Vetoes Cybersecurity “Safe Harbor” Bill

Florida Governor Vetoes Cybersecurity “Safe Harbor” Bill

By Judy Miller, ERMProtect Managing Director

Florida Governor Ron DeSantis today vetoed a bill that would have extended “safe harbor” from data breach litigation to businesses compliant with certain industry-recognized cybersecurity standards.

The governor said HB 473 would “result in Floridians’ data being less secure as the bill provides across-the-board protections for only substantially complying with standards. This incentivizes doing the minimum when protecting consumer data.’’

The governor said the bill, as passed, “may result in a consumer having inadequate recourse if a breach occurs.’’

DeSantis encouraged the Legislature to come up with an alternative bill that provides “a level of liability protection while also ensuring critical data and operations against cyberattacks are protected as much as possible …”

The bill would have had a major impact on government and businesses, offering them safe harbor from expensive litigation, if they “substantially” implemented security measures considered as best practices within the industry. The bill passed the House on an 81-28 vote on March 1 and the Senate on a 32-8 vote on March 5.

Advocates of the bill said it would incentivize local governments, businesses, and third-party agents that maintain sensitive data to voluntarily comply with industry-recognized cybersecurity frameworks such as those developed by the National Institute for Standards and Technology (NIST) and the Center for Internet Security (CIS) Critical Security Controls.

 

Subscribe to Our Weekly Newsletter

Intelligence and Insights

Vetoes Cybersecurity “Safe Harbor” Bill

Florida Governor Vetoes Cybersecurity “Safe Harbor” Bill

Florida Governor Ron DeSantis vetoed HB 473, a bill that would have extended “safe harbor” from data breach litigation to businesses compliant with certain industry-recognized cybersecurity standards …
NIST Cybersecurity Framework

Complete Guide to the NIST Cybersecurity Framework 2.0

In this comprehensive guide, we explain in simple terms every aspect of complying with the NIST Cybersecurity Framework 2.0 …
Musings From a Pen Tester’s Diary

Musings From a Penetration Tester’s Diary – Part 2

We asked Akash to take a trip down memory lane and discuss some of his more interesting intrusion cases. This is Part 2 of “Musings from Pen Tester’s Diary.” …