- What is the Florida Cybersecurity Act?
- What are the Key Requirements of the Florida Cybersecurity Act?
- What is the Florida Local Government Cybersecurity Act?
- What are the Key Requirements of the Florida Local Government Cybersecurity Act?
- Who Must Follow the Florida Cybersecurity Act and the Florida Local Government Cybersecurity Act?
- What is the Florida Information Protection Act (FIPA)?
- What are the Florida Cybersecurity Standards?
- Who Enforces Florida’s State Cybersecurity Laws?
- What is the Florida Cybersecurity Compliance Checklist for State Agencies and Local Governments?
- What is Florida Cybersecurity Act Compliance Software?
- Isora GRC for Florida Cybersecurity Act compliance
-
Florida Cybersecurity Act FAQs
- What is the difference between state and local cybersecurity requirements in Florida?
- How are third-party vendors evaluated under the Florida Cybersecurity Act?
- What documentation must Florida agencies maintain for cybersecurity audits?
- How should agencies manage cybersecurity compliance across departments or units?
- Do schools or universities have to follow the Florida Cybersecurity Law?
- Do Florida state agencies need to use approved tools or software for cybersecurity compliance?
The Florida Cybersecurity Act (Chapter 282, Section 318, F.S.) establishes cybersecurity requirements for state agencies. The Local Government Cybersecurity Act (§ 282.3185, F.S.) extends similar obligations to counties and municipalities.
Together with the Florida Cybersecurity Standards (Chapter 60GG-2, F.A.C.), these laws define how public sector organizations must manage cybersecurity risk.
Agencies and local governments are required to inventory systems and vendors, conduct risk assessments, implement safeguards, report incidents, and maintain program oversight.
This guide is built for Information Security Managers (ISMs), Chief Information Security Officers (CISOs), and public sector information security teams responsible for implementation. It explains the laws, outlines the key requirements, and shows how to manage compliance across systems, departments, and third parties.
What is the Florida Cybersecurity Act?
The Florida Cybersecurity Act, formally known as Chapter 282, Section 318 of the Florida Statutes (§ 282.318, F.S.), is a state law that sets mandatory cybersecurity standards for Florida state agencies. It establishes governance, operational requirements, and oversight structures aligned with the NIST Cybersecurity Framework.
What are the Key Requirements of the Florida Cybersecurity Act?
The Florida Cybersecurity Act establishes five core cybersecurity requirements that apply to all state agencies in Florida. These include: (1) reporting ransomware and high-severity cybersecurity incidents within strict timelines, (2) conducting formal risk assessments every three years with ongoing remediation tracking, (3) delivering role-based cybersecurity training to all employees and technical staff, (4) implementing technical and operational safeguards aligned with the NIST Cybersecurity Framework, and (5) appointing an Information Security Manager (ISM) to oversee compliance and coordinate with the Florida Digital Service.
Agencies must also maintain audit trails, follow procurement standards for secure IT services, and participate in governance structures like the Risk Steering Workgroup. These requirements are enforced through Chapter 60GG-2, Florida Administrative Code, and are designed to shift agencies from reactive incident response to strategic, statewide cybersecurity risk management.
1. Incident Reporting and Classification Timelines
Florida state agencies are required to report cybersecurity incidents quickly and consistently. The Act defines both the severity levels and the reporting timeframes agencies must follow:
- Ransomware incidents must be reported within 12 hours of detection.
- Severity level 3–5 incidents must be reported within 48 hours.
- Incidents must be reported to:
- The Cybersecurity Operations Center (CSOC), operated by the Florida Digital Service.
- The Cybercrime Office within the Florida Department of Law Enforcement (FDLE).
Severity Classifications
Incident severity levels are defined using the National Cyber Incident Response Plan (NCIRP):
- Level 5: Emergency (e.g., threats to critical infrastructure)
- Level 4: Severe
- Level 3: High
- Level 2: Medium
- Level 1: Low (reporting not required)
Additional Requirements
After any qualifying incident, agencies must submit a written after-action report within 1 week, summarizing:
- Facts of the incident
- Data types affected
- Fiscal impact
- Ransom demands (if applicable)
- Backup and restoration details
2. Risk Assessments and Internal Audits
The Florida Cybersecurity Act mandates that every state agency conduct a structured, repeatable cybersecurity risk assessment at least once every three years. This process ensures agencies identify evolving threats, evaluate security control effectiveness, and prioritize remediation efforts.
- Agencies must follow the NIST Risk Management Framework (SP 800-37) and use FIPS 199 to categorize systems by confidentiality, integrity, and availability (Low, Moderate, High).
- Risk assessments must be submitted to the Department of Management Services (DMS) by July 31 every third year.
- Assessments must cover all IT resources, including:
- On-premise systems
- Cloud platforms
- Print environments
- Mobile devices
Risk Steering and Governance
Agencies must establish a Risk Steering Workgroup that:
- Oversees the agency’s risk assessment and remediation strategy
- Reviews and approves deviations or compensating controls
- Maintains the agency’s centralized risk register
Internal Audits
- Agencies are also required to conduct periodic internal audits and evaluations of their cybersecurity program.
- Audit findings must be documented and kept confidential under public records exemptions, ensuring agencies can report candidly without public disclosure risk.
3. Security Training Mandates
Cybersecurity training is a mandatory, recurring requirement for all Florida state agency employees under the Florida Cybersecurity Act. These training programs are designed to build organization-wide awareness and ensure technical personnel are prepared to respond to cyber threats.
Employee Training Requirements
All state employees must complete basic cybersecurity training:
- Within 30 days of starting employment
- Annually thereafter
Training must cover fundamental topics such as:
- Password hygiene
- Phishing awareness
- Data handling procedures
- Incident reporting protocols
Role-Based Advanced Training
IT personnel and employees with access to highly sensitive data must complete advanced training that includes:
- Incident classification procedures
- Severity levels and reporting thresholds
- Secure system configuration and monitoring practices
Training Delivery and Oversight
Training may be developed and delivered by:
- The Florida Digital Service (FDS)
- The Cybercrime Office of FDLE
- Private sector providers
- State University System institutions
4. Technical Safeguards and Procurement Standards
The Florida Cybersecurity Act requires every state agency to implement managerial, operational, and technical safeguards consistent with the NIST Cybersecurity Framework. These safeguards are codified in Chapter 60GG-2 and apply across systems, users, and third-party services.
Required Technical Controls
Agencies must deploy a layered set of security measures, including:
- Multi-Factor Authentication (MFA)
- Required for all privileged accounts and high-risk systems
- Encryption
- At rest: All stored data must be encrypted
- In transit: All transmitted data must use secure protocols
- Access Controls and Password Policies
- Role-based access restrictions
- Passwords must be complex and rotated every 90 days
- Audit Logging
- Unique traceability for all access to exempt or confidential data
- Logs must be retained and monitored for anomalies
- System Security Plans (SSPs)
- Required for all moderate and high-impact systems
- Must follow a defined 7-point documentation structure
- Network Segmentation
- Use of DMZs and isolation for sensitive data environments
IT Procurement and Vendor Standards
To manage third-party risk, the Act imposes cybersecurity requirements on all IT contracts and purchases:
- IT solicitations, contracts, and SLAs must include:
- Security and privacy clauses
- Incident reporting expectations
- Background screening for vendor personnel
- Alignment with state and federal standards (including NIST CSF)
- Agencies must conduct cyber supply chain risk assessments and document:
- Security posture of vendors
- Results of tests, audits, or security reviews
- Mitigation plans for identified risks
5. Role of the Information Security Manager (ISM)
Each Florida state agency is required to formally designate an Information Security Manager (ISM) who is responsible for implementing and overseeing the agency’s cybersecurity program. This leadership role is central to agency-level compliance, risk governance, and coordination with state oversight bodies.
Appointment and Authority
- The agency head must designate the ISM in writing.
- The ISM must have appropriate training and experience in information security management.
- The ISM serves as the primary liaison to the Florida Digital Service and the State Chief Information Security Officer (CISO).
Core Responsibilities
- Oversee cybersecurity program implementation across the agency.
- Lead the agency’s risk assessment process and ensure timely submission to DMS.
- Coordinate the agency’s incident response activities, including severity classification and reporting timelines.
- Manage agency participation in the Risk Steering Workgroup and track remediation efforts.
- Ensure employee training compliance and implementation of technical safeguards.
What is the Florida Local Government Cybersecurity Act?
The Florida Local Government Cybersecurity Act, formally known as Chapter 282, Section 3185 of the Florida Statutes (§ 282.3185, F.S.), was enacted in 2022 to extend cybersecurity requirements to counties and municipalities. The law builds directly on the State Cybersecurity Act (§ 282.318), applying similar expectations for incident reporting, employee training, and NIST-aligned security standards to local governments. It recognizes that cities and counties face the same threats as state agencies, but often with fewer resources.
To accommodate this, the Act uses a population-based compliance timeline, requiring earlier adoption from larger jurisdictions and providing more time for smaller communities. Additionally, oversight, training support, and implementation guidance are provided specifically to local entities by the Florida Digital Service (FDS) to ensure compliance with state standards and improve statewide cyber resilience.
What are the Key Requirements of the Florida Local Government Cybersecurity Act?
The Florida Local Government Cybersecurity Act establishes five core cybersecurity requirements that apply to all counties and municipalities in Florida. These include: (1) adopting cybersecurity standards aligned with the NIST Cybersecurity Framework, (2) providing mandatory cybersecurity training to employees based on role and system access, (3) reporting ransomware and high-severity cybersecurity incidents within strict timelines, (4) meeting compliance deadlines based on population size, and (5) coordinating with the Florida Digital Service (FDS), which provides oversight, guidance, and technical support.
To support implementation, FDS publishes the official Local Government Cybersecurity Resource Packet, which outlines statutory requirements, incident reporting procedures, and training standards for local agencies. The law is modeled after the State Cybersecurity Act (§ 282.318) but scaled to fit local government environments.
1. Adoption of NIST-Aligned Cybersecurity Standards
Local governments must adopt cybersecurity standards that are:
- Aligned with the NIST Cybersecurity Framework (CSF)
- Based on generally accepted best practices
- Designed to safeguard the confidentiality, integrity, and availability of all public sector IT resources
The law gives jurisdictions flexibility to tailor implementation but requires that local standards be substantively consistent with nationally recognized security frameworks.
2. Mandatory Cybersecurity Training for Employees
All employees with access to local government networks or systems must complete regular cybersecurity training.
- Basic training:
- Must be completed within 30 days of employment
- Repeated annually for continued access
- Advanced training is required for:
- IT staff
- Employees with access to sensitive or privileged data
- Covers role-specific topics such as threat detection, response protocols, and secure system management
Training may be delivered by:
- The Florida Digital Service
- The Cybercrime Office of the Florida Department of Law Enforcement (FDLE)
- State university system institutions
- Approved private sector providers
Training records must be maintained to document compliance.
3. Incident Reporting and After-Action Requirements
Local governments must report cybersecurity incidents quickly and follow standardized classification protocols:
- Ransomware attacks must be reported within 12 hours
- Severity level 3–5 incidents must be reported within 48 hours
- Severity levels are based on the DHS National Cyber Incident Response Plan, ranging from minor disruptions (Level 1) to national emergencies (Level 5)
Reports must be submitted to:
- The Florida Digital Service Cybersecurity Operations Center (CSOC)
- The FDLE Cybercrime Office
In addition, a formal after-action report is required within 1 week of any qualifying incident. It must include:
- Timeline of events
- Data types affected
- Estimated fiscal impact
- Whether ransom was demanded or paid
- Status of system recovery and backups
4. Population-Based Compliance Deadlines
Compliance timelines are staggered based on jurisdiction size:
- Counties with 75,000+ residents and municipalities with 25,000+ residents:
- Must be in full compliance by January 1, 2024
- Counties under 75,000 and municipalities under 25,000:
- Must be in compliance by January 1, 2025
This phased rollout ensures that larger governments implement controls early while smaller jurisdictions receive additional time to build necessary capacity.
5. Oversight and Support from the Florida Digital Service
The Florida Digital Service is responsible for overseeing local cybersecurity implementation and providing technical and educational support.
FDS offers:
- Training delivery and certification
- Incident response coordination
- Ongoing updates and clarification of statutory rules
- Templates, control guidance, and planning checklists (via the official Local Government Cybersecurity Resource Packet)
Who Must Follow the Florida Cybersecurity Act and the Florida Local Government Cybersecurity Act?
Every Florida public-sector agency, at both the state and local level, is required to comply with state cybersecurity law.
- The Florida Cybersecurity Act (§ 282.318, F.S.) applies to all state agencies within the executive branch. This includes agencies handling administrative, financial, health, education, and infrastructure systems. Agencies must formally appoint an Information Security Manager and follow detailed governance, risk, and reporting protocols established by the Florida Digital Service and Chapter 60GG-2 of the Florida Administrative Code.
- The Florida Local Government Cybersecurity Act (§ 282.3185, F.S.) applies to every Florida county and municipality, regardless of size or technical capacity. The law defines “local government” broadly—meaning even small jurisdictions that handle public data, citizen services, or connected IT systems must meet baseline cybersecurity requirements.
While the local act does not require a designated Information Security Manager, each city or county must take responsibility for training, incident reporting, and adoption of NIST-aligned cybersecurity standards.
What is the Florida Information Protection Act (FIPA)?
The Florida Information Protection Act, formally known as Chapter 501, Section 171 of the Florida Statutes (§ 501.171, F.S.), is a state law that requires businesses and government agencies to protect personal information and notify individuals in the event of a data breach.
Enacted in 2014, FIPA applies to any commercial or governmental entity that maintains or stores personal information of Florida residents. The law defines personal information broadly, covering combinations of names with Social Security numbers, financial account data, medical details, and other sensitive identifiers.
FIPA requires organizations to:
- Maintain reasonable security measures to protect personal data
- Notify affected individuals within 30 days of discovering a breach
- Report breaches affecting 500 or more individuals to the Florida Department of Legal Affairs
- Properly dispose of records containing personal data
- Maintain written incident response and security policies
While FIPA operates independently from Florida’s cybersecurity statutes for state and local agencies, it overlaps in scope when cybersecurity incidents expose regulated personal data. Enforcement authority rests with the Florida Attorney General’s Office, and noncompliance may result in civil penalties.
What are the Florida Cybersecurity Standards?
The Florida Cybersecurity Standards, formally established in Chapter 60GG-2 of the Florida Administrative Code, are the enforceable rules that implement the Florida Cybersecurity Act (§ 282.318, F.S.). These standards apply to all state executive branch agencies and define the technical and procedural controls required to protect state-managed information systems.
The rules are structured around the five core functions of the NIST Cybersecurity Framework (CSF): Identify, Protect, Detect, Respond, and Recover. Each function corresponds to a specific rule in Chapter 60GG-2 and provides a consistent, risk-based framework for cybersecurity governance.
- Identify (60GG-2.002): Defines requirements for asset inventories, risk categorization, and governance oversight.
- Protect (60GG-2.003): Establishes controls for access, encryption, passwords, and role-based training.
- Detect (60GG-2.004): Requires continuous monitoring, vulnerability management, and anomaly detection procedures.
- Respond (60GG-2.005): Outlines mandatory incident response teams, severity classifications, and training protocols.
- Recover (60GG-2.006): Covers disaster recovery plans, offsite backups, and improvement tracking.
Identify (Rule 60GG-2.002)
The Identify function in Florida’s Cybersecurity Standards focuses on establishing visibility into assets, risks, and organizational dependencies.
Key Requirements
Asset Inventories
Agencies must maintain complete and regularly updated inventories of hardware, software, cloud services, and third-party dependencies. These inventories support visibility and are essential for effective risk categorization. (Mapped to NIST CSF ID.AM-1 through ID.AM-4)
Data Flow Documentation and Risk Categorization
Agencies must identify how data moves across systems and assign impact levels using FIPS 199 categories: Low, Moderate, or High. This classification determines the level of security controls required for each system.
Triennial Risk Assessments
Agencies are required to complete a comprehensive risk assessment at least once every three years. Each assessment must be submitted to the Florida Department of Management Services by July 31 of the reporting year. These assessments evaluate threats, vulnerabilities, and the effectiveness of current safeguards.
Governance and Risk Steering
A designated risk steering workgroup must oversee major cybersecurity decisions. This group reviews risk assessments, control exceptions, and third-party vendor risks to ensure that governance processes are documented and repeatable.
Protect (Rule 60GG-2.003)
The Protect function in Florida’s Cybersecurity Standards defines the safeguards agencies must implement to secure systems, restrict access, and reduce the likelihood of a successful cyberattack.
Key Requirements
Access Controls and Multi-Factor Authentication (MFA)
Agencies must enforce multi-factor authentication for all privileged accounts and for users accessing systems classified as Moderate or High impact. Access must follow the principle of least privilege, with documented justifications for elevated access.
Encryption Standards
Data must be encrypted at rest and in transit, whether stored on internal infrastructure or transmitted to external systems or vendors. Agencies must ensure that encryption protocols meet current state and federal standards.
Security Awareness and Role-Based Training
All employees must complete annual cybersecurity training. Additional advanced training is required for users with elevated access or technical responsibilities. Training must address real-world threats and align with users’ specific roles.
Password and Documentation Policies
Agencies must enforce strong password policies, including complexity and rotation requirements. For systems classified as Moderate or High impact, agencies must maintain seven-point security plans that document administrative, operational, and technical safeguards.
Detect (Rule 60GG-2.004)
The Detect function in Florida’s Cybersecurity Standards focuses on establishing real-time visibility into potential threats and unauthorized activity. Rule 60GG-2.004 requires agencies to implement continuous monitoring and detection capabilities to identify cybersecurity events as they occur.
Key Requirements
Continuous Monitoring
Agencies must deploy automated monitoring tools across networks, systems, and endpoints. These tools must provide timely alerts and support the early identification of malicious behavior, policy violations, or system anomalies.
Vulnerability Management
All discovered vulnerabilities must be documented, prioritized, and tracked through remediation. Agencies must maintain formal processes for patching and configuration management and ensure that vulnerability scans are performed on a recurring basis.
Anomaly Detection
Agencies must define and maintain procedures for identifying unusual patterns of behavior, unauthorized access attempts, or deviations from expected system activity. Detection methods should integrate with incident response protocols to support rapid escalation.
Respond (Rule 60GG-2.005)
The Respond function in Florida’s Cybersecurity Standards defines how agencies must organize and manage incident response efforts.
Key Requirements
CSIRT Formation and Oversight
Every agency must establish a Computer Security Incident Response Team (CSIRT). The team must include representatives from leadership, IT/security operations, and the Office of Inspector General. CSIRTs are responsible for preparing, coordinating, and executing response efforts during a security event.
Severity Classification and Reporting
Agencies must classify incidents using the state-defined severity levels 1 through 5, consistent with the Florida Cybersecurity Act (§ 282.318, F.S.). The classification determines reporting urgency and required coordination with the Florida Digital Service and law enforcement.
Incident Response Training
All CSIRT members must complete annual incident response training to maintain readiness. Training must cover procedures for detection, containment, communication, and recovery, and should be updated based on lessons learned from past events.
Recover (Rule 60GG-2.006)
The Recover function in Florida’s Cybersecurity Standards ensures that agencies can restore operations quickly and effectively following a cybersecurity incident. Rule 60GG-2.006 requires agencies to develop and maintain recovery capabilities that support continuity of government services and incorporate lessons learned.
Key Requirements
Continuity and Disaster Recovery Planning
Agencies must develop, maintain, and regularly test business continuity and disaster recovery plans. These plans must address restoration priorities for critical systems and define roles and responsibilities during recovery operations.
Offsite Backups and Testing
All critical systems and data must be backed up to offsite locations. Agencies must perform documented recovery testing at least once per year to validate the integrity and availability of backups.
Documentation and Lessons Learned
After any incident, agencies must document all recovery activities, including timeframes, actions taken, and outcomes. This documentation must include a formal lessons learned review with recommendations for improving future response and recovery processes.
Who Enforces Florida’s State Cybersecurity Laws?
Florida’s state cybersecurity laws are enforced by three primary state entities, each with distinct responsibilities based on the type of organization and the nature of the cybersecurity obligation.
The Florida Digital Service (FDS) is the lead enforcement authority for state and local government cybersecurity requirements under the Florida Cybersecurity Act (§ 282.318) and the Local Government Cybersecurity Act (§ 282.3185). FDS oversees implementation of the Florida Cybersecurity Standards (Chapter 60GG-2, F.A.C.), manages incident reporting processes, and provides training and compliance guidance to covered entities.
The Florida Department of Law Enforcement (FDLE), through its Cybercrime Office, is responsible for receiving reports of ransomware and high-severity incidents from state agencies and local governments. FDLE also supports investigations and law enforcement actions when cybersecurity events involve criminal activity or unauthorized access to government systems.
The Florida Department of Legal Affairs (Office of the Attorney General) enforces the Florida Information Protection Act (FIPA, § 501.171, F.S.), which governs how both public and private entities must respond to data breaches involving personal information. This office has the authority to investigate violations and pursue civil penalties for noncompliance with FIPA’s notification and security requirements.
What is the Florida Cybersecurity Compliance Checklist for State Agencies and Local Governments?
Florida law requires state agencies and local governments to meet specific cybersecurity compliance obligations. While the laws differ slightly, both sets of requirements focus on governance, training, incident reporting, and technical safeguards. Below is a consolidated checklist showing what each entity type must implement.
State agency compliance checklist
(Under § 282.318, F.S. and Chapter 60GG-2, F.A.C.)
- Appoint an Information Security Manager (ISM) who reports to the agency head
- Conduct a formal risk assessment every 3 years, due July 31
- Maintain current asset and data inventories with risk categorizations
- Implement technical safeguards (MFA, encryption, access controls)
- Deliver annual cybersecurity training for all employees
- Provide advanced role-based training for privileged users and technical staff
- Establish a CSIRT team and maintain a tested incident response plan
- Report ransomware within 12 hours to FDS and FDLE
- Report Level 3–5 incidents within 48 hours
- Submit after-action reports within 1 week of any reportable event
- Maintain offsite backups and perform annual disaster recovery testing
- Participate in oversight and steering groups as required by FDS
Local government compliance checklist
(Under § 282.3185, F.S.)
- Implement cybersecurity controls aligned with the NIST CSF
- Provide cybersecurity training to all employees with system access
- Deliver advanced training to users with elevated privileges
- Report ransomware incidents within 12 hours to FDS and FDLE
- Report high-severity incidents (Levels 3–5) within 48 hours
- Submit after-action reports within 1 week of any reportable event
- Meet compliance deadlines based on population size (2024 or 2025)
- Use the official FDS Resource Packet for guidance
- Coordinate with the Florida Digital Service for support and oversight
What is Florida Cybersecurity Act Compliance Software?
Florida Cybersecurity Act compliance software helps state agencies and local governments manage the operational requirements outlined in § 282.318 (State Cybersecurity Act), § 282.3185 (Local Government Cybersecurity Act), and the Florida Cybersecurity Standards (Chapter 60GG-2, F.A.C.).
These regulations mandate structured cybersecurity programs across five core domains: governance, asset awareness, risk assessment, incident response, and safeguard implementation. But while the laws define what must be done, they do not prescribe how to manage it.
Florida Cybersecurity Compliance Software fills that gap by providing a centralized system of record to:
- Conduct and document risk assessments using state-aligned controls
- Track inventory of assets, systems, users, and third-party vendors
- Maintain a live risk register to document findings and remediation
- Generate audit-ready reporting based on current security posture
Without a system of record, these requirements often rely on disconnected tools like spreadsheets, email, or shared drives, which create risk, slow down audits, and increase the chance of compliance gaps.
Isora GRC for Florida Cybersecurity Act compliance
Isora GRC is built specifically for public sector security teams managing cybersecurity compliance programs. It replaces fragmented tools with a single platform designed to operationalize assessments, inventories, and risk workflows required under Florida law.
Control-Based Risk Assessments
Use structured templates aligned with the Florida Cybersecurity Standards and NIST CSF to run risk assessments across systems, units, or vendors. Define control expectations, assign remediation owners, and track progress over time.
Vendor and Third-Party Risk Workflows
Send structured vendor questionnaires, assess external risks, and track exceptions or non-compliance. Tie third-party responses to the overall risk posture of the agency.
Asset and System Inventory
Maintain inventories of systems, applications, and external services. Classify by impact, owner, and business function. Link assets directly to assessments and findings.
Risk Register and Remediation Tracking
Log risk findings, assign responsible parties, track remediation status, and escalate exceptions when needed. Create a unified view of risk across programs, departments, and teams.
Reporting and Compliance Dashboards
Generate reports aligned to control categories, risk severity, and remediation status. Provide executive stakeholders and oversight bodies with visibility into program health.
Isora GRC supports real-world compliance operations, giving Florida agencies a way to manage cybersecurity obligations that is structured, scalable, and built for collaboration.
Florida Cybersecurity Act FAQs
What is the difference between state and local cybersecurity requirements in Florida?
Florida’s state and local cybersecurity laws share the same foundational goals: protect public systems, standardize risk management, and ensure incident visibility. The key difference lies in their scope and administrative structure.
The State Cybersecurity Act (§ 282.318, F.S.) applies to all executive state agencies. It requires formal governance programs, risk assessments every three years, and alignment with the Florida Cybersecurity Standards (Chapter 60GG-2, F.A.C.).
The Local Government Cybersecurity Act (§ 282.3185, F.S.) extends similar requirements to counties and municipalities, scaled for local operations. The Florida Digital Service provides guidance and oversight through a population-based schedule. While the legal expectations are similar, local governments follow a tiered compliance model based on jurisdiction size and reporting deadlines.
How are third-party vendors evaluated under the Florida Cybersecurity Act?
Agencies must assess third-party vendors as part of their broader cybersecurity program. The law requires that all IT services and systems procured by the state include clear contractual safeguards, including:
- Defined service-level agreements (SLAs) addressing security and privacy
- Background screening for vendor personnel
- Assurance that systems meet state cybersecurity standards
Vendors should be included in asset inventories and assessed for risk. Any systems or data managed by a third party must follow the same security controls as internal systems, including access restrictions, encryption, and audit capabilities. These responsibilities are outlined in § 282.318(4) and further detailed in Florida Cybersecurity Standards Rule 60GG-2.003.
What documentation must Florida agencies maintain for cybersecurity audits?
Florida law requires agencies to maintain clear records of cybersecurity activities. This includes:
- Completed risk assessments and documented remediation plans
- Formal ISM designation letters
- Safeguard implementation plans mapped to control frameworks
- Incident reports, severity classifications, and after-action reviews
- Asset and vendor inventories
- Training and role-based access documentation
- Internal audit findings and program evaluations
Under state law, many of these materials are protected from public disclosure to preserve security. However, they must be maintained for compliance verification, audit readiness, and executive oversight.
How should agencies manage cybersecurity compliance across departments or units?
Agencies often operate across multiple departments, units, and service areas—each with its own systems, vendors, and risks. Florida law holds the entire agency accountable, but effective implementation requires delegation and coordination at the operational level.
Each department should be responsible for completing assessments, maintaining inventories, and addressing risks. The agency must then aggregate these inputs into a single, defensible cybersecurity program. This requires clear workflows, ownership, and central visibility.
Platforms like Isora GRC support this model by enabling distributed assessments with centralized control. Departments complete their work, while security leaders retain full visibility and reporting authority.
Do schools or universities have to follow the Florida Cybersecurity Law?
Florida’s cybersecurity laws primarily apply to executive state agencies and local government entities. However, state colleges and universities, especially those governed by state boards or receiving state/federal funding, are often expected to follow similar cybersecurity standards like the GLBA.
While not always named explicitly in the statutes, higher education institutions may be covered through agency designations or procurement requirements. Many adopt the Florida Cybersecurity Standards and NIST CSF as a baseline to meet regulatory expectations and safeguard sensitive data.
Do Florida state agencies need to use approved tools or software for cybersecurity compliance?
No. Florida law does not mandate specific cybersecurity software. Instead, it requires agencies to meet well-defined standards for risk assessment, incident reporting, safeguard implementation, and oversight.
Agencies may choose whatever tools best support these functions—so long as those tools enable compliance, documentation, and accountability. For many teams, this means moving beyond spreadsheets or general-purpose systems to platforms like Isora GRC that are purpose-built for structured risk and compliance workflows.