State Codes and Statutes

Statutes > Utah > Title-63f > Chapter-01 > 63f-1-206

63F-1-206. Rulemaking -- Policies.
(1) (a) Except as provided in Subsection (2), in accordance with Title 63G, Chapter 3,Utah Administrative Rulemaking Act, the chief information officer shall make rules that:
(i) provide standards that impose requirements on executive branch agencies that:
(A) are related to the security of the statewide area network; and
(B) establish standards for when an agency must obtain approval before obtaining itemslisted in Subsection 63F-1-205(1);
(ii) specify the detail and format required in an agency information technology plansubmitted in accordance with Section 63F-1-204;
(iii) provide for standards related to the privacy policies of websites operated by or onbehalf of an executive branch agency;
(iv) provide for the acquisition, licensing, and sale of computer software;
(v) specify the requirements for the project plan and business case analysis required bySection 63F-1-205;
(vi) provide for project oversight of agency technology projects when required by Section63F-1-205;
(vii) establish, in accordance with Subsection 63F-1-205(2), the implementation of theneeds assessment for information technology purchases; and
(viii) establish telecommunications standards and specifications in accordance withSection 63F-1-404.
(b) The rulemaking authority in this Subsection (1) is in addition to any other rulemakingauthority granted by this title.
(2) (a) Notwithstanding Title 63G, Chapter 3, Utah Administrative Rulemaking Act, andsubject to Subsection (2)(b), the chief information officer may adopt a policy that outlinesprocedures to be followed by the chief information officer in facilitating the implementation ofthis title by executive branch agencies if the policy:
(i) is consistent with the executive branch strategic plan; and
(ii) is not required to be made by rule under Subsection (1) or Section 63G-3-201.
(b) (i) A policy adopted by the chief information officer under Subsection (2)(a) may nottake effect until 30 days after the day on which the chief information officer submits the policyto:
(A) the governor; and
(B) all cabinet level officials.
(ii) During the 30-day period described in Subsection (2)(b)(i), cabinet level officialsmay review and comment on a policy submitted under Subsection (2)(b)(i).
(3) (a) Notwithstanding Subsection (1) or (2) or Title 63G, Chapter 3, UtahAdministrative Rulemaking Act, without following the procedures of Subsection (1) or (2), thechief information officer may adopt a security procedure to be followed by executive branchagencies to protect the statewide area network if:
(i) broad communication of the security procedure would create a significant potentialfor increasing the vulnerability of the statewide area network to breach or attack; and
(ii) after consultation with the chief information officer, the governor agrees that broadcommunication of the security procedure would create a significant potential increase in thevulnerability of the statewide area network to breach or attack.
(b) A security procedure described in Subsection (3)(a) is classified as a protected record

under Title 63G, Chapter 2, Government Records Access and Management Act.
(c) The chief information officer shall provide a copy of the security procedure as aprotected record to:
(i) the chief justice of the Utah Supreme Court for the judicial branch;
(ii) the speaker of the House of Representatives and the president of the Senate for thelegislative branch;
(iii) the chair of the Board of Regents; and
(iv) the chair of the State Board of Education.

Amended by Chapter 382, 2008 General Session

State Codes and Statutes

Statutes > Utah > Title-63f > Chapter-01 > 63f-1-206

63F-1-206. Rulemaking -- Policies.
(1) (a) Except as provided in Subsection (2), in accordance with Title 63G, Chapter 3,Utah Administrative Rulemaking Act, the chief information officer shall make rules that:
(i) provide standards that impose requirements on executive branch agencies that:
(A) are related to the security of the statewide area network; and
(B) establish standards for when an agency must obtain approval before obtaining itemslisted in Subsection 63F-1-205(1);
(ii) specify the detail and format required in an agency information technology plansubmitted in accordance with Section 63F-1-204;
(iii) provide for standards related to the privacy policies of websites operated by or onbehalf of an executive branch agency;
(iv) provide for the acquisition, licensing, and sale of computer software;
(v) specify the requirements for the project plan and business case analysis required bySection 63F-1-205;
(vi) provide for project oversight of agency technology projects when required by Section63F-1-205;
(vii) establish, in accordance with Subsection 63F-1-205(2), the implementation of theneeds assessment for information technology purchases; and
(viii) establish telecommunications standards and specifications in accordance withSection 63F-1-404.
(b) The rulemaking authority in this Subsection (1) is in addition to any other rulemakingauthority granted by this title.
(2) (a) Notwithstanding Title 63G, Chapter 3, Utah Administrative Rulemaking Act, andsubject to Subsection (2)(b), the chief information officer may adopt a policy that outlinesprocedures to be followed by the chief information officer in facilitating the implementation ofthis title by executive branch agencies if the policy:
(i) is consistent with the executive branch strategic plan; and
(ii) is not required to be made by rule under Subsection (1) or Section 63G-3-201.
(b) (i) A policy adopted by the chief information officer under Subsection (2)(a) may nottake effect until 30 days after the day on which the chief information officer submits the policyto:
(A) the governor; and
(B) all cabinet level officials.
(ii) During the 30-day period described in Subsection (2)(b)(i), cabinet level officialsmay review and comment on a policy submitted under Subsection (2)(b)(i).
(3) (a) Notwithstanding Subsection (1) or (2) or Title 63G, Chapter 3, UtahAdministrative Rulemaking Act, without following the procedures of Subsection (1) or (2), thechief information officer may adopt a security procedure to be followed by executive branchagencies to protect the statewide area network if:
(i) broad communication of the security procedure would create a significant potentialfor increasing the vulnerability of the statewide area network to breach or attack; and
(ii) after consultation with the chief information officer, the governor agrees that broadcommunication of the security procedure would create a significant potential increase in thevulnerability of the statewide area network to breach or attack.
(b) A security procedure described in Subsection (3)(a) is classified as a protected record

under Title 63G, Chapter 2, Government Records Access and Management Act.
(c) The chief information officer shall provide a copy of the security procedure as aprotected record to:
(i) the chief justice of the Utah Supreme Court for the judicial branch;
(ii) the speaker of the House of Representatives and the president of the Senate for thelegislative branch;
(iii) the chair of the Board of Regents; and
(iv) the chair of the State Board of Education.

Amended by Chapter 382, 2008 General Session


State Codes and Statutes

State Codes and Statutes

Statutes > Utah > Title-63f > Chapter-01 > 63f-1-206

63F-1-206. Rulemaking -- Policies.
(1) (a) Except as provided in Subsection (2), in accordance with Title 63G, Chapter 3,Utah Administrative Rulemaking Act, the chief information officer shall make rules that:
(i) provide standards that impose requirements on executive branch agencies that:
(A) are related to the security of the statewide area network; and
(B) establish standards for when an agency must obtain approval before obtaining itemslisted in Subsection 63F-1-205(1);
(ii) specify the detail and format required in an agency information technology plansubmitted in accordance with Section 63F-1-204;
(iii) provide for standards related to the privacy policies of websites operated by or onbehalf of an executive branch agency;
(iv) provide for the acquisition, licensing, and sale of computer software;
(v) specify the requirements for the project plan and business case analysis required bySection 63F-1-205;
(vi) provide for project oversight of agency technology projects when required by Section63F-1-205;
(vii) establish, in accordance with Subsection 63F-1-205(2), the implementation of theneeds assessment for information technology purchases; and
(viii) establish telecommunications standards and specifications in accordance withSection 63F-1-404.
(b) The rulemaking authority in this Subsection (1) is in addition to any other rulemakingauthority granted by this title.
(2) (a) Notwithstanding Title 63G, Chapter 3, Utah Administrative Rulemaking Act, andsubject to Subsection (2)(b), the chief information officer may adopt a policy that outlinesprocedures to be followed by the chief information officer in facilitating the implementation ofthis title by executive branch agencies if the policy:
(i) is consistent with the executive branch strategic plan; and
(ii) is not required to be made by rule under Subsection (1) or Section 63G-3-201.
(b) (i) A policy adopted by the chief information officer under Subsection (2)(a) may nottake effect until 30 days after the day on which the chief information officer submits the policyto:
(A) the governor; and
(B) all cabinet level officials.
(ii) During the 30-day period described in Subsection (2)(b)(i), cabinet level officialsmay review and comment on a policy submitted under Subsection (2)(b)(i).
(3) (a) Notwithstanding Subsection (1) or (2) or Title 63G, Chapter 3, UtahAdministrative Rulemaking Act, without following the procedures of Subsection (1) or (2), thechief information officer may adopt a security procedure to be followed by executive branchagencies to protect the statewide area network if:
(i) broad communication of the security procedure would create a significant potentialfor increasing the vulnerability of the statewide area network to breach or attack; and
(ii) after consultation with the chief information officer, the governor agrees that broadcommunication of the security procedure would create a significant potential increase in thevulnerability of the statewide area network to breach or attack.
(b) A security procedure described in Subsection (3)(a) is classified as a protected record

under Title 63G, Chapter 2, Government Records Access and Management Act.
(c) The chief information officer shall provide a copy of the security procedure as aprotected record to:
(i) the chief justice of the Utah Supreme Court for the judicial branch;
(ii) the speaker of the House of Representatives and the president of the Senate for thelegislative branch;
(iii) the chair of the Board of Regents; and
(iv) the chair of the State Board of Education.

Amended by Chapter 382, 2008 General Session