Skip to main content
SB18-086

Cyber Coding Cryptology For State Records

Type Bill
Session 2018 Regular Session
Subjects
State Government

Concerning the use of cyber coding cryptology for state records, and, in connection therewith, making an appropriation.

Bill Summary:

Office of information technology - information security - cyber coding cryptology - state records - institutions of higher education - appropriation. The chief information security officer in the governor's office of information technology (OIT), the director of OIT, the department of state, and the executive director of the department of regulatory agencies are required to take certain actions to protect state records containing trusted sensitive and confidential information from criminal, unauthorized, or inadvertent manipulation or theft.

The chief information security officer is required to:

  • Identify, assess, and mitigate cyber threats to state government;
  • Annually collect information from all public agencies to assess the nature of threats to data systems and the potential risks and civil liabilities from the theft or inadvertent release of such information; and
  • In coordination and partnership with specified agencies, boards, and councils, annually assess the data systems of each public agency for the benefits and costs of adopting and applying distributed ledger technologies such as blockchains.
The chief information security officer is also encouraged to develop and maintain a series of metrics to identify, assess, and monitor each public agency data system for its platform descriptions, vulnerabilities, risks, liabilities, appropriate employee access control, and the benefits and costs of adopting encryption and distributed ledger technologies.

The director of OIT is required to consider the annual metrics from the office of the chief information security officer to recommend programs, contracts, and upgrades of data systems that have good cost-benefit potential or return on investment. In addition, OIT and the office of the chief information security officer are required to consider developing public-private partnerships and contracts to allow capitalization of encryption technologies while protecting intellectual property rights.

The department of state is required to consider research, development, and implementation for encryption and data integrity techniques, including distributed ledger technologies such as blockchains. The department of state is required to consider using distributed ledger technologies when accepting business licensing records and when distributing department of state data to other departments and agencies.

The executive director of the department of regulatory agencies or the director's designee is required to consider secure encryption methods, including distributed ledger technologies, to protect against falsification, create visibility to identify external hacking threats, and to improve internal data security.

In addition, institutions of higher education (institutions) may include distributed ledger technologies within their curricula and research and development activities.

The university of Colorado at Colorado Springs and any nonprofit organization with which the university has a partnership may consider:

  • Encouraging coordination with the United States department of commerce and the national institute of standards and technologies to develop the capability to act as a Colorado in-state center of excellence on cybersecurity advice and national institute of standards and technologies standards;
  • Studying efforts to protect privacy of personal identifying information maintained within distributed ledger programs, ensuring that programs make all attempts to follow best practices for privacy, and providing advice to all program stakeholders on the requirement to maintain privacy in accordance with required regulatory bodies and governing standards; and
  • Encouraging the use of distributed ledger technologies, such as blockchains, within their proposed curricula for public sector education.
The department of higher education is required to allocate to the governing boards of the institutions participating in activities related to cybersecurity and distributed ledger technologies, money appropriated to the department of higher education for cybersecurity and distributed ledger technologies. The institutions are required to ensure that certain percentages of the money that they receive in connection with cybersecurity and distributed ledger technologies will be used to provide scholarships to students at the institution who are doing work in such fields. The department of higher education is also required to prepare an annual report to the general assembly containing specified information in connection with the use of the money appropriated for cybersecurity and distributed ledger technologies.

For the 2018-19 state fiscal year:

  • $250,000 is appropriated from the general fund to the office of the governor for use by the office of information technology for security governance to evaluate the potential use of distributed ledger technologies in state data systems; and
  • $5,100,000 is appropriated from the general fund to the department of higher education to implement the act. Specified amounts are allocated to Colorado Mesa university, Metropolitan state university of Denver, Western state Colorado university, the Colorado state university system, university of Colorado state board for community colleges and occupational education state system, and to the community colleges.
    (Note: This summary applies to this bill as enacted.)

Status

Became Law

Introduced

Passed

Became Law

Related Documents & Information

Date Version Documents
05/30/2018 Signed Act PDF
05/16/2018 Final Act PDF
05/04/2018 Rerevised PDF
05/02/2018 Revised PDF
04/06/2018 Reengrossed PDF
04/05/2018 Engrossed PDF
01/16/2018 Introduced PDF
Date Version Documents
04/26/2018 PA3 PDF
04/03/2018 PA2 PDF
02/08/2018 PA1 PDF
Date Version Documents
09/06/2018 FN5 PDF
04/30/2018 FN4 PDF
04/16/2018 FN3 PDF
03/27/2018 FN2 PDF
02/05/2018 FN1 PDF
Date Version Documents
05/02/2018 SA2 PDF
04/03/2018 SA1 PDF
Activity Vote Documents
Refer Senate Bill 18-086 to the Committee of the Whole. The motion passed on a vote of 12-1. Vote summary
Activity Vote Documents
Adopt amendment J.004 The motion passed without objection. Vote summary
Adopt amendment L.008 The motion passed without objection. Vote summary
Adopt amendment L.010 The motion passed without objection. Vote summary
Adopt amendment L.007 The motion passed without objection. Vote summary
Refer Senate Bill 18-086, as amended, to the Committee on Appropriations. The motion passed on a vote of 12-0. Vote summary
Activity Vote Documents
Activity Vote Documents
Adopt amendment J.001 The motion passed without objection. Vote summary
Adopt amendment L.006 The motion passed without objection. Vote summary
Refer Senate Bill 18-086, as amended, to the Committee of the Whole. The motion passed on a vote of 7-0. Vote summary
Activity Vote Documents
Adopt amendment L.002 The motion passed without objection. Vote summary
Adopt amendment L.003 The motion passed without objection. Vote summary
Adopt amendment L.004 The motion passed without objection. Vote summary
Refer Senate Bill 18-086, as amended, to the Committee on Appropriations. The motion passed on a vote of 5-2. Vote summary
Date Calendar Motion Vote Vote Document
05/07/2018 House Amendments REPASS
33
AYE
2
NO
0
OTHER
Vote record
05/07/2018 House Amendments CONCUR
35
AYE
0
NO
0
OTHER
Vote record
04/06/2018 Third Reading BILL
33
AYE
1
NO
1
OTHER
Vote record
Date Calendar Motion Vote Vote Document
05/04/2018 Third Reading BILL
58
AYE
2
NO
5
OTHER
Vote record
05/04/2018 Third Reading AMD (L.014)
60
AYE
0
NO
5
OTHER
Vote record
05/04/2018 Third Reading PERM
60
AYE
0
NO
5
OTHER
Vote record
Date Location Action
05/30/2018 Governor Governor Signed
05/16/2018 Governor Sent to the Governor
05/16/2018 House Signed by the Speaker of the House
05/15/2018 Senate Signed by the President of the Senate
05/07/2018 Senate Senate Considered House Amendments - Result was to Concur - Repass
05/04/2018 House House Third Reading Passed with Amendments - Floor
05/03/2018 House House Third Reading Laid Over to 05/04/2018 - No Amendments
05/02/2018 House House Second Reading Special Order - Passed with Amendments - Committee, Floor
05/02/2018 House House Committee on Appropriations Refer Unamended to House Committee of the Whole
04/26/2018 House House Committee on Business Affairs and Labor Refer Amended to Appropriations
04/17/2018 House House Committee on Business Affairs and Labor Witness Testimony and/or Committee Discussion Only
04/10/2018 House Introduced In House - Assigned to Business Affairs and Labor
04/06/2018 Senate Senate Third Reading Passed - No Amendments
04/05/2018 Senate Senate Second Reading Passed with Amendments - Committee
04/04/2018 Senate Senate Second Reading Special Order - Laid Over Daily - No Amendments
04/03/2018 Senate Senate Committee on Appropriations Refer Amended to Senate Committee of the Whole
02/07/2018 Senate Senate Committee on Business, Labor, & Technology Refer Amended to Appropriations
01/16/2018 Senate Introduced In Senate - Assigned to Business, Labor, & Technology
Effective Date Chapter # Title Documents
05/30/2018 319 Cyber Coding Cryptology For State Records PDF