Definitions.

Checkout our iOS App for a better way to browser and research.

As used in this part 4, unless the context otherwise requires:

  1. "Availability" means the timely and reliable access to and use of information created,generated, collected, or maintained by a public agency.

  2. Repealed.

  3. "Confidentiality" means the preservation of authorized restrictions on informationaccess and disclosure, including the means for protecting personal privacy and proprietary information.

  4. "Department of higher education" means the Colorado commission on higher education, collegeinvest, the Colorado student loan program, the Colorado college access network, the private occupational school division, and the state historical society.

  5. "Information security" means the protection of communication and information resources from unauthorized access, use, disclosure, disruption, modification, or destruction in order to:

  1. Prevent improper information modification or destruction;

  2. Preserve authorized restrictions on information access and disclosure;(c) Ensure timely and reliable access to and use of information; and (d) Maintain the confidentiality, integrity, and availability of information.

  1. "Information security plan" means the plan developed by a public agency pursuant tosection 24-37.5-404.

  2. "Institution of higher education" means a state-supported institution of higher education.

  3. "Integrity" means the prevention of improper information modification or destructionand ensuring information nonrepudiation and authenticity.

(8.5) "Joint technology committee" means the joint technology committee created in section 2-3-1702, C.R.S.

  1. "Public agency" means every state office, whether executive or judicial, and all of itsrespective offices, departments, divisions, commissions, boards, bureaus, and institutions. "Public agency" does not include institutions of higher education or the general assembly.

  2. "Security incident" means an accidental or deliberate event that results in or constitutes an imminent threat of the unauthorized access, loss, disclosure, modification, disruption, or destruction of communication and information resources.

Source: L. 2006: Entire part added, p. 1714, § 1, effective June 6. L. 2008: (2) repealed,

p. 1130, § 14, effective May 22. L. 2010: (4) amended, (SB 10-158), ch. 231, p. 1014, § 4, effective July 1. L. 2011: (9) amended, (SB 11-062), ch. 128, p. 429, § 5, effective April 22. L. 2013: (8.5) added, (HB 13-1079), ch. 246, p. 1193, § 7, effective May 18.


Download our app to see the most-to-date content.