AN ACT TO CREATE A PILOT PROGRAM TO ESTABLISH PUBLIC-PRIVATE PARTNERSHIPS THAT WILL ASSIST CERTAIN COUNTIES WITH CYBERSECURITY RESOURCES; TO CREATE A PILOT PROGRAM WITHIN THE DEPARTMENT OF INFORMATION TECHNOLOGY TO ENHANCE PROGRAM MANAGEMENT CAPABILITIES WITHIN THE AGENCY; TO ESTABLISH A GRANT
PROGRAM AT THE DEPARTMENT OF INFORMATION TECHNOLOGY TO ENCOURAGE THE EXPANSION OF SATELLITE-BASED BROADBAND SERVICE TO UNSERVED PORTIONS OF THE STATE; TO STREAMLINE THE PREPARATION AND FINALIZATION OF NEW LEASES AND LEASE RENEWALS ON STATE PROPERTY TO EXPEDITE DEPLOYMENT OF BROADBAND INFRASTRUCTURE; AND TO MAKE APPROPRIATIONS TO THE DEPARTMENT OF INFORMATION TECHNOLOGY.
Amends GS 147-64.6 concerning the duties and responsibilities of the State Auditor. Adds the duty to independently examine into and make findings of fact on whether State agencies are adhering to statutory requirements that include conditions precedent, classifications, and similar eligibility or qualifying standards to assure that statutory intent is carried out while the requirements are effective. Further, makes the State Auditor responsible for verification audits for compliance with statutory requirements. Provides that the verification audits for compliance can be initiated at the Auditor's discretion or requested by the Governor or the General Assembly, and do not require advance notice to the organization or State agency being audited. Grants the State Auditor access to examine the accounts and records of any organization or State agency relating to a verification audit for compliance with statutory condition precedent, classification, or other similar eligibility or qualifying standard.
© 2022 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.