<<Prev Rule

Texas Administrative Code

Next Rule>>
TITLE 16ECONOMIC REGULATION
PART 2PUBLIC UTILITY COMMISSION OF TEXAS
CHAPTER 25SUBSTANTIVE RULES APPLICABLE TO ELECTRIC SERVICE PROVIDERS
SUBCHAPTER OUNBUNDLING AND MARKET POWER
DIVISION 2INDEPENDENT ORGANIZATIONS
RULE §25.367Cybersecurity Monitor

(a) Purpose. This section establishes requirements for the commission's cybersecurity coordination program, the cybersecurity monitor program, the cybersecurity monitor, and participation in the cybersecurity monitor program; and establishes the methods to fund the cybersecurity monitor.

(b) Applicability. This section is applicable to all electric utilities, including transmission and distribution utilities; corporations described in Public Utility Regulatory Act (PURA) §32.053; municipally owned utilities; electric cooperatives; and the Electric Reliability Council of Texas (ERCOT).

(c) Definitions. The following words and terms when used in this section have the following meanings, unless the context indicates otherwise:

  (1) Cybersecurity monitor -- The entity selected by the commission to serve as the commission's cybersecurity monitor and its staff.

  (2) Cybersecurity coordination program -- The program established by the commission to monitor the cybersecurity efforts of all electric utilities, municipally owned utilities, and electric cooperatives in the state of Texas.

  (3) Cybersecurity monitor program -- The comprehensive outreach program for monitored utilities managed by the cybersecurity monitor.

  (4) Monitored utility -- A transmission and distribution utility; a corporation described in PURA §32.053; a municipally owned utility or electric cooperative that owns or operates equipment or facilities in the ERCOT power region to transmit electricity at 60 or more kilovolts; or an electric utility, municipally owned utility, or electric cooperative that operates solely outside the ERCOT power region that has elected to participate in the cybersecurity monitor program.

(d) Selection of the Cybersecurity Monitor. The commission and ERCOT will contract with an entity selected by the commission to act as the commission's cybersecurity monitor. The cybersecurity monitor must be independent from ERCOT and is not subject to the supervision of ERCOT. The cybersecurity monitor operates under the supervision and oversight of the commission.

(e) Qualifications of Cybersecurity Monitor.

  (1) The cybersecurity monitor must have the qualifications necessary to perform the duties and responsibilities under subsection (f) of this section.

  (2) The cybersecurity monitor must collectively possess technical skills necessary to perform cybersecurity monitoring functions, including the following:

    (A) developing, reviewing, and implementing cybersecurity risk management programs, cybersecurity policies, cybersecurity strategies, and similar documents;

    (B) working knowledge of North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards and implementation of those standards; and

    (C) conducting vulnerability assessments.

  (3) The cybersecurity monitor staff are subject to background security checks as determined by the commission.

  (4) Every cybersecurity monitor staff member who has access to confidential information must each have a federally-granted secret level clearance and maintain that level of security clearance throughout the term of the contract.

(f) Responsibilities of the cybersecurity monitor. The cybersecurity monitor will gather and analyze information and data provided by ERCOT and voluntarily disclosed by monitored utilities and cybersecurity coordination program participants to manage the cybersecurity coordination program and the cybersecurity monitor program.

  (1) Cybersecurity Coordination Program. The cybersecurity coordination program is available to all electric utilities, municipally owned utilities, and electric cooperatives in the state of Texas. The cybersecurity coordination program must include the following functions:

    (A) guidance on best practices in cybersecurity;

    (B) facilitation of sharing cybersecurity information among utilities;

    (C) research and development of best practices regarding cybersecurity;

    (D) guidance on best practices for cybersecurity controls for supply chain risk management of cybersecurity systems used by utilities, which may include, as applicable, best practices related to:

      (i) software integrity and authenticity;

      (ii) vendor risk management and procurement controls, including notification by a vendor of incidents related to the vendor's products and services; and

      (iii) vendor remote access.

  (2) Cybersecurity Monitor Program. The cybersecurity monitor program is available to all monitored utilities. The cybersecurity monitor program must include the functions of the cybersecurity coordination program listed in paragraph (1) of this subsection in addition to the following functions:

    (A) holding regular meetings with monitored utilities to discuss emerging threats, best business practices, and training opportunities;

    (B) reviewing self-assessments of cybersecurity efforts voluntarily disclosed by monitored utilities; and

    (C) reporting to the commission on monitored utility cybersecurity preparedness.

(g) Authority of the Cybersecurity Monitor.

  (1) The cybersecurity monitor has the authority to conduct monitoring, analysis, reporting, and other activities related to information voluntarily provided by monitored utilities.

  (2) The cybersecurity monitor has the authority to request, but not to require, information from a monitored utility about activities that may be potential cybersecurity threats.

(h) Ethics standards governing the Cybersecurity Monitor.

  (1) During the period of a person's service with the cybersecurity monitor, the person must not:

    (A) have a direct financial interest in the provision of electric service in the state of Texas; or have a current contract to perform services for any entity as described by PURA §31.051 or a corporation described by PURA §32.053.

    (B) serve as an officer, director, partner, owner, employee, attorney, or consultant for ERCOT or any entity as described by PURA §31.051 or a corporation described by PURA §32.053;

    (C) directly or indirectly own or control securities in any entity, an affiliate of any entity, or direct competitor of any entity as described by PURA §31.051 or a corporation described by PURA §32.053, except that it is not a violation of this rule if the person indirectly owns an interest in a retirement system, institution or fund that in the normal course of business invests in diverse securities independently of the control of the person; or

    (D) accept a gift, gratuity, or entertainment from ERCOT, any entity, an affiliate of any entity, or an employee or agent of any entity as described by PURA §31.051 or a corporation described by PURA §32.053.

  (2) The cybersecurity monitor must not directly or indirectly solicit, request from, suggest, or recommend to any entity, an affiliate of any entity, or an employee or agent of any entity as described by PURA §31.051 or a corporation described by PURA §32.053, the employment of a person by any entity as described by PURA §31.051 or a corporation described by PURA §32.053 or an affiliate.

  (3) The commission may impose post-employment restrictions for the cybersecurity monitor and its staff.

(i) Confidentiality standards. The cybersecurity monitor and commission staff must protect confidential information and data in accordance with the confidentiality standards established in PURA, the ERCOT protocols, commission rules, and other applicable laws. The requirements related to the level of protection to be afforded information protected by these laws and rules are incorporated in this section.

(j) Reporting requirement. All reports prepared by the cybersecurity monitor must reflect the cybersecurity monitor's independent analysis, findings, and expertise. The cybersecurity monitor must prepare and submit to the commission:

  (1) monthly, quarterly, and annual reports; and

  (2) periodic or special reports on cybersecurity issues or specific events as directed by the commission or commission staff.

(k) Communication between the Cybersecurity Monitor and the commission.

  (1) The personnel of the cybersecurity monitor may communicate with the commission and commission staff on any matter without restriction consistent with confidentiality requirements.

  (2) The cybersecurity monitor must:

Cont'd...

Next Page

Link to Texas Secretary of State Home Page | link to Texas Register home page | link to Texas Administrative Code home page | link to Open Meetings home page