2016 Colorado Revised Statutes
Title 24 - Government - State
Governor's Office
Article 37.5 - Office of Information Technology
Part 4 - Information Security
§ 24-37.5-404.5. Institutions of higher education - information security plans

CO Rev Stat § 24-37.5-404.5 (2016) What's This?

(1) Each institution of higher education, in coordination with the department of higher education, shall develop an information security program. The information security program shall provide information security for the communication and information resources that support the operations and assets of the institution of higher education.

(2) The information security program shall include:

(a) Periodic assessments of the risk and magnitude of the harm that could result from a security incident;

(b) A process for providing adequate information security for the communication and information resources of the institution of higher education;

(c) Information security awareness training to inform the employees, administrators, and users at the institution of higher education about the information security risks and the responsibility of employees, administrators, and users to comply with the institution's information security program and the policies, standards, and procedures designed to reduce the security risks;

(d) Periodic testing and evaluation of the effectiveness of information security for the institution of higher education, which shall be performed not less than annually;

(e) A process for detecting, reporting, and responding to security incidents consistent with the information security policy of the institution of higher education. The institutions of higher education, the Colorado commission on higher education, and the chief information security officer shall establish the terms and conditions by which the institutions of higher education shall report information security incidents to the chief information security officer.

(f) Plans and procedures to ensure the continuity of operations for information resources that support the operations and assets of the institution of higher education in the event of a security incident.

(3) (a) On or before July 1, 2011, and on or before July 1 each year thereafter, each institution of higher education shall submit to the department of higher education a report concerning the development and implementation of the institution's information security program and compliance with the requirements specified in subsection (2) of this section. Upon receipt of the reports, the department of higher education shall review the reports and subsequently submit the reports to the chief information security officer.

(b) As soon as practicable after August 10, 2016, the department of higher education shall divide the institutions of higher education into three groups. Notwithstanding any provision of paragraph (a) of this subsection (3) to the contrary:

(I) After the report submitted by July 1, 2017, the institutions in the first group shall submit the report required in this subsection (3) by July 1 every three years;

(II) After the report submitted by July 1, 2018, the institutions in the second group shall submit the report required in this subsection (3) by July 1 every three years; and

(III) After the report submitted by July 1, 2019, the institutions in the third group shall submit the report required in this subsection (3) by July 1 every three years.

(4) Nothing in this section shall be construed to require any institution of higher education or the department of higher education to adopt policies or standards that conflict with federal law, rules, or regulations or with contractual arrangements governed by federal laws, rules, or regulations.

(5) and (6) (Deleted by amendment, L. 2011, (SB 11-062), ch. 128, p. 431, § 8, effective April 22, 2011.)

(7) (Deleted by amendment, L. 2011, (HB 11-1301), ch. 297, p. 1422, § 13, effective August 10, 2011.)

Disclaimer: These codes may not be the most recent version. Colorado may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.