AN ACT TO REQUIRE THAT INFORMATION TECHNOLOGY PERSONAL SERVICES CONTRACTS AND OTHER PERSONAL SERVICES CONTRACTS PURCHASED BY EXECUTIVE BRANCH AGENCIES BE SUBJECT TO THE SAME REQUIREMENTS AND PROCEDURES AS CONTRACTS FOR OTHER SERVICES; TO REQUIRE STATE AGENCIES TO OBTAIN THE SERVICES OF TEMPORARY EMPLOYEES THROUGH THE TEMPORARY SOLUTIONS PROGRAM OPERATED BY THE OFFICE OF STATE HUMAN RESOURCES; AND TO PROVIDE THAT INFORMATION TECHNOLOGY PERSONAL SERVICES CONTRACTS CAN ONLY BE OBTAINED UPON WRITTEN APPROVAL FROM THE OFFICE OF INFORMATION TECHNOLOGY SERVICES AND THE OFFICE OF STATE BUDGET AND MANAGEMENT.
Enacts GS 126-6.3 as the title indicates. Mandates that state agencies that use the services of temporary employees to do work that is not information technology related to secure temporary employees through the Temporary Solutions Program administered by the Office of State Human Resources (HR) or in a manner approved by the Director of the HR.
Directs the HR to monitor the employment of temporary employees by state agencies subject to this section and report biannually to the Joint Legislative Commission on Governmental Operations and to the Fiscal Research Division as to the compliance of agencies with this section. Defines a state agency to mean a unit of the executive branch of state government regardless of whether the agency is a part of the Council of State. Excludes the University of North Carolina as a state agency under this section.
Makes a conforming change to GS 126-4 directing the state Human Resources Commission to establish policies and rules governing the implementation of new GS 126-6.3.
© 2021 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.