Enacts new GS 143B-1337 creating the 11-member Information Technology Strategy Board (Board) in the Department of Information Technology to carry out seven specified duties, including advising the State CIO on policies and procedures to develop, review, and update the State Information Technology Plan, and developing and maintaining a five-year prioritization plan for future business system technology projects. Establishes staggered terms for Board members. Prohibits members from being employed by or serving on the board of directors or other corporate governing body of any vendor providing information systems, computer hardware, computer software, or telecommunications goods or services to the state. Names the State CIO as Board chair. Requires the Board to report on projects that have been recommended, the status of those projects, and the most recent version of its five-year prioritization plan to the specified NCGA committee and division annually by January 1.
Establishes the Information Technology Strategy Reserve (Reserve), consisting of 0.4% of the net State tax revenues, all interest earnings received on monies in the Reserve, and any other funds as directed by the NCGA. Allows the Reserve to be used for business system technology projects recommended by the board and approved by the NCGA, and agency information technology projects and project planning.
Appropriates $1 million in nonrecurring funds for 2019-20 from the General Fund to the Reserve.
Effective July 1, 2019.
Bill H 969 (2019-2020)Summary date: Apr 25 2019 - More information
© 2022 School of Government The University of North Carolina at Chapel Hill
This work is copyrighted and subject to "fair use" as permitted by federal copyright law. No portion of this publication may be reproduced or transmitted in any form or by any means without the express written permission of the publisher. Distribution by third parties is prohibited. Prohibited distribution includes, but is not limited to, posting, e-mailing, faxing, archiving in a public database, installing on intranets or servers, and redistributing via a computer network or in printed form. Unauthorized use or reproduction may result in legal action against the unauthorized user.