HOUSE OF REPRESENTATIVES STAFF ANALYSIS
BILL #: CS/HB 7057 PCB SAT 22-03 Public Records and Meetings/Cybersecurity
SPONSOR(S): State Affairs Committee, State Administration & Technology Appropriations Subcommittee,
Giallombardo and Fischer
TIED BILLS: CS/HB 7055 IDEN./SIM. BILLS: CS/SB 1694
REFERENCE ACTION ANALYST STAFF DIRECTOR or
BUDGET/POLICY CHIEF
Orig. Comm.: State Administration & Technology 14 Y, 0 N Mullins Topp
Appropriations Subcommittee
1) State Affairs Committee 23 Y, 0 N, As CS Villa Williamson
SUMMARY ANALYSIS
Current law provides a public record and meeting exemption for certain information held by a state agency
related to cybersecurity or potential breaches of security. It also provides public record exemptions related to
information technology (IT) and cybersecurity information of a utility owned or operated by a unit of local
government or certain cybersecurity information held by supervisors of elections. However, there is no general
public record exemption or public meeting exemption related to state or local government cybersecurity
information.
CS/HB 7055, to which this bill is linked, creates cybersecurity related requirements for state agencies and local
governments. It requires state agencies and local governments to report ransomware incidents and high
severity level cybersecurity incidents and requires local governments to adopt cybersecurity standards that
safeguard the local government’s data, IT, and IT resources by a date certain.
The bill provides a general public record exemption in ch. 119, F.S., for the following information held by an
agency before, on, or after July 1, 2022:
 Coverage limits and deductible or self insurance amounts of insurance or other risk mitigation
coverages acquired for the protection of IT systems, operational technology systems, or data of an
agency.
 Information relating to critical infrastructure.
 Network schematics, hardware and software configurations, or encryption information or information
that identifies detection, investigation, or response practices for suspected or confirmed cybersecurity
incidents.
The bill also creates a public meeting exemption for any portion of a meeting that would reveal the confidential
and exempt information; however, any portion of an exempt meeting must be recorded and transcribed. The
recording and transcript are confidential and exempt from public record requirements.
The bill provides for release of the confidential and exempt information in certain instances and authorizes
agencies to report information about cybersecurity incidents in an aggregate format.
The bill provides for repeal of the exemptions on October 2, 2027, unless reviewed and saved from repeal by
the Legislature, and provides a public necessity statement as required by the Florida Constitution.
The bill may have a minimal fiscal impact on the state and local governments. See Fiscal Comments.
Article I, s. 24(c) of the Florida Constitution requires a two-thirds vote of the members present and
voting for final passage of a newly created or expanded public record or public meeting exemption.
The bill creates a public record and public meeting exemption; thus, it requires a two-thirds vote for
final passage.
This docum ent does not reflect the intent or official position of the bill sponsor or House of Representatives .
STORAGE NAME: h7057.SAC
DATE: 2/23/2022
FULL ANALYSIS
I. SUBSTANTIVE ANALYSIS
A. EFFECT OF PROPOSED CHANGES:
Background
Public Records
Article I, s. 24(a) of the Florida Constitution sets forth the state’s public policy regarding access to
government records. This section guarantees every person a right to inspect or copy any public record
of the legislative, executive, and judicial branches of government.
Public policy regarding access to government records is addressed further in s. 119.07(1)(a), F.S.,
which guarantees every person a right to inspect and copy any state, county, or municipal record,
unless the record is exempt.
Public Meetings
Article I, s. 24(b) of the Florida Constitution requires all meetings of any collegial public body of the
executive branch of state government or any collegial public body of a county, municipality, school
district, or special district, at which official acts are to be taken or at which public business of such body
is to be transacted or discussed, be open and noticed to the public.
Public policy regarding access to government meetings also is addressed in the Florida Statutes.
Section 286.011, F.S., known as the “Government in the Sunshine Law” or “Sunshine Law,” further
requires all meetings of any board or commission of any state agency or authority, or of any agency or
authority of any county, municipality, or political subdivision, at which official acts are to be taken to be
open to the public at all times.1 The board or commission must provide reasonable notice of all public
meetings.2 Public meetings may not be held at any location that discriminates on the basis of sex, age,
race, creed, color, origin, or economic status or that operates in a manner that unreasonably restricts
the public’s access to the facility.3 Minutes of a public meeting must be promptly recorded and open to
public inspection.4 Failure to abide by public meeting requirements will invalidate any resolution, rule, or
formal action adopted at a meeting.5 A public officer or member of a governmental entity who violates
the Sunshine Law is subject to civil and criminal penalties. 6
Public Record and Public Meeting Exemptions
The Legislature may provide by general law for the exemption of records and meetings from the
requirements of Art. I, s. 24(a) and (b) of the Florida Constitution.7 The general law must state with
specificity the public necessity justifying the exemption8 and must be no broader than necessary to
accomplish its purpose.9
Furthermore, the Open Government Sunset Review Act10 provides that a public record or public
meeting exemption may be created or maintained only if it serves an identifiable public purpose. In
addition, it may be no broader than necessary to meet one of the following purposes:
1 Section 286.011(1), F.S.
2 Id.
3 Section 286.011(6), F.S.
4 Section 286.011(2), F.S.
5 Section 286.011(1), F.S.
6 Section 286.011(3), F.S. Penalties include a fine of up to $500 or a second degree misdemeanor, which is punishable by up to 60
days imprisonment and a $500 fine.
7 Art. I, s. 24(c), FLA. CONST .
8 This portion of a public record exemption is commonly referred to as a “public necessity statement.”
9 Art. I, s. 24(c), FLA. CONST .
10 Section 119.15, F.S.
STORAGE NAME: h7057.SAC PAGE: 2
DATE: 2/23/2022
 Allow the state or its political subdivisions to effectively and efficiently administer a
governmental program, which administration would be significantly impaired without the
exemption.
 Protect sensitive personal information that, if released, would be defamatory or would
jeopardize an individual’s safety; however, only the identity of an individual may be exempted
under this provision.
 Protect trade or business secrets.11
The Open Government Sunset Review Act requires the automatic repeal of a newly created public
record or public meeting exemption on October 2nd of the fifth year after creation or substantial
amendment, unless the Legislature reenacts the exemption. 12
Current exemptions for State Agency Cybersecurity Information
Portions of records held by a state agency13 that contain network schematics, hardware and software
configurations, or encryption, or that identify detection, investigation, or response practices for
suspected or confirmed cybersecurity14 incidents,15 including suspected or confirmed breaches,16 are
confidential and exempt17 from pubic record requirements if the disclosure of such records would
facilitate unauthorized access to or the unauthorized modification, disclosure, or destruction of:
 Data18 or information, whether physical or virtual; or
 Information technology (IT) resources,19 which includes:
o Information relating to the security of the agency’s technologies, processes, and
practices designed to protect networks, computers, data processing software, and data
from attack, damage, or unauthorized access; or
o Security information, whether physical or virtual, which relates to the agency’s existing or
proposed IT20 systems.21,22
11 Section 119.15(6)(b), F.S.
12 Section 119.15(3), F.S.
13 “State agency” means any official, officer, commission, board, authority, council, committee, or department of the executive branch
of state government; the Justice Administrative Commission; and the Public Service Commission. The term includes the Departme nt
of Legal Affairs, The Department of Agriculture and Consumer Services, and the Department of Financial Services. The term does not
include university boards of trustees or state universities. See s. 282.0041(33), F.S.
14 “Cybersecurity” means the protection afforded to an automated information system in order to attain the applicable objectives of
preserving the confidentiality, integrity, and availability of data, information, and information technology resources. See s.
282.0041(8), F.S.
15 “Incident” means a violation or imminent threat of violation, whether such violation is accidental or deliberate, of information
technology resources, security, policies, or practices. An imminent threat of violation refers to a situation in which the st ate agency has
a factual basis for believing that a specific incident is about to occur. See s. 282.0041(19), F.S.
16 “Breach” means unauthorized access of data in electronic form containing personal information. Good faith access of personal
information by an employee or agent of the covered entity does not constitute a breach of security, provided that the informa tion is not
used for a purpose unrelated to the business or subject to further unauthorized use. See s. 282.0041(3), F.S.
17 There is a difference between records the Legislature designates exempt from public record requirements and those the Legisla ture
deems confidential and exempt. A record classified as exempt from public disclosure may be disclosed under certain circumstances.
See WFTV, Inc. v. Sch. Bd. of Seminole, 874 So.2d 48, 53 (Fla. 5th DCA 2004), review denied 892 So.2d 1015 (Fla. 2004); City of
Rivera Beach v. Barfield, 642 So.2d 1135 (Fla. 4th DCA 1994); Williams v. City of Minneola, 575 So.2d 683, 687 (Fla. 5th DCA
1991). If the Legislature designates a record as confidential and exempt from public disclosure, such record may not be relea sed by the
custodian of public records to anyone other than the persons or entities specifically designated in statute. See Op. Att’y Ge n. Fla. 04-
09 (2004).
18 “Data” means a subset of structured information in a format that allows such information to be electronic ally retrieved and
transmitted. See s. 282.0041(9), F.S.
19 “Information technology resources” means data processing hardware and software and services, communications, supplies,
personnel, facility resources, maintenance, and training. See s. 282.0041(22), F.S.
20 “Information technology” means equipment, hardware, software, firmware, programs, systems, networks, infrastructure, media, a nd
related material used to automatically, electronically, and wirelessly collect, receive, access, transmit, display, st ore, record, retrieve,
analyze, evaluate, process, classify, manipulate, manage, assimilate, control, communicate, exchange, convert, converge, inte rface,
switch, or disseminate information of any kind or form. See s. 282.0041(20), F.S.
21 Florida law provides a similar public record exemption for state university and Florida College System institutions. See s 1004.055,
F.S.
22 Section 282.318(5), F.S.
STORAGE NAME: h7057.SAC PAGE: 3
DATE: 2/23/2022
In addition, any portion of a public meeting that would reveal any of the above-described confidential
and exempt records is exempt from public meeting requirements. Any portion of an exempt meeting
must be recorded and transcribed. The recordings and transcripts are confidential and exempt from
public record requirements unless a court of competent jurisdiction, following an in camera review,
determines that the meeting was not restricted to the discussion of confidential and exempt data and
information. If such a judicial determination occurs, only the portion of the recording or transcript that
reveals nonexempt data may be disclosed.23
The confidential and exempt cybersecurity information must be available to the Auditor General, the
Cybercrime Office within the Florida Department of Law Enforcement (FDLE), the Florida Digital
Service (FLDS),24 and for agencies under the jurisdiction of the Governor, the Chief Inspector General.
In addition, the records may be made available to a local government, another state agency, or a
federal agency for cybersecurity purposes or in the furtherance of the state agency’s official duties. 25
Current Exemptions for Local Government Cybersecurity Information
Information related to the security of a utility26 owned or operated by a unit of local government27 that is
designed to protect the utility’s networks, computers, programs, and data from attack, damage or
unauthorized access, is exempt from public record requirements to the extent disclosure of such
information would facilitate the alteration, disclosure, or destruction of data or IT resources. 28
In addition, information related to the security of existing or proposed IT systems or industrial control
technology systems of a utility owned or operated by a unit of local government is exempt from public
record requirements to the extent disclosure would facilitate unauthorized access to, and the alternation
or destruction of, such IT systems in a manner that would adversely impact the safe and reliable
operations of the IT systems and the utility.29
Current law also provides a public record exemption for certain cybersecurity information held by
supervisor of elections that mirrors the public record exemption for state agencies, which was
described above.30 The confidential and exempt information must be made available to the Auditor
General and may be made available to another governmental entity for cybersecurity purposes or in the
furtherance of the entity’s official duties.31
Critical Infrastructure Cybersecurity
The United States depends on the reliable function of critical infrastructure. Cybersecurity threats
exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s
security, economy, and public safety and health at risk. The World Economic Forum’s 2020 Global Risk
Report ranked cyberattacks causing disruption to operations and critical infrastructure among the top
five increasing global risks.32
In 2001, the federal government enacted the Critical Infrastructures Protection Act (act) to protect the
increasingly relied upon critical physical and information infrastructures across a vast number of
23 Section 282.318(7), F.S. Florida law provides a similar public meeting exemption for state university and Florida College sys tem
institutions, see s. 1004.055, F.S.
24 FLDS (formerly the Division of State Technology) is a subdivision of DMS and is charged with overseeing the state’s IT resources.
Section 20.22(2)(b), F.S.
25 Section 282.318(8), F.S.
26 “Utility” means a person or entity that provides electricity, natural gas, telecommunications, water, chilled water, reuse wa ter, or
wastewater. Section 119.011(15), F.S.
27 “Unit of local government” means a county, municipality, special district, local agency, authority, consolidated city -county
government, or any other local governmental body or public body corporate or politic authorized or created by gen eral or special law.
Section 119.0713(2)(a), F.S.
28 Section 119.0713 (5)(a)1., F.S.
29 Section 119.0713(5)(a)2., F.S.
30 Section 98.015(13)(a), F.S.
31 Section 98.015(13)(b), F.S.
32 World Economic Forum, The Global Risks Report 2020, available at:
https://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf (last visited February 19, 2022).
STORAGE NAME: h7057.SAC PAGE: 4
DATE: 2/23/2022
industries.33 These include telecommunications, energy, financial services, water, and transportation
sectors.34 The act aimed to create a comprehensive and effective program to ensure the continuity of
essential functions.35 “Critical infrastructure” is defined in the act as systems and assets, whether
physical or virtual, so vital to the United States that the incapacity or destruction of such systems and
assets would have a debilitating impact on security, national economic security, national public health
or safety, or any combination of those matters.36 Recently, the federal government launched an
Industrial Control System Cybersecurity