<?xml version="1.0" encoding="UTF-16"?>
<leg xml:space="preserve" billnum="HB0042" sponsor="Ryan D. Wilcox" designation="HB" otherSponsor="" otherHouse="Senate" subNumber="01" subSponsor="Ryan D. Wilcox" sess="2026GS" fileno="2026FL0072" date="2/2/2026 09:02:310" printDate="02-02 09:49" subVer="1" minVer="0" office="LEGISLATIVE GENERAL COUNSEL" actionDate="" impact="code"><info><nextbuid>31</nextbuid><aminfo anum="0" effdate="05/06/2026"><seclist><sect action="A" src="code" buid="19" uid="C53G-7-S227_2026050620260506" fromuid="C53G-7-S227_2025101420251206" sort="53G07 02270020260506" mtype="section" effdate="05/06/2026">53G-7-227</sect><sect action="E" src="code" buid="6" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" mtype="section" effdate="05/06/2026">53G-8-901</sect><sect action="E" src="code" buid="7" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" mtype="section" effdate="05/06/2026">53G-8-902</sect><sect action="E" src="code" buid="8" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" mtype="section" effdate="05/06/2026">53G-8-903</sect><sect action="A" src="code" buid="22" uid="C53H-4-S213.4_2026050620260506" fromuid="C53H-4-S213.4_2025101420251206" sort="53H04 02130420260506" mtype="section" effdate="05/06/2026">53H-4-213.4</sect><sect action="A" src="code" buid="14" uid="C63C-27-S201_2026050620260506" fromuid="C63C-27-S201_2022050420220504" sort="63C27 02010020260506" mtype="section" effdate="05/06/2026" libenddate="07/01/2032" endtype="SN">63C-27-201</sect><sect src="uncod" untype="effdate" buid="30" uid="EF0000" sort="UZEFF" mtype="uncod" effdate="05/06/2026"/></seclist></aminfo></info><tbox><sinfo><nextpairid>0</nextpairid></sinfo><st numlevel="1" lineno="1" slineno="0-1">School Cybersecurity Amendments</st><sessionhead>2026 GENERAL SESSION</sessionhead><statehead>STATE OF UTAH</statehead><sponsorhead>Chief Sponsor: Ryan D. Wilcox</sponsorhead><otherSponsorhead>Senate Sponsor: </otherSponsorhead></tbox><lt numlevel="1" lineno="2" slineno="0-2"><lthead lineno="3">LONG TITLE</lthead><gdhead lineno="4">General Description:</gdhead><gd numlevel="1" lineno="5" slineno="0-5">This bill directs the State Board of Education to establish minimum cybersecurity standards <ln numlevel="1" lineno="6" slineno="0-6"/>for local education agencies.</gd><hphead lineno="7">Highlighted Provisions:</hphead><hp numlevel="1" lineno="8" slineno="0-8">This bill:<hl numlevel="1" lineno="9" slineno="0-9" level="1">prohibits certain devices in schools;</hl><hl numlevel="1" lineno="10" slineno="0-10" level="1">directs the State Board of Education to make rules establishing minimum cybersecurity <ln numlevel="1" lineno="11" slineno="0-11"/>standards for LEAs in collaboration with the Utah Education and Telehealth Network;</hl><hl numlevel="1" lineno="12" slineno="0-12" level="1">establishes a phased implementation timeline for LEA compliance;</hl><hl numlevel="1" lineno="13" slineno="0-13" level="1">requires coordination among the Utah Cyber Center, the State Board of Education, and <ln numlevel="1" lineno="14" slineno="0-14"/>the Utah Education and Telehealth Network;</hl><hl numlevel="1" lineno="15" slineno="0-15" level="1">establishes reporting requirements for cybersecurity incidents;</hl><hl numlevel="1" lineno="16" slineno="0-16" level="1">expands the Utah Cyber Center's duties to include services for LEAs;</hl><hl numlevel="1" lineno="17" slineno="0-17" level="1">requires the State Board of Education to provide implementation support and resources; <ln numlevel="1" lineno="18" slineno="0-18"/>and</hl><hl numlevel="1" lineno="19" slineno="0-19" level="1">makes conforming changes.</hl></hp><moni numlevel="1" lineno="20" slineno="0-20" display="none">Money Appropriated in this Bill:</moni><moniNone lineno="21">None</moniNone><oc numlevel="1" lineno="22" slineno="0-22">Other Special Clauses:</oc><ocNone lineno="23">None</ocNone><sa numlevel="1" lineno="24" slineno="0-24">Utah Code Sections Affected:<saamd numlevel="1" lineno="25" slineno="0-25"><snhead>AMENDS:</snhead><sn num="53G-7-227" src="code" uid="C53G-7-S227_2026050620260506" buid="19" sort="53G07 02270020260506" numlevel="1" lineno="26" slineno="0-26"><bold>53G-7-227</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , as last amended by Laws of Utah 2025, First Special <ln numlevel="1" lineno="27" slineno="0-27"/>Session, Chapter 9</sn><sn num="53H-4-213.4" src="code" uid="C53H-4-S213.4_2026050620260506" buid="22" sort="53H04 02130420260506" numlevel="1" lineno="28" slineno="0-28"><bold>53H-4-213.4</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , as renumbered and amended by Laws of Utah 2025, <ln numlevel="1" lineno="29" slineno="0-29"/>First Special Session, Chapter 8</sn><sn num="63C-27-201" src="code" uid="C63C-27-S201_2026050620260506" buid="14" sort="63C27 02010020260506" numlevel="1" lineno="30" slineno="0-30"><bold>63C-27-201</bold><parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens> , as enacted by Laws of Utah 2022, <ln numlevel="1" lineno="31" slineno="0-31"/>Chapter 153</sn></saamd><saent numlevel="1" lineno="32" slineno="0-32"><snhead>ENACTS:</snhead><sn num="53G-8-901" src="code" uid="C53G-8-S901_2026050620260506" buid="6" sort="53G08 09010020260506" numlevel="1" lineno="33" slineno="0-33"><bold>53G-8-901</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn><sn num="53G-8-902" src="code" uid="C53G-8-S902_2026050620260506" buid="7" sort="53G08 09020020260506" numlevel="1" lineno="34" slineno="0-34"><bold>53G-8-902</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn><sn num="53G-8-903" src="code" uid="C53G-8-S903_2026050620260506" buid="8" sort="53G08 09030020260506" numlevel="1" lineno="35" slineno="0-35"><bold>53G-8-903</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn></saent></sa></lt><enacthead lineno="36"/><enact numlevel="1" lineno="37" slineno="0-37">Be it enacted by the Legislature of the state of Utah:</enact><bdy><bsec buid="19" num="53G-7-227" type="amend" src="code" uid="C53G-7-S227_2026050620260506" sort="53G07 02270020260506" numlevel="1" lineno="38" slineno="1-1" sn="1"><section number="53G-7-227" numlevel="1" lineno="39" slineno="1-2" type="amend"><secline lineno="38">Section 1. Section <bold>53G-7-227</bold> is amended to read:</secline><catline lineno="39"><bold>53G-7-227<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Device prohibition.</bold></catline><subsection ssid="19-null-73" dnum="1-o" numlevel="1" lineno="40" slineno="1-3" level="1" placement="noreturn"><display>(1)</display>As used in this section:<subsection ssid="19-null-74" dnum="_-o:a-i" numlevel="1" lineno="41" slineno="1-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" space="false"><display><amend anum="0" ea="amend" pairid="1001" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><subsection ssid="19-null-75" dnum="_-o:i-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" placement="sameline"><display><amend anum="0" ea="amend" pairid="1002" style="1" owner="i" level="1">(i)</amend></display><amend anum="0" ea="amend" pairid="0" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" means wearable eyewear, whether prescription or <ln numlevel="1" lineno="42" slineno="1-5"/>non-prescription, that:</amend><subsection ssid="19-null-76" dnum="_-o:A-i" numlevel="1" lineno="43" slineno="1-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1003" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="9" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="end">incorporates one or more sensors, including cameras, microphones, <ln numlevel="1" lineno="44" slineno="1-7"/>accelerometers, gyroscopes, or biometric sensors;</amend></subsection><subsection ssid="19-null-77" dnum="_-o:B-i" numlevel="1" lineno="45" slineno="1-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1004" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="14" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">uses artificial intelligence, machine learning algorithms, or neural networks to <ln numlevel="1" lineno="46" slineno="1-9"/>process, analyze, or interpret data captured by the sensors in real-time or near <ln numlevel="1" lineno="47" slineno="1-10"/>real-time;</amend></subsection><subsection ssid="19-null-78" dnum="_-o:C-i" numlevel="1" lineno="48" slineno="1-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1005" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="19" groupid="14" style="1" owner="jchristopherson" level="1" amendtag="end">provides information, overlays, translations, identification, or other augmented <ln numlevel="1" lineno="49" slineno="1-12"/>content to the wearer through visual displays, audio output, or haptic feedback; <ln numlevel="1" lineno="50" slineno="1-13"/>and</amend></subsection><subsection ssid="19-null-79" dnum="_-o:D-i" numlevel="1" lineno="51" slineno="1-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1006" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="24" groupid="18" style="1" owner="jchristopherson" level="1" amendtag="end">may transmit, store, or share data to external devices, networks, or <ln numlevel="1" lineno="52" slineno="1-15"/>cloud-based services.</amend></subsection></subsection><subsection ssid="19-null-80" dnum="_-o:ii-i" numlevel="1" lineno="53" slineno="1-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1007" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="28" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" does not include:</amend><subsection ssid="19-null-81" dnum="_-o:A-i" numlevel="1" lineno="54" slineno="1-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1008" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="33" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">prescription eyeglasses or sunglasses without electronic components;</amend></subsection><subsection ssid="19-null-82" dnum="_-o:B-i" numlevel="1" lineno="55" slineno="1-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1009" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="38" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">wearable devices used solely for reading glasses or vision correction without <ln numlevel="1" lineno="56" slineno="1-19"/>data collection or processing capabilities;</amend></subsection><subsection ssid="19-null-83" dnum="_-o:C-i" numlevel="1" lineno="57" slineno="1-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1010" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="43" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">protective eyewear that contains only passive sensors without artificial <ln numlevel="1" lineno="58" slineno="1-21"/>intelligence processing capabilities; or</amend></subsection><subsection ssid="19-null-84" dnum="_-o:D-i" numlevel="1" lineno="59" slineno="1-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1011" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="48" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">virtual reality headsets designed primarily for immersive gaming or <ln numlevel="1" lineno="60" slineno="1-23"/>entertainment that are not suitable for continuous wear in public settings.</amend></subsection></subsection></subsection><subsection ssid="19-null-85" dnum="a-o:b-i" numlevel="1" lineno="61" slineno="1-24" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1012" style="2" owner="o" level="1" deltag="both">(a)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1013" style="1" owner="i" level="1" amendtag="both" space="true">(b)</amend></display>"Cellphone" means a handheld, portable electronic device that is designed to be <ln numlevel="1" lineno="62" slineno="1-25"/>operated using one or both hands and is capable of transmitting and receiving voice, <ln numlevel="1" lineno="63" slineno="1-26"/>data, or text communication by means of:<subsection ssid="19-null-86" dnum="i-o" numlevel="1" lineno="64" slineno="1-27" level="3"><display>(i)</display>a cellular network;</subsection><subsection ssid="19-null-87" dnum="ii-o" numlevel="1" lineno="65" slineno="1-28" level="3"><display>(ii)</display>a satellite network; or</subsection><subsection ssid="19-null-88" dnum="iii-o" numlevel="1" lineno="66" slineno="1-29" level="3"><display>(iii)</display>any other wireless technology.</subsection></subsection><subsection ssid="19-null-89" dnum="b-o:c-i" numlevel="1" lineno="67" slineno="1-30" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1016" style="2" owner="o" level="1" deltag="both">(b)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1017" style="1" owner="i" level="1" amendtag="both" space="true">(c)</amend></display>"Cellphone" includes:<subsection ssid="19-null-90" dnum="i-o" numlevel="1" lineno="68" slineno="1-31" level="3"><display>(i)</display>a smartphone;</subsection><subsection ssid="19-null-91" dnum="ii-o" numlevel="1" lineno="69" slineno="1-32" level="3"><display>(ii)</display>a feature phone;</subsection><subsection ssid="19-null-92" dnum="iii-o" numlevel="1" lineno="70" slineno="1-33" level="3"><display>(iii)</display>a mobile phone;</subsection><subsection ssid="19-null-93" dnum="iv-o" numlevel="1" lineno="71" slineno="1-34" level="3"><display>(iv)</display>a satellite phone; or</subsection><subsection ssid="19-null-94" dnum="v-o" numlevel="1" lineno="72" slineno="1-35" level="3"><display>(v)</display>a personal digital assistant that incorporates capabilities similar to a smartphone, <ln numlevel="1" lineno="73" slineno="1-36"/>feature phone, mobile phone, or satellite phone.</subsection></subsection><subsection ssid="19-null-95" dnum="c-o:d-i" numlevel="1" lineno="74" slineno="1-37" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1022" style="2" owner="o" level="1" deltag="both">(c)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1023" style="1" owner="i" level="1" amendtag="both" space="true">(d)</amend></display>"Classroom hours" means:<subsection ssid="19-null-96" dnum="i-o" numlevel="1" lineno="75" slineno="1-38" level="3"><display>(i)</display>time during which a student receives scheduled, teacher-supervised instruction <ln numlevel="1" lineno="76" slineno="1-39"/>that occurs:<subsection ssid="19-null-97" dnum="A-o" numlevel="1" lineno="77" slineno="1-40" level="4"><display>(A)</display>in a physical or virtual classroom setting;</subsection><subsection ssid="19-null-98" dnum="B-o" numlevel="1" lineno="78" slineno="1-41" level="4"><display>(B)</display>during regular school operating hours; and</subsection><subsection ssid="19-null-99" dnum="C-o" numlevel="1" lineno="79" slineno="1-42" level="4"><display>(C)</display>as part of an approved educational curriculum.</subsection></subsection><subsection ssid="19-null-100" dnum="ii-o" numlevel="1" lineno="80" slineno="1-43" level="3"><display>(ii)</display>"Classroom hours" does not include:<subsection ssid="19-null-101" dnum="A-o" numlevel="1" lineno="81" slineno="1-44" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-102" dnum="B-o" numlevel="1" lineno="82" slineno="1-45" level="4"><display>(B)</display>recess;</subsection><subsection ssid="19-null-103" dnum="C-o" numlevel="1" lineno="83" slineno="1-46" level="4"><display>(C)</display>transit time between classes;</subsection><subsection ssid="19-null-104" dnum="D-o" numlevel="1" lineno="84" slineno="1-47" level="4"><display>(D)</display>study halls unless directly supervised by a qualified instructor;</subsection><subsection ssid="19-null-105" dnum="E-o" numlevel="1" lineno="85" slineno="1-48" level="4"><display>(E)</display>after-school activities unless part of an approved extended learning program; or</subsection><subsection ssid="19-null-106" dnum="F-o" numlevel="1" lineno="86" slineno="1-49" level="4"><display>(F)</display>independent study time occurring outside scheduled instruction.</subsection></subsection></subsection><subsection ssid="19-null-107" dnum="d-o:e-i" numlevel="1" lineno="87" slineno="1-50" level="2" space="false"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1034" style="2" owner="o" level="1" deltag="both">(d)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1035" style="1" owner="i" level="1" amendtag="both" space="true">(e)</amend></display><subsection ssid="19-null-108" dnum="i-o" level="3" placement="sameline"><display>(i)</display>"Emerging technology" means any other device that has or will be able to <ln numlevel="1" lineno="88" slineno="1-51"/>act in place of or as an extension of an individual's cellphone.</subsection><subsection ssid="19-null-109" dnum="ii-o" numlevel="1" lineno="89" slineno="1-52" level="3"><display>(ii)</display>"Emerging technology" does not include school provided or required devices.</subsection></subsection><subsection ssid="19-null-110" dnum="e-o:f-i" numlevel="1" lineno="90" slineno="1-53" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1037" style="2" owner="o" level="1" deltag="both">(e)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1038" style="1" owner="i" level="1" amendtag="both" space="true">(f)</amend></display>"Smart watch" means a wearable computing device that closely resembles a <ln numlevel="1" lineno="91" slineno="1-54"/>wristwatch or other time-keeping device with the capacity to act in place of or as an <ln numlevel="1" lineno="92" slineno="1-55"/>extension of an individual's cellphone.</subsection><subsection ssid="19-null-111" dnum="f-o:g-i" numlevel="1" lineno="93" slineno="1-56" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1038" style="2" owner="o" level="1" deltag="both">(f)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1039" style="1" owner="i" level="1" amendtag="both" space="true">(g)</amend></display>"Smart watch" does not include a wearable device that can only:<subsection ssid="19-null-112" dnum="i-o" numlevel="1" lineno="94" slineno="1-57" level="3"><display>(i)</display>tell time;</subsection><subsection ssid="19-null-113" dnum="ii-o" numlevel="1" lineno="95" slineno="1-58" level="3"><display>(ii)</display>monitor an individual's health informatics;</subsection><subsection ssid="19-null-114" dnum="iii-o" numlevel="1" lineno="96" slineno="1-59" level="3"><display>(iii)</display>receive and display notifications or information without the capability to <ln numlevel="1" lineno="97" slineno="1-60"/>respond; or</subsection><subsection ssid="19-null-115" dnum="iv-o" numlevel="1" lineno="98" slineno="1-61" level="3"><display>(iv)</display>track the individual's physical location.</subsection></subsection></subsection><subsection ssid="19-null-116" dnum="2-o" numlevel="1" lineno="99" slineno="1-62" level="1" space="false"><display>(2)</display><subsection ssid="19-null-117" dnum="a-o" level="2" placement="sameline"><display>(a)</display>An LEA:<subsection ssid="19-null-118" dnum="i-o" numlevel="1" lineno="100" slineno="1-63" level="3" tab="1"><display>(i)</display>shall establish a policy that allows a student to use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="49" groupid="38" style="1" owner="jchristopherson" level="1" amendtag="both">AI <ln numlevel="1" lineno="101" slineno="1-64"/>glasses, </amend>or emerging technology:<subsection ssid="19-null-119" dnum="A-o" numlevel="1" lineno="102" slineno="1-65" level="4"><display>(A)</display>to respond to an imminent threat to the health or safety of an individual;</subsection><subsection ssid="19-null-120" dnum="B-o" numlevel="1" lineno="103" slineno="1-66" level="4"><display>(B)</display>to respond to a school-wide emergency;</subsection><subsection ssid="19-null-121" dnum="C-o" numlevel="1" lineno="104" slineno="1-67" level="4"><display>(C)</display>to use the SafeUT Crisis Line described in Section <xref depth="3" refnumber="53H-4-210">53H-4-210</xref>;</subsection><subsection ssid="19-null-122" dnum="D-o" numlevel="1" lineno="105" slineno="1-68" level="4"><display>(D)</display>for a student's IEP or Section 504 accommodation plan; or</subsection><subsection ssid="19-null-123" dnum="E-o" numlevel="1" lineno="106" slineno="1-69" level="4"><display>(E)</display>to address a medical necessity; and</subsection></subsection><subsection ssid="19-null-124" dnum="ii-o" numlevel="1" lineno="107" slineno="1-70" level="3" tab="1"><display>(ii)</display>may establish a policy that provides for other circumstances when a student may <ln numlevel="1" lineno="108" slineno="1-71"/>use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="51" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology.</subsection></subsection><subsection ssid="19-null-125" dnum="b-o" numlevel="1" lineno="109" slineno="1-72" level="2"><display>(b)</display>An LEA may establish policies that:<subsection ssid="19-null-126" dnum="i-o" numlevel="1" lineno="110" slineno="1-73" level="3"><display>(i)</display>extend restrictions on student use of cellphones, smart watches, or emerging <ln numlevel="1" lineno="111" slineno="1-74"/>technologies to non-classroom hours during the school day, including:<subsection ssid="19-null-127" dnum="A-o" numlevel="1" lineno="112" slineno="1-75" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-128" dnum="B-o" numlevel="1" lineno="113" slineno="1-76" level="4"><display>(B)</display>transition times between classes; and</subsection><subsection ssid="19-null-129" dnum="C-o" numlevel="1" lineno="114" slineno="1-77" level="4"><display>(C)</display>other school-supervised activities; and</subsection></subsection><subsection ssid="19-null-130" dnum="ii-o" numlevel="1" lineno="115" slineno="1-78" level="3"><display>(ii)</display>impose additional limitations on the use of cellphones, smart watches, or <ln numlevel="1" lineno="116" slineno="1-79"/>emerging technologies beyond those required by this section.</subsection></subsection></subsection><subsection ssid="19-null-131" dnum="3-o" numlevel="1" lineno="117" slineno="1-80" level="1"><display>(3)</display>Except as provided in Subsection <xref depth="4" refnumber="53G-7-227(2)">(2)</xref>, a student may not use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="54" groupid="42" style="1" owner="jchristopherson" level="1" amendtag="both"><ln numlevel="1" lineno="118" slineno="1-81"/>AI glasses, </amend>or emerging technology at a school during classroom hours.</subsection><subsection ssid="19-null-132" dnum="4-o" numlevel="1" lineno="119" slineno="1-82" level="1"><display>(4)</display>The state board may create one or more model policies regarding when a student may <ln numlevel="1" lineno="120" slineno="1-83"/>use a student's cellphone, smart watch, <amend anum="0" ea="amend" pairid="57" groupid="44" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology in a school <ln numlevel="1" lineno="121" slineno="1-84"/>during classroom hours consistent with this section.</subsection></section></bsec><bsec buid="6" num="53G-8-901" type="enact" src="code" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" numlevel="1" lineno="122" slineno="2-1" sn="2"><section numlevel="1" lineno="124" slineno="2-3" number="53G-8-901" type="enact"><secline lineno="122">Section 2. Section <bold>53G-8-901</bold> is enacted to read:</secline><headpart number="53G-8-9" numlevel="1" lineno="123" slineno="2-2">9. LEA Cybersecurity Standards</headpart><catline lineno="124"><bold>53G-8-901<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. General provisions -- Definitions.</bold></catline><sectionText lineno="125"><para/><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both">As used in this part:</amend></sectionText><subsection ssid="6-15" dnum="_-o:1-i" numlevel="1" lineno="126" slineno="2-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1060" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="4" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">"Cyber Center" means the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref>.</amend></subsection><subsection ssid="6-16" dnum="_-o:2-i" numlevel="1" lineno="127" slineno="2-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1061" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="8" style="1" owner="jchristopherson" level="1" amendtag="end">"Data breach" means the same as that term is defined in Section <xref depth="3" refnumber="63A-16-1101">63A-16-1101</xref>.</amend></subsection><subsection ssid="6-17" dnum="_-o:3-i" numlevel="1" lineno="128" slineno="2-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1062" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">"UETN" means the Utah Education and Telehealth Network created in Section <xref depth="3" refnumber="53H-4-213.4"><ln numlevel="1" lineno="129" slineno="2-8"/>53H-4-213.4</xref>.</amend></subsection></section></bsec><bsec buid="7" num="53G-8-902" type="enact" src="code" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" numlevel="1" lineno="130" slineno="3-1" sn="3"><section numlevel="1" lineno="131" slineno="3-2" number="53G-8-902" type="enact"><secline lineno="130">Section 3. Section <bold>53G-8-902</bold> is enacted to read:</secline><catline lineno="131"><bold>53G-8-902<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. State board to establish minimum cybersecurity <ln numlevel="1" lineno="132" slineno="3-3"/>standards -- Phased implementation -- Coordination with state entities.</bold></catline><subsection ssid="7-1" dnum="_-o:1-i" numlevel="1" lineno="133" slineno="3-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1063" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="387" groupid="169" style="1" owner="jchristopherson" level="1" amendtag="end">In accordance with Title 63G, Chapter 3, Utah Administrative Rulemaking Act, and in <ln numlevel="1" lineno="134" slineno="3-5"/>collaboration with UETN, the state board shall make rules establishing minimum <ln numlevel="1" lineno="135" slineno="3-6"/>cybersecurity standards for an LEA that:</amend><subsection ssid="7-80" dnum="_-o:a-i" numlevel="1" lineno="136" slineno="3-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1064" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="392" groupid="173" style="1" owner="jchristopherson" level="1" amendtag="end">take into account varying LEA resources and needs; and</amend></subsection><subsection ssid="7-81" dnum="_-o:b-i" numlevel="1" lineno="137" slineno="3-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1065" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="397" groupid="177" style="1" owner="jchristopherson" level="1" amendtag="end">may address:</amend><subsection ssid="7-82" dnum="_-o:i-i" numlevel="1" lineno="138" slineno="3-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1066" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="402" groupid="181" style="1" owner="jchristopherson" level="1" amendtag="end">user authentication and access controls;</amend></subsection><subsection ssid="7-83" dnum="_-o:ii-i" numlevel="1" lineno="139" slineno="3-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1067" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="407" groupid="185" style="1" owner="jchristopherson" level="1" amendtag="end">cybersecurity oversight and governance within an LEA;</amend></subsection><subsection ssid="7-84" dnum="_-o:iii-i" numlevel="1" lineno="140" slineno="3-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1068" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="412" groupid="189" style="1" owner="jchristopherson" level="1" amendtag="end">device and endpoint security;</amend></subsection><subsection ssid="7-85" dnum="_-o:iv-i" numlevel="1" lineno="141" slineno="3-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1069" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="417" groupid="193" style="1" owner="jchristopherson" level="1" amendtag="end">cybersecurity awareness and training for staff;</amend></subsection><subsection ssid="7-86" dnum="_-o:v-i" numlevel="1" lineno="142" slineno="3-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1070" style="1" owner="i" level="1" amendtag="start">(v)</amend></display><amend anum="0" ea="amend" pairid="422" groupid="197" style="1" owner="jchristopherson" level="1" amendtag="end">system maintenance and software updates;</amend></subsection><subsection ssid="7-87" dnum="_-o:vi-i" numlevel="1" lineno="143" slineno="3-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1071" style="1" owner="i" level="1" amendtag="start">(vi)</amend></display><amend anum="0" ea="amend" pairid="427" groupid="201" style="1" owner="jchristopherson" level="1" amendtag="end">data backup and recovery procedures;</amend></subsection><subsection ssid="7-88" dnum="_-o:vii-i" numlevel="1" lineno="144" slineno="3-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1072" style="1" owner="i" level="1" amendtag="start">(vii)</amend></display><amend anum="0" ea="amend" pairid="432" groupid="205" style="1" owner="jchristopherson" level="1" amendtag="end">incident response planning and coordination;</amend></subsection><subsection ssid="7-89" dnum="_-o:viii-i" numlevel="1" lineno="145" slineno="3-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1073" style="1" owner="i" level="1" amendtag="start">(viii)</amend></display><amend anum="0" ea="amend" pairid="437" groupid="209" style="1" owner="jchristopherson" level="1" amendtag="end">third-party vendor management and oversight; and</amend></subsection><subsection ssid="7-90" dnum="_-o:ix-i" numlevel="1" lineno="146" slineno="3-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1074" style="1" owner="i" level="1" amendtag="start">(ix)</amend></display><amend anum="0" ea="amend" pairid="442" groupid="213" style="1" owner="jchristopherson" level="1" amendtag="end">phased implementation approaches based on LEA size, capacity, and resources.</amend></subsection></subsection></subsection><subsection ssid="7-60" dnum="_-o:2-i" numlevel="1" lineno="147" slineno="3-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1075" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><subsection ssid="7-61" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1076" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="297" groupid="103" style="1" owner="jchristopherson" level="1" amendtag="end">The state board shall ensure the rules made under Subsection <xref depth="4" refnumber="53G-8-902(1)">(1)</xref> align with <ln numlevel="1" lineno="148" slineno="3-19"/>industry recognized cybersecurity frameworks and best practices.</amend></subsection><subsection ssid="7-62" dnum="_-o:b-i" numlevel="1" lineno="149" slineno="3-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1077" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="308" groupid="109" style="1" owner="jchristopherson" level="1" amendtag="end">The state board may establish different compliance timelines or requirements for <ln numlevel="1" lineno="150" slineno="3-21"/>LEAs based on the LEA's size, existing cybersecurity infrastructure, or available <ln numlevel="1" lineno="151" slineno="3-22"/>resources.</amend></subsection></subsection><subsection ssid="7-63" dnum="_-o:3-i" numlevel="1" lineno="152" slineno="3-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1078" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="309" groupid="110" style="1" owner="jchristopherson" level="1" amendtag="end">The state board, in consultation with the Cyber Center and UETN, shall:</amend><subsection ssid="7-64" dnum="_-o:a-i" numlevel="1" lineno="153" slineno="3-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1079" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="316" groupid="115" style="1" owner="jchristopherson" level="1" amendtag="end">develop implementation guidelines and resources to assist LEAs in meeting the <ln numlevel="1" lineno="154" slineno="3-25"/>minimum cybersecurity standards;</amend></subsection><subsection ssid="7-65" dnum="_-o:b-i" numlevel="1" lineno="155" slineno="3-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1080" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="321" groupid="119" style="1" owner="jchristopherson" level="1" amendtag="end">provide technical assistance and support to LEAs;</amend></subsection><subsection ssid="7-66" dnum="_-o:c-i" numlevel="1" lineno="156" slineno="3-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1081" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="326" groupid="123" style="1" owner="jchristopherson" level="1" amendtag="end">establish a method to assess LEA compliance with the minimum cybersecurity <ln numlevel="1" lineno="157" slineno="3-28"/>standards; and </amend></subsection><subsection ssid="7-67" dnum="_-o:d-i" numlevel="1" lineno="158" slineno="3-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1082" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="331" groupid="127" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate the provision of cybersecurity services and resources to LEAs.</amend></subsection></subsection><subsection ssid="7-68" dnum="_-o:4-i" numlevel="1" lineno="159" slineno="3-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1083" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><subsection ssid="7-69" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1084" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="332" groupid="128" style="1" owner="jchristopherson" level="1" amendtag="end">The Cyber Center, the state board, and UETN shall coordinate services to LEAs <ln numlevel="1" lineno="160" slineno="3-31"/>to:</amend><subsection ssid="7-70" dnum="_-o:i-i" numlevel="1" lineno="161" slineno="3-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1085" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="343" groupid="134" style="1" owner="jchristopherson" level="1" amendtag="end">avoid duplication of efforts;</amend></subsection><subsection ssid="7-71" dnum="_-o:ii-i" numlevel="1" lineno="162" slineno="3-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1086" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="348" groupid="138" style="1" owner="jchristopherson" level="1" amendtag="end">maximize the effectiveness of cybersecurity resources;</amend></subsection><subsection ssid="7-72" dnum="_-o:iii-i" numlevel="1" lineno="163" slineno="3-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1087" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="353" groupid="142" style="1" owner="jchristopherson" level="1" amendtag="end">ensure LEAs receive consistent guidance and support; and</amend></subsection><subsection ssid="7-73" dnum="_-o:iv-i" numlevel="1" lineno="164" slineno="3-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1088" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="358" groupid="146" style="1" owner="jchristopherson" level="1" amendtag="end">facilitate information sharing regarding cybersecurity threats and best practices.</amend></subsection></subsection><subsection ssid="7-74" dnum="_-o:b-i" numlevel="1" lineno="165" slineno="3-36" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1089" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="363" groupid="150" style="1" owner="jchristopherson" level="1" amendtag="end">The coordination required under Subsection <xref depth="4" refnumber="53G-8-902(4)(a)">(4)(a)</xref> shall include:</amend><subsection ssid="7-75" dnum="_-o:i-i" numlevel="1" lineno="166" slineno="3-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1090" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="368" groupid="154" style="1" owner="jchristopherson" level="1" amendtag="end">regular meetings among the entities to discuss LEA cybersecurity needs and <ln numlevel="1" lineno="167" slineno="3-38"/>initiatives;</amend></subsection><subsection ssid="7-76" dnum="_-o:ii-i" numlevel="1" lineno="168" slineno="3-39" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1091" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="373" groupid="158" style="1" owner="jchristopherson" level="1" amendtag="end">joint development of training materials and resources;</amend></subsection><subsection ssid="7-77" dnum="_-o:iii-i" numlevel="1" lineno="169" slineno="3-40" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1092" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="378" groupid="162" style="1" owner="jchristopherson" level="1" amendtag="end">coordinated response to cybersecurity incidents affecting LEAs; and</amend></subsection><subsection ssid="7-78" dnum="_-o:iv-i" numlevel="1" lineno="170" slineno="3-41" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1093" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="383" groupid="166" style="1" owner="jchristopherson" level="1" amendtag="end">alignment of cybersecurity standards and network infrastructure requirements.</amend></subsection></subsection></subsection><subsection ssid="7-79" dnum="_-o:5-i" numlevel="1" lineno="171" slineno="3-42" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1094" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="384" groupid="167" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall comply with the minimum cybersecurity standards established in rule <ln numlevel="1" lineno="172" slineno="3-43"/>under Subsection <xref depth="4" refnumber="53G-8-902(1)">(1)</xref> according to the phased implementation timeline established by the <ln numlevel="1" lineno="173" slineno="3-44"/>state board.</amend></subsection></section></bsec><bsec buid="8" num="53G-8-903" type="enact" src="code" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" numlevel="1" lineno="174" slineno="4-1" sn="4"><section numlevel="1" lineno="175" slineno="4-2" number="53G-8-903" type="enact"><secline lineno="174">Section 4. Section <bold>53G-8-903</bold> is enacted to read:</secline><catline lineno="175"><bold>53G-8-903<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Data breach reporting -- Coordination with <ln numlevel="1" lineno="176" slineno="4-3"/>Utah Cyber Center.</bold></catline><subsection ssid="8-35" dnum="_-o:1-i" numlevel="1" lineno="177" slineno="4-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1095" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="168" groupid="129" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall report a data breach to the Cyber Center in accordance with Section <xref depth="3" refnumber="63A-19-405"><ln numlevel="1" lineno="178" slineno="4-5"/>63A-19-405</xref>.</amend></subsection><subsection ssid="8-41" dnum="_-o:2-i" numlevel="1" lineno="179" slineno="4-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1096" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="172" groupid="132" style="1" owner="jchristopherson" level="1" amendtag="end">In addition to the requirements in Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>, an LEA shall:</amend><subsection ssid="8-42" dnum="_-o:a-i" numlevel="1" lineno="180" slineno="4-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1097" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="177" groupid="136" style="1" owner="jchristopherson" level="1" amendtag="end">notify the state board within 24 hours of discovering the data breach;</amend></subsection><subsection ssid="8-43" dnum="_-o:b-i" numlevel="1" lineno="181" slineno="4-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1098" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="182" groupid="140" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with UETN if the data breach involves network infrastructure or services <ln numlevel="1" lineno="182" slineno="4-9"/>provided by UETN; and</amend></subsection><subsection ssid="8-44" dnum="_-o:c-i" numlevel="1" lineno="183" slineno="4-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1099" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="187" groupid="144" style="1" owner="jchristopherson" level="1" amendtag="end">cooperate with the Cyber Center's investigation and response efforts.</amend></subsection></subsection><subsection ssid="8-45" dnum="_-o:3-i" numlevel="1" lineno="184" slineno="4-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1100" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="188" groupid="145" style="1" owner="jchristopherson" level="1" amendtag="end">In collaboration with UETN, the Cyber Center shall provide assistance to an LEA in <ln numlevel="1" lineno="185" slineno="4-12"/>responding to a data breach in the same manner the Cyber Center provides assistance to <ln numlevel="1" lineno="186" slineno="4-13"/>a governmental entity as described in Title 63A, Chapter 16, Part 11, Utah Cyber Center.</amend></subsection><subsection ssid="8-46" dnum="_-o:4-i" numlevel="1" lineno="187" slineno="4-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1101" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="194" groupid="149" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall:</amend><subsection ssid="8-47" dnum="_-o:a-i" numlevel="1" lineno="188" slineno="4-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1102" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="199" groupid="153" style="1" owner="jchristopherson" level="1" amendtag="end">participate in cybersecurity information sharing initiatives coordinated by the Cyber <ln numlevel="1" lineno="189" slineno="4-16"/>Center;</amend></subsection><subsection ssid="8-48" dnum="_-o:b-i" numlevel="1" lineno="190" slineno="4-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1103" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="204" groupid="157" style="1" owner="jchristopherson" level="1" amendtag="end">designate a primary point of contact for cybersecurity matters who shall interface <ln numlevel="1" lineno="191" slineno="4-18"/>with the Cyber Center, the state board, and UETN; and</amend></subsection><subsection ssid="8-49" dnum="_-o:c-i" numlevel="1" lineno="192" slineno="4-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1104" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="209" groupid="161" style="1" owner="jchristopherson" level="1" amendtag="end">cooperate with statewide cybersecurity assessments and improvement initiatives.</amend></subsection></subsection><subsection ssid="8-50" dnum="_-o:5-i" numlevel="1" lineno="193" slineno="4-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1105" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><subsection ssid="8-51" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1106" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="210" groupid="162" style="1" owner="jchristopherson" level="1" amendtag="end">A regional education service agency, as that term is defined in Section <xref depth="3" refnumber="53G-4-410">53G-4-410</xref>, <ln numlevel="1" lineno="194" slineno="4-21"/>may serve as the designated primary cybersecurity contact for multiple LEAs within <ln numlevel="1" lineno="195" slineno="4-22"/>the service area.</amend></subsection><subsection ssid="8-52" dnum="_-o:b-i" numlevel="1" lineno="196" slineno="4-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1107" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="220" groupid="167" style="1" owner="jchristopherson" level="1" amendtag="end">If a regional education service agency serves as the primary contact under Subsection <xref depth="4" refnumber="53G-8-903(5)(a)"><ln numlevel="1" lineno="197" slineno="4-24"/>(5)(a)</xref>, the agency shall:</amend><subsection ssid="8-53" dnum="_-o:i-i" numlevel="1" lineno="198" slineno="4-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1108" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="225" groupid="171" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with the Cyber Center, the state board, and UETN on behalf of the <ln numlevel="1" lineno="199" slineno="4-26"/>participating LEAs; </amend></subsection><subsection ssid="8-54" dnum="_-o:ii-i" numlevel="1" lineno="200" slineno="4-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1109" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="230" groupid="175" style="1" owner="jchristopherson" level="1" amendtag="end">ensure each participating LEA meets the minimum cybersecurity standards <ln numlevel="1" lineno="201" slineno="4-28"/>established under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>; and</amend></subsection><subsection ssid="8-55" dnum="_-o:iii-i" numlevel="1" lineno="202" slineno="4-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1110" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="235" groupid="179" style="1" owner="jchristopherson" level="1" amendtag="end">maintain documentation of cybersecurity services provided to each LEA.</amend></subsection></subsection></subsection></section></bsec><bsec buid="22" num="53H-4-213.4" type="amend" src="code" uid="C53H-4-S213.4_2026050620260506" sort="53H04 02130420260506" numlevel="1" lineno="203" slineno="5-1" sn="5"><section number="53H-4-213.4" numlevel="1" lineno="204" slineno="5-2" type="amend"><secline lineno="203">Section 5. Section <bold>53H-4-213.4</bold> is amended to read:</secline><catline lineno="204"><bold>53H-4-213.4<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Educational telecommunications -- Utah <ln numlevel="1" lineno="205" slineno="5-3"/>Education and Telehealth Network.</bold></catline><subsection ssid="22-null-1" dnum="1-o" numlevel="1" lineno="206" slineno="5-4" level="1" placement="noreturn"><display>(1)</display>There is created the Utah Education and Telehealth Network, or UETN.</subsection><subsection ssid="22-null-2" dnum="2-o" numlevel="1" lineno="207" slineno="5-5" level="1"><display>(2)</display>UETN shall:<subsection ssid="22-null-3" dnum="a-o" numlevel="1" lineno="208" slineno="5-6" level="2"><display>(a)</display>coordinate and support the telecommunications needs of public and higher education, <ln numlevel="1" lineno="209" slineno="5-7"/>public libraries, and entities affiliated with the state systems of public and higher <ln numlevel="1" lineno="210" slineno="5-8"/>education as approved by the Utah Education and Telehealth Network Board, <ln numlevel="1" lineno="211" slineno="5-9"/>including the statewide development and implementation of a network for education, <ln numlevel="1" lineno="212" slineno="5-10"/>which utilizes satellite, microwave, fiber-optic, broadcast, and other transmission <ln numlevel="1" lineno="213" slineno="5-11"/>media;</subsection><subsection ssid="22-null-4" dnum="b-o" numlevel="1" lineno="214" slineno="5-12" level="2"><display>(b)</display>coordinate the various telecommunications technology initiatives of public and <ln numlevel="1" lineno="215" slineno="5-13"/>higher education;</subsection><subsection ssid="22-null-5" dnum="c-o" numlevel="1" lineno="216" slineno="5-14" level="2"><display>(c)</display>provide high-quality, cost-effective Internet access and appropriate interface <ln numlevel="1" lineno="217" slineno="5-15"/>equipment for schools and school systems;</subsection><subsection ssid="22-null-6" dnum="d-o" numlevel="1" lineno="218" slineno="5-16" level="2"><display>(d)</display>procure, install, and maintain telecommunication services and equipment on behalf <ln numlevel="1" lineno="219" slineno="5-17"/>of public and higher education;</subsection><subsection ssid="22-null-7" dnum="e-o" numlevel="1" lineno="220" slineno="5-18" level="2"><display>(e)</display>develop or implement other programs or services for the delivery of distance learning <ln numlevel="1" lineno="221" slineno="5-19"/>and telehealth services as directed by law;</subsection><subsection ssid="22-null-8" dnum="f-o" numlevel="1" lineno="222" slineno="5-20" level="2"><display>(f)</display>apply for state and federal funding on behalf of:<subsection ssid="22-null-9" dnum="i-o" numlevel="1" lineno="223" slineno="5-21" level="3"><display>(i)</display>public and higher education; and</subsection><subsection ssid="22-null-10" dnum="ii-o" numlevel="1" lineno="224" slineno="5-22" level="3"><display>(ii)</display>telehealth services;</subsection></subsection><subsection ssid="22-null-11" dnum="g-o" numlevel="1" lineno="225" slineno="5-23" level="2"><display>(g)</display>in consultation with health care providers from a variety of health care systems, <ln numlevel="1" lineno="226" slineno="5-24"/>explore and encourage the development of telehealth services as a means of reducing <ln numlevel="1" lineno="227" slineno="5-25"/>health care costs and increasing health care quality and access, with emphasis on <ln numlevel="1" lineno="228" slineno="5-26"/>assisting rural health care providers and special populations; <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="9" groupid="8" style="2" owner="jchristopherson" level="1" deltag="both">and</amend><amendoutend style="2"/></subsection><subsection ssid="22-null-12" dnum="h-o" numlevel="1" lineno="229" slineno="5-27" level="2"><display>(h)</display>in consultation with the Department of Health and Human Services, advise the <ln numlevel="1" lineno="230" slineno="5-28"/>governor and the Legislature on:<subsection ssid="22-null-13" dnum="i-o" numlevel="1" lineno="231" slineno="5-29" level="3"><display>(i)</display>the role of telehealth in the state;</subsection><subsection ssid="22-null-14" dnum="ii-o" numlevel="1" lineno="232" slineno="5-30" level="3"><display>(ii)</display>the policy issues related to telehealth;</subsection><subsection ssid="22-null-15" dnum="iii-o" numlevel="1" lineno="233" slineno="5-31" level="3"><display>(iii)</display>the changing telehealth needs and resources in the state; and</subsection><subsection ssid="22-null-16" dnum="iv-o" numlevel="1" lineno="234" slineno="5-32" level="3"><display>(iv)</display>state budgetary matters related to telehealth<amendoutstart style="2"/><amend anum="0" ea="erase" pairid="10" groupid="9" style="2" owner="jchristopherson" level="1" deltag="both">.</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="7" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">; and</amend></subsection></subsection><subsection ssid="22-58" dnum="_-o:i-i" numlevel="1" lineno="235" slineno="5-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1127" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref> to:</amend><subsection ssid="22-59" dnum="_-o:i-i" numlevel="1" lineno="236" slineno="5-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1128" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="end">implement network-level security controls for local education agencies;</amend></subsection><subsection ssid="22-60" dnum="_-o:ii-i" numlevel="1" lineno="237" slineno="5-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1129" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="15" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">support cybersecurity incident response when network infrastructure is affected; <ln numlevel="1" lineno="238" slineno="5-36"/>and</amend></subsection><subsection ssid="22-61" dnum="_-o:iii-i" numlevel="1" lineno="239" slineno="5-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1130" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="18" groupid="15" style="1" owner="jchristopherson" level="1" amendtag="end">ensure alignment between network infrastructure and cybersecurity standards <ln numlevel="1" lineno="240" slineno="5-38"/>required under Section <xref depth="3" refnumber="53G-8-902">53G-8-902</xref>.</amend></subsection></subsection></subsection><subsection ssid="22-null-17" dnum="3-o" numlevel="1" lineno="241" slineno="5-39" level="1"><display>(3)</display>In performing the duties under Subsection <xref depth="4" refnumber="53B-17-105(2)" start="0">(2)</xref>, UETN shall:<subsection ssid="22-null-18" dnum="a-o" numlevel="1" lineno="242" slineno="5-40" level="2"><display>(a)</display>provide services to schools, school districts, and the public and higher education <ln numlevel="1" lineno="243" slineno="5-41"/>systems through an open and competitive bidding process;</subsection><subsection ssid="22-null-19" dnum="b-o" numlevel="1" lineno="244" slineno="5-42" level="2"><display>(b)</display>work with the private sector to deliver high-quality, cost-effective services;</subsection><subsection ssid="22-null-20" dnum="c-o" numlevel="1" lineno="245" slineno="5-43" level="2"><display>(c)</display>avoid duplicating facilities, equipment, or services of private providers or public <ln numlevel="1" lineno="246" slineno="5-44"/>telecommunications service, as defined under Section <xref depth="3" refnumber="54-8b-2" start="0">54-8b-2</xref>;</subsection><subsection ssid="22-null-21" dnum="d-o" numlevel="1" lineno="247" slineno="5-45" level="2"><display>(d)</display>utilize statewide economic development criteria in the design and implementation of <ln numlevel="1" lineno="248" slineno="5-46"/>the educational telecommunications infrastructure; and</subsection><subsection ssid="22-null-22" dnum="e-o" numlevel="1" lineno="249" slineno="5-47" level="2"><display>(e)</display>assure that public service entities, such as educators, public service providers, and <ln numlevel="1" lineno="250" slineno="5-48"/>public broadcasters, are provided access to the telecommunications infrastructure <ln numlevel="1" lineno="251" slineno="5-49"/>developed in the state.</subsection></subsection><subsection ssid="22-null-23" dnum="4-o" numlevel="1" lineno="252" slineno="5-50" level="1"><display>(4)</display>The University of Utah shall provide administrative support for UETN.</subsection><subsection ssid="22-null-24" dnum="5-o" numlevel="1" lineno="253" slineno="5-51" level="1" space="false"><display>(5)</display><subsection ssid="22-null-25" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The Utah Education and Telehealth Network Board, which is the governing board <ln numlevel="1" lineno="254" slineno="5-52"/>for UETN, is created.</subsection><subsection ssid="22-null-26" dnum="b-o" numlevel="1" lineno="255" slineno="5-53" level="2"><display>(b)</display>The Utah Education and Telehealth Network Board shall have 13 members as <ln numlevel="1" lineno="256" slineno="5-54"/>follows:<subsection ssid="22-null-27" dnum="i-o" numlevel="1" lineno="257" slineno="5-55" level="3"><display>(i)</display>five members representing the state system of higher education, of which at least <ln numlevel="1" lineno="258" slineno="5-56"/>one member represents technical colleges, appointed by the commissioner of <ln numlevel="1" lineno="259" slineno="5-57"/>higher education;</subsection><subsection ssid="22-null-28" dnum="ii-o" numlevel="1" lineno="260" slineno="5-58" level="3"><display>(ii)</display>four members representing the state system of public education appointed by the <ln numlevel="1" lineno="261" slineno="5-59"/>State Board of Education;</subsection><subsection ssid="22-null-29" dnum="iii-o" numlevel="1" lineno="262" slineno="5-60" level="3"><display>(iii)</display>one member representing the state library appointed by the state librarian;</subsection><subsection ssid="22-null-30" dnum="iv-o" numlevel="1" lineno="263" slineno="5-61" level="3"><display>(iv)</display>two members representing hospitals as follows:<subsection ssid="22-null-31" dnum="A-o" numlevel="1" lineno="264" slineno="5-62" level="4"><display>(A)</display>the members may not be employed by the same hospital system;</subsection><subsection ssid="22-null-32" dnum="B-o" numlevel="1" lineno="265" slineno="5-63" level="4"><display>(B)</display>one member shall represent a rural hospital;</subsection><subsection ssid="22-null-33" dnum="C-o" numlevel="1" lineno="266" slineno="5-64" level="4"><display>(C)</display>one member shall represent an urban hospital; and</subsection><subsection ssid="22-null-34" dnum="D-o" numlevel="1" lineno="267" slineno="5-65" level="4"><display>(D)</display>the chief administrator or the administrator's designee for each hospital <ln numlevel="1" lineno="268" slineno="5-66"/>licensed in this state shall select the two hospital representatives; and</subsection></subsection><subsection ssid="22-null-35" dnum="v-o" numlevel="1" lineno="269" slineno="5-67" level="3"><display>(v)</display>one member representing the office of the governor, appointed by the governor.</subsection></subsection><subsection ssid="22-null-36" dnum="c-o" numlevel="1" lineno="270" slineno="5-68" level="2"><display>(c)</display>When a vacancy occurs in the membership for any reason, the replacement shall be <ln numlevel="1" lineno="271" slineno="5-69"/>appointed for the unexpired term.</subsection><subsection ssid="22-null-37" dnum="d-o" numlevel="1" lineno="272" slineno="5-70" level="2" space="false"><display>(d)</display><subsection ssid="22-null-38" dnum="i-o" level="3" placement="sameline"><display>(i)</display>The Utah Education and Telehealth Network Board shall elect a chair.</subsection><subsection ssid="22-null-39" dnum="ii-o" numlevel="1" lineno="273" slineno="5-71" level="3"><display>(ii)</display>The chair shall set the agenda for the Utah Education and Telehealth Network <ln numlevel="1" lineno="274" slineno="5-72"/>Board meetings.</subsection></subsection></subsection><subsection ssid="22-null-40" dnum="6-o" numlevel="1" lineno="275" slineno="5-73" level="1"><display>(6)</display>A member of the Utah Education and Telehealth Network Board may not receive <ln numlevel="1" lineno="276" slineno="5-74"/>compensation or benefits for the member's service, but may receive per diem and travel <ln numlevel="1" lineno="277" slineno="5-75"/>expenses in accordance with:<subsection ssid="22-null-41" dnum="a-o" numlevel="1" lineno="278" slineno="5-76" level="2"><display>(a)</display>Section <xref depth="3" refnumber="63A-3-106" start="0">63A-3-106</xref>;</subsection><subsection ssid="22-null-42" dnum="b-o" numlevel="1" lineno="279" slineno="5-77" level="2"><display>(b)</display>Section <xref depth="3" refnumber="63A-3-107" start="0">63A-3-107</xref>; and</subsection><subsection ssid="22-null-43" dnum="c-o" numlevel="1" lineno="280" slineno="5-78" level="2"><display>(c)</display>rules made by the Division of Finance pursuant to Sections <xref depth="3" refnumber="63A-3-106" start="0">63A-3-106</xref> and <xref depth="3" refnumber="63A-3-107" start="0"><ln numlevel="1" lineno="281" slineno="5-79"/>63A-3-107</xref>.</subsection></subsection><subsection ssid="22-null-44" dnum="7-o" numlevel="1" lineno="282" slineno="5-80" level="1"><display>(7)</display>The Utah Education and Telehealth Network Board:<subsection ssid="22-null-45" dnum="a-o" numlevel="1" lineno="283" slineno="5-81" level="2"><display>(a)</display>shall hire an executive director for UETN who may hire staff for UETN as permitted <ln numlevel="1" lineno="284" slineno="5-82"/>by the budget;</subsection><subsection ssid="22-null-46" dnum="b-o" numlevel="1" lineno="285" slineno="5-83" level="2"><display>(b)</display>may terminate the executive director's employment or assignment;</subsection><subsection ssid="22-null-47" dnum="c-o" numlevel="1" lineno="286" slineno="5-84" level="2"><display>(c)</display>shall determine the executive director's salary;</subsection><subsection ssid="22-null-48" dnum="d-o" numlevel="1" lineno="287" slineno="5-85" level="2"><display>(d)</display>shall annually conduct a performance evaluation of the executive director;</subsection><subsection ssid="22-null-49" dnum="e-o" numlevel="1" lineno="288" slineno="5-86" level="2"><display>(e)</display>shall establish policies the Utah Education and Telehealth Network Board determines <ln numlevel="1" lineno="289" slineno="5-87"/>are necessary for the operation of UETN and the administration of UETN's duties; <ln numlevel="1" lineno="290" slineno="5-88"/>and</subsection><subsection ssid="22-null-50" dnum="f-o" numlevel="1" lineno="291" slineno="5-89" level="2"><display>(f)</display>shall advise UETN in:<subsection ssid="22-null-51" dnum="i-o" numlevel="1" lineno="292" slineno="5-90" level="3"><display>(i)</display>the development and operation of a coordinated, statewide, multi-option <ln numlevel="1" lineno="293" slineno="5-91"/>telecommunications system to assist in the delivery of educational services and <ln numlevel="1" lineno="294" slineno="5-92"/>telehealth services throughout the state; and</subsection><subsection ssid="22-null-52" dnum="ii-o" numlevel="1" lineno="295" slineno="5-93" level="3"><display>(ii)</display>acquiring, producing, and distributing instructional content.</subsection></subsection></subsection><subsection ssid="22-null-53" dnum="8-o" numlevel="1" lineno="296" slineno="5-94" level="1"><display>(8)</display>The executive director of UETN shall be an at-will employee.</subsection><subsection ssid="22-null-54" dnum="9-o" numlevel="1" lineno="297" slineno="5-95" level="1"><display>(9)</display>UETN shall locate and maintain educational and telehealth telecommunication <ln numlevel="1" lineno="298" slineno="5-96"/>infrastructure throughout the state.</subsection><subsection ssid="22-null-55" dnum="10-o" numlevel="1" lineno="299" slineno="5-97" level="1"><display>(10)</display>Educational institutions shall manage site operations under policy established by <ln numlevel="1" lineno="300" slineno="5-98"/>UETN.</subsection><subsection ssid="22-null-56" dnum="11-o" numlevel="1" lineno="301" slineno="5-99" level="1"><display>(11)</display>Subject to future budget constraints, the Legislature shall provide an annual <ln numlevel="1" lineno="302" slineno="5-100"/>appropriation to operate UETN.</subsection><subsection ssid="22-null-57" dnum="12-o" numlevel="1" lineno="303" slineno="5-101" level="1"><display>(12)</display>If the network operated by the Division of Technology Services is not available, <ln numlevel="1" lineno="304" slineno="5-102"/>UETN may provide network connections to the central administration of counties and <ln numlevel="1" lineno="305" slineno="5-103"/>municipalities for the sole purpose of transferring data to a secure facility for backup and <ln numlevel="1" lineno="306" slineno="5-104"/>disaster recovery.</subsection></section></bsec><bsec buid="14" num="63C-27-201" type="amend" src="code" uid="C63C-27-S201_2026050620260506" sort="63C27 02010020260506" numlevel="1" lineno="307" slineno="6-1" sn="6"><section number="63C-27-201" numlevel="1" lineno="308" slineno="6-2" type="amend"><secline lineno="307">Section 6. Section <bold>63C-27-201</bold> is amended to read:</secline><catline lineno="308"><bold>63C-27-201<parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens>. Cybersecurity Commission <ln numlevel="1" lineno="309" slineno="6-3"/>created.</bold></catline><subsection ssid="14-null-1" dnum="1-o" numlevel="1" lineno="310" slineno="6-4" level="1" placement="noreturn"><display>(1)</display>There is created the Cybersecurity Commission.</subsection><subsection ssid="14-null-2" dnum="2-o" numlevel="1" lineno="311" slineno="6-5" level="1"><display>(2)</display>The commission shall be composed of <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="6" groupid="5" style="2" owner="jchristopherson" level="1" deltag="both">24</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="5" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">the following</amend> members:<subsection ssid="14-null-3" dnum="a-o" numlevel="1" lineno="312" slineno="6-6" level="2"><display>(a)</display>one member the governor designates to serve as the governor's designee;</subsection><subsection ssid="14-null-4" dnum="b-o" numlevel="1" lineno="313" slineno="6-7" level="2"><display>(b)</display>the commissioner of the Department of Public Safety;</subsection><subsection ssid="14-null-5" dnum="c-o" numlevel="1" lineno="314" slineno="6-8" level="2"><display>(c)</display>the lieutenant governor, or an election officer, as that term is defined in Section <xref depth="3" refnumber="20A-1-102" start="0"><ln numlevel="1" lineno="315" slineno="6-9"/>20A-1-102</xref>, the lieutenant governor designates to serve as the lieutenant governor's <ln numlevel="1" lineno="316" slineno="6-10"/>designee;</subsection><subsection ssid="14-null-6" dnum="d-o" numlevel="1" lineno="317" slineno="6-11" level="2"><display>(d)</display>the chief information officer of the Division of Technology Services;</subsection><subsection ssid="14-null-7" dnum="e-o" numlevel="1" lineno="318" slineno="6-12" level="2"><display>(e)</display>the chief information security officer, as described in Section <xref depth="3" refnumber="63A-16-210" start="0">63A-16-210</xref>;</subsection><subsection ssid="14-null-8" dnum="f-o" numlevel="1" lineno="319" slineno="6-13" level="2"><display>(f)</display>the chairman of the Public Service Commission shall designate a representative with <ln numlevel="1" lineno="320" slineno="6-14"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-9" dnum="g-o" numlevel="1" lineno="321" slineno="6-15" level="2"><display>(g)</display>the executive director of the Utah Department of Transportation shall designate a <ln numlevel="1" lineno="322" slineno="6-16"/>representative with professional experience in information technology or <ln numlevel="1" lineno="323" slineno="6-17"/>cybersecurity;</subsection><subsection ssid="14-null-10" dnum="h-o" numlevel="1" lineno="324" slineno="6-18" level="2"><display>(h)</display>the director of the Division of Finance shall designate a representative with <ln numlevel="1" lineno="325" slineno="6-19"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-11" dnum="i-o" numlevel="1" lineno="326" slineno="6-20" level="2"><display>(i)</display>the executive director of the Department of Health and Human Services shall <ln numlevel="1" lineno="327" slineno="6-21"/>designate a representative with professional experience in information technology or <ln numlevel="1" lineno="328" slineno="6-22"/>cybersecurity;</subsection><subsection ssid="14-null-12" dnum="j-o" numlevel="1" lineno="329" slineno="6-23" level="2"><display>(j)</display>the director of the Division of Indian Affairs shall designate a representative with <ln numlevel="1" lineno="330" slineno="6-24"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-13" dnum="k-o" numlevel="1" lineno="331" slineno="6-25" level="2"><display>(k)</display>the Utah League of Cities and Towns shall designate a representative with <ln numlevel="1" lineno="332" slineno="6-26"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-14" dnum="l-o" numlevel="1" lineno="333" slineno="6-27" level="2"><display>(l)</display>the Utah Association of Counties shall designate a representative with professional <ln numlevel="1" lineno="334" slineno="6-28"/>experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-15" dnum="m-o" numlevel="1" lineno="335" slineno="6-29" level="2"><display>(m)</display>the attorney general, or the attorney general's designee;</subsection><subsection ssid="14-null-16" dnum="n-o" numlevel="1" lineno="336" slineno="6-30" level="2"><display>(n)</display>the commissioner of financial institutions, or the commissioner's designee;</subsection><subsection ssid="14-null-17" dnum="o-o" numlevel="1" lineno="337" slineno="6-31" level="2"><display>(o)</display>the executive director of the Department of Environmental Quality shall designate a <ln numlevel="1" lineno="338" slineno="6-32"/>representative with professional experience in information technology or <ln numlevel="1" lineno="339" slineno="6-33"/>cybersecurity;</subsection><subsection ssid="14-null-18" dnum="p-o" numlevel="1" lineno="340" slineno="6-34" level="2"><display>(p)</display>the executive director of the Department of Natural Resources shall designate a <ln numlevel="1" lineno="341" slineno="6-35"/>representative with professional experience in information technology or <ln numlevel="1" lineno="342" slineno="6-36"/>cybersecurity;</subsection><subsection ssid="14-54" dnum="_-o:q-i" numlevel="1" lineno="343" slineno="6-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1190" style="1" owner="i" level="1" amendtag="start">(q)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">two local education agency employees tasked with job duties that include systems <ln numlevel="1" lineno="344" slineno="6-38"/>and security management from one charter school and one school district whom the <ln numlevel="1" lineno="345" slineno="6-39"/>state superintendent selects;</amend></subsection><subsection ssid="14-null-19" dnum="q-o:r-i" numlevel="1" lineno="346" slineno="6-40" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1191" style="2" owner="o" level="1" deltag="both">(q)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1192" style="1" owner="i" level="1" amendtag="both" space="true">(r)</amend></display>the highest ranking information technology official, or the official's designee, <ln numlevel="1" lineno="347" slineno="6-41"/>from each of:<subsection ssid="14-null-20" dnum="i-o" numlevel="1" lineno="348" slineno="6-42" level="3"><display>(i)</display>the Judicial Council;</subsection><subsection ssid="14-null-21" dnum="ii-o" numlevel="1" lineno="349" slineno="6-43" level="3"><display>(ii)</display>the Utah Board of Higher Education;</subsection><subsection ssid="14-null-22" dnum="iii-o" numlevel="1" lineno="350" slineno="6-44" level="3"><display>(iii)</display>the State Board of Education; and</subsection><subsection ssid="14-null-23" dnum="iv-o" numlevel="1" lineno="351" slineno="6-45" level="3"><display>(iv)</display>the State Tax Commission;</subsection></subsection><subsection ssid="14-null-24" dnum="r-o:s-i" numlevel="1" lineno="352" slineno="6-46" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1196" style="2" owner="o" level="1" deltag="both">(r)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1197" style="1" owner="i" level="1" amendtag="both" space="true">(s)</amend></display>the governor shall appoint:<subsection ssid="14-null-25" dnum="i-o" numlevel="1" lineno="353" slineno="6-47" level="3"><display>(i)</display>one representative from the Utah National Guard; and</subsection><subsection ssid="14-null-26" dnum="ii-o" numlevel="1" lineno="354" slineno="6-48" level="3"><display>(ii)</display>one representative from the Governor's Office of Economic Opportunity;</subsection></subsection><subsection ssid="14-null-27" dnum="s-o:t-i" numlevel="1" lineno="355" slineno="6-49" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1199" style="2" owner="o" level="1" deltag="both">(s)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1200" style="1" owner="i" level="1" amendtag="both" space="true">(t)</amend></display>the president of the Senate shall appoint one member of the Senate; and</subsection><subsection ssid="14-null-28" dnum="t-o:u-i" numlevel="1" lineno="356" slineno="6-50" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1200" style="2" owner="o" level="1" deltag="both">(t)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1201" style="1" owner="i" level="1" amendtag="both" space="true">(u)</amend></display>the speaker of the House of Representatives shall appoint one member of the <ln numlevel="1" lineno="357" slineno="6-51"/>House of Representatives.</subsection></subsection><subsection ssid="14-null-29" dnum="3-o" numlevel="1" lineno="358" slineno="6-52" level="1" space="false"><display>(3)</display><subsection ssid="14-null-30" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The governor's designee shall serve as cochair of the commission.</subsection><subsection ssid="14-null-31" dnum="b-o" numlevel="1" lineno="359" slineno="6-53" level="2"><display>(b)</display>The commissioner of the Department of Public Safety shall serve as cochair of the <ln numlevel="1" lineno="360" slineno="6-54"/>commission.</subsection></subsection><subsection ssid="14-null-32" dnum="4-o" numlevel="1" lineno="361" slineno="6-55" level="1" space="false"><display>(4)</display><subsection ssid="14-null-33" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall represent urban, rural, and <ln numlevel="1" lineno="362" slineno="6-56"/>suburban population areas.</subsection><subsection ssid="14-null-34" dnum="b-o" numlevel="1" lineno="363" slineno="6-57" level="2"><display>(b)</display>No fewer than half of the members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall have <ln numlevel="1" lineno="364" slineno="6-58"/>professional experience in cybersecurity or in information technology.</subsection></subsection><subsection ssid="14-null-35" dnum="5-o" numlevel="1" lineno="365" slineno="6-59" level="1"><display>(5)</display>In addition to the membership described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref>, the commission shall seek <ln numlevel="1" lineno="366" slineno="6-60"/>information and advice from state and private entities with expertise in critical <ln numlevel="1" lineno="367" slineno="6-61"/>infrastructure.</subsection><subsection ssid="14-null-36" dnum="6-o" numlevel="1" lineno="368" slineno="6-62" level="1"><display>(6)</display>As necessary to improve information and protect potential vulnerabilities, the <ln numlevel="1" lineno="369" slineno="6-63"/>commission shall seek information and advice from federal entities including:<subsection ssid="14-null-37" dnum="a-o" numlevel="1" lineno="370" slineno="6-64" level="2"><display>(a)</display>the Cybersecurity and Infrastructure Security Agency;</subsection><subsection ssid="14-null-38" dnum="b-o" numlevel="1" lineno="371" slineno="6-65" level="2"><display>(b)</display>the Federal Energy Regulatory Commission;</subsection><subsection ssid="14-null-39" dnum="c-o" numlevel="1" lineno="372" slineno="6-66" level="2"><display>(c)</display>the Federal Bureau of Investigation; and</subsection><subsection ssid="14-null-40" dnum="d-o" numlevel="1" lineno="373" slineno="6-67" level="2"><display>(d)</display>the United States Department of Transportation.</subsection></subsection><subsection ssid="14-null-41" dnum="7-o" numlevel="1" lineno="374" slineno="6-68" level="1" space="false"><display>(7)</display><subsection ssid="14-null-42" dnum="a-o" level="2" placement="sameline"><display>(a)</display>Except as provided in Subsections <xref depth="4" refnumber="63C-27-201(7)(b)" start="0">(7)(b)</xref> and <xref depth="4" refnumber="63C-27-201(7)(c)" start="0">(c)</xref>, a member is appointed for a <ln numlevel="1" lineno="375" slineno="6-69"/>term of four years.</subsection><subsection ssid="14-null-43" dnum="b-o" numlevel="1" lineno="376" slineno="6-70" level="2"><display>(b)</display>A member shall serve until the member's successor is appointed and qualified.</subsection><subsection ssid="14-null-44" dnum="c-o" numlevel="1" lineno="377" slineno="6-71" level="2"><display>(c)</display>Notwithstanding the requirements of Subsection <xref depth="4" refnumber="63C-27-201(7)(a)" start="0">(7)(a)</xref>, the governor shall, at the <ln numlevel="1" lineno="378" slineno="6-72"/>time of appointment or reappointment, adjust the length of terms to ensure that the <ln numlevel="1" lineno="379" slineno="6-73"/>terms of commission members are staggered so that approximately half of the <ln numlevel="1" lineno="380" slineno="6-74"/>commission members appointed under Subsection <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="14" groupid="12" style="2" owner="jchristopherson" level="1" deltag="both"><xref depth="4" refnumber="63C-27-201(2)(r)" start="0">(2)(r)</xref></amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="13" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">(2)</amend> are appointed every two <ln numlevel="1" lineno="381" slineno="6-75"/>years.</subsection></subsection><subsection ssid="14-null-45" dnum="8-o" numlevel="1" lineno="382" slineno="6-76" level="1" space="false"><display>(8)</display><subsection ssid="14-null-46" dnum="a-o" level="2" placement="sameline"><display>(a)</display>If a vacancy occurs in the membership of the commission, the member shall be <ln numlevel="1" lineno="383" slineno="6-77"/>replaced in the same manner in which the original appointment was made.</subsection><subsection ssid="14-null-47" dnum="b-o" numlevel="1" lineno="384" slineno="6-78" level="2"><display>(b)</display>An individual may be appointed to more than one term.</subsection><subsection ssid="14-null-48" dnum="c-o" numlevel="1" lineno="385" slineno="6-79" level="2"><display>(c)</display>When a vacancy occurs in the membership for any reason, the replacement shall be <ln numlevel="1" lineno="386" slineno="6-80"/>appointed for the unexpired term.</subsection></subsection><subsection ssid="14-null-49" dnum="9-o" numlevel="1" lineno="387" slineno="6-81" level="1" space="false"><display>(9)</display><subsection ssid="14-null-50" dnum="a-o" level="2" placement="sameline"><display>(a)</display>A majority of the members of the commission is a quorum.</subsection><subsection ssid="14-null-51" dnum="b-o" numlevel="1" lineno="388" slineno="6-82" level="2"><display>(b)</display>The action of a majority of a quorum constitutes an action of the commission.</subsection></subsection><subsection ssid="14-null-52" dnum="10-o" numlevel="1" lineno="389" slineno="6-83" level="1"><display>(10)</display>The commission shall meet at least two times a year.</subsection></section></bsec><bsec buid="30" type="uncod" untype="effdate" src="uncod" uid="EF0000" sort="UZEFF" langlock="true" numlevel="1" lineno="390" slineno="7-1" sn="7"><section type="uncod" untype="effdate" display="false" src="uncod"><secline lineno="390">Section 7.  <bold>Effective Date.</bold></secline><sectionText lineno="391"><amend anum="0" ea="amend" pairid="1" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="both">This bill takes effect on <effdate uid="code" date="5/6/2026">May 6, 2026</effdate>.</amend></sectionText></section></bsec></bdy><foot><rev><tm>2-2-26 9:49 AM</tm></rev></foot></leg>