid="1" num="63A-16-1101" type="amend" src="code" uid="C63A-16-S1101_2026050620260506" sort="63A16 11010020260506" numlevel="1" lineno="365" slineno="6-1" sn="6"><section number="63A-16-1101" numlevel="1" lineno="366" slineno="6-2" type="amend"><secline lineno="365">Section 6. Section <bold>63A-16-1101</bold> is amended to read:</secline><catline lineno="366"><bold>63A-16-1101<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Definitions.</bold></catline><sectionText lineno="367"><tab/>As used in this part:</sectionText><subsection ssid="1-null-1" dnum="1-o" numlevel="1" lineno="368" slineno="6-4" level="1"><display>(1)</display>"Cyber Center" means the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref>.</subsection><subsection ssid="1-null-2" dnum="2-o" numlevel="1" lineno="369" slineno="6-5" level="1"><display>(2)</display>"Data breach" means the unauthorized access, acquisition, disclosure, loss of access, or <ln numlevel="1" lineno="370" slineno="6-6"/>destruction of:<subsection ssid="1-null-3" dnum="a-o" numlevel="1" lineno="371" slineno="6-7" level="2"><display>(a)</display>personal data affecting 500 or more individuals; or</subsection><subsection ssid="1-null-4" dnum="b-o" numlevel="1" lineno="372" slineno="6-8" level="2"><display>(b)</display>data that compromises the security, confidentiality, availability, or integrity of the <ln numlevel="1" lineno="373" slineno="6-9"/>computer systems used or information maintained by the governmental entity.</subsection></subsection><subsection ssid="1-null-5" dnum="3-o" numlevel="1" lineno="374" slineno="6-10" level="1"><display>(3)</display>"Governmental entity" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-103">63G-2-103</xref><amend anum="0" ea="amend" pairid="1" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both"> and <ln numlevel="1" lineno="375" slineno="6-11"/>includes a local education agency as that term is defined in Section <xref depth="3" refnumber="53E-1-102">53E-1-102</xref></amend>.</subsection><subsection ssid="1-null-6" dnum="4-o" numlevel="1" lineno="376" slineno="6-12" level="1"><display>(4)</display>"Personal data" means information that is linked or can be reasonably linked to an <ln numlevel="1" lineno="377" slineno="6-13"/>identified individual or an identifiable individual.</subsection><subsection ssid="1-8" dnum="_-o:5-i" numlevel="1" lineno="378" slineno="6-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1207" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="2" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">"Utah Education and Telehealth Network" or "UETN" means the network created in <ln numlevel="1" lineno="379" slineno="6-15"/>Section <xref depth="3" refnumber="53H-4-213.4">53H-4-213.4</xref>.</amend></subsection></section></bsec><bsec buid="25" num="63A-16-1102" type="amend" src="code" uid="C63A-16-S1102_2026050620260506" sort="63A16 11020020260506" numlevel="1" lineno="380" slineno="7-1" sn="7"><section number="63A-16-1102" numlevel="1" lineno="381" slineno="7-2" type="amend"><secline lineno="380">Section 7. Section <bold>63A-16-1102</bold> is amended to read:</secline><catline lineno="381"><bold>63A-16-1102<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Utah Cyber Center -- Creation -- Duties.</bold></catline><subsection ssid="25-null-1" dnum="1-o" numlevel="1" lineno="382" slineno="7-3" level="1" placement="noreturn" space="false"><display>(1)</display><subsection ssid="25-null-2" dnum="a-o" level="2" placement="sameline"><display>(a)</display>There is created within the division the Utah Cyber Center.</subsection><subsection ssid="25-null-3" dnum="b-o" numlevel="1" lineno="383" slineno="7-4" level="2"><display>(b)</display>The chief information security officer appointed under Section <xref depth="3" refnumber="63A-16-210">63A-16-210</xref> shall <ln numlevel="1" lineno="384" slineno="7-5"/>serve as the director of the Cyber Center.</subsection></subsection><subsection ssid="25-null-4" dnum="2-o" numlevel="1" lineno="385" slineno="7-6" level="1"><display>(2)</display>The division shall operate the Cyber Center in partnership with the following entities <ln numlevel="1" lineno="386" slineno="7-7"/>within the Department of Public Safety created in Section <xref depth="3" refnumber="53-1-103">53-1-103</xref>:<subsection ssid="25-null-5" dnum="a-o" numlevel="1" lineno="387" slineno="7-8" level="2"><display>(a)</display>the Statewide Information and Analysis Center;</subsection><subsection ssid="25-null-6" dnum="b-o" numlevel="1" lineno="388" slineno="7-9" level="2"><display>(b)</display>the State Bureau of Investigation created in Section <xref depth="3" refnumber="53-10-301">53-10-301</xref>; and</subsection><subsection ssid="25-null-7" dnum="c-o" numlevel="1" lineno="389" slineno="7-10" level="2"><display>(c)</display>the Division of Emergency Management created in Section <xref depth="3" refnumber="53-2a-103">53-2a-103</xref>.</subsection></subsection><subsection ssid="25-null-8" dnum="3-o" numlevel="1" lineno="390" slineno="7-11" level="1"><display>(3)</display>In addition to the entities described in Subsection <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="36" groupid="29" style="2" owner="jchristopherson" level="1" deltag="both"><xref depth="4" refnumber="63A-16-1102(3)">(3)</xref></amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="35" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">(2)</amend>, the Cyber Center shall <ln numlevel="1" lineno="391" slineno="7-12"/>collaborate with:<subsection ssid="25-null-9" dnum="a-o" numlevel="1" lineno="392" slineno="7-13" level="2"><display>(a)</display>the Cybersecurity Commission created in Section <xref depth="3" refnumber="63C-27-201">63C-27-201</xref>;</subsection><subsection ssid="25-null-10" dnum="b-o" numlevel="1" lineno="393" slineno="7-14" level="2"><display>(b)</display>the Office of the Attorney General;</subsection><subsection ssid="25-null-11" dnum="c-o" numlevel="1" lineno="394" slineno="7-15" level="2"><display>(c)</display>the Utah Education and Telehealth Network created in Section <xref depth="3" refnumber="53H-4-213.4">53H-4-213.4</xref>;</subsection><subsection ssid="25-null-12" dnum="d-o" numlevel="1" lineno="395" slineno="7-16" level="2"><display>(d)</display>appropriate federal partners, including the Federal Bureau of Investigation and the <ln numlevel="1" lineno="396" slineno="7-17"/>Cybersecurity and Infrastructure Security Agency;</subsection><subsection ssid="25-null-13" dnum="e-o" numlevel="1" lineno="397" slineno="7-18" level="2"><display>(e)</display>appropriate information sharing and analysis centers;</subsection><subsection ssid="25-null-14" dnum="f-o" numlevel="1" lineno="398" slineno="7-19" level="2"><display>(f)</display>information technology directors, cybersecurity professionals, or equivalent <ln numlevel="1" lineno="399" slineno="7-20"/>individuals representing political subdivisions<amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="both"> and local education agencies, as that <ln numlevel="1" lineno="400" slineno="7-21"/>term is defined in Section <xref depth="3" refnumber="53E-1-102">53E-1-102</xref>,</amend> in the state; and</subsection><subsection ssid="25-null-15" dnum="g-o" numlevel="1" lineno="401" slineno="7-22" level="2"><display>(g)</display>any other person the division believes is necessary to carry out the duties described <ln numlevel="1" lineno="402" slineno="7-23"/>in Subsection <xref depth="4" refnumber="63A-16-1102(4)">(4)</xref>.</subsection></subsection><subsection ssid="25-null-16" dnum="4-o" numlevel="1" lineno="403" slineno="7-24" level="1"><display>(4)</display>The Cyber Center shall, within legislative appropriations:<subsection ssid="25-null-17" dnum="a-o" numlevel="1" lineno="404" slineno="7-25" level="2"><display>(a)</display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="33" groupid="26" style="2" owner="jchristopherson" level="1" deltag="both">by June 30, 2024, </amend><amendoutend style="2"/>develop a statewide strategic cybersecurity plan for <ln numlevel="1" lineno="405" slineno="7-26"/>governmental entities;</subsection><subsection ssid="25-null-18" dnum="b-o" numlevel="1" lineno="406" slineno="7-27" level="2"><display>(b)</display>with respect to executive branch agencies:<subsection ssid="25-null-19" dnum="i-o" numlevel="1" lineno="407" slineno="7-28" level="3"><display>(i)</display>identify, analyze, and, when appropriate, mitigate cyber threats and vulnerabilities;</subsection><subsection ssid="25-null-20" dnum="ii-o" numlevel="1" lineno="408" slineno="7-29" level="3"><display>(ii)</display>coordinate cybersecurity resilience planning;</subsection><subsection ssid="25-null-21" dnum="iii-o" numlevel="1" lineno="409" slineno="7-30" level="3"><display>(iii)</display>provide cybersecurity incident response capabilities; and</subsection><subsection ssid="25-null-22" dnum="iv-o" numlevel="1" lineno="410" slineno="7-31" level="3"><display>(iv)</display>recommend to the division standards, policies, or procedures to increase the <ln numlevel="1" lineno="411" slineno="7-32"/>cyber resilience of executive branch agencies individually or collectively;</subsection></subsection><subsection ssid="25-null-23" dnum="c-o" numlevel="1" lineno="412" slineno="7-33" level="2"><display>(c)</display>at the request of a governmental entity, coordinate cybersecurity incident response <ln numlevel="1" lineno="413" slineno="7-34"/>for a data breach affecting the governmental entity in accordance with Section <xref depth="3" refnumber="63A-19-405"><ln numlevel="1" lineno="414" slineno="7-35"/>63A-19-405</xref>;</subsection><subsection ssid="25-null-24" dnum="d-o" numlevel="1" lineno="415" slineno="7-36" level="2"><display>(d)</display>promote cybersecurity best practices;</subsection><subsection ssid="25-null-25" dnum="e-o" numlevel="1" lineno="416" slineno="7-37" level="2"><display>(e)</display>share cyber threat intelligence with governmental entities and, through the Statewide <ln numlevel="1" lineno="417" slineno="7-38"/>Information and Analysis Center, with other public and private sector organizations;</subsection><subsection ssid="25-null-26" dnum="f-o" numlevel="1" lineno="418" slineno="7-39" level="2"><display>(f)</display>serve as the state cybersecurity incident response repository to receive reports of <ln numlevel="1" lineno="419" slineno="7-40"/>breaches of system security, including notification or disclosure under Section <xref depth="3" refnumber="13-44-202"><ln numlevel="1" lineno="420" slineno="7-41"/>13-44-202</xref> and data breaches under Section <xref depth="3" refnumber="63A-16-1103">63A-16-1103</xref>;</subsection><subsection ssid="25-null-27" dnum="g-o" numlevel="1" lineno="421" slineno="7-42" level="2"><display>(g)</display>develop incident response plans to coordinate federal, state, local, and private sector <ln numlevel="1" lineno="422" slineno="7-43"/>activities and manage the risks associated with an attack or malfunction of critical <ln numlevel="1" lineno="423" slineno="7-44"/>information technology systems within the state;</subsection><subsection ssid="25-null-28" dnum="h-o" numlevel="1" lineno="424" slineno="7-45" level="2"><display>(h)</display>coordinate, develop, and share best practices for cybersecurity resilience in the state;</subsection><subsection ssid="25-null-29" dnum="i-o" numlevel="1" lineno="425" slineno="7-46" level="2"><display>(i)</display>identify sources of funding to make cybersecurity improvements throughout the state;</subsection><subsection ssid="25-null-30" dnum="j-o" numlevel="1" lineno="426" slineno="7-47" level="2"><display>(j)</display>develop a sharing platform to provide resources based on information, <ln numlevel="1" lineno="427" slineno="7-48"/>recommendations, and best practices; <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="9" groupid="8" style="2" owner="jchristopherson" level="1" deltag="both">and</amend><amendoutend style="2"/></subsection><subsection ssid="25-null-31" dnum="k-o" numlevel="1" lineno="428" slineno="7-49" level="2"><display>(k)</display>partner with institutions of higher education<amend anum="0" ea="amend" pairid="30" groupid="23" style="1" owner="jchristopherson" level="1" amendtag="both">, the Utah Education and Telehealth <ln numlevel="1" lineno="429" slineno="7-50"/>Network,</amend> and other public and private sector organizations to increase the state's <ln numlevel="1" lineno="430" slineno="7-51"/>cyber resilience<amendoutstart style="2"/><amend anum="0" ea="erase" pairid="10" groupid="9" style="2" owner="jchristopherson" level="1" deltag="both">.</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="7" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">; and</amend></subsection><subsection ssid="25-32" dnum="_-o:l-i" numlevel="1" lineno="431" slineno="7-52" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1239" style="1" owner="i" level="1" amendtag="start">(l)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">provide cybersecurity services to a local education agency as defined in Section <xref depth="3" refnumber="53E-1-102"><ln numlevel="1" lineno="432" slineno="7-53"/>53E-1-102</xref>, including:</amend><subsection ssid="25-33" dnum="_-o:i-i" numlevel="1" lineno="433" slineno="7-54" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1240" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="end">cybersecurity assessments and vulnerability testing;</amend></subsection><subsection ssid="25-34" dnum="_-o:ii-i" numlevel="1" lineno="434" slineno="7-55" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1241" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="15" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">incident response coordination and support;</amend></subsection><subsection ssid="25-35" dnum="_-o:iii-i" numlevel="1" lineno="435" slineno="7-56" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1242" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="18" groupid="15" style="1" owner="jchristopherson" level="1" amendtag="end">threat intelligence sharing relevant to the education sector;</amend></subsection><subsection ssid="25-36" dnum="_-o:iv-i" numlevel="1" lineno="436" slineno="7-57" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1243" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">technical assistance in implementing cybersecurity standards required under Se<xref depth="3" refnumber="53G-8-902"><ln numlevel="1" lineno="437" slineno="7-58"/>ction </xref><xref depth="3" refnumber="53G-8-902">53G-8-902</xref>;</amend></subsection><subsection ssid="25-37" dnum="_-o:v-i" numlevel="1" lineno="438" slineno="7-59" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1244" style="1" owner="i" level="1" amendtag="start">(v)</amend></display><amend anum="0" ea="amend" pairid="24" groupid="19" style="1" owner="jchristopherson" level="1" amendtag="end">cybersecurity awareness training resources; and</amend></subsection><subsection ssid="25-38" dnum="_-o:vi-i" numlevel="1" lineno="439" slineno="7-60" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1245" style="1" owner="i" level="1" amendtag="start">(vi)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">coordination with the Utah Education and Telehealth Network on relevant <ln numlevel="1" lineno="440" slineno="7-61"/>security matters in accordance with Section <xref depth="3" refnumber="53H-4-213.4">53H-4-213.4</xref>.</amend></subsection></subsection></subsection></section></bsec><bsec buid="3" num="63A-16-1103" type="amend" src="code" uid="C63A-16-S1103_2026050620260506" sort="63A16 11030020260506" numlevel="1" lineno="441" slineno="8-1" sn="8"><section number="63A-16-1103" numlevel="1" lineno="442" slineno="8-2" type="amend"><secline lineno="441">Section 8. Section <bold>63A-16-1103</bold> is amended to read:</secline><catline lineno="442"><bold>63A-16-1103<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Assistance to governmental entities -- Records.</bold></catline><subsection ssid="3-null-1" dnum="1-o" numlevel="1" lineno="443" slineno="8-3" level="1" placement="noreturn"><display>(1)</display>The Cyber Center shall provide a governmental entity with assistance in responding to a <ln numlevel="1" lineno="444" slineno="8-4"/>data breach reported under Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>, which may include:<subsection ssid="3-null-2" dnum="a-o" numlevel="1" lineno="445" slineno="8-5" level="2"><display>(a)</display>conducting all or part of an internal investigation into the data breach;</subsection><subsection ssid="3-null-3" dnum="b-o" numlevel="1" lineno="446" slineno="8-6" level="2"><display>(b)</display>assisting law enforcement with the law enforcement investigation if needed;</subsection><subsection ssid="3-null-4" dnum="c-o" numlevel="1" lineno="447" slineno="8-7" level="2"><display>(c)</display>determining the scope of the data breach;</subsection><subsection ssid="3-null-5" dnum="d-o" numlevel="1" lineno="448" slineno="8-8" level="2"><display>(d)</display>assisting the governmental entity in restoring the reasonable integrity of the system; <ln numlevel="1" lineno="449" slineno="8-9"/>or</subsection><subsection ssid="3-null-6" dnum="e-o" numlevel="1" lineno="450" slineno="8-10" level="2"><display>(e)</display>providing any other assistance in response to the reported data breach.</subsection></subsection><subsection ssid="3-null-7" dnum="2-o" numlevel="1" lineno="451" slineno="8-11" level="1" space="false"><display>(2)</display><subsection ssid="3-null-8" dnum="a-o" level="2" placement="sameline"><display>(a)</display>A governmental entity that is required to submit information under Section <xref depth="3" refnumber="63A-19-405"><ln numlevel="1" lineno="452" slineno="8-12"/>63A-19-405</xref> shall provide records to the Cyber Center as a shared record in <ln numlevel="1" lineno="453" slineno="8-13"/>accordance with Section <xref depth="3" refnumber="63G-2-206">63G-2-206</xref>.</subsection><subsection ssid="3-null-9" dnum="b-o" numlevel="1" lineno="454" slineno="8-14" level="2"><display>(b)</display>The following information may be deemed confidential and may only be shared as <ln numlevel="1" lineno="455" slineno="8-15"/>provided in Section <xref depth="3" refnumber="63G-2-206">63G-2-206</xref>:<subsection ssid="3-null-10" dnum="i-o" numlevel="1" lineno="456" slineno="8-16" level="3"><display>(i)</display>the information provided to the Cyber Center by a governmental entity under <ln numlevel="1" lineno="457" slineno="8-17"/>Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>; and</subsection><subsection ssid="3-null-11" dnum="ii-o" numlevel="1" lineno="458" slineno="8-18" level="3"><display>(ii)</display><amend anum="0" ea="amend" pairid="4" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="both">the </amend>information produced by the Cyber Center in response to a report of a data <ln numlevel="1" lineno="459" slineno="8-19"/>breach under Subsection <xref depth="4" refnumber="63A-16-1103(1)">(1)</xref>.</subsection></subsection></subsection><subsection ssid="3-12" dnum="_-o:3-i" numlevel="1" lineno="460" slineno="8-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1257" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="0" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="end">In addition to all requirements for a governmental entity in this part, a local education <ln numlevel="1" lineno="461" slineno="8-21"/>agency shall submit information in accordance with Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>.</amend></subsection></section></bsec><bsec buid="11" num="63A-19-101" type="amend" src="code" uid="C63A-19-S101_2026050620260506" sort="63A19 01010020260506" numlevel="1" lineno="462" slineno="9-1" sn="9"><section number="63A-19-101" numlevel="1" lineno="463" slineno="9-2" type="amend"><secline lineno="462">Section 9. Section <bold>63A-19-101</bold> is amended to read:</secline><catline lineno="463"><bold>63A-19-101<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Definitions.</bold></catline><sectionText lineno="464"><tab/>As used in this chapter:</sectionText><subsection ssid="11-null-1" dnum="1-o" numlevel="1" lineno="465" slineno="9-4" level="1"><display>(1)</display>"Anonymized data" means information that has been irreversibly modified so that there <ln numlevel="1" lineno="466" slineno="9-5"/>is no possibility of using the information, alone or in combination with other <ln numlevel="1" lineno="467" slineno="9-6"/>information, to identify an individual.</subsection><subsection ssid="11-null-2" dnum="2-o" numlevel="1" lineno="468" slineno="9-7" level="1"><display>(2)</display>"At-risk government employee" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-303"><ln numlevel="1" lineno="469" slineno="9-8"/>63G-2-303</xref>.</subsection><subsection ssid="11-null-3" dnum="3-o" numlevel="1" lineno="470" slineno="9-9" level="1"><display>(3)</display>"Automated decision making" means using personal data to make a decision about an <ln numlevel="1" lineno="471" slineno="9-10"/>individual through automated processing, without human review or intervention.</subsection><subsection ssid="11-null-4" dnum="4-o" numlevel="1" lineno="472" slineno="9-11" level="1"><display>(4)</display>"Biometric data" means the same as that term is defined in Section <xref depth="3" refnumber="13-61-101">13-61-101</xref>.</subsection><subsection ssid="11-null-5" dnum="5-o" numlevel="1" lineno="473" slineno="9-12" level="1"><display>(5)</display>"Chief administrative officer" means the same as that term is defined in Section <xref depth="3" refnumber="63A-12-100.5"><ln numlevel="1" lineno="474" slineno="9-13"/>63A-12-100.5</xref>.</subsection><subsection ssid="11-null-6" dnum="6-o" numlevel="1" lineno="475" slineno="9-14" level="1"><display>(6)</display>"Chief privacy officer" means the individual appointed under Section <xref depth="3" refnumber="63A-19-302">63A-19-302</xref>.</subsection><subsection ssid="11-null-7" dnum="7-o" numlevel="1" lineno="476" slineno="9-15" level="1"><display>(7)</display>"Commission" means the Utah Privacy Commission established in Section <xref depth="3" refnumber="63A-19-203">63A-19-203</xref>.</subsection><subsection ssid="11-null-8" dnum="8-o" numlevel="1" lineno="477" slineno="9-16" level="1"><display>(8)</display>"Contract" means an agreement between a governmental entity and a person for goods <ln numlevel="1" lineno="478" slineno="9-17"/>or services that involve personal data.</subsection><subsection ssid="11-null-9" dnum="9-o" numlevel="1" lineno="479" slineno="9-18" level="1" space="false"><display>(9)</display><subsection ssid="11-null-10" dnum="a-o" level="2" placement="sameline"><display>(a)</display>"Contractor" means a person who:<subsection ssid="11-null-11" dnum="i-o" numlevel="1" lineno="480" slineno="9-19" level="3" tab="1"><display>(i)</display>has entered into a contract with a governmental entity; and</subsection><subsection ssid="11-null-12" dnum="ii-o" numlevel="1" lineno="481" slineno="9-20" level="3" tab="1"><display>(ii)</display>may process personal data under the contract.</subsection></subsection><subsection ssid="11-null-13" dnum="b-o" numlevel="1" lineno="482" slineno="9-21" level="2"><display>(b)</display>"Contractor" includes a contractor's employees, agents, or subcontractors.</subsection></subsection><subsection ssid="11-null-14" dnum="10-o" numlevel="1" lineno="483" slineno="9-22" level="1"><display>(10)</display>"Cyber Center" means the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref>.</subsection><subsection ssid="11-null-15" dnum="11-o" numlevel="1" lineno="484" slineno="9-23" level="1"><display>(11)</display>"Data breach" means the unauthorized access, acquisition, disclosure, loss of access, or <ln numlevel="1" lineno="485" slineno="9-24"/>destruction of personal data held by a governmental entity, unless the governmental <ln numlevel="1" lineno="486" slineno="9-25"/>entity concludes, according to standards established by the Cyber Center, that there is a <ln numlevel="1" lineno="487" slineno="9-26"/>low probability that personal data has been compromised.</subsection><subsection ssid="11-null-16" dnum="12-o" numlevel="1" lineno="488" slineno="9-27" level="1"><display>(12)</display>"De-identified data" means information from which personal data has been removed or <ln numlevel="1" lineno="489" slineno="9-28"/>obscured so that the information is not readily identifiable to a specific individual, and <ln numlevel="1" lineno="490" slineno="9-29"/>which may not be re-identified.</subsection><subsection ssid="11-null-17" dnum="13-o" numlevel="1" lineno="491" slineno="9-30" level="1"><display>(13)</display>"Genetic data" means the same as that term is defined in Section <xref depth="3" refnumber="13-60-102">13-60-102</xref>.</subsection><subsection ssid="11-null-18" dnum="14-o" numlevel="1" lineno="492" slineno="9-31" level="1"><display>(14)</display>"Governing board" means the Utah Privacy Governing Board established in Section <xref depth="3" refnumber="63A-19-201"><ln numlevel="1" lineno="493" slineno="9-32"/>63A-19-201</xref>.</subsection><subsection ssid="11-null-19" dnum="15-o" numlevel="1" lineno="494" slineno="9-33" level="1"><display>(15)</display>"Governmental entity" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-103">63G-2-103</xref><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both"> <ln numlevel="1" lineno="495" slineno="9-34"/>and includes a local education agency as that term is defined in Section <xref depth="3" refnumber="53E-1-102">53E-1-102</xref></amend>.</subsection><subsection ssid="11-null-20" dnum="16-o" numlevel="1" lineno="496" slineno="9-35" level="1"><display>(16)</display>"Government website" means a set of related web pages that is operated by or on <ln numlevel="1" lineno="497" slineno="9-36"/>behalf of a governmental entity and is:<subsection ssid="11-null-21" dnum="a-o" numlevel="1" lineno="498" slineno="9-37" level="2"><display>(a)</display>located under a single domain name or web address; and</subsection><subsection ssid="11-null-22" dnum="b-o" numlevel="1" lineno="499" slineno="9-38" level="2"><display>(b)</display>accessible directly through the Internet or by the use of a software program.</subsection></subsection><subsection ssid="11-null-23" dnum="17-o" numlevel="1" lineno="500" slineno="9-39" level="1" space="false"><display>(17)</display><subsection ssid="11-null-24" dnum="a-o" level="2" placement="sameline"><display>(a)</display>"High-risk processing activities" means a governmental entity's processing of <ln numlevel="1" lineno="501" slineno="9-40"/>personal data that may have a significant impact on an individual's privacy interests, <ln numlevel="1" lineno="502" slineno="9-41"/>based on factors that include:<subsection ssid="11-null-25" dnum="i-o" numlevel="1" lineno="503" slineno="9-42" level="3" tab="1"><display>(i)</display>the sensitivity of the personal data processed;</subsection><subsection ssid="11-null-26" dnum="ii-o" numlevel="1" lineno="504" slineno="9-43" level="3" tab="1"><display>(ii)</display>the amount of personal data being processed;</subsection><subsection ssid="11-null-27" dnum="iii-o" numlevel="1" lineno="505" slineno="9-44" level="3" tab="1"><display>(iii)</display>the individual's ability to consent to the processing of personal data; and</subsection><subsection ssid="11-null-28" dnum="iv-o" numlevel="1" lineno="506" slineno="9-45" level="3" tab="1"><display>(iv)</display>risks of unauthorized access or use.</subsection></subsection><subsection ssid="11-null-29" dnum="b-o" numlevel="1" lineno="507" slineno="9-46" level="2"><display>(b)</display>"High-risk processing activities" may include the use of:<subsection ssid="11-null-30" dnum="i-o" numlevel="1" lineno="508" slineno="9-47" level="3"><display>(i)</display>facial recognition technology;</subsection><subsection ssid="11-null-31" dnum="ii-o" numlevel="1" lineno="509" slineno="9-48" level="3"><display>(ii)</display>automated decision making;</subsection><subsection ssid="11-null-32" dnum="iii-o" numlevel="1" lineno="510" slineno="9-49" level="3"><display>(iii)</display>profiling;</subsection><subsection ssid="11-null-33" dnum="iv-o" numlevel="1" lineno="511" slineno="9-50" level="3"><display>(iv)</display>genetic data;</subsection><subsection ssid="11-null-34" dnum="v-o" numlevel="1" lineno="512" slineno="9-51" level="3"><display>(v)</display>biometric data; or</subsection><subsection ssid="11-null-35" dnum="vi-o" numlevel="1" lineno="513" slineno="9-52" level="3"><display>(vi)</display>geolocation data.</subsection></subsection></subsection><subsection ssid="11-null-36" dnum="18-o" numlevel="1" lineno="514" slineno="9-53" level="1"><display>(18)</display>"Independent entity" means the same as that term is defined in Section <xref depth="3" refnumber="63E-1-102">63E-1-102</xref>.</subsection><subsection ssid="11-null-37" dnum="19-o" numlevel="1" lineno="515" slineno="9-54" level="1"><display>(19)</display>"Individual" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-103">63G-2-103</xref>.</subsection><subsection ssid="11-null-38" dnum="20-o" numlevel="1" lineno="516" slineno="9-55" level="1"><display>(20)</display>"Legal guardian" means:<subsection ssid="11-null-39" dnum="a-o" numlevel="1" lineno="517" slineno="9-56" level="2"><display>(a)</display>the parent of a minor; or</subsection><subsection ssid="11-null-40" dnum="b-o" numlevel="1" lineno="518" slineno="9-57" level="2"><display>(b)</display>an individual appointed by a court to be the guardian of a minor or incapacitated <ln numlevel="1" lineno="519" slineno="9-58"/>individual and given legal authority to make decisions regarding the person or <ln numlevel="1" lineno="520" slineno="9-59"/>property of the minor or incapacitated individual.</subsection></subsection><subsection ssid="11-null-41" dnum="21-o" numlevel="1" lineno="521" slineno="9-60" level="1"><display>(21)</display>"Office" means the Utah Office of Data Privacy created in Section <xref depth="3" refnumber="63A-19-301">63A-19-301</xref>.</subsection><subsection ssid="11-null-42" dnum="22-o" numlevel="1" lineno="522" slineno="9-61" level="1"><display>(22)</display>"Ombudsperson" means the data privacy ombudsperson appointed under Section <xref depth="3" refnumber="63A-19-501"><ln numlevel="1" lineno="523" slineno="9-62"/>63A-19-501</xref>.</subsection><subsection ssid="11-null-43" dnum="23-o" numlevel="1" lineno="524" slineno="9-63" level="1"><display>(23)</display>"Person" means the same as that term is defined in Section  <xref depth="3" refnumber="63G-2-103">63G-2-103</xref>.</subsection><subsection ssid="11-null-44" dnum="24-o" numlevel="1" lineno="525" slineno="9-64" level="1"><display>(24)</display>"Personal data" means information that is linked or can be reasonably linked to an <ln numlevel="1" lineno="526" slineno="9-65"/>identified individual or an identifiable individual.</subsection><subsection ssid="11-null-45" dnum="25-o" numlevel="1" lineno="527" slineno="9-66" level="1"><display>(25)</display>"Privacy annotation" means a summary of personal data contained in a record series as <ln numlevel="1" lineno="528" slineno="9-67"/>described in Section <xref depth="3" refnumber="63A-19-401.1">63A-19-401.1</xref>.</subsection><subsection ssid="11-null-46" dnum="26-o" numlevel="1" lineno="529" slineno="9-68" level="1"><display>(26)</display>"Privacy practice" means a governmental entity's:<subsection ssid="11-null-47" dnum="a-o" numlevel="1" lineno="530" slineno="9-69" level="2"><display>(a)</display>organizational, technical, administrative, and physical safeguards designed to protect <ln numlevel="1" lineno="531" slineno="9-70"/>an individual's personal data;</subsection><subsection ssid="11-null-48" dnum="b-o" numlevel="1" lineno="532" slineno="9-71" level="2"><display>(b)</display>policies and procedures related to the acquisition, use, storage, sharing, retention, <ln numlevel="1" lineno="533" slineno="9-72"/>and disposal of personal data; and</subsection><subsection ssid="11-null-49" dnum="c-o" numlevel="1" lineno="534" slineno="9-73" level="2"><display>(c)</display>practice of providing notice to an individual regarding the individual's privacy rights.</subsection></subsection><subsection ssid="11-null-50" dnum="27-o" numlevel="1" lineno="535" slineno="9-74" level="1"><display>(27)</display>"Process," "processing," or "processing activity" means any operation or set of <ln numlevel="1" lineno="536" slineno="9-75"/>operations performed on personal data, including collection, recording, organization, <ln numlevel="1" lineno="537" slineno="9-76"/>structuring, storage, adaptation, alteration, access, retrieval, consultation, use, disclosure <ln numlevel="1" lineno="538" slineno="9-77"/>by transmission, transfer, dissemination, alignment, combination, restriction, erasure, or <ln numlevel="1" lineno="539" slineno="9-78"/>destruction.</subsection><subsection ssid="11-null-51" dnum="28-o" numlevel="1" lineno="540" slineno="9-79" level="1"><display>(28)</display>"Profiling" means the processing of personal data to evaluate or predict an individual's:<subsection ssid="11-null-52" dnum="a-o" numlevel="1" lineno="541" slineno="9-80" level="2"><display>(a)</display>economic situation;</subsection><subsection ssid="11-null-53" dnum="b-o" numlevel="1" lineno="542" slineno="9-81" level="2"><display>(b)</display>health;</subsection><subsection ssid="11-null-54" dnum="c-o" numlevel="1" lineno="543" slineno="9-82" level="2"><display>(c)</display>personal preferences;</subsection><subsection ssid="11-null-55" dnum="d-o" numlevel="1" lineno="544" slineno="9-83" level="2"><display>(d)</display>interests;</subsection><subsection ssid="11-null-56" dnum="e-o" numlevel="1" lineno="545" slineno="9-84" level="2"><display>(e)</display>reliability;</subsection><subsection ssid="11-null-57" dnum="f-o" numlevel="1" lineno="546" slineno="9-85" level="2"><display>(f)</display>behavior;</subsection><subsection ssid="11-null-58" dnum="g-o" numlevel="1" lineno="547" slineno="9-86" level="2"><display>(g)</display>location; or</subsection><subsection ssid="11-null-59" dnum="h-o" numlevel="1" lineno="548" slineno="9-87" level="2"><display>(h)</display>movements.</subsection></subsection><subsection ssid="11-null-60" dnum="29-o" numlevel="1" lineno="549" slineno="9-88" level="1"><display>(29)</display>"Purchase" or "purchasing" means the exchange of monetary consideration to obtain <ln numlevel="1" lineno="550" slineno="9-89"/>the personal data of an individual who is not a party to the transaction.</subsection><subsection ssid="11-null-61" dnum="30-o" numlevel="1" lineno="551" slineno="9-90" level="1"><display>(30)</display>"Record" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-103">63G-2-103</xref>.</subsection><subsection ssid="11-null-62" dnum="31-o" numlevel="1" lineno="552" slineno="9-91" level="1"><display>(31)</display>"Record series" means the same as that term is defined in Section <xref depth="3" refnumber="63G-2-103">63G-2-103</xref>.</subsection><subsection ssid="11-null-63" dnum="32-o" numlevel="1" lineno="553" slineno="9-92" level="1"><display>(32)</display>"Retention schedule" means a governmental entity's schedule for the retention or <ln numlevel="1" lineno="554" slineno="9-93"/>disposal of records that has been approved by the Records Management Committee <ln numlevel="1" lineno="555" slineno="9-94"/>pursuant to Section <xref depth="3" refnumber="63A-12-113">63A-12-113</xref>.</subsection><subsection ssid="11-null-64" dnum="33-o" numlevel="1" lineno="556" slineno="9-95" level="1" space="false"><display>(33)</display><subsection ssid="11-null-65" dnum="a-o" level="2" placement="sameline"><display>(a)</display>"Sell" means an exchange of personal data for monetary consideration by a <ln numlevel="1" lineno="557" slineno="9-96"/>governmental entity to a third party.</subsection><subsection ssid="11-null-66" dnum="b-o" numlevel="1" lineno="558" slineno="9-97" level="2"><display>(b)</display>"Sell" does not include a fee:<subsection ssid="11-null-67" dnum="i-o" numlevel="1" lineno="559" slineno="9-98" level="3"><display>(i)</display>charged by a governmental entity for access to a record pursuant to Section <xref depth="3" refnumber="63G-2-203"><ln numlevel="1" lineno="560" slineno="9-99"/>63G-2-203</xref>; or</subsection><subsection ssid="11-null-68" dnum="ii-o" numlevel="1" lineno="561" slineno="9-100" level="3"><display>(ii)</display>assessed in accordance with an approved fee schedule.</subsection></subsection></subsection><subsection ssid="11-null-69" dnum="34-o" numlevel="1" lineno="562" slineno="9-101" level="1" space="false"><display>(34)</display><subsection ssid="11-null-70" dnum="a-o" level="2" placement="sameline"><display>(a)</display>"State agency" means the following entities that are under the direct supervision <ln numlevel="1" lineno="563" slineno="9-102"/>and control of the governor or the lieutenant governor:<subsection ssid="11-null-71" dnum="i-o" numlevel="1" lineno="564" slineno="9-103" level="3" tab="1"><display>(i)</display>a department;</subsection><subsection ssid="11-null-72" dnum="ii-o" numlevel="1" lineno="565" slineno="9-104" level="3" tab="1"><display>(ii)</display>a commission;</subsection><subsection ssid="11-null-73" dnum="iii-o" numlevel="1" lineno="566" slineno="9-105" level="3" tab="1"><display>(iii)</display>a board;</subsection><subsection ssid="11-null-74" dnum="iv-o" numlevel="1" lineno="567" slineno="9-106" level="3" tab="1"><display>(iv)</display>a council;</subsection><subsection ssid="11-null-75" dnum="v-o" numlevel="1" lineno="568" slineno="9-107" level="3" tab="1"><display>(v)</display>an institution;</subsection><subsection ssid="11-null-76" dnum="vi-o" numlevel="1" lineno="569" slineno="9-108" level="3" tab="1"><display>(vi)</display>an officer;</subsection><subsection ssid="11-null-77" dnum="vii-o" numlevel="1" lineno="570" slineno="9-109" level="3" tab="1"><display>(vii)</display>a corporation;</subsection><subsection ssid="11-null-78" dnum="viii-o" numlevel="1" lineno="571" slineno="9-110" level="3" tab="1"><display>(viii)</display>a fund;</subsection><subsection ssid="11-null-79" dnum="ix-o" numlevel="1" lineno="572" slineno="9-111" level="3" tab="1"><display>(ix)</display>a division;</subsection><subsection ssid="11-null-80" dnum="x-o" numlevel="1" lineno="573" slineno="9-112" level="3" tab="1"><display>(x)</display>an office;</subsection><subsection ssid="11-null-81" dnum="xi-o" numlevel="1" lineno="574" slineno="9-113" level="3" tab="1"><display>(xi)</display>a committee;</subsection><subsection ssid="11-null-82" dnum="xii-o" numlevel="1" lineno="575" slineno="9-114" level="3" tab="1"><display>(xii)</display>an authority;</subsection><subsection ssid="11-null-83" dnum="xiii-o" numlevel="1" lineno="576" slineno="9-115" level="3" tab="1"><display>(xiii)</display>a laboratory;</subsection><subsection ssid="11-null-84" dnum="xiv-o" numlevel="1" lineno="577" slineno="9-116" level="3" tab="1"><display>(xiv)</display>a library;</subsection><subsection ssid="11-null-85" dnum="xv-o" numlevel="1" lineno="578" slineno="9-117" level="3" tab="1"><display>(xv)</display>a bureau;</subsection><subsection ssid="11-null-86" dnum="xvi-o" numlevel="1" lineno="579" slineno="9-118" level="3" tab="1"><display>(xvi)</display>a panel;</subsection><subsection ssid="11-null-87" dnum="xvii-o" numlevel="1" lineno="580" slineno="9-119" level="3" tab="1"><display>(xvii)</display>another administrative unit of the state; or</subsection><subsection ssid="11-null-88" dnum="xviii-o" numlevel="1" lineno="581" slineno="9-120" level="3" tab="1"><display>(xviii)</display>an agent of an entity described in Subsections <xref depth="4" refnumber="63A-19-101(34)(a)(i)">(34)(a)(i)</xref> through <xref depth="4" refnumber="63A-19-101(xvii)">(xvii)</xref>.</subsection></subsection><subsection ssid="11-null-89" dnum="b-o" numlevel="1" lineno="582" slineno="9-121" level="2"><display>(b)</display>"State agency" does not include:<subsection ssid="11-null-90" dnum="i-o" numlevel="1" lineno="583" slineno="9-122" level="3"><display>(i)</display>the legislative branch;</subsection><subsection ssid="11-null-91" dnum="ii-o" numlevel="1" lineno="584" slineno="9-123" level="3"><display>(ii)</display>the judicial branch;</subsection><subsection ssid="11-null-92" dnum="iii-o" numlevel="1" lineno="585" slineno="9-124" level="3"><display>(iii)</display>an executive branch agency within the Office of the Attorney General, the state <ln numlevel="1" lineno="586" slineno="9-125"/>auditor, the state treasurer, or the State Board of Education; or</subsection><subsection ssid="11-null-93" dnum="iv-o" numlevel="1" lineno="587" slineno="9-126" level="3"><display>(iv)</display>an independent entity.</subsection></subsection></subsection><subsection ssid="11-null-94" dnum="35-o" numlevel="1" lineno="588" slineno="9-127" level="1"><display>(35)</display>"State privacy auditor" means the same as that term is defined in Section <xref depth="3" refnumber="67-3-13">67-3-13</xref>.</subsection><subsection ssid="11-null-95" dnum="36-o" numlevel="1" lineno="589" slineno="9-128" level="1"><display>(36)</display>"Synthetic data" means artificial data that:<subsection ssid="11-null-96" dnum="a-o" numlevel="1" lineno="590" slineno="9-129" level="2"><display>(a)</display>is generated from personal data; and</subsection><subsection ssid="11-null-97" dnum="b-o" numlevel="1" lineno="591" slineno="9-130" level="2"><display>(b)</display>models the statistical properties of the original personal data.</subsection></subsection><subsection ssid="11-null-98" dnum="37-o" numlevel="1" lineno="592" slineno="9-131" level="1"><display>(37)</display>"User" means an individual who accesses a government website.</subsection><subsection ssid="11-null-99" dnum="38-o" numlevel="1" lineno="593" slineno="9-132" level="1" space="false"><display>(38)</display><subsection ssid="11-null-100" dnum="a-o" level="2" placement="sameline"><display>(a)</display>"User data" means any information about a user that is automatically collected <ln numlevel="1" lineno="594" slineno="9-133"/>by a government website when a user accesses the government website.</subsection><subsection ssid="11-null-101" dnum="b-o" numlevel="1" lineno="595" slineno="9-134" level="2"><display>(b)</display>"User data" includes information that identifies:<subsection ssid="11-null-102" dnum="i-o" numlevel="1" lineno="596" slineno="9-135" level="3"><display>(i)</display>a user as having requested or obtained specific materials or services from a <ln numlevel="1" lineno="597" slineno="9-136"/>government website;</subsection><subsection ssid="11-null-103" dnum="ii-o" numlevel="1" lineno="598" slineno="9-137" level="3"><display>(ii)</display>Internet sites visited by a user;</subsection><subsection ssid="11-null-104" dnum="iii-o" numlevel="1" lineno="599" slineno="9-138" level="3"><display>(iii)</display>the contents of a user's data-storage device;</subsection><subsection ssid="11-null-105" dnum="iv-o" numlevel="1" lineno="600" slineno="9-139" level="3"><display>(iv)</display>any identifying code linked to a user of a government website; and</subsection><subsection ssid="11-null-106" dnum="v-o" numlevel="1" lineno="601" slineno="9-140" level="3"><display>(v)</display>a user's:<subsection ssid="11-null-107" dnum="A-o" numlevel="1" lineno="602" slineno="9-141" level="4"><display>(A)</display>IP or Mac address; or</subsection><subsection ssid="11-null-108" dnum="B-o" numlevel="1" lineno="603" slineno="9-142" level="4"><display>(B)</display>session ID.</subsection></subsection></subsection></subsection><subsection ssid="11-null-109" dnum="39-o" numlevel="1" lineno="604" slineno="9-143" level="1"><display>(39)</display>"Website tracking technology" means any tool used by a government website to:<subsection ssid="11-null-110" dnum="a-o" numlevel="1" lineno="605" slineno="9-144" level="2"><display>(a)</display>monitor a user's behavior; or</subsection><subsection ssid="11-null-111" dnum="b-o" numlevel="1" lineno="606" slineno="9-145" level="2"><display>(b)</display>collect user data.</subsection></subsection></section></bsec><bsec buid="14" num="63C-27-201" type="amend" src="code" uid="C63C-27-S201_2026050620260506" sort="63C27 02010020260506" numlevel="1" lineno="607" slineno="10-1" sn="10"><section number="63C-27-201" numlevel="1" lineno="608" slineno="10-2" type="amend"><secline lineno="607">Section 10. Section <bold>63C-27-201</bold> is amended to read:</secline><catline lineno="608"><bold>63C-27-201<parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens>. Cybersecurity Commission <ln numlevel="1" lineno="609" slineno="10-3"/>created.</bold></catline><subsection ssid="14-null-1" dnum="1-o" numlevel="1" lineno="610" slineno="10-4" level="1" placement="noreturn"><display>(1)</display>There is created the Cybersecurity Commission.</subsection><subsection ssid="14-null-2" dnum="2-o" numlevel="1" lineno="611" slineno="10-5" level="1"><display>(2)</display>The commission shall be composed of <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="6" groupid="5" style="2" owner="jchristopherson" level="1" deltag="both">24</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="5" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">the following</amend> members:<subsection ssid="14-null-3" dnum="a-o" numlevel="1" lineno="612" slineno="10-6" level="2"><display>(a)</display>one member the governor designates to serve as the governor's designee;</subsection><subsection ssid="14-null-4" dnum="b-o" numlevel="1" lineno="613" slineno="10-7" level="2"><display>(b)</display>the commissioner of the Department of Public Safety;</subsection><subsection ssid="14-null-5" dnum="c-o" numlevel="1" lineno="614" slineno="10-8" level="2"><display>(c)</display>the lieutenant governor, or an election officer, as that term is defined in Section <xref depth="3" refnumber="20A-1-102" start="0"><ln numlevel="1" lineno="615" slineno="10-9"/>20A-1-102</xref>, the lieutenant governor designates to serve as the lieutenant governor's <ln numlevel="1" lineno="616" slineno="10-10"/>designee;</subsection><subsection ssid="14-null-6" dnum="d-o" numlevel="1" lineno="617" slineno="10-11" level="2"><display>(d)</display>the chief information officer of the Division of Technology Services;</subsection><subsection ssid="14-null-7" dnum="e-o" numlevel="1" lineno="618" slineno="10-12" level="2"><display>(e)</display>the chief information security officer, as described in Section <xref depth="3" refnumber="63A-16-210" start="0">63A-16-210</xref>;</subsection><subsection ssid="14-null-8" dnum="f-o" numlevel="1" lineno="619" slineno="10-13" level="2"><display>(f)</display>the chairman of the Public Service Commission shall designate a representative with <ln numlevel="1" lineno="620" slineno="10-14"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-9" dnum="g-o" numlevel="1" lineno="621" slineno="10-15" level="2"><display>(g)</display>the executive director of the Utah Department of Transportation shall designate a <ln numlevel="1" lineno="622" slineno="10-16"/>representative with professional experience in information technology or <ln numlevel="1" lineno="623" slineno="10-17"/>cybersecurity;</subsection><subsection ssid="14-null-10" dnum="h-o" numlevel="1" lineno="624" slineno="10-18" level="2"><display>(h)</display>the director of the Division of Finance shall designate a representative with <ln numlevel="1" lineno="625" slineno="10-19"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-11" dnum="i-o" numlevel="1" lineno="626" slineno="10-20" level="2"><display>(i)</display>the executive director of the Department of Health and Human Services shall <ln numlevel="1" lineno="627" slineno="10-21"/>designate a representative with professional experience in information technology or <ln numlevel="1" lineno="628" slineno="10-22"/>cybersecurity;</subsection><subsection ssid="14-null-12" dnum="j-o" numlevel="1" lineno="629" slineno="10-23" level="2"><display>(j)</display>the director of the Division of Indian Affairs shall designate a representative with <ln numlevel="1" lineno="630" slineno="10-24"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-13" dnum="k-o" numlevel="1" lineno="631" slineno="10-25" level="2"><display>(k)</display>the Utah League of Cities and Towns shall designate a representative with <ln numlevel="1" lineno="632" slineno="10-26"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-14" dnum="l-o" numlevel="1" lineno="633" slineno="10-27" level="2"><display>(l)</display>the Utah Association of Counties shall designate a representative with professional <ln numlevel="1" lineno="634" slineno="10-28"/>experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-15" dnum="m-o" numlevel="1" lineno="635" slineno="10-29" level="2"><display>(m)</display>the attorney general, or the attorney general's designee;</subsection><subsection ssid="14-null-16" dnum="n-o" numlevel="1" lineno="636" slineno="10-30" level="2"><display>(n)</display>the commissioner of financial institutions, or the commissioner's designee;</subsection><subsection ssid="14-null-17" dnum="o-o" numlevel="1" lineno="637" slineno="10-31" level="2"><display>(o)</display>the executive director of the Department of Environmental Quality shall designate a <ln numlevel="1" lineno="638" slineno="10-32"/>representative with professional experience in information technology or <ln numlevel="1" lineno="639" slineno="10-33"/>cybersecurity;</subsection><subsection ssid="14-null-18" dnum="p-o" numlevel="1" lineno="640" slineno="10-34" level="2"><display>(p)</display>the executive director of the Department of Natural Resources shall designate a <ln numlevel="1" lineno="641" slineno="10-35"/>representative with professional experience in information technology or <ln numlevel="1" lineno="642" slineno="10-36"/>cybersecurity;</subsection><subsection ssid="14-53" dnum="_-o:q-i" numlevel="1" lineno="643" slineno="10-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1387" style="1" owner="i" level="1" amendtag="start">(q)</amend></display><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="end">the state superintendent of public instruction or the state superintendent's designee;</amend></subsection><subsection ssid="14-54" dnum="_-o:r-i" numlevel="1" lineno="644" slineno="10-38" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1388" style="1" owner="i" level="1" amendtag="start">(r)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">two local education agency employees tasked with job duties that include systems <ln numlevel="1" lineno="645" slineno="10-39"/>and security management from one charter school and one school district whom the <ln numlevel="1" lineno="646" slineno="10-40"/>state superintendent selects;</amend></subsection><subsection ssid="14-null-19" dnum="q-o:s-i" numlevel="1" lineno="647" slineno="10-41" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1389" style="2" owner="o" level="1" deltag="both">(q)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1390" style="1" owner="i" level="1" amendtag="both" space="true">(s)</amend></display>the highest ranking information technology official, or the official's designee, <ln numlevel="1" lineno="648" slineno="10-42"/>from each of:<subsection ssid="14-null-20" dnum="i-o" numlevel="1" lineno="649" slineno="10-43" level="3"><display>(i)</display>the Judicial Council;</subsection><subsection ssid="14-null-21" dnum="ii-o" numlevel="1" lineno="650" slineno="10-44" level="3"><display>(ii)</display>the Utah Board of Higher Education;</subsection><subsection ssid="14-null-22" dnum="iii-o" numlevel="1" lineno="651" slineno="10-45" level="3"><display>(iii)</display>the State Board of Education; and</subsection><subsection ssid="14-null-23" dnum="iv-o" numlevel="1" lineno="652" slineno="10-46" level="3"><display>(iv)</display>the State Tax Commission;</subsection></subsection><subsection ssid="14-null-24" dnum="r-o:t-i" numlevel="1" lineno="653" slineno="10-47" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1394" style="2" owner="o" level="1" deltag="both">(r)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1395" style="1" owner="i" level="1" amendtag="both" space="true">(t)</amend></display>the governor shall appoint:<subsection ssid="14-null-25" dnum="i-o" numlevel="1" lineno="654" slineno="10-48" level="3"><display>(i)</display>one representative from the Utah National Guard; and</subsection><subsection ssid="14-null-26" dnum="ii-o" numlevel="1" lineno="655" slineno="10-49" level="3"><display>(ii)</display>one representative from the Governor's Office of Economic Opportunity;</subsection></subsection><subsection ssid="14-null-27" dnum="s-o:u-i" numlevel="1" lineno="656" slineno="10-50" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1397" style="2" owner="o" level="1" deltag="both">(s)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1398" style="1" owner="i" level="1" amendtag="both" space="true">(u)</amend></display>the president of the Senate shall appoint one member of the Senate; and</subsection><subsection ssid="14-null-28" dnum="t-o:v-i" numlevel="1" lineno="657" slineno="10-51" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1398" style="2" owner="o" level="1" deltag="both">(t)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1399" style="1" owner="i" level="1" amendtag="both" space="true">(v)</amend></display>the speaker of the House of Representatives shall appoint one member of the <ln numlevel="1" lineno="658" slineno="10-52"/>House of Representatives.</subsection></subsection><subsection ssid="14-null-29" dnum="3-o" numlevel="1" lineno="659" slineno="10-53" level="1" space="false"><display>(3)</display><subsection ssid="14-null-30" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The governor's designee shall serve as cochair of the commission.</subsection><subsection ssid="14-null-31" dnum="b-o" numlevel="1" lineno="660" slineno="10-54" level="2"><display>(b)</display>The commissioner of the Department of Public Safety shall serve as cochair of the <ln numlevel="1" lineno="661" slineno="10-55"/>commission.</subsection></subsection><subsection ssid="14-null-32" dnum="4-o" numlevel="1" lineno="662" slineno="10-56" level="1" space="false"><display>(4)</display><subsection ssid="14-null-33" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall represent urban, rural, and <ln numlevel="1" lineno="663" slineno="10-57"/>suburban population areas.</subsection><subsection ssid="14-null-34" dnum="b-o" numlevel="1" lineno="664" slineno="10-58" level="2"><display>(b)</display>No fewer than half of the members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall have <ln numlevel="1" lineno="665" slineno="10-59"/>professional experience in cybersecurity or in information technology.</subsection></subsection><subsection ssid="14-null-35" dnum="5-o" numlevel="1" lineno="666" slineno="10-60" level="1"><display>(5)</display>In addition to the membership described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref>, the commission shall seek <ln numlevel="1" lineno="667" slineno="10-61"/>information and advice from state and private entities with expertise in critical <ln numlevel="1" lineno="668" slineno="10-62"/>infrastructure.</subsection><subsection ssid="14-null-36" dnum="6-o" numlevel="1" lineno="669" slineno="10-63" level="1"><display>(6)</display>As necessary to improve information and protect potential vulnerabilities, the <ln numlevel="1" lineno="670" slineno="10-64"/>commission shall seek information and advice from federal entities including:<subsection ssid="14-null-37" dnum="a-o" numlevel="1" lineno="671" slineno="10-65" level="2"><display>(a)</display>the Cybersecurity and Infrastructure Security Agency;</subsection><subsection ssid="14-null-38" dnum="b-o" numlevel="1" lineno="672" slineno="10-66" level="2"><display>(b)</display>the Federal Energy Regulatory Commission;</subsection><subsection ssid="14-null-39" dnum="c-o" numlevel="1" lineno="673" slineno="10-67" level="2"><display>(c)</display>the Federal Bureau of Investigation; and</subsection><subsection ssid="14-null-40" dnum="d-o" numlevel="1" lineno="674" slineno="10-68" level="2"><display>(d)</display>the United States Department of Transportation.</subsection></subsection><subsection ssid="14-null-41" dnum="7-o" numlevel="1" lineno="675" slineno="10-69" level="1" space="false"><display>(7)</display><subsection ssid="14-null-42" dnum="a-o" level="2" placement="sameline"><display>(a)</display>Except as provided in Subsections <xref depth="4" refnumber="63C-27-201(7)(b)" start="0">(7)(b)</xref> and <xref depth="4" refnumber="63C-27-201(7)(c)" start="0">(c)</xref>, a member is appointed for a <ln numlevel="1" lineno="676" slineno="10-70"/>term of four years.</subsection><subsection ssid="14-null-43" dnum="b-o" numlevel="1" lineno="677" slineno="10-71" level="2"><display>(b)</display>A member shall serve until the member's successor is appointed and qualified.</subsection><subsection ssid="14-null-44" dnum="c-o" numlevel="1" lineno="678" slineno="10-72" level="2"><display>(c)</display>Notwithstanding the requirements of Subsection <xref depth="4" refnumber="63C-27-201(7)(a)" start="0">(7)(a)</xref>, the governor shall, at the <ln numlevel="1" lineno="679" slineno="10-73"/>time of appointment or reappointment, adjust the length of terms to ensure that the <ln numlevel="1" lineno="680" slineno="10-74"/>terms of commission members are staggered so that approximately half of the <ln numlevel="1" lineno="681" slineno="10-75"/>commission members appointed under Subsection <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="14" groupid="12" style="2" owner="jchristopherson" level="1" deltag="both"><xref depth="4" refnumber="63C-27-201(2)(r)" start="0">(2)(r)</xref></amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="13" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">(2)</amend> are appointed every two <ln numlevel="1" lineno="682" slineno="10-76"/>years.</subsection></subsection><subsection ssid="14-null-45" dnum="8-o" numlevel="1" lineno="683" slineno="10-77" level="1" space="false"><display>(8)</display><subsection ssid="14-null-46" dnum="a-o" level="2" placement="sameline"><display>(a)</display>If a vacancy occurs in the membership of the commission, the member shall be <ln numlevel="1" lineno="684" slineno="10-78"/>replaced in the same manner in which the original appointment was made.</subsection><subsection ssid="14-null-47" dnum="b-o" numlevel="1" lineno="685" slineno="10-79" level="2"><display>(b)</display>An individual may be appointed to more than one term.</subsection><subsection ssid="14-null-48" dnum="c-o" numlevel="1" lineno="686" slineno="10-80" level="2"><display>(c)</display>When a vacancy occurs in the membership for any reason, the replacement shall be <ln numlevel="1" lineno="687" slineno="10-81"/>appointed for the unexpired term.</subsection></subsection><subsection ssid="14-null-49" dnum="9-o" numlevel="1" lineno="688" slineno="10-82" level="1" space="false"><display>(9)</display><subsection ssid="14-null-50" dnum="a-o" level="2" placement="sameline"><display>(a)</display>A majority of the members of the commission is a quorum.</subsection><subsection ssid="14-null-51" dnum="b-o" numlevel="1" lineno="689" slineno="10-83" level="2"><display>(b)</display>The action of a majority of a quorum constitutes an action of the commission.</subsection></subsection><subsection ssid="14-null-52" dnum="10-o" numlevel="1" lineno="690" slineno="10-84" level="1"><display>(10)</display>The commission shall meet at least two times a year.</subsection></section></bsec><bsec buid="26" type="uncod" untype="effdate" src="uncod" uid="EF0000" sort="UZEFF" langlock="true" numlevel="1" lineno="691" slineno="11-1" sn="11"><section type="uncod" untype="effdate" display="false" src="uncod"><secline lineno="691">Section 11.  <bold>Effective Date.</bold></secline><sectionText lineno="692"><amend anum="0" ea="amend" pairid="1" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="both">This bill takes effect on <effdate uid="code" date="5/6/2026">May 6, 2026</effdate>.</amend></sectionText></section></bsec></bdy><foot><rev><tm>12-18-25 8:53 PM</tm></rev></foot></leg>