US Lawyer Database

For Lawyer-Seekers

YOU DESERVE THE BEST LAWYER

§ 24-33.5-1901. Legislative Declaration

The general assembly hereby finds and declares that: Cyber threats have continued to grow in significance, scale, scope, and sophistication in the past several years; A dramatic increase in the number of cyber attacks against public, private, and nonprofit entities and individual citizens, coupled with inadequate resources to respond to such attacks, have made cybersecurity […]

§ 24-33.5-1902. Colorado Cybersecurity Council – Creation – Council Members

There is created in the department of public safety and within existing resources the Colorado cybersecurity council. The council operates as a steering group to develop cybersecurity policy guidance for the governor; develop comprehensive sets of prioritized goals, requirements, initiatives, and milestones; and coordinate with the general assembly and the judicial branch regarding cybersecurity as […]

§ 24-33.5-1903. Cyber Operation Center – Coordination of Missions

The department of public safety, using the office of prevention and security within the division of homeland security and emergency management, and using any other facilities deemed necessary and appropriate by the department of public safety, may coordinate with the division of homeland security and emergency management, the Colorado bureau of investigation, the federal bureau […]

§ 24-33.5-1904. Education – Training – Workforce Development

The university of Colorado at Colorado Springs may partner with other institutions of higher education and a nonprofit organization that supports national, state, and regional cybersecurity initiatives to establish and expand cyber higher education programs and establish needed cyber education and training laboratories. The subject areas of such higher education programs may include, but need […]

§ 24-33.5-1905. Research and Development

The university of Colorado at Colorado Springs may partner with a nonprofit organization that supports national, state, and regional cybersecurity initiatives to work to establish a secure environment for research and development, initial operational testing and evaluation, and expedited contracting for production for industrial cyber products and techniques. In furtherance of subsection (1) of this […]