Amends GS 147-33.80 as the title indicates, making Article 3D, State Information Technology Services, applicable to the General Assembly, the Judicial Department, and the University of North Carolina and its constituent institutions. Directs these agencies to participate in the information technology procurement programs, services, or contracts offered by the Office of Information Technology services (was, these agencies may elect to participate). Makes conforming changes to GS 147-33.82(b), GS 147-33.83(a), GS 147-33.91 and deletes GS 147-33.111(b), which exempted the previously identified state agencies from the security standards developed by the state Chief Information Officer (CIO) and allowed them to develop their own.Makes stylistic changes to GS 147-33.81 (Definitions).
Amends GS 147-33.84 to provide that any state agency, may request in writing to the CIOfor authority to deviate from the provisions in GS 147-33.83(a) (was, provided for certain deviationsby the Department of Revenue). Directs the CIO to review deviations that are granted to state agencies under this section before July 1, 2013, and requires the CIO to adopt a plan to bring each deviation within the CIO's general governance under this article as soon as practical.
Deletes provisions in GS 143-661(a) authorizing the Criminal Justice Network Governing Board established within the office of the CIO to exercise all of its statutory power independent of control by the CIO's office. Makes an additional conforming change to GS 143C-3-3(e).
Bill H 859 (2013-2014)Summary date: Apr 15 2013 - More information
© 2021 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.