Bill Text: HI HB767 | 2013 | Regular Session | Introduced
Bill Title: Chief Information Officer; Information Technology; Security
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Introduced - Dead) 2013-01-24 - Referred to FIN, referral sheet 5 [HB767 Detail]
Download: Hawaii-2013-HB767-Introduced.html
HOUSE OF REPRESENTATIVES |
H.B. NO. |
767 |
TWENTY-SEVENTH LEGISLATURE, 2013 |
|
|
STATE OF HAWAII |
|
|
|
|
|
|
||
|
A BILL FOR AN ACT
RELATING TO INFORMATION TECHNOLOGY.
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
SECTION 1. Protecting and securing the State of Hawaii's information and data is a top concern in today's cyber world. The State must protect its technology from enemies both outside and within the State. To ensure the security of state government information and the data communications infrastructure from unauthorized uses, intrusions, or other security threats, the chief information officer should be given the responsibility and authority to direct the development, adoption, and implementation of policies, procedures, and standards and training personnel to minimize vulnerability to threats, regularly assess security risks, determine appropriate security measures, and perform security audits of government information systems and data communications infrastructures.
The purpose of this Act is to establish policies, procedures, and standards to identify and require the adoption of practices to safeguard information systems, data, and communications infrastructures; define the scope and regularity of security audits; and which bodies are authorized to conduct security audits, which may include reviews of physical security practices.
SECTION 2. Chapter 27, Hawaii Revised Statutes, is amended by adding to part VII a new section, to be appropriately designated and to read as follows:
"§27- Additional duties of the chief information officer relating to security of government information. (a) The chief information officer shall provide for periodic security audits of all executive branch agencies regarding the protection of government databases and data communications.
(b) Security audits may include, but are not limited to, on-site audits as well as reviews of all written security procedures and documented practices. The chief information officer may contract with a private firm or firms that specialize in conducting these audits. All departments, agencies, boards, or commissions subject to the audits authorized by this section shall fully cooperate with the entity designated to perform the audit. The chief information officer may direct specific remediation actions to mitigate findings of insufficient administrative, technical, and physical controls necessary to protect state government information or data communication infrastructures.
(c) The provisions of this section shall not infringe upon responsibilities assigned to the state comptroller, the legislative auditor, or other statutory requirements.
SECTION 3. New statutory material is underscored.
SECTION 3. This Act shall take effect upon its approval.
INTRODUCED BY: |
_____________________________ |
|
BY REQUEST |
Report Title:
Chief Information Officer; Information Technology; Security
Description:
Assigns to the Chief Information Officer the responsibility and authority to direct the development, adoption, and training of policies, procedures, and standards to minimize vulnerability to threats, regularly assess security risks, determine appropriate security measures, and perform security audits of government information systems and data communications infrastructures.
The summary description of legislation appearing on this page is for informational purposes only and is not legislation or evidence of legislative intent.