All Roll Calls
Yes: 223 • No: 1
Sponsored By: Daniel Linville (Republican)
Signed by Governor
Personalized for You
Sign up for a PRIA Policy Scan to see your personalized alignment score for this bill and every other piece of legislation we track. We analyze your financial profile against policy provisions to show you exactly what matters to your wallet.
6 provisions identified: 4 benefits, 0 costs, 2 mixed.
Each year by December 1, the CISO reports to the Governor and the Joint Committee on Government and Finance. The report explains the cybersecurity program’s status, recommends any law changes, and summarizes the year’s agency reviews. It also lists major IT modernization work by the Office of Technology.
Cybersecurity risk assessments, program reviews, plans of action and milestones, and remediation plans are not public records. The law keeps any details that could expose risks or threaten critical systems confidential. This protects government technology, public safety, and public health.
The CISO and Chief Information Officer ensure software licenses do not limit the state’s hardware choices. If software runs on standard desktops or servers, contracts must let the state choose its own hardware. This reduces vendor lock-in and helps deployments.
Beginning June 12, 2026, the state runs a centralized Cybersecurity Office led by a Chief Information Security Officer (CISO). The CISO sets statewide cybersecurity policies, standards, risk assessments, training, and privacy impact checks. The office provides a cyber risk management service and helps agencies with incident response and recovery. The Secretary of Administration must write rules to carry out and enforce these requirements.
Higher education, the State Police, listed constitutional officers, the Legislature, and the Judiciary are exempt from these cybersecurity rules. Those entities may choose to join the program. If they opt in, they do so under fee-based agreements set by the state. The law does not set fee amounts.
Agencies and information custodians subject to the law must follow the statewide cyber standard and complete risk assessments. They must join at least one annual cybersecurity program review before November 30 each year and submit any policy exceptions to the CISO. The review checks readiness, data safety, and needed fixes. If a custodian skips the review, the Office of Technology may perform diagnostics and bill only its actual costs.
Daniel Linville
Republican • House
There are no cosponsors for this bill.
All Roll Calls
Yes: 223 • No: 1
House vote • 3/14/2026
House concurred in Senate amendment and passed bill (Roll No. 644)
Yes: 96 • No: 1
Senate vote • 3/12/2026
Passed Senate (Roll No. 514)
Yes: 34 • No: 0
House vote • 3/2/2026
Passed House (Roll No. 251)
Yes: 93 • No: 0
Approved by Governor 4/1/2026
To Governor 3/25/26
House received Senate message
House concurred in Senate amendment and passed bill (Roll No. 644)
Communicated to Senate
Completed legislative action
House Message received
To Governor 3/25/2026 - Senate Journal
Approved by Governor 4/1/2026 - Senate Journal
Approved by Governor 4/1/2026 - House Journal
On 3rd reading
Read 3rd time
Passed Senate (Roll No. 514)
Senate requests House to concur
On 2nd reading
Read 2nd time
Committee amendment adopted (Voice vote)
Reported do pass, with amendment
Immediate consideration
Read 1st time
Introduced in Senate
To Government Organization
To Government Organization
On 3rd reading, Special Calendar
Read 3rd time
Engrossed
Enrolled
Introduced Version
HB 5692 — Supplemental appropriation, State Road Fund
HB 5691 — Supplemental appropriation, Department of Health
HB 5684 — Relating to authorizing the Supreme Court of Appeals to create child protection commissioners
HB 5686 — Relating to the timing of payments of annually required deposit into an eligible recipient’s Hope Scholarship account
HB 5685 — Relating to authorizing bonds for improvements to the West Virginia Science and Culture Center
SB 1064 — Redefining "long-term substitute" as it relates to public school personnel