US Lawyer Database

For Lawyer-Seekers

YOU DESERVE THE BEST LAWYER

4-13.1-1-1. Applicability

Sec. 1. The definitions in this chapter apply throughout this article. As added by P.L.177-2005, SEC.9.

4-13.1-1-1.3. “Attack Vector”

Sec. 1.3. “Attack vector” means a method or way for attacking, infiltrating, or otherwise compromising a computer network or system. As added by P.L.134-2021, SEC.1.

4-13.1-1-1.5. “Cybersecurity Incident”

Sec. 1.5. (a) “Cybersecurity incident” means a malicious or suspicious occurrence that consists of one (1) or more of the categories of attack vectors described in subsection (b) and defined on the office’s Internet web site that: (1) jeopardizes or may potentially jeopardize the confidentiality, integrity, or availability of an information system, an operational system, […]

4-13.1-1-2. “Information Technology”

Sec. 2. “Information technology” includes the resources, technologies, and services associated with the fields of: (1) information processing; (2) office automation; (3) telecommunication facilities and networks; (4) data input and storage; and (5) information system applications. As added by P.L.177-2005, SEC.9.

4-13.1-1-3. “Office”

Sec. 3. “Office” means the office of technology established by IC 4-13.1-2-1. As added by P.L.177-2005, SEC.9.

4-13.1-1-4. “State Agency”

Sec. 4. (a) “State agency” means an authority, a board, a branch, a commission, a committee, a department, a division, or another instrumentality of the executive, including the administrative, department of state government. (b) The term does not include: (1) the judicial or legislative departments of state government; (2) a state educational institution; or (3) […]

4-13.1-1-5. “Telecommunication”

Sec. 5. “Telecommunication” means the transmission of any document, picture, datum, sound, or other symbol by television, radio, microwave, optical, or other electromagnetic signal. As added by P.L.177-2005, SEC.9.