Sec. 12. (a) This section applies only if the costs to a county to enter into an agreement required by this section can be paid from money:
(1) received from the federal government and permitted to be spent for this purpose; or
(2) appropriated by the general assembly for this purpose.
(b) Each county shall enter into an agreement with the secretary of state to use a threat intelligence and enterprise security company designated by the secretary of state to provide hardware, software, and services to:
(1) investigate cybersecurity attacks;
(2) protect against malicious software; and
(3) analyze information technology security risks.
(c) The agreement to provide services to a county under this section:
(1) has no effect on any threat intelligence and enterprise security service provided to the county by any other agreement with a provider or by any county employee or contractor; and
(2) must be designed to complement any existing service agreement or service used by the county;
when the county enters into the agreement.
(d) This section expires January 1, 2028.
As added by P.L.135-2020, SEC.1. Amended by P.L.193-2021, SEC.5; P.L.115-2022, SEC.1.