|
Public Act 104-0195 |
HB1631 Enrolled | LRB104 07727 BDA 17772 b |
|
|
AN ACT concerning State government. |
Be it enacted by the People of the State of Illinois, |
represented in the General Assembly: |
Section 5. The Department of Innovation and Technology Act |
is amended by changing Sections 1-5, 1-10, 1-15, and 1-25 as |
follows: |
(20 ILCS 1370/1-5) |
Sec. 1-5. Definitions. In this Act: |
"Client agency" means each transferring agency, or its |
successor, and any other public agency to which the Department |
provides service to the extent specified in an interagency |
agreement with the public agency. |
"Dedicated unit" means the dedicated bureau, division, |
office, or other unit within a transferred transferring agency |
that is responsible for the information technology functions |
of the transferred transferring agency. |
"Department" means the Department of Innovation and |
Technology. |
"Information technology" means technology, |
infrastructure, equipment, systems, software, networks, and |
processes used to create, send, receive, and store electronic |
or digital information, including, without limitation, |
computer systems and telecommunication services and systems. |
|
"Information technology" shall be construed broadly to |
incorporate future technologies that change or supplant those |
in effect as of the effective date of this Act. |
"Information technology functions" means the development, |
procurement, installation, retention, maintenance, operation, |
possession, storage, and related functions of all information |
technology. |
"Secretary" means the Secretary of Innovation and |
Technology. |
"State agency" means each State agency, department, board, |
and commission under the jurisdiction of the Governor to which |
the Department provides services . |
" Transferred Transferring agency" means the Department on |
Aging; the Departments of Agriculture, Central Management |
Services, Children and Family Services, Commerce and Economic |
Opportunity, Corrections, Employment Security, Financial and |
Professional Regulation, Healthcare and Family Services, Human |
Rights, Human Services, Insurance, Juvenile Justice, Labor, |
Lottery, Military Affairs, Natural Resources, Public Health, |
Revenue, Transportation, and Veterans' Affairs; the Illinois |
State Police; the Capital Development Board; the Deaf and Hard |
of Hearing Commission; the Environmental Protection Agency; |
the Governor's Office of Management and Budget; the |
Guardianship and Advocacy Commission; the Abraham Lincoln |
Presidential Library and Museum; the Illinois Arts Council; |
the Illinois Council on Developmental Disabilities; the |
|
Illinois Emergency Management Agency; the Illinois Gaming |
Board; the Illinois Liquor Control Commission; the Office of |
the State Fire Marshal; the Prisoner Review Board; and the |
Department of Early Childhood. |
(Source: P.A. 102-376, eff. 1-1-22; 102-538, eff. 8-20-21; |
102-813, eff. 5-13-22; 102-870, eff. 1-1-23; 103-588, eff. |
6-5-24.) |
(20 ILCS 1370/1-10) |
Sec. 1-10. Transfer of functions. On and after March 25, |
2016 (the effective date of Executive Order 2016-001): |
(a) (Blank). |
(b) (Blank). |
(c) The personnel of each transferred transferring agency |
designated by the Governor are transferred to the Department. |
The status and rights of the employees and the State of |
Illinois or its transferred transferring agencies under the |
Personnel Code, the Illinois Public Labor Relations Act, and |
applicable collective bargaining agreements or under any |
pension, retirement, or annuity plan shall not be affected by |
this Act. Under the direction of the Governor, the Secretary, |
in consultation with the transferred transferring agencies and |
labor organizations representing the affected employees, shall |
identify each position and employee who is engaged in the |
performance of functions transferred to the Department, or |
engaged in the administration of a law the administration of |
|
which is transferred to the Department, to be transferred to |
the Department. An employee engaged primarily in providing |
administrative support for information technology functions |
may be considered engaged in the performance of functions |
transferred to the Department. |
(d) All books, records, papers, documents, property (real |
and personal), contracts, causes of action, and pending |
business pertaining to the powers, duties, rights, and |
responsibilities relating to dedicated units and information |
technology functions transferred under this Act to the |
Department, including, but not limited to, material in |
electronic or magnetic format and necessary computer hardware |
and software, shall be transferred to the Department. |
(e) All unexpended appropriations and balances and other |
funds available for use relating to dedicated units and |
information technology functions transferred under this Act |
shall be transferred for use by the Department at the |
direction of the Governor. Unexpended balances so transferred |
shall be expended only for the purpose for which the |
appropriations were originally made. |
(f) The powers, duties, rights, and responsibilities |
relating to dedicated units and information technology |
functions transferred by this Act shall be vested in and shall |
be exercised by the Department. |
(g) Whenever reports or notices are now required to be |
made or given or papers or documents furnished or served by any |
|
person to or upon each dedicated unit in connection with any of |
the powers, duties, rights, and responsibilities relating to |
information technology functions transferred by this Act, the |
same shall be made, given, furnished, or served in the same |
manner to or upon the Department. |
(h) This Act does not affect any act done, ratified, or |
canceled or any right occurring or established or any action |
or proceeding had or commenced in an administrative, civil, or |
criminal cause by each dedicated unit relating to information |
technology functions before the transfer of responsibilities |
under this Act; such actions or proceedings may be prosecuted |
and continued by the Department. |
(i) (Blank). |
(j) (Blank). |
(Source: P.A. 102-376, eff. 1-1-22 .) |
(20 ILCS 1370/1-15) |
Sec. 1-15. Powers and duties. |
(a) The head officer of the Department is the Secretary, |
who shall be the chief information officer for the State and |
the steward of State data with respect to those transferred |
agencies under the jurisdiction of the Governor. The Secretary |
shall be appointed by the Governor, with the advice and |
consent of the Senate. The Department may employ or retain |
other persons to assist in the discharge of its functions, |
subject to the Personnel Code. |
|
(b) The Department shall promote best-in-class innovation |
and technology to transferred client agencies to foster |
collaboration among client agencies, empower client agencies |
to provide better service to residents of Illinois, and |
maximize the value of taxpayer resources. The Department shall |
be responsible for information technology functions on behalf |
of transferred client agencies. |
(c) When requested and when in the best interest of the |
State, the The Department may shall provide for and assist |
with coordinate information technology for non-transferred |
State agencies , and, when requested and when in the best |
interests of the State, for State constitutional offices, |
other State government entities, units of federal or local |
governments, and public and not-for-profit institutions of |
primary, secondary, and higher education, or other parties not |
associated with State government. The Department shall |
establish charges for information technology for State |
agencies , and, when requested, for State constitutional |
offices, other State government entities, units of federal or |
local government, and public and not-for-profit institutions |
of primary, secondary, or higher education and for use by |
other parties not associated with State government for any |
services requested and provided . Entities charged for these |
services shall make payment to the Department. The Department |
may instruct all State agencies to report their usage of |
information technology regularly to the Department in the |
|
manner the Secretary may prescribe. |
(d) The Department shall establish principles develop and |
implement standards for the protection of , policies, and |
procedures to protect the security and interoperability of |
State data with respect to State those agencies under the |
jurisdiction of the Governor , including in particular data |
that are confidential, sensitive, or protected from disclosure |
by privacy or other laws, while recognizing and balancing the |
need for collaboration and public transparency. |
(e) The Department shall be responsible for providing the |
Governor with timely, comprehensive, and meaningful |
information pertinent to the formulation and execution of |
fiscal policy. In performing this responsibility, the |
Department shall have the power to do the following: |
(1) Control the procurement, retention, installation, |
maintenance, and operation, as specified by the |
Department, of information technology equipment used by |
State client agencies in such a manner as to achieve |
maximum economy and provide appropriate assistance in the |
development of information suitable for management |
analysis. |
(2) Establish principles and standards for the |
implementation of information technology-related |
reporting by State client agencies and priorities for |
completion of research by those agencies in accordance |
with the requirements for management analysis specified by |
|
the Department. State agencies shall work with the |
Department to follow the principles and standards |
developed by the Department. |
(3) Establish charges for information technology and |
related services requested by transferred client agencies |
and rendered by the Department. The Department is likewise |
empowered to establish prices or charges for all |
information technology reports purchased by State agencies |
and governmental entities individuals not connected with |
State government using the Department's services . |
(4) Instruct all State client agencies to report |
regularly to the Department, in the manner the Department |
may prescribe, their usage of information technology, the |
cost incurred, the information produced, and the |
procedures followed in obtaining the information. All |
State client agencies shall request from the Department |
assistance and consultation in securing any necessary |
information technology to support their requirements. |
(5) Examine the accounts and information |
technology-related data of any organization, body, or |
agency receiving appropriations from the General Assembly, |
except for a State constitutional office, the Office of |
the Executive Inspector General, or any office of the |
legislative or judicial branches of State government. For |
a State constitutional office, the Office of the Executive |
Inspector General, or any office of the legislative or |
|
judicial branches of State government, the Department |
shall have the power to examine the accounts and |
information technology-related data of the State |
constitutional office, the Office of the Executive |
Inspector General, or any office of the legislative or |
judicial branches of State government when requested by |
those offices. |
(6) Install and operate a modern information |
technology system for State agencies using equipment |
adequate to satisfy the requirements for analysis and |
review as specified by the Department. Expenditures for |
information technology and related services rendered shall |
be reimbursed by the recipients. The reimbursement shall |
be determined by the Department as amounts sufficient to |
reimburse the Technology Management Revolving Fund for |
expenditures incurred in rendering the services. |
(f) In addition to the other powers and duties listed in |
subsection (e), the Department shall analyze the present and |
future aims, needs, and requirements of information |
technology, research, and planning for State agencies in order |
to provide for the formulation of overall policy relative to |
the use of information technology and related equipment by the |
State of Illinois. In making this analysis, the Department |
shall formulate a master plan for information technology, |
using information technology most advantageously, and advising |
whether information technology should be leased or purchased |
|
by the State. The Department shall prepare and submit interim |
reports of meaningful developments and proposals for |
legislation to the Governor on or before January 30 each year. |
The Department shall engage in a continuing analysis and |
evaluation of the master plan so developed, and it shall be the |
responsibility of the Department to recommend from time to |
time any needed amendments and modifications of any master |
plan enacted by the General Assembly. |
(g) The Department may make information technology and the |
use of information technology available to units of local |
government, elected State officials, State educational |
institutions, the judicial branch, the legislative branch, and |
all other governmental units of the State requesting them. The |
Department shall establish prices and charges for the |
information technology so furnished and for the use of the |
information technology. The prices and charges shall be |
sufficient to reimburse the cost of furnishing the services |
and use of information technology. |
(h) The Department may establish principles and standards |
to provide consistency in the operation and use of information |
technology by State agencies . State agencies shall work with |
the Department to follow the principles and standards |
developed by the Department. |
(i) The Department may adopt rules under the Illinois |
Administrative Procedure Act necessary to carry out its |
responsibilities under this Act. |
|
(Source: P.A. 102-376, eff. 1-1-22 .) |
(20 ILCS 1370/1-25) |
Sec. 1-25. Charges for services; non-State funding. The |
Department may establish charges for services rendered by the |
Department to State client agencies from funds provided |
directly to the State client agency by appropriation or |
otherwise. In establishing charges, the Department shall |
consult with State client agencies to make charges transparent |
and clear and seek to minimize or avoid charges for costs for |
which the Department has other funding sources available. |
State Client agencies shall continue to apply for and |
otherwise seek federal funds and other capital and operational |
resources for technology for which the agencies are eligible |
and, subject to compliance with applicable laws, regulations, |
and grant terms, make those funds available for use by the |
Department. |
(Source: P.A. 102-870, eff. 1-1-23 .) |
(20 ILCS 1370/1-75 rep.) |
Section 10. The Department of Innovation and Technology |
Act is amended by repealing Section 1-75. |
Section 15. The Illinois Information Security Improvement |
Act is amended by changing Sections 5-5, 5-15, and 5-25 and by |
adding Section 5-35 as follows: |
|
(20 ILCS 1375/5-5) |
Sec. 5-5. Definitions. As used in this Act: |
"Critical information system" means any information system |
(including any telecommunications system) used or operated by |
a State agency or by a contractor of a State agency or other |
organization or entity on behalf of a State agency: that |
contains health insurance information, medical information, or |
personal information as defined in the Personal Information |
Protection Act; where the unauthorized disclosure, |
modification, destruction of information in the information |
system could be expected to have a serious, severe, or |
catastrophic adverse effect on State agency operations, |
assets, or individuals; or where the disruption of access to |
or use of the information or information system could be |
expected to have a serious, severe, or catastrophic adverse |
effect on State operations, assets, or individuals. |
"Department" means the Department of Innovation and |
Technology. |
"Information security" means protecting information and |
information systems from unauthorized access, use, disclosure, |
disruption, modification, or destruction in order to provide: |
integrity, which means guarding against improper information |
modification or destruction, and includes ensuring information |
non-repudiation and authenticity; confidentiality, which means |
preserving authorized restrictions on access and disclosure, |
|
including means for protecting personal privacy and |
proprietary information; and availability, which means |
ensuring timely and reliable access to and use of information. |
"Incident" means an occurrence that: actually or |
imminently jeopardizes, without lawful authority, the |
confidentiality, integrity, or availability of information or |
an information system; or constitutes a violation or imminent |
threat of violation of law, security policies, security |
procedures, or acceptable use policies or standard security |
practices. |
"Information system" means a discrete set of information |
resources organized for the collection, processing, |
maintenance, use, sharing, dissemination, or disposition of |
information created or maintained by or for the State of |
Illinois. |
"Office" means the Office of the Statewide Chief |
Information Security Officer. |
"Secretary" means the Secretary of Innovation and |
Technology. |
"Security controls" means the management, operational, and |
technical controls (including safeguards and countermeasures) |
for an information system that protect the confidentiality, |
integrity, and availability of the system and its information. |
"State agency" means any State agency , department, board, |
and commission under the jurisdiction of the Governor to which |
the Department provides services . |
|
(Source: P.A. 100-611, eff. 7-20-18.) |
(20 ILCS 1375/5-15) |
Sec. 5-15. Office of the Statewide Chief Information |
Security Officer. |
(a) The Office of the Statewide Chief Information Security |
Officer is established within the Department of Innovation and |
Technology. The Office is directly subordinate to the |
Secretary of Innovation and Technology. |
(b) The Office shall: |
(1) serve as the strategic planning, facilitation, and |
coordination office for information technology security in |
this State and as the lead and central coordinating entity |
to guide and oversee the information security functions of |
State agencies; |
(2) provide information security services to support |
the secure delivery of State agency services that utilize |
information systems and to assist State agencies with |
fulfilling their responsibilities under this Act; |
(3) conduct information and cybersecurity strategic, |
operational, and resource planning and facilitating an |
effective enterprise information security architecture |
capable of protecting the State; |
(4) identify information security risks to each State |
agency, to third-party providers, and to key supply chain |
partners, including an assessment of the extent to which |
|
information resources or processes are vulnerable to |
unauthorized access or harm, including the extent to which |
the State agency's or contractor's electronically stored |
information is vulnerable to unauthorized access, use, |
disclosure, disruption, modification, or destruction, and |
recommend risk mitigation strategies, methods, and |
procedures to reduce those risks. These assessments shall |
also include, but not be limited to, assessments of |
information systems, computers, printers, software, |
computer networks, interfaces to computer systems, mobile |
and peripheral device sensors, and other devices or |
systems which access the State's network, computer |
software, and information processing or operational |
procedures of the State agency or of a contractor of the |
State agency. |
(5) manage the response to information security and |
information security incidents involving State agency |
State of Illinois information systems and ensure the |
completeness of information system security plans for |
critical information systems; |
(6) conduct pre-deployment information security |
assessments for critical information systems and submit |
findings and recommendations to the Secretary and State |
agency heads; |
(7) develop and conduct targeted operational |
evaluations, including threat and vulnerability |
|
assessments on State agency information systems; |
(8) monitor and report compliance of each State |
agency's compliance agency with State information security |
policies, standards, and procedures; |
(9) coordinate statewide information security |
awareness and training programs; and |
(10) develop and execute other strategies as necessary |
to protect State agency's this State's information |
technology infrastructure and the data stored on or |
transmitted by such infrastructure. |
(c) The Office may temporarily suspend operation of an |
information system or information technology infrastructure |
that is owned, leased, outsourced, or shared by one or more |
State agencies in order to isolate the source of, or stop the |
spread of, an information security breach or other similar |
information security incident. State agencies shall comply |
with directives to temporarily discontinue or suspend |
operations of information systems or information technology |
infrastructure. |
(Source: P.A. 100-611, eff. 7-20-18.) |
(20 ILCS 1375/5-25) |
Sec. 5-25. Responsibilities. |
(a) The Secretary shall: |
(1) appoint a Statewide Chief Information Security |
Officer pursuant to Section 5-20; |
|
(2) provide the Office with the staffing and resources |
deemed necessary by the Secretary to fulfill the |
responsibilities of the Office; |
(3) oversee statewide information security policies |
and practices for State agencies , including: |
(A) directing and overseeing the development, |
implementation, and communication of statewide |
information security policies, standards, and |
guidelines; |
(B) overseeing the education of State agency |
personnel regarding the requirement to identify and |
provide information security protections commensurate |
with the risk and magnitude of the harm resulting from |
the unauthorized access, use, disclosure, disruption, |
modification, or destruction of information in a |
critical information system; |
(C) overseeing the development and implementation |
of a statewide information security risk management |
program; |
(D) overseeing State agency compliance with the |
requirements of this Section; |
(E) coordinating Information Security policies and |
practices with related information and personnel |
resources management policies and procedures; and |
(F) providing an effective and efficient process |
to assist State agencies with complying with the |
|
requirements of this Act; and |
(4) subject to appropriation, establish a |
cybersecurity liaison program to advise and assist units |
of local government in identifying cyber threats, |
performing risk assessments, sharing best practices, and |
responding to cyber incidents. |
(b) The Statewide Chief Information Security Officer |
shall: |
(1) serve as the head of the Office and ensure the |
execution of the responsibilities of the Office as set |
forth in subsection (c) of Section 5-15, the Statewide |
Chief Information Security Officer shall also oversee |
State agency personnel with significant responsibilities |
for information security and ensure a competent workforce |
that keeps pace with the changing information security |
environment; |
(2) develop and recommend information security |
policies, standards, procedures, and guidelines to the |
Secretary for statewide adoption and monitor compliance |
with these policies, standards, guidelines, and procedures |
through periodic testing; |
(3) develop and maintain risk-based, cost-effective |
information security programs and control techniques to |
address all applicable security and compliance |
requirements throughout the life cycle of State agency |
information systems; |
|
(4) establish the procedures, processes, and |
technologies for State agencies to rapidly and effectively |
identify threats, risks, and vulnerabilities to State |
information systems, and ensure the prioritization of the |
remediation of vulnerabilities that pose risk to the |
State; |
(5) develop and implement capabilities and procedures |
for detecting, reporting, and responding to information |
security incidents; |
(6) establish and direct a statewide information |
security risk management program to identify information |
security risks in State agencies and deploy risk |
mitigation strategies, processes, and procedures; |
(7) establish the State's capability to sufficiently |
protect the security of data through effective information |
system security planning, secure system development, |
acquisition, and deployment, the application of protective |
technologies and information system certification, |
accreditation, and assessments; |
(8) ensure that State agency personnel, including |
contractors, are appropriately screened and receive |
information security awareness training; |
(9) convene meetings with State agency heads and other |
State officials to help ensure: |
(A) the ongoing communication of risk and risk |
reduction strategies, |
|
(B) effective implementation of information |
security policies and practices, and |
(C) the incorporation of and compliance with |
information security policies, standards, and |
guidelines into the policies and procedures of the |
State agencies; |
(10) provide operational and technical assistance to |
State agencies in implementing policies, principles, |
standards, and guidelines on information security, |
including implementation of standards promulgated under |
subparagraph (A) of paragraph (3) of subsection (a) of |
this Section, and provide assistance and effective and |
efficient means for State agencies to comply with the |
State agency requirements under this Act; |
(11) in coordination and consultation with the |
Secretary and the Governor's Office of Management and |
Budget, review State agency budget requests related to |
Information Security systems and provide recommendations |
to the Governor's Office of Management and Budget; |
(12) ensure the preparation and maintenance of plans |
and procedures to provide cyber resilience and continuity |
of operations for critical information systems that |
support the operations of the State; and |
(13) take such other actions as the Secretary may |
direct. |
(Source: P.A. 101-81, eff. 7-12-19; 102-753, eff. 1-1-23 .) |
|
(20 ILCS 1375/5-35 new) |
Sec. 5-35. Local government cybersecurity designee. The |
principal executive officer, or his or her designee, of each |
municipality with a population of 35,000 or greater and of |
each county shall designate a local official or employee as |
the primary point of contact for local cybersecurity issues. |
Each jurisdiction must provide the name and contact |
information of the cybersecurity designee to the Statewide |
Chief Information Security Officer and update the information |
as necessary. |
Section 20. The Uniform Electronic Transactions Act is |
amended by changing Section 18 as follows: |
(815 ILCS 333/18) |
Sec. 18. Acceptance and distribution of electronic records |
by governmental agencies. |
(a) Except as otherwise provided in Section 12(f), each |
governmental agency of this State shall determine whether, and |
the extent to which, it will send and accept electronic |
records and electronic signatures to and from other persons |
and otherwise create, generate, communicate, store, process, |
use, and rely upon electronic records and electronic |
signatures. |
(b) To the extent that a governmental agency uses |
|
electronic records and electronic signatures under subsection |
(a), the governmental agency, giving due consideration to |
security, may Department of Innovation and Technology and the |
Secretary of State, pursuant to their rulemaking authority |
under other law and giving due consideration to security, |
shall, no later than 6 months after the effective date of this |
amendatory Act of the 103rd General Assembly, adopt |
administrative rules that specify: |
(1) the manner and format in which the electronic |
records must be created, generated, sent, communicated, |
received, and stored and the systems established for those |
purposes; |
(2) if electronic records must be signed by electronic |
means, the type of electronic signature required, the |
manner and format in which the electronic signature must |
be affixed to the electronic record, and the identity of, |
or criteria that must be met by, any third party used by a |
person filing a document to facilitate the process; |
(3) control processes and procedures as appropriate to |
ensure adequate preservation, disposition, integrity, |
security, confidentiality, and auditability of electronic |
records; and |
(4) any other required attributes for electronic |
records which are specified for corresponding |
nonelectronic records or reasonably necessary under the |
circumstances. |
|
(b-5) Pursuant to their rulemaking authority under other |
laws, the Secretary of State and the Department of Innovation |
and Technology may adopt rules setting forth their respective |
minimum requirements under subsection (b) of this Section. Any |
rules adopted by the Secretary of State under this subsection |
shall only apply with respect to the Secretary of State and any |
rules adopted by the Department of Innovation and Technology |
under this subsection shall only apply with respect to State |
agencies, departments, boards, and commissions under the |
jurisdiction of the Governor to which the Department of |
Innovation and Technology provides services. |
(c) Except as otherwise provided in Section 12(f), this |
Act does not require a governmental agency of this State to use |
or permit the use of electronic records or electronic |
signatures. |
(Source: P.A. 102-38, eff. 6-25-21; 103-390, eff. 7-28-23.) |