Current through P.L. 171-2024
Section 3-5-4-12 - Agreements to use a threat, intelligence, and enterprise security company designated by the secretary of state; expiration of section(a) This section applies only if the costs to a county to enter into an agreement required by this section can be paid from money:(1) received from the federal government and permitted to be spent for this purpose; or(2) appropriated by the general assembly for this purpose.(b) Each county shall enter into an agreement with the secretary of state to use a threat intelligence and enterprise security company designated by the secretary of state to provide hardware, software, and services to: (1) investigate cybersecurity attacks;(2) protect against malicious software; and(3) analyze information technology security risks.(c) The agreement to provide services to a county under this section:(1) has no effect on any threat intelligence and enterprise security service provided to the county by any other agreement with a provider or by any county employee or contractor; and(2) must be designed to complement any existing service agreement or service used by the county; when the county enters into the agreement.
(d) This section expires January 1, 2028.Amended by P.L. 115-2022,SEC. 1, eff. 7/1/2022.Amended by P.L. 193-2021,SEC. 5, eff. 4/29/2021.Added by P.L. 135-2020,SEC. 1, eff. 3/21/2020.