Sec. 12. (a) This section applies only if the costs to a county to enter into an agreement required by this section can be paid from money:

(1) received from the federal government and permitted to be spent for this purpose; or

Ask a legal question, get an answer ASAP!
Click here to chat with a lawyer about your rights.

(2) appropriated by the general assembly for this purpose.

     (b) Each county shall enter into an agreement with the secretary of state to use a threat intelligence and enterprise security company designated by the secretary of state to provide hardware, software, and services to:

(1) investigate cybersecurity attacks;

(2) protect against malicious software; and

(3) analyze information technology security risks.

     (c) The agreement to provide services to a county under this section:

(1) has no effect on any threat intelligence and enterprise security service provided to the county by any other agreement with a provider or by any county employee or contractor; and

(2) must be designed to complement any existing service agreement or service used by the county;

when the county enters into the agreement.

     (d) This section expires January 1, 2028.

As added by P.L.135-2020, SEC.1. Amended by P.L.193-2021, SEC.5; P.L.115-2022, SEC.1.