Chief information security officer - duties and responsibilities.

Checkout our iOS App for a better way to browser and research.

(1) The chief information officer shall appoint a chief information security officer who shall serve at the pleasure of the chief information officer. The security officer shall report to and be under the supervision of the chief information officer. The security officer shall exhibit a background and expertise in security and risk management for communications and information resources. In the event the security officer is unavailable to perform the duties and responsibilities under this part 4, all powers and authority granted to the security officer may be exercised by the chief information officer.

  1. The chief information security officer shall:

  1. Develop and update information security policies, standards, and guidelines for public agencies;

  2. Promulgate rules pursuant to article 4 of this title containing information securitypolicies, standards, and guidelines;

  3. Ensure the incorporation of and compliance with information security policies, standards, and guidelines in the information security plans developed by public agencies pursuant to section 24-37.5-404;

  4. Direct information security audits and assessments in public agencies in order toensure program compliance and adjustments;

  5. Establish and direct a risk management process to identify information security risksin public agencies and deploy risk mitigation strategies, processes, and procedures;

  6. Approve or disapprove and review annually the information security plans of publicagencies;

  7. Conduct information security awareness and training programs;

  8. In coordination and consultation with the office of state planning and budgeting andthe chief information officer, review public agency budget requests related to information security systems and approve such budget requests for state agencies other than the legislative department; and

  9. Coordinate with the Colorado commission on higher education for purposes of reviewing and commenting on information security plans adopted by institutions of higher education that are submitted pursuant to section 24-37.5-404.5 (3).

  1. It is the intent of the general assembly that the cost of the services provided by thechief information security officer to a public agency be adequately funded in fiscal years commencing on and after July 1, 2007, through an appropriation to the public agency to pay for such services.

Source: L. 2006: Entire part added, p. 1715, § 1, effective June 6. L. 2008: (1) and (2)(h) amended, p. 1121, § 8, effective May 22. L. 2011: (1), (2)(b), and (3) amended, (SB 11-062), ch. 128, p. 429, § 6, effective April 22.


Download our app to see the most-to-date content.