<?xml version="1.0" encoding="UTF-16"?>
<leg xml:space="preserve" billnum="HB0042" sponsor="Ryan D. Wilcox" designation="HB" otherSponsor="Ann Millner" otherHouse="Senate" subNumber="03" subSponsor="Ryan D. Wilcox" sess="2026GS" fileno="2026FL0072" date="2/13/2026 12:02:493" printDate="02-19 15:05" subVer="3" minVer="0" office="LEGISLATIVE GENERAL COUNSEL" actionDate="" impact="code"><info><nextbuid>45</nextbuid><aminfo anum="0" effdate="05/06/2026"><seclist><sect action="A" src="code" buid="19" uid="C53G-7-S227_2026050620260506" fromuid="C53G-7-S227_2025101420251206" sort="53G07 02270020260506" mtype="section" effdate="05/06/2026">53G-7-227</sect><sect action="E" src="code" buid="6" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" mtype="section" effdate="05/06/2026">53G-8-901</sect><sect action="E" src="code" buid="36" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" mtype="section" effdate="05/06/2026">53G-8-902</sect><sect action="E" src="code" buid="34" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" mtype="section" effdate="05/06/2026">53G-8-903</sect><sect action="A" src="code" buid="14" uid="C63C-27-S201_2026050620260506" fromuid="C63C-27-S201_2022050420220504" sort="63C27 02010020260506" mtype="section" effdate="05/06/2026" libenddate="07/01/2032" endtype="SN">63C-27-201</sect><sect action="A" src="code" buid="39" uid="C63C-27-S202_2026050620260506" fromuid="C63C-27-S202_2022050420220504" sort="63C27 02020020260506" mtype="section" effdate="05/06/2026" libenddate="07/01/2032" endtype="SN">63C-27-202</sect><sect src="uncod" untype="effdate" buid="44" uid="EF0000" sort="UZEFF" mtype="uncod" effdate="05/06/2026"/><sect src="uncod" untype="coord" buid="43" uid="CRD0000" sort="UZT00000" mtype="uncod" effdate="05/06/2026" ccid="2786"><ccbill>HB0042</ccbill><ccbill>SB0069</ccbill><ccsect uid="C53G-7-S227_2026050620260506">53G-7-227 (05/06/26)</ccsect></sect></seclist></aminfo></info><tbox><sinfo><nextpairid>0</nextpairid></sinfo><st numlevel="1" lineno="1" slineno="0-1">School Cybersecurity Amendments</st><sessionhead>2026 GENERAL SESSION</sessionhead><statehead>STATE OF UTAH</statehead><sponsorhead>Chief Sponsor: Ryan D. Wilcox</sponsorhead><otherSponsorhead>Senate Sponsor: Ann Millner</otherSponsorhead></tbox><lt numlevel="1" lineno="2" slineno="0-2"><lthead lineno="3">LONG TITLE</lthead><gdhead lineno="4">General Description:</gdhead><gd numlevel="1" lineno="5" slineno="0-5">This bill directs the State Board of Education to establish minimum cybersecurity standards <ln numlevel="1" lineno="6" slineno="0-6"/>for local education agencies.</gd><hphead lineno="7">Highlighted Provisions:</hphead><hp numlevel="1" lineno="8" slineno="0-8">This bill:<hl numlevel="1" lineno="9" slineno="0-9" level="1">prohibits certain devices in schools;</hl><hl numlevel="1" lineno="10" slineno="0-10" level="1">directs the Cybersecurity Commission to make rules establishing minimum cybersecurity <ln numlevel="1" lineno="11" slineno="0-11"/>standards for local education agencies (LEAs) aligned with industry recognized <ln numlevel="1" lineno="12" slineno="0-12"/>frameworks;</hl><hl numlevel="1" lineno="13" slineno="0-13" level="1">establishes a phased implementation timeline for LEA compliance;</hl><hl numlevel="1" lineno="14" slineno="0-14" level="1">requires coordination among the Utah Cyber Center, the State Board of Education, and <ln numlevel="1" lineno="15" slineno="0-15"/>the Utah Education and Telehealth Network;</hl><hl numlevel="1" lineno="16" slineno="0-16" level="1">establishes reporting requirements for cybersecurity incidents;</hl><hl numlevel="1" lineno="17" slineno="0-17" level="1">requires the State Board of Education to provide implementation support and resources; </hl><hl numlevel="1" lineno="18" slineno="0-18" level="1">includes a coordination clause to incorporate changes made to Section 53G-7-227 with <ln numlevel="1" lineno="19" slineno="0-19"/>changes made to that section in S.B. 69, School Device Revisions; and</hl><hl numlevel="1" lineno="20" slineno="0-20" level="1">makes conforming changes.</hl></hp><moni numlevel="1" lineno="21" slineno="0-21" display="none">Money Appropriated in this Bill:</moni><moniNone lineno="22">None</moniNone><oc numlevel="1" lineno="23" slineno="0-23">Other Special Clauses:<ocl type="coord" sort="4" numlevel="1" lineno="24" slineno="0-24">This bill provides a coordination clause.</ocl></oc><sa numlevel="1" lineno="25" slineno="0-25">Utah Code Sections Affected:<saamd numlevel="1" lineno="26" slineno="0-26"><snhead>AMENDS:</snhead><sn num="53G-7-227" src="code" uid="C53G-7-S227_2026050620260506" buid="19" sort="53G07 02270020260506" numlevel="1" lineno="27" slineno="0-27"><bold>53G-7-227</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , as last amended by Laws of Utah 2025, First Special <ln numlevel="1" lineno="28" slineno="0-28"/>Session, Chapter 9</sn><sn num="63C-27-201" src="code" uid="C63C-27-S201_2026050620260506" buid="14" sort="63C27 02010020260506" numlevel="1" lineno="29" slineno="0-29"><bold>63C-27-201</bold><parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens> , as enacted by Laws of Utah 2022, <ln numlevel="1" lineno="30" slineno="0-30"/>Chapter 153</sn><sn num="63C-27-202" src="code" uid="C63C-27-S202_2026050620260506" buid="39" sort="63C27 02020020260506" numlevel="1" lineno="31" slineno="0-31"><bold>63C-27-202</bold><parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens> , as enacted by Laws of Utah 2022, <ln numlevel="1" lineno="32" slineno="0-32"/>Chapter 153</sn></saamd><saent numlevel="1" lineno="33" slineno="0-33"><snhead>ENACTS:</snhead><sn num="53G-8-901" src="code" uid="C53G-8-S901_2026050620260506" buid="6" sort="53G08 09010020260506" numlevel="1" lineno="34" slineno="0-34"><bold>53G-8-901</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn><sn num="53G-8-902" src="code" uid="C53G-8-S902_2026050620260506" buid="36" sort="53G08 09020020260506" numlevel="1" lineno="35" slineno="0-35"><bold>53G-8-902</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn><sn num="53G-8-903" src="code" uid="C53G-8-S903_2026050620260506" buid="34" sort="53G08 09030020260506" numlevel="1" lineno="36" slineno="0-36"><bold>53G-8-903</bold><parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens> , Utah Code Annotated 1953</sn></saent></sa><da type="code" numlevel="1" lineno="37" slineno="0-37">Utah Code Sections Affected by Coordination Clause:<daamd><sn num="53G-7-227 (05/06/26)" uid="CRD0000" buid="43" src="code" sort="53G07 227 00" numlevel="1" lineno="38" slineno="0-38"><bold>53G-7-227 (05/06/26)</bold>, as last amended by Laws of Utah 2025, First Special Session, <ln numlevel="1" lineno="39" slineno="0-39"/>Chapter 9</sn></daamd></da></lt><enacthead lineno="40"/><enact numlevel="1" lineno="41" slineno="0-41">Be it enacted by the Legislature of the state of Utah:</enact><bdy><bsec buid="19" num="53G-7-227" type="amend" src="code" uid="C53G-7-S227_2026050620260506" sort="53G07 02270020260506" numlevel="1" lineno="43" slineno="1-2" sn="1"><flags numlevel="1" lineno="42" slineno="1-1">The following section is affected by a coordination clause at the end of this bill.</flags><section number="53G-7-227" numlevel="1" lineno="44" slineno="1-3" type="amend"><secline lineno="43">Section 1. Section <bold>53G-7-227</bold> is amended to read:</secline><catline lineno="44"><bold>53G-7-227<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Device prohibition.</bold></catline><subsection ssid="19-null-73" dnum="1-o" numlevel="1" lineno="45" slineno="1-4" level="1" placement="noreturn"><display>(1)</display>As used in this section:<subsection ssid="19-null-74" dnum="_-o:a-i" numlevel="1" lineno="46" slineno="1-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" space="false"><display><amend anum="0" ea="amend" pairid="1001" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><subsection ssid="19-null-75" dnum="_-o:i-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" placement="sameline"><display><amend anum="0" ea="amend" pairid="1002" style="1" owner="i" level="1">(i)</amend></display><amend anum="0" ea="amend" pairid="0" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" means wearable eyewear, whether prescription or <ln numlevel="1" lineno="47" slineno="1-6"/>non-prescription, that:</amend><subsection ssid="19-null-76" dnum="_-o:A-i" numlevel="1" lineno="48" slineno="1-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1003" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="9" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="end">incorporates one or more sensors, including cameras, microphones, <ln numlevel="1" lineno="49" slineno="1-8"/>accelerometers, gyroscopes, or biometric sensors;</amend></subsection><subsection ssid="19-null-77" dnum="_-o:B-i" numlevel="1" lineno="50" slineno="1-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1004" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="14" groupid="10" style="1" owner="jchristopherson" level="1" amendtag="end">uses artificial intelligence, machine learning algorithms, or neural networks to <ln numlevel="1" lineno="51" slineno="1-10"/>process, analyze, or interpret data captured by the sensors in real-time or near <ln numlevel="1" lineno="52" slineno="1-11"/>real-time;</amend></subsection><subsection ssid="19-null-78" dnum="_-o:C-i" numlevel="1" lineno="53" slineno="1-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1005" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="19" groupid="14" style="1" owner="jchristopherson" level="1" amendtag="end">provides information, overlays, translations, identification, or other augmented <ln numlevel="1" lineno="54" slineno="1-13"/>content to the wearer through visual displays, audio output, or haptic feedback; <ln numlevel="1" lineno="55" slineno="1-14"/>and</amend></subsection><subsection ssid="19-null-79" dnum="_-o:D-i" numlevel="1" lineno="56" slineno="1-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="4" tab="1"><display><amend anum="0" ea="amend" pairid="1006" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="24" groupid="18" style="1" owner="jchristopherson" level="1" amendtag="end">may transmit, store, or share data to external devices, networks, or <ln numlevel="1" lineno="57" slineno="1-16"/>cloud-based services.</amend></subsection></subsection><subsection ssid="19-null-80" dnum="_-o:ii-i" numlevel="1" lineno="58" slineno="1-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1007" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="28" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">"AI glasses" does not include:</amend><subsection ssid="19-null-81" dnum="_-o:A-i" numlevel="1" lineno="59" slineno="1-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1008" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="33" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">prescription eyeglasses or sunglasses without electronic components;</amend></subsection><subsection ssid="19-null-82" dnum="_-o:B-i" numlevel="1" lineno="60" slineno="1-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1009" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="38" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">wearable devices used solely for reading glasses or vision correction without <ln numlevel="1" lineno="61" slineno="1-20"/>data collection or processing capabilities;</amend></subsection><subsection ssid="19-null-83" dnum="_-o:C-i" numlevel="1" lineno="62" slineno="1-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1010" style="1" owner="i" level="1" amendtag="start">(C)</amend></display><amend anum="0" ea="amend" pairid="43" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">protective eyewear that contains only passive sensors without artificial <ln numlevel="1" lineno="63" slineno="1-22"/>intelligence processing capabilities; or</amend></subsection><subsection ssid="19-null-84" dnum="_-o:D-i" numlevel="1" lineno="64" slineno="1-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1011" style="1" owner="i" level="1" amendtag="start">(D)</amend></display><amend anum="0" ea="amend" pairid="48" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">virtual reality headsets designed primarily for immersive gaming or <ln numlevel="1" lineno="65" slineno="1-24"/>entertainment that are not suitable for continuous wear in public settings.</amend></subsection></subsection></subsection><subsection ssid="19-null-85" dnum="a-o:b-i" numlevel="1" lineno="66" slineno="1-25" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1012" style="2" owner="o" level="1" deltag="both">(a)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1013" style="1" owner="i" level="1" amendtag="both" space="true">(b)</amend></display>"Cellphone" means a handheld, portable electronic device that is designed to be <ln numlevel="1" lineno="67" slineno="1-26"/>operated using one or both hands and is capable of transmitting and receiving voice, <ln numlevel="1" lineno="68" slineno="1-27"/>data, or text communication by means of:<subsection ssid="19-null-86" dnum="i-o" numlevel="1" lineno="69" slineno="1-28" level="3"><display>(i)</display>a cellular network;</subsection><subsection ssid="19-null-87" dnum="ii-o" numlevel="1" lineno="70" slineno="1-29" level="3"><display>(ii)</display>a satellite network; or</subsection><subsection ssid="19-null-88" dnum="iii-o" numlevel="1" lineno="71" slineno="1-30" level="3"><display>(iii)</display>any other wireless technology.</subsection></subsection><subsection ssid="19-null-89" dnum="b-o:c-i" numlevel="1" lineno="72" slineno="1-31" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1016" style="2" owner="o" level="1" deltag="both">(b)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1017" style="1" owner="i" level="1" amendtag="both" space="true">(c)</amend></display>"Cellphone" includes:<subsection ssid="19-null-90" dnum="i-o" numlevel="1" lineno="73" slineno="1-32" level="3"><display>(i)</display>a smartphone;</subsection><subsection ssid="19-null-91" dnum="ii-o" numlevel="1" lineno="74" slineno="1-33" level="3"><display>(ii)</display>a feature phone;</subsection><subsection ssid="19-null-92" dnum="iii-o" numlevel="1" lineno="75" slineno="1-34" level="3"><display>(iii)</display>a mobile phone;</subsection><subsection ssid="19-null-93" dnum="iv-o" numlevel="1" lineno="76" slineno="1-35" level="3"><display>(iv)</display>a satellite phone; or</subsection><subsection ssid="19-null-94" dnum="v-o" numlevel="1" lineno="77" slineno="1-36" level="3"><display>(v)</display>a personal digital assistant that incorporates capabilities similar to a smartphone, <ln numlevel="1" lineno="78" slineno="1-37"/>feature phone, mobile phone, or satellite phone.</subsection></subsection><subsection ssid="19-null-95" dnum="c-o:d-i" numlevel="1" lineno="79" slineno="1-38" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1022" style="2" owner="o" level="1" deltag="both">(c)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1023" style="1" owner="i" level="1" amendtag="both" space="true">(d)</amend></display>"Classroom hours" means:<subsection ssid="19-null-96" dnum="i-o" numlevel="1" lineno="80" slineno="1-39" level="3"><display>(i)</display>time during which a student receives scheduled, teacher-supervised instruction <ln numlevel="1" lineno="81" slineno="1-40"/>that occurs:<subsection ssid="19-null-97" dnum="A-o" numlevel="1" lineno="82" slineno="1-41" level="4"><display>(A)</display>in a physical or virtual classroom setting;</subsection><subsection ssid="19-null-98" dnum="B-o" numlevel="1" lineno="83" slineno="1-42" level="4"><display>(B)</display>during regular school operating hours; and</subsection><subsection ssid="19-null-99" dnum="C-o" numlevel="1" lineno="84" slineno="1-43" level="4"><display>(C)</display>as part of an approved educational curriculum.</subsection></subsection><subsection ssid="19-null-100" dnum="ii-o" numlevel="1" lineno="85" slineno="1-44" level="3"><display>(ii)</display>"Classroom hours" does not include:<subsection ssid="19-null-101" dnum="A-o" numlevel="1" lineno="86" slineno="1-45" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-102" dnum="B-o" numlevel="1" lineno="87" slineno="1-46" level="4"><display>(B)</display>recess;</subsection><subsection ssid="19-null-103" dnum="C-o" numlevel="1" lineno="88" slineno="1-47" level="4"><display>(C)</display>transit time between classes;</subsection><subsection ssid="19-null-104" dnum="D-o" numlevel="1" lineno="89" slineno="1-48" level="4"><display>(D)</display>study halls unless directly supervised by a qualified instructor;</subsection><subsection ssid="19-null-105" dnum="E-o" numlevel="1" lineno="90" slineno="1-49" level="4"><display>(E)</display>after-school activities unless part of an approved extended learning program; or</subsection><subsection ssid="19-null-106" dnum="F-o" numlevel="1" lineno="91" slineno="1-50" level="4"><display>(F)</display>independent study time occurring outside scheduled instruction.</subsection></subsection></subsection><subsection ssid="19-null-107" dnum="d-o:e-i" numlevel="1" lineno="92" slineno="1-51" level="2" space="false"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1034" style="2" owner="o" level="1" deltag="both">(d)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1035" style="1" owner="i" level="1" amendtag="both" space="true">(e)</amend></display><subsection ssid="19-null-108" dnum="i-o" level="3" placement="sameline"><display>(i)</display>"Emerging technology" means any other device that has or will be able to <ln numlevel="1" lineno="93" slineno="1-52"/>act in place of or as an extension of an individual's cellphone.</subsection><subsection ssid="19-null-109" dnum="ii-o" numlevel="1" lineno="94" slineno="1-53" level="3"><display>(ii)</display>"Emerging technology" does not include school provided or required devices.</subsection></subsection><subsection ssid="19-null-110" dnum="e-o:f-i" numlevel="1" lineno="95" slineno="1-54" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1037" style="2" owner="o" level="1" deltag="both">(e)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1038" style="1" owner="i" level="1" amendtag="both" space="true">(f)</amend></display>"Smart watch" means a wearable computing device that closely resembles a <ln numlevel="1" lineno="96" slineno="1-55"/>wristwatch or other time-keeping device with the capacity to act in place of or as an <ln numlevel="1" lineno="97" slineno="1-56"/>extension of an individual's cellphone.</subsection><subsection ssid="19-null-111" dnum="f-o:g-i" numlevel="1" lineno="98" slineno="1-57" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1038" style="2" owner="o" level="1" deltag="both">(f)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1039" style="1" owner="i" level="1" amendtag="both" space="true">(g)</amend></display>"Smart watch" does not include a wearable device that can only:<subsection ssid="19-null-112" dnum="i-o" numlevel="1" lineno="99" slineno="1-58" level="3"><display>(i)</display>tell time;</subsection><subsection ssid="19-null-113" dnum="ii-o" numlevel="1" lineno="100" slineno="1-59" level="3"><display>(ii)</display>monitor an individual's health informatics;</subsection><subsection ssid="19-null-114" dnum="iii-o" numlevel="1" lineno="101" slineno="1-60" level="3"><display>(iii)</display>receive and display notifications or information without the capability to <ln numlevel="1" lineno="102" slineno="1-61"/>respond; or</subsection><subsection ssid="19-null-115" dnum="iv-o" numlevel="1" lineno="103" slineno="1-62" level="3"><display>(iv)</display>track the individual's physical location.</subsection></subsection></subsection><subsection ssid="19-null-116" dnum="2-o" numlevel="1" lineno="104" slineno="1-63" level="1" space="false"><display>(2)</display><subsection ssid="19-null-117" dnum="a-o" level="2" placement="sameline"><display>(a)</display>An LEA:<subsection ssid="19-null-118" dnum="i-o" numlevel="1" lineno="105" slineno="1-64" level="3" tab="1"><display>(i)</display>shall establish a policy that allows a student to use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="49" groupid="38" style="1" owner="jchristopherson" level="1" amendtag="both">AI <ln numlevel="1" lineno="106" slineno="1-65"/>glasses, </amend>or emerging technology:<subsection ssid="19-null-119" dnum="A-o" numlevel="1" lineno="107" slineno="1-66" level="4"><display>(A)</display>to respond to an imminent threat to the health or safety of an individual;</subsection><subsection ssid="19-null-120" dnum="B-o" numlevel="1" lineno="108" slineno="1-67" level="4"><display>(B)</display>to respond to a school-wide emergency;</subsection><subsection ssid="19-null-121" dnum="C-o" numlevel="1" lineno="109" slineno="1-68" level="4"><display>(C)</display>to use the SafeUT Crisis Line described in Section <xref depth="3" refnumber="53H-4-210">53H-4-210</xref>;</subsection><subsection ssid="19-null-122" dnum="D-o" numlevel="1" lineno="110" slineno="1-69" level="4"><display>(D)</display>for a student's IEP or Section 504 accommodation plan; or</subsection><subsection ssid="19-null-123" dnum="E-o" numlevel="1" lineno="111" slineno="1-70" level="4"><display>(E)</display>to address a medical necessity; and</subsection></subsection><subsection ssid="19-null-124" dnum="ii-o" numlevel="1" lineno="112" slineno="1-71" level="3" tab="1"><display>(ii)</display>may establish a policy that provides for other circumstances when a student may <ln numlevel="1" lineno="113" slineno="1-72"/>use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="51" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology.</subsection></subsection><subsection ssid="19-null-125" dnum="b-o" numlevel="1" lineno="114" slineno="1-73" level="2"><display>(b)</display>An LEA may establish policies that:<subsection ssid="19-null-126" dnum="i-o" numlevel="1" lineno="115" slineno="1-74" level="3"><display>(i)</display>extend restrictions on student use of cellphones, smart watches, or emerging <ln numlevel="1" lineno="116" slineno="1-75"/>technologies to non-classroom hours during the school day, including:<subsection ssid="19-null-127" dnum="A-o" numlevel="1" lineno="117" slineno="1-76" level="4"><display>(A)</display>lunch periods;</subsection><subsection ssid="19-null-128" dnum="B-o" numlevel="1" lineno="118" slineno="1-77" level="4"><display>(B)</display>transition times between classes; and</subsection><subsection ssid="19-null-129" dnum="C-o" numlevel="1" lineno="119" slineno="1-78" level="4"><display>(C)</display>other school-supervised activities; and</subsection></subsection><subsection ssid="19-null-130" dnum="ii-o" numlevel="1" lineno="120" slineno="1-79" level="3"><display>(ii)</display>impose additional limitations on the use of cellphones, smart watches, or <ln numlevel="1" lineno="121" slineno="1-80"/>emerging technologies beyond those required by this section.</subsection></subsection></subsection><subsection ssid="19-null-131" dnum="3-o" numlevel="1" lineno="122" slineno="1-81" level="1"><display>(3)</display>Except as provided in Subsection <xref depth="4" refnumber="53G-7-227(2)">(2)</xref>, a student may not use a cellphone, smart watch, <amend anum="0" ea="amend" pairid="54" groupid="42" style="1" owner="jchristopherson" level="1" amendtag="both"><ln numlevel="1" lineno="123" slineno="1-82"/>AI glasses, </amend>or emerging technology at a school during classroom hours.</subsection><subsection ssid="19-null-132" dnum="4-o" numlevel="1" lineno="124" slineno="1-83" level="1"><display>(4)</display>The state board may create one or more model policies regarding when a student may <ln numlevel="1" lineno="125" slineno="1-84"/>use a student's cellphone, smart watch, <amend anum="0" ea="amend" pairid="57" groupid="44" style="1" owner="jchristopherson" level="1" amendtag="both">AI glasses, </amend>or emerging technology in a school <ln numlevel="1" lineno="126" slineno="1-85"/>during classroom hours consistent with this section.</subsection></section></bsec><bsec buid="6" num="53G-8-901" type="enact" src="code" uid="C53G-8-S901_2026050620260506" sort="53G08 09010020260506" numlevel="1" lineno="127" slineno="2-1" sn="2"><section numlevel="1" lineno="129" slineno="2-3" number="53G-8-901" type="enact"><secline lineno="127">Section 2. Section <bold>53G-8-901</bold> is enacted to read:</secline><headpart number="53G-8-9" numlevel="1" lineno="128" slineno="2-2">9. LEA Cybersecurity Standards</headpart><catline lineno="129"><bold>53G-8-901<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. General provisions -- Definitions.</bold></catline><sectionText lineno="130"><para/><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both">As used in this part:</amend></sectionText><subsection ssid="6-15" dnum="_-o:1-i" numlevel="1" lineno="131" slineno="2-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1060" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="4" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">"Cyber Center" means the Utah Cyber Center created in Section <xref depth="3" refnumber="63A-16-1102">63A-16-1102</xref>.</amend></subsection><subsection ssid="6-16" dnum="_-o:2-i" numlevel="1" lineno="132" slineno="2-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1061" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="8" style="1" owner="jchristopherson" level="1" amendtag="end">"Data breach" means the same as that term is defined in Section <xref depth="3" refnumber="63A-16-1101">63A-16-1101</xref>.</amend></subsection><subsection ssid="6-17" dnum="_-o:3-i" numlevel="1" lineno="133" slineno="2-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1062" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">"UETN" means the Utah Education and Telehealth Network created in Section <xref depth="3" refnumber="53H-4-213.4"><ln numlevel="1" lineno="134" slineno="2-8"/>53H-4-213.4</xref>.</amend></subsection></section></bsec><bsec buid="36" num="53G-8-902" type="enact" src="code" uid="C53G-8-S902_2026050620260506" sort="53G08 09020020260506" numlevel="1" lineno="135" slineno="3-1" sn="3"><section numlevel="1" lineno="136" slineno="3-2" number="53G-8-902" type="enact"><secline lineno="135">Section 3. Section <bold>53G-8-902</bold> is enacted to read:</secline><catline lineno="136"><bold>53G-8-902<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. LEA compliance with cybersecurity standards -- <ln numlevel="1" lineno="137" slineno="3-3"/>Coordination.</bold></catline><subsection ssid="36-1" dnum="_-o:1-i" numlevel="1" lineno="138" slineno="3-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1063" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall comply with the minimum cybersecurity standards established by the <ln numlevel="1" lineno="139" slineno="3-5"/>Cybersecurity Commission created in Section <xref depth="3" refnumber="63C-27-201">63C-27-201</xref> in rule made in accordance <ln numlevel="1" lineno="140" slineno="3-6"/>with Subsection <xref depth="4" refnumber="63C-27-202(9)">63C-27-202(9)</xref>.</amend></subsection><subsection ssid="36-2" dnum="_-o:2-i" numlevel="1" lineno="141" slineno="3-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1064" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall comply with the minimum cybersecurity standards according to the <ln numlevel="1" lineno="142" slineno="3-8"/>phased implementation timeline established in rule under Subsection <xref depth="4" refnumber="63C-27-202(9)">63C-27-202(9)</xref>.</amend></subsection><subsection ssid="36-3" dnum="_-o:3-i" numlevel="1" lineno="143" slineno="3-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1065" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">UETN, in consultation with the Cyber Center and the state board, shall:</amend><subsection ssid="36-4" dnum="_-o:a-i" numlevel="1" lineno="144" slineno="3-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1066" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">develop implementation guidelines and technical resources to assist LEAs in  <ln numlevel="1" lineno="145" slineno="3-11"/>meeting the minimum cybersecurity standards;</amend></subsection><subsection ssid="36-5" dnum="_-o:b-i" numlevel="1" lineno="146" slineno="3-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1067" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">provide technical assistance and support to LEAs; and</amend></subsection><subsection ssid="36-7" dnum="_-o:c-i" numlevel="1" lineno="147" slineno="3-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1068" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate the provision of cybersecurity services and resources to LEAs.</amend></subsection></subsection><subsection ssid="36-8" dnum="_-o:4-i" numlevel="1" lineno="148" slineno="3-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1069" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><subsection ssid="36-9" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1070" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">The Cyber Center, the state board, and UETN shall coordinate services to LEAs <ln numlevel="1" lineno="149" slineno="3-15"/>to:</amend><subsection ssid="36-10" dnum="_-o:i-i" numlevel="1" lineno="150" slineno="3-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1071" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="48" groupid="35" style="1" owner="jchristopherson" level="1" amendtag="end">avoid duplication of efforts;</amend></subsection><subsection ssid="36-11" dnum="_-o:ii-i" numlevel="1" lineno="151" slineno="3-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1072" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="53" groupid="39" style="1" owner="jchristopherson" level="1" amendtag="end">maximize the effectiveness of cybersecurity resources;</amend></subsection><subsection ssid="36-12" dnum="_-o:iii-i" numlevel="1" lineno="152" slineno="3-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1073" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="58" groupid="43" style="1" owner="jchristopherson" level="1" amendtag="end">ensure LEAs receive consistent guidance and support; and</amend></subsection><subsection ssid="36-13" dnum="_-o:iv-i" numlevel="1" lineno="153" slineno="3-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" tab="1"><display><amend anum="0" ea="amend" pairid="1074" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="63" groupid="47" style="1" owner="jchristopherson" level="1" amendtag="end">facilitate information sharing regarding cybersecurity threats and best practices.</amend></subsection></subsection><subsection ssid="36-14" dnum="_-o:b-i" numlevel="1" lineno="154" slineno="3-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1075" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="68" groupid="51" style="1" owner="jchristopherson" level="1" amendtag="end">The coordination required under Subsection <xref depth="4" refnumber="53G-8-902(4)(a)">(4)(a)</xref> shall include:</amend><subsection ssid="36-15" dnum="_-o:i-i" numlevel="1" lineno="155" slineno="3-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1076" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="73" groupid="55" style="1" owner="jchristopherson" level="1" amendtag="end">regular meetings among the entities to discuss LEA cybersecurity needs and <ln numlevel="1" lineno="156" slineno="3-22"/>initiatives;</amend></subsection><subsection ssid="36-16" dnum="_-o:ii-i" numlevel="1" lineno="157" slineno="3-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1077" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="78" groupid="59" style="1" owner="jchristopherson" level="1" amendtag="end">joint development of training materials and resources;</amend></subsection><subsection ssid="36-17" dnum="_-o:iii-i" numlevel="1" lineno="158" slineno="3-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1078" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="83" groupid="63" style="1" owner="jchristopherson" level="1" amendtag="end">coordinated response to cybersecurity incidents affecting LEAs; and</amend></subsection><subsection ssid="36-18" dnum="_-o:iv-i" numlevel="1" lineno="159" slineno="3-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1079" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="88" groupid="67" style="1" owner="jchristopherson" level="1" amendtag="end">alignment of cybersecurity standards and network infrastructure requirements.</amend></subsection></subsection></subsection></section></bsec><bsec buid="34" num="53G-8-903" type="enact" src="code" uid="C53G-8-S903_2026050620260506" sort="53G08 09030020260506" numlevel="1" lineno="160" slineno="4-1" sn="4"><section numlevel="1" lineno="161" slineno="4-2" number="53G-8-903" type="enact"><secline lineno="160">Section 4. Section <bold>53G-8-903</bold> is enacted to read:</secline><catline lineno="161"><bold>53G-8-903<parens><paren sort="00" type="original" show="true"><effect>Effective </effect><date>05/06/26</date></paren></parens>. Data breach reporting -- Coordination with <ln numlevel="1" lineno="162" slineno="4-3"/>Utah Cyber Center.</bold></catline><subsection ssid="34-32-72" dnum="_-o:1-i" numlevel="1" lineno="163" slineno="4-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1080" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="168" groupid="129" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall report a data breach to the Cyber Center:</amend><subsection ssid="34-88" dnum="_-o:a-i" numlevel="1" lineno="164" slineno="4-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1081" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="240" groupid="183" style="1" owner="jchristopherson" level="1" amendtag="end">in accordance with Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>; and</amend></subsection><subsection ssid="34-89" dnum="_-o:b-i" numlevel="1" lineno="165" slineno="4-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1082" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="245" groupid="187" style="1" owner="jchristopherson" level="1" amendtag="end">consistent with standards and procedures established in rule under Subsection <xref depth="4" refnumber="63C-27-202(9)"><ln numlevel="1" lineno="166" slineno="4-7"/>63C-27-202(9)</xref>.</amend></subsection></subsection><subsection ssid="34-32-73" dnum="_-o:2-i" numlevel="1" lineno="167" slineno="4-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1083" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="172" groupid="132" style="1" owner="jchristopherson" level="1" amendtag="end">In addition to the requirements in Section <xref depth="3" refnumber="63A-19-405">63A-19-405</xref>, an LEA shall:</amend><subsection ssid="34-32-74" dnum="_-o:a-i" numlevel="1" lineno="168" slineno="4-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1084" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="177" groupid="136" style="1" owner="jchristopherson" level="1" amendtag="end">notify the state board within 24 hours of discovering the data breach;</amend></subsection><subsection ssid="34-32-75" dnum="_-o:b-i" numlevel="1" lineno="169" slineno="4-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1085" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="182" groupid="140" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with UETN if the data breach involves network infrastructure or services <ln numlevel="1" lineno="170" slineno="4-11"/>provided by UETN; and</amend></subsection><subsection ssid="34-32-76" dnum="_-o:c-i" numlevel="1" lineno="171" slineno="4-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1086" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="187" groupid="144" style="1" owner="jchristopherson" level="1" amendtag="end">cooperate with the Cyber Center's investigation and response efforts.</amend></subsection></subsection><subsection ssid="34-32-77" dnum="_-o:3-i" numlevel="1" lineno="172" slineno="4-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1087" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="188" groupid="145" style="1" owner="jchristopherson" level="1" amendtag="end">The Cyber Center shall provide assistance to an LEA in responding to a data breach in <ln numlevel="1" lineno="173" slineno="4-14"/>the same manner the Cyber Center provides assistance to a governmental entity as <ln numlevel="1" lineno="174" slineno="4-15"/>described in Title 63A, Chapter 16, Part 11, Utah Cyber Center.</amend></subsection><subsection ssid="34-32-78" dnum="_-o:4-i" numlevel="1" lineno="175" slineno="4-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1088" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="194" groupid="149" style="1" owner="jchristopherson" level="1" amendtag="end">An LEA shall:</amend><subsection ssid="34-32-79" dnum="_-o:a-i" numlevel="1" lineno="176" slineno="4-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1089" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="199" groupid="153" style="1" owner="jchristopherson" level="1" amendtag="end">participate in cybersecurity information sharing initiatives coordinated by the Cyber <ln numlevel="1" lineno="177" slineno="4-18"/>Center;</amend></subsection><subsection ssid="34-32-80" dnum="_-o:b-i" numlevel="1" lineno="178" slineno="4-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1090" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="204" groupid="157" style="1" owner="jchristopherson" level="1" amendtag="end">designate a primary point of contact for cybersecurity matters who shall interface <ln numlevel="1" lineno="179" slineno="4-20"/>with the Cyber Center, the state board, and UETN; and</amend></subsection><subsection ssid="34-32-81" dnum="_-o:c-i" numlevel="1" lineno="180" slineno="4-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1091" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="209" groupid="161" style="1" owner="jchristopherson" level="1" amendtag="end">cooperate with statewide cybersecurity assessments and improvement initiatives.</amend></subsection></subsection><subsection ssid="34-32-82" dnum="_-o:5-i" numlevel="1" lineno="181" slineno="4-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1092" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><subsection ssid="34-32-83" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1093" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="210" groupid="162" style="1" owner="jchristopherson" level="1" amendtag="end">A regional education service agency, as that term is defined in Section <xref depth="3" refnumber="53G-4-410">53G-4-410</xref>, <ln numlevel="1" lineno="182" slineno="4-23"/>may serve as the designated primary cybersecurity contact for multiple LEAs within <ln numlevel="1" lineno="183" slineno="4-24"/>the service area.</amend></subsection><subsection ssid="34-32-84" dnum="_-o:b-i" numlevel="1" lineno="184" slineno="4-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1094" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="220" groupid="167" style="1" owner="jchristopherson" level="1" amendtag="end">If a regional education service agency serves as the primary contact under Subsection <xref depth="4" refnumber="53G-8-903(5)(a)"><ln numlevel="1" lineno="185" slineno="4-26"/>(5)(a)</xref>, the agency shall:</amend><subsection ssid="34-32-85" dnum="_-o:i-i" numlevel="1" lineno="186" slineno="4-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1095" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="225" groupid="171" style="1" owner="jchristopherson" level="1" amendtag="end">coordinate with the Cyber Center, the state board, and UETN on behalf of the <ln numlevel="1" lineno="187" slineno="4-28"/>participating LEAs;</amend></subsection><subsection ssid="34-32-86" dnum="_-o:ii-i" numlevel="1" lineno="188" slineno="4-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1096" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="230" groupid="175" style="1" owner="jchristopherson" level="1" amendtag="end">ensure each participating LEA meets the minimum cybersecurity standards <ln numlevel="1" lineno="189" slineno="4-30"/>established under Subsection <xref depth="4" refnumber="63C-27-202(9)">63C-27-202(9)</xref>; and</amend></subsection><subsection ssid="34-32-87" dnum="_-o:iii-i" numlevel="1" lineno="190" slineno="4-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1097" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="235" groupid="179" style="1" owner="jchristopherson" level="1" amendtag="end">maintain documentation of cybersecurity services provided to each LEA.</amend></subsection></subsection></subsection></section></bsec><bsec buid="14" num="63C-27-201" type="amend" src="code" uid="C63C-27-S201_2026050620260506" sort="63C27 02010020260506" numlevel="1" lineno="191" slineno="5-1" sn="5"><section number="63C-27-201" numlevel="1" lineno="192" slineno="5-2" type="amend"><secline lineno="191">Section 5. Section <bold>63C-27-201</bold> is amended to read:</secline><catline lineno="192"><bold>63C-27-201<parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens>. Cybersecurity Commission <ln numlevel="1" lineno="193" slineno="5-3"/>created.</bold></catline><subsection ssid="14-null-1" dnum="1-o" numlevel="1" lineno="194" slineno="5-4" level="1" placement="noreturn"><display>(1)</display>There is created the Cybersecurity Commission.</subsection><subsection ssid="14-null-2" dnum="2-o" numlevel="1" lineno="195" slineno="5-5" level="1"><display>(2)</display>The commission shall be composed of <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="6" groupid="5" style="2" owner="jchristopherson" level="1" deltag="both">24</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="5" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="both" space="true">the following</amend> members:<subsection ssid="14-null-3" dnum="a-o" numlevel="1" lineno="196" slineno="5-6" level="2"><display>(a)</display>one member the governor designates to serve as the governor's designee;</subsection><subsection ssid="14-null-4" dnum="b-o" numlevel="1" lineno="197" slineno="5-7" level="2"><display>(b)</display>the commissioner of the Department of Public Safety;</subsection><subsection ssid="14-null-5" dnum="c-o" numlevel="1" lineno="198" slineno="5-8" level="2"><display>(c)</display>the lieutenant governor, or an election officer, as that term is defined in Section <xref depth="3" refnumber="20A-1-102" start="0"><ln numlevel="1" lineno="199" slineno="5-9"/>20A-1-102</xref>, the lieutenant governor designates to serve as the lieutenant governor's <ln numlevel="1" lineno="200" slineno="5-10"/>designee;</subsection><subsection ssid="14-null-6" dnum="d-o" numlevel="1" lineno="201" slineno="5-11" level="2"><display>(d)</display>the chief information officer of the Division of Technology Services;</subsection><subsection ssid="14-null-7" dnum="e-o" numlevel="1" lineno="202" slineno="5-12" level="2"><display>(e)</display>the chief information security officer, as described in Section <xref depth="3" refnumber="63A-16-210" start="0">63A-16-210</xref>;</subsection><subsection ssid="14-null-8" dnum="f-o" numlevel="1" lineno="203" slineno="5-13" level="2"><display>(f)</display>the chairman of the Public Service Commission shall designate a representative with <ln numlevel="1" lineno="204" slineno="5-14"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-9" dnum="g-o" numlevel="1" lineno="205" slineno="5-15" level="2"><display>(g)</display>the executive director of the Utah Department of Transportation shall designate a <ln numlevel="1" lineno="206" slineno="5-16"/>representative with professional experience in information technology or <ln numlevel="1" lineno="207" slineno="5-17"/>cybersecurity;</subsection><subsection ssid="14-null-10" dnum="h-o" numlevel="1" lineno="208" slineno="5-18" level="2"><display>(h)</display>the director of the Division of Finance shall designate a representative with <ln numlevel="1" lineno="209" slineno="5-19"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-11" dnum="i-o" numlevel="1" lineno="210" slineno="5-20" level="2"><display>(i)</display>the executive director of the Department of Health and Human Services shall <ln numlevel="1" lineno="211" slineno="5-21"/>designate a representative with professional experience in information technology or <ln numlevel="1" lineno="212" slineno="5-22"/>cybersecurity;</subsection><subsection ssid="14-null-12" dnum="j-o" numlevel="1" lineno="213" slineno="5-23" level="2"><display>(j)</display>the director of the Division of Indian Affairs shall designate a representative with <ln numlevel="1" lineno="214" slineno="5-24"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-13" dnum="k-o" numlevel="1" lineno="215" slineno="5-25" level="2"><display>(k)</display>the Utah League of Cities and Towns shall designate a representative with <ln numlevel="1" lineno="216" slineno="5-26"/>professional experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-14" dnum="l-o" numlevel="1" lineno="217" slineno="5-27" level="2"><display>(l)</display>the Utah Association of Counties shall designate a representative with professional <ln numlevel="1" lineno="218" slineno="5-28"/>experience in information technology or cybersecurity;</subsection><subsection ssid="14-null-15" dnum="m-o" numlevel="1" lineno="219" slineno="5-29" level="2"><display>(m)</display>the attorney general, or the attorney general's designee;</subsection><subsection ssid="14-null-16" dnum="n-o" numlevel="1" lineno="220" slineno="5-30" level="2"><display>(n)</display>the commissioner of financial institutions, or the commissioner's designee;</subsection><subsection ssid="14-null-17" dnum="o-o" numlevel="1" lineno="221" slineno="5-31" level="2"><display>(o)</display>the executive director of the Department of Environmental Quality shall designate a <ln numlevel="1" lineno="222" slineno="5-32"/>representative with professional experience in information technology or <ln numlevel="1" lineno="223" slineno="5-33"/>cybersecurity;</subsection><subsection ssid="14-null-18" dnum="p-o" numlevel="1" lineno="224" slineno="5-34" level="2"><display>(p)</display>the executive director of the Department of Natural Resources shall designate a <ln numlevel="1" lineno="225" slineno="5-35"/>representative with professional experience in information technology or <ln numlevel="1" lineno="226" slineno="5-36"/>cybersecurity;</subsection><subsection ssid="14-54" dnum="_-o:q-i" numlevel="1" lineno="227" slineno="5-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1116" style="1" owner="i" level="1" amendtag="start">(q)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">two local education agency employees tasked with job duties that include systems <ln numlevel="1" lineno="228" slineno="5-38"/>and security management from one charter school and one school district whom the <ln numlevel="1" lineno="229" slineno="5-39"/>state superintendent selects;</amend></subsection><subsection ssid="14-null-19" dnum="q-o:r-i" numlevel="1" lineno="230" slineno="5-40" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1117" style="2" owner="o" level="1" deltag="both">(q)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1118" style="1" owner="i" level="1" amendtag="both" space="true">(r)</amend></display>the highest ranking information technology official, or the official's designee, <ln numlevel="1" lineno="231" slineno="5-41"/>from each of:<subsection ssid="14-null-20" dnum="i-o" numlevel="1" lineno="232" slineno="5-42" level="3"><display>(i)</display>the Judicial Council;</subsection><subsection ssid="14-null-21" dnum="ii-o" numlevel="1" lineno="233" slineno="5-43" level="3"><display>(ii)</display>the Utah Board of Higher Education;</subsection><subsection ssid="14-null-22" dnum="iii-o" numlevel="1" lineno="234" slineno="5-44" level="3"><display>(iii)</display>the State Board of Education; and</subsection><subsection ssid="14-null-23" dnum="iv-o" numlevel="1" lineno="235" slineno="5-45" level="3"><display>(iv)</display>the State Tax Commission;</subsection></subsection><subsection ssid="14-null-24" dnum="r-o:s-i" numlevel="1" lineno="236" slineno="5-46" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1122" style="2" owner="o" level="1" deltag="both">(r)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1123" style="1" owner="i" level="1" amendtag="both" space="true">(s)</amend></display>the governor shall appoint:<subsection ssid="14-null-25" dnum="i-o" numlevel="1" lineno="237" slineno="5-47" level="3"><display>(i)</display>one representative from the Utah National Guard; and</subsection><subsection ssid="14-null-26" dnum="ii-o" numlevel="1" lineno="238" slineno="5-48" level="3"><display>(ii)</display>one representative from the Governor's Office of Economic Opportunity;</subsection></subsection><subsection ssid="14-null-27" dnum="s-o:t-i" numlevel="1" lineno="239" slineno="5-49" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1125" style="2" owner="o" level="1" deltag="both">(s)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1126" style="1" owner="i" level="1" amendtag="both" space="true">(t)</amend></display>the president of the Senate shall appoint one member of the Senate; and</subsection><subsection ssid="14-null-28" dnum="t-o:u-i" numlevel="1" lineno="240" slineno="5-50" level="2"><display><amendoutstart style="2"/><amend anum="0" ea="erase" pairid="1126" style="2" owner="o" level="1" deltag="both">(t)</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="1127" style="1" owner="i" level="1" amendtag="both" space="true">(u)</amend></display>the speaker of the House of Representatives shall appoint one member of the <ln numlevel="1" lineno="241" slineno="5-51"/>House of Representatives.</subsection></subsection><subsection ssid="14-null-29" dnum="3-o" numlevel="1" lineno="242" slineno="5-52" level="1" space="false"><display>(3)</display><subsection ssid="14-null-30" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The governor's designee shall serve as cochair of the commission.</subsection><subsection ssid="14-null-31" dnum="b-o" numlevel="1" lineno="243" slineno="5-53" level="2"><display>(b)</display>The commissioner of the Department of Public Safety shall serve as cochair of the <ln numlevel="1" lineno="244" slineno="5-54"/>commission.</subsection></subsection><subsection ssid="14-null-32" dnum="4-o" numlevel="1" lineno="245" slineno="5-55" level="1" space="false"><display>(4)</display><subsection ssid="14-null-33" dnum="a-o" level="2" placement="sameline"><display>(a)</display>The members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall represent urban, rural, and <ln numlevel="1" lineno="246" slineno="5-56"/>suburban population areas.</subsection><subsection ssid="14-null-34" dnum="b-o" numlevel="1" lineno="247" slineno="5-57" level="2"><display>(b)</display>No fewer than half of the members described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref> shall have <ln numlevel="1" lineno="248" slineno="5-58"/>professional experience in cybersecurity or in information technology.</subsection></subsection><subsection ssid="14-null-35" dnum="5-o" numlevel="1" lineno="249" slineno="5-59" level="1"><display>(5)</display>In addition to the membership described in Subsection <xref depth="4" refnumber="63C-27-201(2)" start="0">(2)</xref>, the commission shall seek <ln numlevel="1" lineno="250" slineno="5-60"/>information and advice from state and private entities with expertise in critical <ln numlevel="1" lineno="251" slineno="5-61"/>infrastructure.</subsection><subsection ssid="14-null-36" dnum="6-o" numlevel="1" lineno="252" slineno="5-62" level="1"><display>(6)</display>As necessary to improve information and protect potential vulnerabilities, the <ln numlevel="1" lineno="253" slineno="5-63"/>commission shall seek information and advice from federal entities including:<subsection ssid="14-null-37" dnum="a-o" numlevel="1" lineno="254" slineno="5-64" level="2"><display>(a)</display>the Cybersecurity and Infrastructure Security Agency;</subsection><subsection ssid="14-null-38" dnum="b-o" numlevel="1" lineno="255" slineno="5-65" level="2"><display>(b)</display>the Federal Energy Regulatory Commission;</subsection><subsection ssid="14-null-39" dnum="c-o" numlevel="1" lineno="256" slineno="5-66" level="2"><display>(c)</display>the Federal Bureau of Investigation; and</subsection><subsection ssid="14-null-40" dnum="d-o" numlevel="1" lineno="257" slineno="5-67" level="2"><display>(d)</display>the United States Department of Transportation.</subsection></subsection><subsection ssid="14-null-41" dnum="7-o" numlevel="1" lineno="258" slineno="5-68" level="1" space="false"><display>(7)</display><subsection ssid="14-null-42" dnum="a-o" level="2" placement="sameline"><display>(a)</display>Except as provided in Subsections <xref depth="4" refnumber="63C-27-201(7)(b)" start="0">(7)(b)</xref> and <xref depth="4" refnumber="63C-27-201(7)(c)" start="0">(c)</xref>, a member is appointed for a <ln numlevel="1" lineno="259" slineno="5-69"/>term of four years.</subsection><subsection ssid="14-null-43" dnum="b-o" numlevel="1" lineno="260" slineno="5-70" level="2"><display>(b)</display>A member shall serve until the member's successor is appointed and qualified.</subsection><subsection ssid="14-null-44" dnum="c-o" numlevel="1" lineno="261" slineno="5-71" level="2"><display>(c)</display>Notwithstanding the requirements of Subsection <xref depth="4" refnumber="63C-27-201(7)(a)" start="0">(7)(a)</xref>, the governor shall, at the <ln numlevel="1" lineno="262" slineno="5-72"/>time of appointment or reappointment, adjust the length of terms to ensure that the <ln numlevel="1" lineno="263" slineno="5-73"/>terms of commission members are staggered so that approximately half of the <ln numlevel="1" lineno="264" slineno="5-74"/>commission members appointed under Subsection <amendoutstart style="2"/><amend anum="0" ea="erase" pairid="14" groupid="12" style="2" owner="jchristopherson" level="1" deltag="both"><xref depth="4" refnumber="63C-27-201(2)(r)" start="0">(2)(r)</xref></amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="13" groupid="11" style="1" owner="jchristopherson" level="1" amendtag="both" space="true"><xref refnumber="63C-27-201(2)" depth="4">(2)</xref></amend> are appointed every two <ln numlevel="1" lineno="265" slineno="5-75"/>years.</subsection></subsection><subsection ssid="14-null-45" dnum="8-o" numlevel="1" lineno="266" slineno="5-76" level="1" space="false"><display>(8)</display><subsection ssid="14-null-46" dnum="a-o" level="2" placement="sameline"><display>(a)</display>If a vacancy occurs in the membership of the commission, the member shall be <ln numlevel="1" lineno="267" slineno="5-77"/>replaced in the same manner in which the original appointment was made.</subsection><subsection ssid="14-null-47" dnum="b-o" numlevel="1" lineno="268" slineno="5-78" level="2"><display>(b)</display>An individual may be appointed to more than one term.</subsection><subsection ssid="14-null-48" dnum="c-o" numlevel="1" lineno="269" slineno="5-79" level="2"><display>(c)</display>When a vacancy occurs in the membership for any reason, the replacement shall be <ln numlevel="1" lineno="270" slineno="5-80"/>appointed for the unexpired term.</subsection></subsection><subsection ssid="14-null-49" dnum="9-o" numlevel="1" lineno="271" slineno="5-81" level="1" space="false"><display>(9)</display><subsection ssid="14-null-50" dnum="a-o" level="2" placement="sameline"><display>(a)</display>A majority of the members of the commission is a quorum.</subsection><subsection ssid="14-null-51" dnum="b-o" numlevel="1" lineno="272" slineno="5-82" level="2"><display>(b)</display>The action of a majority of a quorum constitutes an action of the commission.</subsection></subsection><subsection ssid="14-null-52" dnum="10-o" numlevel="1" lineno="273" slineno="5-83" level="1"><display>(10)</display>The commission shall meet at least two times a year.</subsection></section></bsec><bsec buid="39" num="63C-27-202" type="amend" src="code" uid="C63C-27-S202_2026050620260506" sort="63C27 02020020260506" numlevel="1" lineno="274" slineno="6-1" sn="6"><section number="63C-27-202" numlevel="1" lineno="275" slineno="6-2" type="amend"><secline lineno="274">Section 6. Section <bold>63C-27-202</bold> is amended to read:</secline><catline lineno="275"><bold>63C-27-202<parens><paren sort="00" type="original" show="true" display="space"><effect>Effective </effect><date>05/06/26</date></paren><paren sort="00" type="original" show="true"><effect>Repealed </effect><date>07/01/32</date></paren></parens>. Commission duties.</bold></catline><sectionText lineno="276"><tab/>The commission shall:</sectionText><subsection ssid="39-null-1" dnum="1-o" numlevel="1" lineno="277" slineno="6-4" level="1"><display>(1)</display>identify and inform the governor of:<subsection ssid="39-null-2" dnum="a-o" numlevel="1" lineno="278" slineno="6-5" level="2"><display>(a)</display>cyber threats and vulnerabilities towards Utah's critical infrastructure;</subsection><subsection ssid="39-null-3" dnum="b-o" numlevel="1" lineno="279" slineno="6-6" level="2"><display>(b)</display>cybersecurity assets and resources;<amend anum="0" ea="amend" pairid="100" groupid="73" style="1" owner="jchristopherson" level="1" amendtag="both"> and</amend></subsection><subsection ssid="39-null-4" dnum="c-o" numlevel="1" lineno="280" slineno="6-7" level="2"><display>(c)</display>an analysis of:<subsection ssid="39-null-5" dnum="i-o" numlevel="1" lineno="281" slineno="6-8" level="3"><display>(i)</display>current cyber incident response capabilities;</subsection><subsection ssid="39-null-6" dnum="ii-o" numlevel="1" lineno="282" slineno="6-9" level="3"><display>(ii)</display>potential cyber threats; and</subsection><subsection ssid="39-null-7" dnum="iii-o" numlevel="1" lineno="283" slineno="6-10" level="3"><display>(iii)</display>areas of significant concern with respect to:<subsection ssid="39-null-8" dnum="A-o" numlevel="1" lineno="284" slineno="6-11" level="4"><display>(A)</display>vulnerability to cyber attack; or</subsection><subsection ssid="39-null-9" dnum="B-o" numlevel="1" lineno="285" slineno="6-12" level="4"><display>(B)</display>seriousness of consequences in the event of a cyber attack;</subsection></subsection></subsection></subsection><subsection ssid="39-null-10" dnum="2-o" numlevel="1" lineno="286" slineno="6-13" level="1"><display>(2)</display>provide resources with respect to cyber attacks in both the public and private sector, <ln numlevel="1" lineno="287" slineno="6-14"/>including:<subsection ssid="39-null-11" dnum="a-o" numlevel="1" lineno="288" slineno="6-15" level="2"><display>(a)</display>best practices;</subsection><subsection ssid="39-null-12" dnum="b-o" numlevel="1" lineno="289" slineno="6-16" level="2"><display>(b)</display>education; and</subsection><subsection ssid="39-null-13" dnum="c-o" numlevel="1" lineno="290" slineno="6-17" level="2"><display>(c)</display>mitigation;</subsection></subsection><subsection ssid="39-null-14" dnum="3-o" numlevel="1" lineno="291" slineno="6-18" level="1"><display>(3)</display>promote cyber security awareness;</subsection><subsection ssid="39-null-15" dnum="4-o" numlevel="1" lineno="292" slineno="6-19" level="1"><display>(4)</display>share information;</subsection><subsection ssid="39-null-16" dnum="5-o" numlevel="1" lineno="293" slineno="6-20" level="1"><display>(5)</display>promote best practices to prevent and mitigate cyber attacks;</subsection><subsection ssid="39-null-17" dnum="6-o" numlevel="1" lineno="294" slineno="6-21" level="1"><display>(6)</display>enhance cyber capabilities and response for all Utahns;</subsection><subsection ssid="39-null-18" dnum="7-o" numlevel="1" lineno="295" slineno="6-22" level="1"><display>(7)</display>provide consistent outreach and collaboration with private and public sector <ln numlevel="1" lineno="296" slineno="6-23"/>organizations;<amendoutstart style="2"/><amend anum="0" ea="erase" pairid="86" groupid="70" style="2" owner="jchristopherson" level="1" deltag="both"> and</amend><amendoutend style="2"/></subsection><subsection ssid="39-null-19" dnum="8-o" numlevel="1" lineno="297" slineno="6-24" level="1"><display>(8)</display>share cyber threat intelligence to operators and overseers of Utah's critical infrastructure<amendoutstart style="2"/><amend anum="0" ea="erase" pairid="10" groupid="9" style="2" owner="jchristopherson" level="1" deltag="both">.</amend><amendoutend style="2"/><amend anum="0" ea="amend" pairid="7" groupid="6" style="1" owner="jchristopherson" level="1" amendtag="both" space="true"><ln numlevel="1" lineno="298" slineno="6-25"/>; and</amend></subsection><subsection ssid="39-20" dnum="_-o:9-i" numlevel="1" lineno="299" slineno="6-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1170" style="1" owner="i" level="1" amendtag="start">(9)</amend></display><amend anum="0" ea="amend" pairid="6" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">in accordance with Title 63G, Chapter 3, Utah Administrative Rulemaking Act, make <ln numlevel="1" lineno="300" slineno="6-27"/>rules establishing minimum cybersecurity standards for a local education agency, as that <ln numlevel="1" lineno="301" slineno="6-28"/>term is defined in Section <xref depth="3" refnumber="53G-3-402">53G-3-402</xref>, that:</amend><subsection ssid="39-21" dnum="_-o:a-i" numlevel="1" lineno="302" slineno="6-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1171" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="15" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">align with industry recognized cybersecurity frameworks and standards, including <ln numlevel="1" lineno="303" slineno="6-30"/>frameworks developed by the National Institute of Standards and Technology, the <ln numlevel="1" lineno="304" slineno="6-31"/>Center for Internet Security, or a successor organization;</amend></subsection><subsection ssid="39-22" dnum="_-o:b-i" numlevel="1" lineno="305" slineno="6-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1172" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="20" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">take into account varying local education agency resources, capacity, and needs;</amend></subsection><subsection ssid="39-23" dnum="_-o:c-i" numlevel="1" lineno="306" slineno="6-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1173" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="25" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">establish phased implementation timelines based on local education agency size, <ln numlevel="1" lineno="307" slineno="6-34"/>existing cybersecurity infrastructure, and available resources; and</amend></subsection><subsection ssid="39-24" dnum="_-o:d-i" numlevel="1" lineno="308" slineno="6-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1174" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="30" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">as appropriate based on the local education agency's size, risk profile, and available <ln numlevel="1" lineno="309" slineno="6-36"/>resources, shall address:</amend><subsection ssid="39-25" dnum="_-o:i-i" numlevel="1" lineno="310" slineno="6-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1175" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="35" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">identity and access management;</amend></subsection><subsection ssid="39-26" dnum="_-o:ii-i" numlevel="1" lineno="311" slineno="6-38" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1176" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="40" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">asset management and inventory of hardware, software, and data systems;</amend></subsection><subsection ssid="39-27" dnum="_-o:iii-i" numlevel="1" lineno="312" slineno="6-39" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1177" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="45" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">data protection;</amend></subsection><subsection ssid="39-28" dnum="_-o:iv-i" numlevel="1" lineno="313" slineno="6-40" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1178" style="1" owner="i" level="1" amendtag="start">(iv)</amend></display><amend anum="0" ea="amend" pairid="50" groupid="41" style="1" owner="jchristopherson" level="1" amendtag="end">security monitoring and logging capabilities;</amend></subsection><subsection ssid="39-29" dnum="_-o:v-i" numlevel="1" lineno="314" slineno="6-41" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1179" style="1" owner="i" level="1" amendtag="start">(v)</amend></display><amend anum="0" ea="amend" pairid="55" groupid="45" style="1" owner="jchristopherson" level="1" amendtag="end">vulnerability management, including regular security assessments and patching <ln numlevel="1" lineno="315" slineno="6-42"/>procedures;</amend></subsection><subsection ssid="39-30" dnum="_-o:vi-i" numlevel="1" lineno="316" slineno="6-43" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1180" style="1" owner="i" level="1" amendtag="start">(vi)</amend></display><amend anum="0" ea="amend" pairid="60" groupid="49" style="1" owner="jchristopherson" level="1" amendtag="end">incident response and recovery planning;</amend></subsection><subsection ssid="39-31" dnum="_-o:vii-i" numlevel="1" lineno="317" slineno="6-44" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1181" style="1" owner="i" level="1" amendtag="start">(vii)</amend></display><amend anum="0" ea="amend" pairid="65" groupid="53" style="1" owner="jchristopherson" level="1" amendtag="end">security awareness training requirements for staff and administrators;</amend></subsection><subsection ssid="39-32" dnum="_-o:viii-i" numlevel="1" lineno="318" slineno="6-45" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1182" style="1" owner="i" level="1" amendtag="start">(viii)</amend></display><amend anum="0" ea="amend" pairid="70" groupid="57" style="1" owner="jchristopherson" level="1" amendtag="end">third-party risk management for vendors with access to local education agency <ln numlevel="1" lineno="319" slineno="6-46"/>systems or data;</amend></subsection><subsection ssid="39-33" dnum="_-o:ix-i" numlevel="1" lineno="320" slineno="6-47" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1183" style="1" owner="i" level="1" amendtag="start">(ix)</amend></display><amend anum="0" ea="amend" pairid="75" groupid="61" style="1" owner="jchristopherson" level="1" amendtag="end">network security controls;</amend></subsection><subsection ssid="39-34" dnum="_-o:x-i" numlevel="1" lineno="321" slineno="6-48" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1184" style="1" owner="i" level="1" amendtag="start">(x)</amend></display><amend anum="0" ea="amend" pairid="80" groupid="65" style="1" owner="jchristopherson" level="1" amendtag="end">backup and disaster recovery procedures; and</amend></subsection><subsection ssid="39-35" dnum="_-o:xi-i" numlevel="1" lineno="322" slineno="6-49" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1185" style="1" owner="i" level="1" amendtag="start">(xi)</amend></display><amend anum="0" ea="amend" pairid="85" groupid="69" style="1" owner="jchristopherson" level="1" amendtag="end">governance structures for cybersecurity oversight within a local education <ln numlevel="1" lineno="323" slineno="6-50"/>agency.</amend></subsection></subsection></subsection></section></bsec><bsec buid="44" type="uncod" untype="effdate" src="uncod" uid="EF0000" sort="UZEFF" langlock="true" numlevel="1" lineno="324" slineno="7-1" sn="7"><section type="uncod" untype="effdate" display="false" src="uncod"><secline lineno="324">Section 7.  <bold>Effective Date.</bold></secline><sectionText lineno="325"><amend anum="0" ea="amend" pairid="1" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="both">This bill takes effect on <effdate uid="code" date="5/6/2026">May 6, 2026</effdate>.</amend></sectionText></section></bsec><bsec buid="43" type="uncod" untype="coord" src="uncod" uid="CRD0000" sort="UZT00000" langlock="false" numlevel="1" lineno="326" slineno="8-1" sn="8"><section ccsum="true" type="uncod" untype="coord" display="false" src="uncod"><secline lineno="326">Section 8.  <bold>Coordinating H.B. 42 with S.B. 69.</bold></secline><sectionText lineno="327"><amend anum="0" ea="amend" pairid="3" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="both">If H.B. 42, School Cybersecurity Amendments, and S.B. 69, School Device Revisions, <ln numlevel="1" lineno="328" slineno="8-3"/>both pass and become law, the Legislature intends that, on July 1, 2026, Subsection <ln numlevel="1" lineno="329" slineno="8-4"/>53G-7-227(2) enacted in S.B. 69, be amended to read:<eol numlevel="1" lineno="330" slineno="8-5"/>"(2) Except as provided in Subsection (3), a student may not use a cellphone, smart watch, <ln numlevel="1" lineno="331" slineno="8-6"/>AI glasses, or emerging technology at a school during school hours.".</amend></sectionText></section></bsec></bdy><foot><rev><tm>2-13-26 12:22 PM</tm></rev></foot></leg>