Health Care Department Operations Manual

Chapter 5 – Administrative

Article 1 – General Administration

5.1.1 Implementation and Review of Health Care Regulations, Health Care Department Operations Manual, and Health Care Forms

  • Policy

    • The California Correctional Health Care Services (CCHCS), Health Care Regulations and Policy Section (RPS), shall facilitate the development, revision, adoption and publication of health care regulations, the Health Care Department Operations Manual (HCDOM), and health care forms. Health care regulations shall be adopted and maintained according to statutory requirements pursuant to the Administrative Procedure Act (APA) as set forth in Government Code, Section 11340, et seq. CCHCS’ designated internal and external stakeholders shall have the opportunity to review health care regulations, and the HCDOM prior to implementation as defined within this policy.

    • References to regulations, HCDOM, and forms within this procedure pertain to medical and dental services. The Regulation and Policy Management Branch (RPMB), California Department of Corrections and Rehabilitation (CDCR), provides guidance and support for non-health care related regulations and policies.

  • Responsibility

    • Approval Authority

      • The Receiver and the Undersecretary, Health Care Services, are the approval authorities for the content of the HCDOM.

    • Headquarters

      • CDCR and CCHCS departmental leadership at all levels of the organization, within the scope of their authority, are responsible for the review, approval, and implementation of health care regulations, HCDOM, and health care forms.

      • RPS consists of the Health Care Regulations and HCDOM Teams and is responsible for the implementation, monitoring, and evaluation of this procedure.

      • RPS shall ensure noticed and adopted regulatory packages, as required by statute, and the current version of the HCDOM are available electronically on Lifeline, CDCR Hub, and the CCHCS internet.

        • All CCHCS documents posted to the public-facing internet shall be compliant with the Americans with Disabilities Act, pursuant to Government Code, Section 11546.7.

      • RPS is responsible for notifying CDCR and CCHCS staff of changes to health care regulations, HCDOM, care guides, protocols, and health care forms via statewide email distribution.

    • Regional

      • Regional Health Care Executives (RHCEs) shall aggregate and provide feedback from their assigned region on draft health care regulations or HCDOM sections during the executive approval process.

    • Institutional

      • The Chief Executive Officer (CEO), or designee, of each institution shall ensure:

      • Training is provided to health care staff on new and revised health care regulations, HCDOM sections, care guides, protocols, and health care forms.

      • Local operating procedures are maintained in accordance with the HCDOM and provided to the RHCEs, as required.

      • Documentation of health care regulations and HCDOM implementation activities are maintained in an established training file (proof of practice file).

      • Hardcopies of the current versions of Title 15 of the California Code of Regulations (CCR), appropriate HCDOM sections, care guides, and policy memoranda are available in the law library of each institution.

    • Health Care Regulations and Policy Section

      • RPS staff shall ensure Title 15, Division 3, Chapter 2, the HCDOM, and forms do not include informal terms or language.

  • Procedure

    • Content Review and Development

      • Each health care regulation, HCDOM section, and health care form shall be reviewed biennially. RPS shall provide notification to affected program(s) based on the last revision or review date.

      • The program shall have 14 calendar days to review applicable health care regulations and HCDOM sections (including links) to ensure content is current and accurate and notify RPS of any necessary revisions.

      • RPS shall track the review to ensure the program communicates if revisions are required or if the content remains current and accurate.

      • When health care regulations revisions are required, the program shall contact the Regulations Team via HealthCareRegulations@cdcr.ca.gov for assignment of the regulatory package to staff.

      • If the program confirms the content of the regulation remains current, the Regulations Team shall input the confirmation into an electronic tracking system.

      • When HCDOM or form revisions are required, the program shall contact the HCDOM Team via HealthCareDOM@cdcr.ca.gov to request the current published version and submit the revision to the HCDOM Team upon completion.

      • If the program confirms the content of the HCDOM section remains current, the HCDOM Team shall update the revision history to include the date reviewed.

    • Health Care Regulations

      • Revision or Development

        • The Regulations Team shall:

          • Review and revise or develop the regulatory text to ensure it meets the standards set forth in the APA in collaboration with the program, CCHCS Office of Legal Affairs (COLA), and Office of Legal Affairs (OLA), CDCR.

          • Develop the initial statement of reasons in collaboration with the program, COLA, and OLA.

          • Perform all processes required by the APA and Title 1 of the CCR, including preparing all required documents and forms.

          • Notify the HCDOM Team of any proposed regulatory changes for determination of potential impact to the HCDOM via HealthCareDOM@cdcr.ca.gov.

        • The HCDOM team shall:

          • Perform a HCDOM impact determination, as needed, to identify existing HCDOM sections that may require revision or new HCDOM provisions that may be needed based on the proposed regulations.

          • Assist the program with the development or revision, and facilitate workgroups, if necessary.

      • Executive Routing

        • The following review and approval process shall occur for each regulatory package. The Regulations Team shall incorporate feedback and obtain approval of any changes from COLA, OLA, the program, the Associate Director, Risk Management Branch, and the Deputy Director, Policy and Risk Management Services, as needed, at each level of executive routing. The Regulations Team shall preserve electronic feedback and approvals throughout the process.

        • Level One: the Regulations Team shall route the package to the following as indicated for approval, in consecutive order:

          • COLA, OLA, and program(s) Subject Matter Experts via email.

          • Associate Director, Risk Management Branch, CCHCS.

          • Deputy Director, Policy and Risk Management Services, CCHCS.

          • Deputy Director, Fiscal Management, CCHCS, for signature.

        • Level Two: the Regulations Team shall concurrently email the package to the following for review and feedback:

          • CCHCS Deputy Directors.

          • RHCEs.

          • Office of Legislation, CDCR, to determine if review by the Governor’s Office is required.

          • Office of the Special Master.

          • Prison Law Office (PLO).

          • Rosen, Bien, Galvan and Grunfeld (RBGG)

          • The Regulations Team shall notify non-responsive executives that their lack of response is recorded as assumed concurrence.

        • Level Three: the Regulations Team shall concurrently email the package to the following for approval:

          • CCHCS Directors.

          • Director, Division of Adult Institutions.

          • Chief Counsel, COLA.

          • General Counsel, OLA.

        • Level Four: the Regulations Team shall email the package to the following for approval, in consecutive order:

          • Undersecretary, Health Care Services.

          • Receiver.

        • Following receipt of all approvals, the regulatory package shall be routed via Docusign to the Secretary, CDCR, for final signature. If necessary, the Regulations Team shall concurrently submit the package to the Governor’s Office and/or the Department of Finance for a 30-day review following approval and signature by the Secretary.

        • Upon completion of all reviews, the Regulations Team shall submit the regulatory package to the Office of Administrative Law

      • Notice Posting and Distribution

        • Upon publication of the Notice, the Regulations Team shall email the Public Information Officer (PIO) at each institution the following:

          • A PDF containing all the documents included in the Notice, including the CDCR 7554, Notice of Change to Health Care Regulations.

          • A blank CDCR 621-HC, Certification of Posting.

        • Within five calendar days of receipt of the Notice, each institution’s PIO, or designee, shall:

          • Post the CDCR 7554 on staff and incarcerated person bulletin boards.

          • Post the CDCR 7554 in incarcerated person housing units, corridors, and other areas easily accessible to incarcerated persons.

          • Post the CDCR 7554 in institution health care facilities.

          • Post the CDCR 7554 in incarcerated person security housing and specialized housing units.

          • Provide the full contents of the Notice to incarcerated person law libraries.

          • Provide the full contents of the Notice to incarcerated person advisory committees/councils.

        • Within ten calendar days of receipt of the Notice, each institution’s PIO, or designee, shall submit a single, completed CDCR 621-HC to HealthCareRegulations@cdcr.ca.gov certifying the institution’s compliance with the posting and distribution requirements outlined in Section (c)(2)(C)2.

        • The Regulations Team shall track each institution’s compliance with the posting and CDCR 621-HC submittal requirements and notify the PIO, CEO, and Warden of non-responsive institutions 11 calendar days following the initial email to the PIOs.

      • Public Comment Period and Public Hearing

        • The 45-day public comment period begins upon publication of the Notice in the California Regulatory Notice Register and shall conclude with a public hearing.

          • Public Hearing

            • The Regulations Team shall schedule a hearing to receive public comments and notify the program, COLA, and OLA via an Outlook invite.

            • Attendees shall be provided the opportunity to present their comments orally or in writing.

            • If comments are received during the APA public comment period(s), the Regulations Team shall work collaboratively with the program, COLA, and OLA, if necessary, to develop responses to the comments and revise the final rulemaking package as needed.

        • The Regulations Team shall post noticed and adopted regulatory packages on Lifeline, CDCR Hub, and the CCHCS internet in accordance with statutory requirements. All adopted regulations shall be distributed to CDCR and CCHCS staff via statewide email upon publication on Westlaw.

      • Petitions

        • The Regulations Team shall process responses to petitions to adopt, amend, or repeal health care regulations, as well as underground regulations petitions related to health care documents, according to requirements set forth in the APA and in collaboration with the impacted program(s), COLA, and OLA, if necessary.

        • Any petitions related to health care regulations received by any CDCR/CCHCS staff shall be immediately forwarded to HealthCareRegulations@cdcr.ca.gov.

      • Pilot Programs

        • Programs considering a pilot related to the provision of health care shall submit the concept to the HealthCareRegulations@cdcr.ca.gov.

        • The Regulations Team shall determine whether the potential pilot meets the definition of a pilot program in Penal Code, Section 5058.1.

        • The Regulations Team shall develop and process all documents necessary for incorporation of the pilot program into the CCR, according to requirements set forth in the APA and in collaboration with the impacted program(s), COLA, and OLA, if necessary.

      • Annual Mailing

        • Pursuant to Government Code, Section 14911, the Regulations Team shall send a notification to all individuals on the CDCR/CCHCS notice of regulatory action mailing and email lists requesting that individuals verify they wish to remain on the list and/or provide updated contact information.

        • This notification shall be sent out via postcard to the mailing list and via email to the email list in April of each calendar year.

        • The Regulations Team shall remove the names of individuals from the CDCR notice of regulatory action mailing and email lists when:

          • They do not respond within 30 calendar days of the notification.

          • Their notifications (email or postcard) are undeliverable or “returned to sender.”

          • They request to be removed from the list.

        • At any time and upon request, the Regulations Team shall add an individual or entity to the mailing and/or email list.

      • Annual Rulemaking Calendar

        • RPMB is responsible for preparation of the Annual Rulemaking Calendar, which covers all regulatory actions that may be filed in the coming calendar year.

        • At RPMB’s request, the Regulations Team shall provide RPMB with an Annual Rulemaking Calendar for health care regulatory actions in accordance with Government Code, Section 11017.6.

      • Annual Title 15 Printing

        • The Regulations Team shall incorporate changes to Title 15, Division 3, Chapter 2, in real time throughout the year into a searchable PDF available to all CDCR/CCHCS staff and provide RPMB with the adopted, amended, and repealed regulations since the last printing, including a revised table of contents.

        • RPMB oversees the annual publication of the printed Title 15 and its distribution to institutions, facilities, and offices.

      • Stakeholder Review

        • The Regulations Teams shall process and respond to requests for CCHCS stakeholder review regarding proposed regulatory changes.

    • Health Care Department Operations Manual

      • New and Revised HCDOM Sections

        • Upon statewide release of a HCDOM section, the Regulations Team shall perform a Regulatory Impact Determination to identify existing regulations that require revision or new regulations.

        • The HCDOM Team shall review, format, and edit the HCDOM section and resolve issues collaboratively with all impacted programs, as necessary.

      • Content Approval and Distribution

        • Clinical Operations Team (COT) and Joint Clinical Executive Team (JCET)

          • The HCDOM Team shall submit the HCDOM sections to COT and JCET for approval.

          • A representative from the HCDOM Team shall attend the COT meeting in which the content will be reviewed.

          • If COT or JCET has revisions, the HCDOM Team shall incorporate the changes and collaborate with the program(s), as necessary.

          • The JCET representative shall notify the HCDOM Team of the outcome of the JCET meeting.

          • Following COT and JCET’s approval, the HCDOM Team shall prepare the HCDOM section for executive routing.

        • Executive Routing – Clinical HCDOM Sections

          • The HCDOM Team shall email the final draft of the clinical HCDOM section to the following, concurrently in each group, in consecutive order depending upon legal authority:

          • Attorney, COLA; Attorney, OLA; Labor Relations, CCHCS; Human Resources, CCHCS; RHCEs; Information Technology (IT); Institution Operations; Acquisitions Management; Direct Care Contracts; Fiscal Management; Coleman experts, PLO, and RBGG.

          • Director, Health Care Services; Director, Health Care Policy and Administration; Chief Counsel, COLA; Director, Legislation and Special Projects; and Director, Corrections Services, concurrently, and a separate email to the Director, Division of Adult Institutions.

          • Undersecretary, Health Care Services.

          • Receiver

        • Prison Law Office 30-Day Notice

          • Following executive approval, the HCDOM Team shall submit the clinical HCDOM section to the PLO for the notice period, pursuant to the Plata court order.

          • If formal written comments are received from the PLO, the HCDOM Team shall collaborate with the program(s), as necessary, to provide a response to the PLO. Following the response to the PLO or if no comments are received from the PLO, the HCDOM Team shall post the clinical HCDOM section on Lifeline and the CCHCS internet and distribute to CDCR and CCHCS staff via statewide email.

      • Executive Routing – Dental HCDOM Section

        • The HCDOM Team shall email the final draft of the dental HCDOM section to the following, concurrently in each group, in consecutive order depending upon legal authority:

        • Attorney, COLA; Attorney, OLA; Labor Relations, CCHCS; Human Resources CCHCS; IT; Acquisitions Management; Direct Care Contracts; and Fiscal Management.

        • Director, Health Care Services; Director, Health Care Policy and Administration; Chief Counsel, COLA; Director, Legislation and Special Projects; and Director, Corrections Services, concurrently, and a separate email to the Director, Division of Adult Institutions.

        • Undersecretary, Health Care Services.

        • Following executive approval, the HCDOM Team shall post the dental HCDOM section on Lifeline and the CCHCS internet and distribute to CDCR and CCHCS staff via statewide email.

      • Administrative Content Approval and Distribution

        • The program shall obtain approval of content from COLA, Labor Relations, CCHCS, and the Director, Health Care Policy and Administration for all new policies, prior to submitting the draft section to the HCDOM Team. Content review for policy revisions shall be reviewed and approved by the Deputy Director of the program.

        • The HCDOM Team shall:

          • Submit the section to COT and JCET if there is a clinical impact, to Field Operations if there is a custody impact, and to IT if there is an IT impact.

          • Submit the section to applicable programs for feedback, as needed.

          • Route the final draft for review and approval to the following, in consecutive order:

            • Associate Director, Risk Management Branch, CCHCS.

            • Deputy Director, Policy and Risk Management Services, CCHCS.

            • Director, Health Care Policy and Administration, CCHCS.

          • Following executive approval, post the administrative HCDOM section on Lifeline and distribute via email to the distribution list specified by the program (e.g., CDCR and CCHCS all staff, executive staff).

      • The Chief Privacy Officer and the Chief Information Security Officer shall:

        • Complete an annual self-attestation to certify that the appropriate HCDOM policies related to the Health Insurance Portability and Accountability Act have been reviewed and are compliant with the most recent version of the Statewide Health Information Policy Manual and Office of Civil Rights annual review requirement.

        • Provide the self-attestation to the Center for Data Insights and Innovation.

      • Revision history that includes the month, day, and year of the revision shall be updated for each revised HCDOM section.

      • Archived HCDOM sections shall be retained for a minimum of six years.

    • Health Care Forms

      • New and Revised Forms

        • The HCDOM Team shall review, format, and edit the form and resolve issues collaboratively with the program, as necessary.

      • Approval and Distribution

        • The HCDOM Team shall submit the form to COT and JCET for approval.

          • A representative from the HCDOM Team shall attend the COT meeting in which the form will be reviewed.

          • If COT or JCET has revisions, the HCDOM Team shall incorporate the changes and work collaboratively with the program(s), as necessary.

          • The JCET representative shall notify the HCDOM Team of the outcome of the JCET meeting.

        • Following COT and JCET approval, the HCDOM Team shall finalize the form.

          • Clinical forms shall be posted on Lifeline and the CDCR Hub and distributed to CDCR and CCHCS staff via statewide email.

          • Dental forms shall be provided to the program.

    • Stakeholder Review

      • Requests for CCHCS stakeholder review of CDCR Department Operation Manual revisions shall be submitted to the Deputy Director, Policy and Risk Management Services.

      • The HCDOM Team shall solicit and aggregate CCHCS program feedback and provide a response to RPMB or any other requesting agency.

    • Care Guides

      • The program shall submit new or revised care guides that have been approved by the Clinical Documentation and Decision Support Committee, COT, and JCET to the HCDOM Team via HealthCareDOM@cdcr.ca.gov.

      • Approval and Distribution

        • The HCDOM Team shall:

        • Email the final draft of the care guide to the following, in consecutive order:

          • Director, Health Care Services.

          • Labor Relations, CCHCS.

        • Following executive approval, post the care guide on Lifeline and the CCHCS internet, provide a courtesy notice to CCHCS executives and the PLO, and distribute to CDCR and CCHCS staff via statewide email.

    • Protocols

      • The program shall submit new or revised protocols approved by the Deputy Director, Nursing Services, to the HCDOM Team via HealthCareDOM@cdcr.ca.gov.

      • Approval and Distribution

        • The HCDOM Team shall:

        • Email the final draft of the protocol to the following, in consecutive order:

          • Director, Health Care Services.

          • Labor Relations, CCHCS

        • Following executive approval, post the protocol to Lifeline, provide a courtesy notice to CCHCS executives and the PLO, and distribute to CDCR and CCHCS staff via statewide email.

    • Policy Memorandums

      • The program shall submit draft policy memorandums to the HCDOM Team via HealthCareDOM@cdcr.ca.gov.

      • The HCDOM Team shall:

        • Review, format, edit, and assign a number to the policy memorandum and resolve issues collaboratively with the program(s), as necessary.

        • Route the final draft of the policy memorandum for signature to the designated signers.

        • Following approval and signature, post the policy memorandum on Lifeline and distribute to the distribution list designated by the program and initiate HCDOM revisions, if necessary.

    • Written Language Translations

      • The program shall:

      • Send health care forms and patient education that require language translation (e.g., English to Spanish) to the contracted vendor.

      • Upon completion and verification of the translated material, submit to the HCDOM team to post and distribute the document accordingly.

    • Content Approval Tracking

      • RPS shall monitor and track the status of new and revised health care regulations, HCDOM sections, health care forms, care guides, and protocols that are pending approval, through SharePoint matrices.

      • RPS shall generate a status report from the SharePoint matrices and provide it to the Director, Health Care Policy and Administration, on a weekly basis, and to CCHCS executive leadership as requested.

  • References

    • California Government Code, Title 2, Division 3, Part 1, Chapter 1, Article 1, Section 11017.6

    • California Government Code, Title 2, Division 3, Part 1, Chapter 3.5, Article 1, Section 11340 et seq.

    • California Government Code, Title 2, Division 3, Part 1, Chapter 3.5, Article 3, Section 11343

    • California Government Code, Title 2, Division 3, Part 1, Chapter 3.5, Article 5, Sections 11346.4, 11346.8 and 11347

    • California Government Code, Title 2, Division 3, Part 1, Chapter 5.6, Section 11546.7

    • California Penal Code, Part 3, Title 1, Chapter 2, Section 2080

    • California Penal Code, Part 3, Title 7, Chapter 2, Section 5058

    • California Code of Regulations, Title 1

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 6, Section 12010 et seq.

    • Statewide Health Information Policy Manual, Sections 3.4.1, III, D, 3, and 4.1.1, III, A, 4

    • Thomson Reuters Westlaw, California Code of Regulations, https://govt.westlaw.com/calregs/Index?bhcp=1&transitionType=Default&contextData=%28sc.Default%29

  • Revision History

    • Effective: 07/2020
      Revised: 10/03/2024

5.1.2 California Public Records Act Requests

  • Policy

    • The California Public Records Act (PRA) requires that government records be released to the public, upon request, unless the records are specifically exempt from disclosure by law.  Under provisions of the PRA, California Correctional Health Care Services (CCHCS) shall ensure timely responses to all health care-related PRA requests.

    • Responsive records to a PRA request shall be released unless they disclose personal, medical, or other private information about an individual; confidential financial or trade secret information about a company/vendor; are exempt under the PRA; or the PRA requester chooses not to remit the assessed fee for the records.  All requests for records shall be considered PRA requests with the exception of subpoenas, court orders, search warrants, or legal documents.  It is not necessary for a records request to cite the PRA or any other authority, to state the purpose for the request, or to identify themselves or their affiliation.

  • Responsibilities

    • The Deputy Director, Policy and Risk Management Services, or designee, has the authority to release records requested under the PRA and shall ensure departmental compliance with this policy.

    • The Associate Director, Risk Management Branch (AD RMB), shall designate a CCHCS PRA Coordinator, or designee, responsible for releasing all health care-related PRA requests.

    • The CCHCS PRA Coordinator, or designee, shall ensure instructions for making a PRA request are posted at CCHCS headquarters and https://cchcs.ca.gov/pra/ at all times. The Chief Executive Officer, or designee, at each institution shall ensure the PRA instructions are posted in the law libraries.

    • Health Care Litigation Support Section (LSS) staff are responsible for researching PRA requests; contacting programs for responsive records; calculating costs for compiling, copying, and furnishing records, if produced by LSS; preparing PRA responses; and submitting responses to the CCHCS PRA Coordinator for approval to release which may include responsive records, a denial, notification of extension, or confirmation of records, and instructions on remittance or in-person inspection.

  • Procedure

    • Submittal of Public Records Act Requests

      • PRA requests may be sent via email to CCHCSHealthPRAs@cdcr.ca.gov, or by mail to California Correctional Health Care Services, Attention: PRA Coordinator, Building C, P.O. Box 588500, Elk Grove, CA  95758.

      • Health care-related PRA requests submitted to CCHCS or California Department of Corrections and Rehabilitation (CDCR) employees shall be forwarded to LSS within 24 hours of receipt.

        • Requests for contract records made during a contract’s procurement shall not be considered PRA requests and shall be forwarded immediately to the CCHCS contracting office responsible for that procurement. This shall ensure that vendors are provided timely information prior to the close of the procurement. 

        • Only upon completion of a contract’s procurement, including any applicable protest period, will requests for contract records be processed as PRA requests and forwarded to LSS.

      • LSS shall contact the requester to clarify requests that are overly broad, vague, or not sufficiently descriptive, and assist in focusing the request, if possible.

    • Fee Determination and Collection

      • CCHCS shall collect fees for responsive records if:

        • Hardcopy records are requested; or

        • Data compilation, extraction, or programming to produce the record is required.

      • LSS shall contact the appropriate CCHCS program area to determine if there is a fee associated with the PRA request.

      • Prior to performing any tasks to gather responsive documents, LSS shall email to the program area the Public Records Act Staff Salary and Cost Breakdown worksheet to complete which includes:

        • An estimate of the calculated hours needed to complete the request, and

        • The number and classifications of staff that will be utilized.

      • LSS shall:

        • Calculate the hourly rate based on the mid-range salary for the classification performing the data compilation, extraction, or programming to produce the record.

        • Prepare a cost estimate.

        • Provide the estimate to the requester, in writing, with instructions on remittance of payment and due date.

      • If full payment is not received by the due date, which is 30 calendar days, LSS shall close the PRA request.

    • Responding to Public Records Act Requests

      • The CCHCS PRA Coordinator, or designee, shall respond to the PRA requests within ten calendar days of receipt by providing to the PRA requester one of the following:

        • Confirmation that responsive records exist, an approximate date the records will be available, and instructions about cost remittance or in-person inspection, if requested.

        • A denial letter indicating no records shall be provided and the reason(s) for the denial.

        • A notification of a 14-calendar day extension pursuant to California Government Code Section 7922.535(b).

        • The requested records.

        • A portion of the requested records with an estimated time for the balance of the records to be provided.

    • Processing of Public Records Act Requests

      • Upon receipt of the full payment of fees (refer to Section (c)(2) above), LSS shall request responsive documents from the appropriate CCHCS program area within a specified timeframe.

      • The appropriate CCHCS program area shall:

        • Process the request including redacting all personal or exempt information within the responsive records and notify LSS of any information redacted and the reason(s) for the redaction.

        • Provide responsive records to LSS in their original and redacted formats.

      • The CCHCS’ Office of Legal Affairs (COLA) shall consider the appropriateness of proposed redactions and provide legal guidance as needed.

    • Release of Public Records

      • Prior to the CCHCS PRA Coordinator releasing records under the PRA, the AD RMB, and COLA shall provide written approval to LSS (except for records in Section (c)(5)(B)1. and 2. below).

      • Release of the following records does not require AD RMB or COLA approval:

        • Official CDCR medical, mental health, or dental forms.

        • Prior versions of the Health Care Department Operations Manual and CCHCS Care Guides.

      • Responsive records shall be transmitted electronically whenever possible; however, records shall be provided to the requester in the format requested and paid for, if applicable (i.e., hardcopies of public records may also be mailed, if appropriate).

    • Physical Inspection of Public Records

      • Physical inspection of responsive records to a PRA request shall be permitted within a CCHCS Headquarters’ office during normal business hours or facilitated through the institution Litigation Coordinator. 

      • There is no fee for inspection of public records.

      • LSS staff shall remain present for the duration of the inspection in order to prevent the PRA requester from destroying, mutilating, defacing, altering, or removing any records from the premises.

      • Upon completion of the inspection or at the request of LSS staff, the PRA requester shall relinquish physical possession of the records.

    • Denial of Public Records Request

      • LSS shall deny the release of records which are exempt from disclosure under the PRA.

      • If a request is denied, in whole or in part, LSS shall provide the requester with legal justification for withholding the record. 

      • If LSS denies a PRA request with knowledge that the records may be available within CDCR, CCHCS shall provide contact information for CDCR’s PRA Coordinator to the PRA requester.

    • Public Records Act Request Tracking and Reporting Requirements

      • LSS shall utilize a tracking system for each PRA request.

      • The AD RMB, or designee, shall issue a weekly PRA report to designated CCHCS executive staff providing the status of PRA requests, as well as compile an annual report at the conclusion of each fiscal year.

    • Document Retention

      • Copies of PRA records shall be maintained within LSS at CCHCS headquarters for a minimum of five years following closure of the request.  PRA records shall be purged after the five-year period, unless there is duty to preserve the documentation pursuant to litigation.

  • References

  • California Government Code, Title 1, Division 10, Chapter 3.5. Inspection of Public Records, Sections 7920.000-7930.215

  • Revision History

    • Effective: 03/2014
      Revised: 6/10/2024

5.1.3 Medical Bed Management

  • Policy

    • The California Department of Corrections and Rehabilitation (CDCR)/California Correctional Health Care Services (CCHCS) adopted a Medical Classification System (MCS) to serve as the process for considering medical factors in making patient placement decisions.

  • Purpose

    • The Health Care Placement Oversight Program (HCPOP), in conjunction with CCHCS headquarters Utilization Management (UM), is responsible for providing management and oversight of institutional Specialized Medical Beds and for making patient placement decisions to ensure maximum and efficient bed utilization and to facilitate timely access to the continuity of care.  Specialized Medical beds are defined as Outpatient Housing Unit, Hospice, Correctional Treatment Center, Skilled Nursing Facility, and General Acute Care Hospital Beds.

  • Local Level Placements and Discharges

    • Admissions and discharges can be made at the local level and shall be reported as they occur unless HCPOP/UM has placed a hold on the medical bed.  HCPOP/UM staff will review all admissions for appropriate level of care placement.

  • Health Care Placement Oversight Program

    • Once HCPOP has placed a hold on a medical bed for an identified placement, the bed shall not be used without authorization from HCPOP. 

    • If an institution holding a bed requests to utilize a medical bed on which HCPOP has placed a hold, the institution shall provide the appropriate  documents (CDCR Form 128-C3, Medical Classification Chrono), CDCR Form 7410, Comprehensive Accommodation Chrono, and CDCR Form 1845, Disability Placement Program Verification) to HCPOP for review by UM to determine appropriate bed utilization.

    • As the availability of beds, programs, and other capacities change, the HCPOP staff will ensure the Medical Classification Matrix and the Medical Classification Matrix Database are updated as needed.  All updated information shall be disseminated to the field through the CDCR Division of Adult Institutions Population Management Unit.

  • Medical Bed Placement/Weekends and Holidays

    • When institutional medical staff determines the need for an in-patient medical bed within their institution and one is not available, medical staff shall contact HCPOP to determine if the needed type of specialized medical bed is available at an alternate institution prior to placing/retaining a patient in a community hospital.

    • The need for a specialized medical bed may be for a medical admission, to clear a swing bed (a bed that can be used for either medical or mental health) for mental health, or to return a patient from a community hospital.

    • All transfers made during weekends/holidays are medical and return for short duration to avoid a hospital admission or delay in a community discharge.  The transferred patient shall be returned to the sending institution upon bed availability.

  • Contact

    • For questions or clarification, please contact the Chief, Health Care Placement Oversight Program.

  • Forms

    • CDCR Form 128-C3, Medical Classification Chrono

    • CDCR Form 1845, Disability Placement Program Verification

    • CDCR Form 7410, Comprehensive Accommodation Chrono

  • References

    • Health Care Department Operations Manual, Chapter 1, Article 2, Section 1.2.15, Utilization Management Program

    • Health Care Department Operations Manual, Chapter 3, Article 1, Section 3.1.9, Health Care Transfer

    • Health Care Department Operations Manual, Chapter 1, Article 2, Section 1.2.14, Medical Classification System

  • Revision History

    • Effective: 01/2012
      Reviewed: 08/2022

5.1.4 Reporting of Actual or Suspected Incidents of Fraud, Errors, and Improper Governmental Activities

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain the highest standards of conduct in the fulfillment of its mission.  CCHCS employees entrusted with state resources must, at a minimum, exercise reasonable care for safekeeping.

    • Management is required to ensure that state assets are protected, laws and regulations are followed, financial and management information is reliable, and the organization and programs are operating effectively and efficiently.

    • The State of California has adopted the Standards for Internal Control in the Federal Government by the Comptroller General of the United States (Green Book) that provides an overall framework for establishing and maintaining effective policies, procedures, and practices for an effective work place environment.

    • CCHCS management shall create an effective work environment in their areas of responsibility and have established policies, procedures, and practices to mitigate, prevent, and detect actual or suspected incidents of fraud, misuse/theft of assets, inappropriate contract/procurement activities, employee misconduct, errors in financial reporting, errors that impact the state fund, and other fiscal irregularities.

    • Managers shall take appropriate and immediate action following discovery of an incident outlined within this policy to ensure compliance with the State Administrative Manual (SAM), Section 20080, Notification of Fraud or Error, reporting requirements.  Managers shall not tolerate or condone these types of activities.

  • Purpose

    • To ensure that incidents of actual or suspected fraud, misuse/theft, damage, and fiscal irregularities of state assets and funds are reported to the Policy and Risk Management Services, Internal Audit Program (IAP); California State Auditor (CSA); and Department of Finance, Office of State Audits and Evaluations (OSAE), as required by SAM, Section 20080.

  • Applicability

    • This policy applies to all CCHCS civil service employees.

  • Reportable Incidents

    • The following examples of potential reportable incidents under this policy include, but are not limited to:

    • Illegal or fraudulent acts involving state property, including cash.

    • Forgery or alteration of state documents including, but not limited to, checks, timesheets, payroll documents, drafts, purchase orders, invoices.

    • Misappropriation of state funds, supplies, or any other state asset.

    • Theft, destruction, or disappearance of state records, equipment, or other assets.

    • Misrepresentation of information on state documents (e.g., travel reimbursement related documents, purchase orders, or false entries).

    • Authorizing or receiving state payment for goods not received or services not performed.

    • State financial reporting misrepresentation.

    • Fraud in securing an appointment to a state position.

    • Tampering with or inappropriate use of information technology, unauthorized disclosure of confidential or proprietary information, personal information or medical information.

    • Accepting bribes (e.g., contracting, subcontracting).

    • Working on incompatible activities using state resources.

    • Errors that are unusual and have a fiscal impact to the state fund.

    • Employee misconduct that is not subject to adverse action but may result in an informal discipline, letter of instruction, or counseling memorandum.

  • Filing an Incident

    • Headquarters, regional offices, and institution reporting:

      • Upon discovery of an incident, the employee (staff or management) shall document the incident using an Actual or Suspected Fraud, Errors, and Improper Governmental Activities Report (herein referred to as Report).  Supporting documents (e.g., timesheets, forms, relevant emails) provided should support the alleged incident. 

      • The Report shall be documented in clear and concise statements that describe how the alleged incident was discovered, a description of the incident, sequence (chronology) of events, internal controls compromised (e.g., any action inconsistent with policy, improper approval), and any statutes, regulations, procedures or rules violated (e.g., Government Code, Penal Code, State Administrative Manual, Department Operations Manuals).

      • The employee shall scan and immediately email the Report to the Chief, IAP, at CCHCSIAP@cdcr.ca.gov.  The employee shall share the report with the employee’s supervisor prior to submission, unless the supervisor is involved in the subject of the report or unless the employee fears retaliation if the employee were to share the report with the supervisor.

      • If complete information is not available following discovery of the incident, IAP shall either reject the Report or request additional information.

      • IAP shall determine whether this incident is reportable under SAM, Section 20080, and address as appropriate.

      • IAP shall reject Reports submitted anonymously.

      • IAP shall determine if CSA and OSAE are to be notified of reported incidents.  For incidents that require reporting to external agencies, other than CSA and OSAE, IAP shall first review the matter with appropriate management and CCHCS’ Office of Legal Affairs. 

      • Once IAP determines material or substantive information exists to support the incidents and activities alleged, the Chief, IAP, shall follow SAM, Section 20080, procedures to notify and follow up with OSAE and the CSA no later than 30 calendar days following the discovery of the incident.

        • Updated reports are required every 180 days until the incident is resolved.

        • Incidents are resolved when corrective action is taken or a referral is made to the proper authority (e.g., the Attorney General, California Highway Patrol, outside law enforcement).

      • IAP shall notify the reporting employee when the incident is received.  IAP shall notify the reporting hiring authority of incidents reported and when incidents are resolved. 

      • Each reporting employee has an obligation to exercise sound judgment to avoid baseless allegations of incidents. Reporting employees may not be notified on how reported incidents are resolved.

    • The following incidents do not apply to this policy and will not be reviewed by IAP:

      • Incidents that have been first reported to external agencies (e.g., California State Auditor Whistleblower, State Personnel Board, Office of Inspector General, or the Attorney General’s Office) unless directed by external agencies.

      • Bargaining Unit (Union) specific grievances and complaints.

      • Complaints regarding harassment and unlawful discrimination.

  • Whistleblower Protection Act and Employee Retaliation

    • The California Whistleblower Protection Act authorizes CSA to receive complaints from state employees and members of the public who wish to report an improper governmental act.  All employees and members of the public may file a Whistleblower complaint directly with CSA.  For instructions on filing a Whistleblower complaint, refer to CSA’s website at https://www.auditor.ca.gov/whistleblower/.

    • Labor Code, Section 1102.5, prohibits an employer from retaliating against an employee who discloses information that would result in a potential violation or noncompliance of statute or regulation to a governmental or law enforcement agency, to a person with authority over the employee, or another employee who has the authority to investigate.  The Labor Code also protects employees who refuse to participate in an activity that would result in a potential violation or noncompliance of statute or regulation.

  • Training

    • All CCHCS civil service employees are required to complete the read and sign training via the online Learning Management System upon hire and annually thereafter.

  • References

    • Government Code, Title 2, Division 1, Chapter 6.5, Article 3, California Whistleblower Protection Act, Sections 8547-8547.15

    • State Administrative Manual, Section 20060, Internal Control

    • State Administrative Manual, Section 20080, Notification of Fraud or Error

    • Health Care Department Operations Manual, Administrative Policy, Chapter 5, Article 1, Section 9 Protecting Employees from Retaliation Policy and Procedure

  • Revision History

    • Effective: 08/2016
      Revised: 08/2019

5.1.5 Disability Placement Program and Developmental Disability Program Staff Accountability

  • Policy

    • The California Correctional Health Care Services (CCHCS) shall ensure all staff comply with the requirements outlined in the Disability Placement Program (DPP) and the Developmental Disability Program (DDP) by maintaining a process to report, log, track, and initiate inquiries into allegations of non-compliance with the DPP and DDP and ensure corrective action where applicable.

  • Responsibility

    • The Chief Executive Officer (CEO) or designee of each institution is responsible for the implementation and monitoring of this policy.

  • Procedure

    • Reporting Allegations

      • All staff are responsible for identifying and reporting allegations of staff non-compliance with the DPP or Armstrong Remedial Plan, DDP or Clark Remedial Plan, or any subsequent court orders associated with the Armstrong or Clark litigation, even if the non-compliance was unintentional, unavoidable, done without malice, done by an unidentified staff or subsequently remedied.

      • All allegations shall be reported via written report (e.g., memorandum, e-mail, audit results) and include any supporting documentation.

      • Allegations may be identified through, but not limited to:

        • Internal audits

        • Staff observation

        • Health care grievances

        • Reasonable modification or accommodation request

        • Third party (e.g., Release of Information Log, advocacy letters, monitoring tour reports)

    • Tracking Allegations

      • Allegations of staff non-compliance require placement into the Allegation Log Tracking System (ALTS) if:

        • The patient is a participant in the DPP or DDP, has a learning disability, verified or unverified, or requires accommodation based on a reading level score of 4.0 or lower, which includes zero or no reading score.

        • The patient claims denial of equal access to programs, activities or services, or claims a discriminatory or retaliatory action based on the patient’s disability.

        • The allegation involves a staff member or contracted employee.

      • Allegations of non-compliance that do not require placement within ALTS are:

        • Effective Communication (EC) is not appropriately documented pursuant to EC procedures, but is documented elsewhere (e.g., progress notes, physician’s orders, and chronos).

        • Allegations regarding lost or misplaced Durable Medical Equipment as a direct result of a community ambulance transport.

        • Entries in the Electronic Health Records System not matching entries in the Strategic Offender Management System. Inconsistent entries shall be resolved as appropriate.

        • With the exception of patients with DPW or DPO codes, if a patient arrives at an institution after hours and is placed in a bed that does not meet their Americans with Disabilities Act needs, but the patient is moved to an appropriate bed the following calendar day.

    • Allegation Inquiry

      • There shall be an inquiry into all allegations of staff non-compliance regardless of whether the allegation contains the name of staff members.

      • In rare instances where the date of discovery is 16 months or older, the allegation shall be discussed with the California Department of Corrections and Rehabilitation (CDCR), Office of Legal Affairs to determine whether the incident is too old to initiate an inquiry.

      • Initiation of a timely inquiry is necessary to ensure allegations are reviewed while memories are fresh, the facts surrounding the allegations are still in existence, and the violation can be remedied.

        • The inquiry shall be assigned to an appropriate supervisor or manager and initiated within ten business days of being discovered or reported to staff.  The inquiry shall be completed within 30 business days of being assigned.

        • The inquiry shall include a review of all information necessary to determine whether the allegation is “confirmed” or “not confirmed” or “entered in error”.

        • The inquiry shall include a mandatory interview with the affected patient with the following exceptions:

          • Instances regarding EC where it is determined that EC was not appropriately documented (check boxes not completed or EC documented elsewhere [EC documentation error]).

          • When an allegation is raised via a CDCR 602 HC, Health Care Grievance, a CDCR 1824, Reasonable Accommodation Request, or a third party and, as a result of that process, a patient interview is conducted that meets the inquiry requirements.

        • The inquiry shall be conducted at the institution where the allegation occurred. If the patient transfers prior to completion of the inquiry and an interview is required, the assigned supervisor or manager shall contact the patient’s new institution and arrange an interview.

        • The inquiry shall include an interview with the employee against whom the allegation is made unless investigation determines that the allegation has no merit.

        • The outcome of the inquiry shall be documented as “confirmed”, “not confirmed” or “entered in error”.

      • The Health Care Compliance Analyst shall forward allegations and all supporting documentation to the appropriate institution or hiring authority where applicable.

    • Written Report of the Inquiry

      • The inquiry shall result in a written report containing the following:

        • Date of discovery

        • Type of allegation

        • Name and title of person conducting the inquiry

        • Patient interview

        • Summary of findings

        • List of all sources of information relied upon (including any staff interviews)

        • Other allegations of non-compliance discovered at the time of the inquiry

        • Conclusion: Confirmed or Not Confirmed

      • The completed inquiry form and all corresponding supporting case documents shall be uploaded and retained within ALTS.

    • Progressive Discipline

      • The CEO shall determine whether to initiate corrective action, or to submit a confidential request for investigation or approval for direct adverse action to the Office of Internal Affairs for an employee found in non-compliance.  The following factors shall be considered:

        • Number of prior violations in relation to the overall number of encounters

        • Serious harm occurred or could have occurred to the patient

        • Culpability of the employee

        • Systemic issue

      • The CEO shall discipline employees consistent with the Employee Disciplinary Matrix set forth in the CDCR, Department Operations Manual, Chapter 3, Article 22, Employee Discipline and the California Code of Regulations, Title 15, Section 3392, Employee Discipline.

    • Disclosure

      • Corrections Services staff shall collect, aggregate, analyze, and submit the statewide ALTS logs to Plaintiffs on a monthly basis.

      • The statewide ALTS, DDP, and DPP logs shall be reported separately.

      • Staff names shall be omitted.

    • Continuous Process Improvement

      • The Statewide Quality Management Committee shall:

      • Periodically evaluate ALTS data to identify systemic themes that may pose quality and patient safety risks, and

      • Prioritize and initiate process improvement activities, as necessary or appropriate.

  • References

    • California Code of Regulations, Title 15, Division 3, Chapter 1, Subchapter 5, Article 2, Section 3392, Employee Discipline

    • Armstrong Injunction Order, Armstrong v. Newsom, United States District Court of Northern California, January 18, 2007

    • Armstrong Remedial Plan, Armstrong v. Newsom, United States District Court of Northern California, Amended January 3, 2001

    • Clark Remedial Plan, Clark v. California, United States District Court of Northern California, March 1, 2002

    • Order Denying Motion for Contempt, Denying as Moot Motion to Strike and Modifying Permanent Injunction, Armstrong v. Newsom, United States District Court of Northern California, August 22, 2012

    • Order Revising the Modified Injunction, Armstrong v. Newsom, United States District Court of Northern California, December 5, 2014

    • Order Modifying January 18, 2007 Injunction, Armstrong v. Newsom, United States District Court of Northern California, December 29, 2014

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22, Personnel, Training, and Employee Relations

    • California Correctional Health Care Services, Armstrong Staff Non-Compliance Log Memorandum, November 2, 2012

    • California Correctional Health Care Services, Order Modifying January 18, 2007 Armstrong Injunction Memorandum, January 13, 2015

    • California Correctional Health Care Services, Receiver’s Memorandum of Understanding, August 24, 2012

    • California Department of Corrections and Rehabilitation, California Correctional Health Care Services, Disability Placement Program Compliance Evaluation and Hiring Authority Accountability Memorandum, November 21, 2008

    • California Department of Corrections and Rehabilitation, Expectations for Staff Accountability and Non-Compliance of the Disability Placement Program Memorandum, March 29, 2012

    • California Correctional Health Care Services, Revision to Staff Accountability Procedures Memorandum, June 8, 2017

  • Revision History

    • Effective: 12/2010
      Revised: 09/20/2023

5.1.6 Non‑Paragraph 7 Process

  • Policy

    • California Correctional Health Care Services (CCHCS) shall provide Non-Paragraph 7 (Non-P7) responses that address Prison Law Office (PLO) questions and concerns regarding issues not covered under the patient-specific Paragraph 7 (P7) process, pursuant to the Plata Stipulation for Injunctive Relief, dated June 13, 2002. CCHCS shall ensure timely response to the PLO’s inquiry within 30 calendar days of receipt.  Responses shall be provided by the responsible program, region, or institution and vetted through CCHCS Office of Legal Affairs (COLA) and Office of Legal Affairs (OLA), California Department of Corrections and Rehabilitation, prior to release to the PLO. Issues addressed via the Non-P7 process shall include the following:

      • Systemic health care issues identified by the PLO through P7 cases, tours, or other sources of information.

      • Significant institution compliance issues requiring headquarters attention and intervention.

  • Responsibility

    • The Health Care Compliance Support Section (CSS) is responsible for facilitating the Non-P7 process and providing formal responses to PLO inquiries.  CSS is responsible for soliciting and maintaining a current listing of point of contact designees for each program area.

    • Headquarters program managers, institution leadership, or regional executives are responsible for providing comprehensive responses to CSS within the timeframes specified, and appointing a designee and back-up from their program area to be the point of contact for any follow-up questions.  It is the responsibility of headquarters program managers, institution leadership, or regional executives to ensure any corrective actions included within a formal response to the PLO are implemented, monitored, and sustained.

    • The Associate Director (AD), Risk Management Branch (RMB), Deputy Director (DD), Policy and Risk Management Services (PRMS), Director, Health Care Policy and Administration, Director, Health Care Services, COLA, and OLA, as well as appropriate program leadership or designees (when applicable), are responsible for reviewing responses to ensure accuracy, completion, and appropriate corrective actions (if applicable) prior to releasing to the PLO.

    • The DD, PRMS, or designee, upon approval from COLA and OLA, has authority to release responses and shall ensure departmental compliance with this policy.

  • Non-P7 Database Tracking

    • CSS shall utilize a designated database for tracking each Non-P7 inquiry and response.  Appropriate documentation of timeframes and status updates shall be input timely by designated CSS staff.

  • Reporting Requirements

    • The AD, RMB, or designee, shall email a weekly status report of open Non-P7 inquiries to COLA and OLA, and applicable headquarters Directors, program managers and designees, institutional leadership, and regional executives.

  • References

  • Revision History

    • Effective: 08/2019
      Revised: 02/24/2023

5.1.7 Health Care Grievance

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain a health care grievance (grievance) process to provide an administrative remedy to patients under health care’s jurisdiction (medical, mental health, and dental) for review of complaints of applied health care policies, decisions, actions, conditions, or omissions that have a material adverse effect on their health and welfare.  Any grievance which contains allegations against health care staff behavior or activity which would constitute staff misconduct if true, must be processed as a health care staff complaint (staff complaint).

  • Purpose

    • To maintain the integrity of CCHCS and the Division of Health Care Services through fair, objective, and effective review of the patient’s complaints; provide for the resolution of a grievance at the lowest possible administrative level with timely responses to the patient; provide the patient intervention as deemed medically necessary by health care staff to address an identified health care issue and/or staff complaint; and afford the patient an avenue for the exhaustion of administrative remedies prior to initiation of a court action.

  • Responsibilities

    • All health care staff involved in the grievance process shall be responsible for the effective operation of the grievance process and ensure that every grievance and staff complaint is reviewed thoroughly and answered appropriately in accordance with California Code of Regulations (CCR), Title 15, Division 3, Chapter 2, Subchapter 2, Article 5, Health Care Grievances, and applicable rules, regulations, and policies.

    • Institutional Level

      • The Chief Executive Officer, or designee, is responsible for the institution’s grievance process, ensuring it operates effectively and consistently and is the institutional level reviewing authority.

      • Each institution shall have a Health Care Grievance Office (HCGO) and assigned staff, including a Health Care Appeals Registered Nurse and a Health Care Grievance Coordinator, responsible for the processing of all grievances and staff complaints.

      • Health care staff with supervisory authority over the subject of a staff complaint is responsible for conducting the confidential inquiry.

    • Headquarters’ Level

      • The Chief, Health Care Correspondence and Appeals Branch (HCCAB), and the Deputy Director, Policy and Risk Management Services, are responsible for oversight of the statewide grievance process, ensuring it operates effectively and consistently. 

      • The Chief, HCCAB, is the headquarters’ level reviewing authority.

      • HCCAB shall have assigned staff, including licensed clinical staff, responsible for the processing of all health care grievance appeals and staff complaints.

  • Procedure

    • Institutional Level

      • Grievances and staff complaints are subject to an institutional level review. 

      • HCGO staff shall process all grievances and staff complaints, prepare a response for each accepted grievance or staff complaint, and route the prepared response to the reviewing authority for review and signed approval. 

      • Completed grievances and staff complaints shall be mailed/delivered to the patient within 45 business days of receipt, unless processed as an expedited health care grievance pursuant to CCR, Title 15, Section 3999.233(b). 

      • Additional information related to institutional level grievance procedures are outlined in the Health Care Grievances Operating Standards: Correspondence and Appeals Branch – HCG-Complete.pdf – All Documents (sharepoint.com).

    • Headquarters’ Level

      • Grievances and staff complaints may receive a headquarters’ level review, if requested by the patient.

      • HCCAB staff shall process all grievance appeals and staff complaints, prepare a response for each accepted grievance appeal or staff complaint, and route the prepared response to the reviewing authority for review and signed approval. 

      • Completed grievance appeals and staff complaints shall be mailed/delivered to the patient within 60 business days of receipt, unless processed as an expedited health care grievance appeal pursuant to CCR, Title 15, Section 3999.233(b). 

      • A headquarters’ level grievance appeal disposition exhausts administrative remedies.

      • Additional information related to headquarters’ level grievance appeal procedures are outlined in the Health Care Grievances Operating Standards: Correspondence and Appeals Branch – HCG-Complete.pdf – All Documents (sharepoint.com)

  • Training and Resources

    • HCGO and HCCAB staff shall complete grievance and staff complaint process training via the online Learning Management System upon hire and annually thereafter. 

    • Supervisory staff who conduct staff complaint confidential inquiries shall complete staff complaint training for supervisors.

    • Health care staff involved in the grievance process shall utilize the Health Care Grievances Operating Standards and Standard Grievance Language resource documents available on the Department intranet.

  • References

  • Revision History

    • Effective: 08/2019

5.1.8 Compliance and Support Team

  • Policy

    • The Health Care Correspondence and Appeals Branch (HCCAB) shall maintain a Compliance and Support Team (CAST) to assist Health Care Grievance Offices (HCGO) statewide to ensure compliance with California Code of Regulations, Title 15, Division 3, Chapter 2, Subchapter 2, Article 5, Health Care Grievances; court mandates; and departmental policies and procedures related to the health care grievance (grievance) process; efficient grievance processing at the institutional and headquarters’ levels; and a meaningful administrative remedy process for patients. 

  • Purpose

    • To maintain the integrity of the grievance process by promoting accountability through compliance reviews and provision of assistance and/or training; tracking and monitoring of action items, Corrective Action Plans (CAP), and recommendations; identifying and implementing processes to increase efficiencies and mitigate risk; and compiling and reporting compliance review findings, CAST activities, and key performance metrics and trends.

  • Responsibilities

    • The Chief, HCCAB, and the Deputy Director, Policy and Risk Management Services (PRMS), are responsible for:

      • The oversight and management of the statewide grievance program and implementation of this policy and procedure, and the Health Care Grievances Operating Standards, Section 4.1, Compliance and Support Team.

      • Approving requests and referrals for CAST Support.

      • Issuing Compliance Review Exit Memorandums.

      • Compiling and issuing CAST metrics as appropriate.

    • The Chief Executive Officer (CEO) is responsible for:

      • Compliance with this policy and procedure at the institution level.

      • Responding to the Compliance Review Exit Memorandum and taking corrective action to resolve identified non-compliance issues.

    • All California Correctional Health Care Services and Division of Health Care Services staff involved in the grievance process are responsible for the efficient operation of the grievance process and supporting CAST activities to ensure compliance with applicable regulations, court mandates, and departmental policies and procedures.

  • Procedure

    • Compliance Review

      • Prior to a compliance review site visit, CAST shall utilize the Compliance Review Tool to conduct a preliminary assessment consisting of a review of grievances and staff complaints closed in the Health Care Appeals and Risk Tracking System (HCARTS) in the most recent three months to identify applicable areas of non-compliance and general grievance processing issues.

      • During the site visit, CAST shall discuss the results of the preliminary assessment, interview HCGO staff to complete the questions in the Compliance Review Tool that require on-site responses, and review hard copies of staff complaint packages selected during the preliminary assessment.

      • Upon return from the site visit, CAST shall draft a Compliance Review Exit Memorandum, which shall:

        • Be addressed to the CEO, with copies to the appropriate headquarters and institution chain of command.

        • Outline the observations, compliance ratings for the quantifiable indicators, action items, and/or CAP, if applicable.

        • Be routed for HCCAB management review within ten business days.

        • Be emailed with the completed Compliance Review Tool to the addressees within 15 business days.

        • Request a response from the CEO to address the action items and/or CAP within 25 business days of receipt.

      • Within 25 business days of receipt of the Compliance Review Exit Memorandum, the CEO shall prepare a memorandum confirming each action item has been implemented and/or completed, including a CAP, if applicable, and email the signed response to CAST.

    • CAST Support

      • CAST shall assist in the development and implementation of effective training curriculum and utilize appropriate training methods to deliver onboarding and ad-hoc training to institution and headquarters staff involved in the health care grievance process.

      • HCGO Support

        • Upon identifying the need for CAST Support, the HCGO or HCCAB staff shall complete and submit a CAST Support Request and Referral Form to HCCAB management for approval.

        • The Chief, HCCAB, and the Deputy Director, PRMS, shall review requests and referrals for approval within ten business days of receipt.

        • Upon approval of a request or referral for CAST Support, CAST shall review monitoring data and may use applicable sections of the Compliance Review Tool to conduct a spot check consisting of review of grievances and staff complaints closed in HCARTS in the most recent three months to identify risks, trends, training needs, and process improvement opportunities.

        • While on-site in the HCGO, CAST shall:

          • Observe HCGO operations to analyze training needs, develop customized training plans, identify process improvement opportunities, and provide guidance in the development of local operating procedures.

          • Provide assistance and/or training and recommendations to HCGO staff and other institutional staff, as necessary.

        • CAST shall provide ongoing support to HCGO staff as deemed necessary by CAST management and the Chief, HCCAB.

  • CAST Reporting

    • Metrics Report

      • CAST management shall generate the Metrics Report by the tenth day of the month after the end of the reporting period for issuance to the Chief, HCCAB.  The Metrics Report shall consolidate the previous month’s CAST activities and performance information across key areas of the grievance process.

    • Regional Report

      • CAST management shall generate the Regional Report by the tenth day of the month after the end of the fiscal year for issuance to headquarters executives and the Regional Health Care Executives.  The Regional Report shall consolidate CAST activities and performance trends identified in the previous fiscal year’s Metrics Reports.

  • References

    • California Code of Regulations, Title 15, Division 3, Section 2, Subsection 2, Article 5, Health Care Grievances

    • Armstrong Remedial Plan, Armstrong v. Newsom, U.S. District Court of Northern California, Case No. C94-2307 CW, Amended January 3, 2001

    • Clark Remedial Plan, Clark v. California, United States District Court of Northern California, March 1, 2002

    • Plata v. Newsom, et al., U.S. District Court of the Northern District of California, Case No. C01-1351 TEH

    • Health Care Grievances Operating Standards, Section 4.1, Compliance and Support Team

  • Revision History

    • Effective: 08/2019

5.1.9 Protecting Employees from Retaliation

  • Policy

    • The California Whistleblower Protection Act protects all state civil service employees and applicants for state employment who make a protected disclosure in good faith from suffering retaliation. It is illegal for state officers and employees to retaliate against a state civil service employee or applicant for state civil service appointment for informally or formally reporting improper governmental activities or for refusing to obey an illegal order.

    • California Correctional Health Care Services (CCHCS) and the California Department of Corrections and Rehabilitation (CDCR) shall protect whistleblowers from retaliation by reviewing complaints of whistleblowers, notification of incidents of fraud or errors, harassment, discrimination, and retaliation and investigate as appropriate.

  • Purpose

    • To ensure all CCHCS state civil service employees and applicants for state employment are protected from retaliation.

  • Applicability

    • This policy and procedure applies to all CCHCS state civil services employees.

  • Retaliation Complaint Procedure

    • Internal

      • Complaints of retaliation shall be resolved at the lowest level.

      • Hiring authorities have the responsibility to protect all employees who report misconduct from retaliation by ensuring that all necessary measures are taken to protect whistleblowers during the investigation process as well as after the case has been adjudicated.

      • Labor Code, Section 1102.5, prohibits an employer from retaliating against an employee who discloses information that would result in a potential violation or noncompliance of statute or regulation to a governmental or law enforcement agency, to a person with authority over the employee, or another employee who has the authority to investigate. The Labor Code also protects employees who refuse to participate in an activity that would result in a potential violation or noncompliance of statute or regulation.

      • Allegations of retaliation shall be forwarded by the hiring authority to the Office of Internal Affairs (OIA) via a CDCR 989, Confidential Request for Internal Affairs Investigation/Notification of Direct Adverse Action, when a reasonable belief of misconduct occurred and the alleged misconduct, if proven true, would result in adverse action as defined in the CDCR’s Department Operations Manual, Chapter 3, Article 22, Adverse Personnel Actions.

    • External

  • Discipline and Liability

    • In accordance with the provisions of Penal Code, Section 6129(c)(2), any employee of CDCR found to have engaged in retaliatory acts shall be disciplined by, at a minimum, a suspension without pay for 30 days.

    • Pursuant to Government Code, section 8547.8(c), in addition to all other penalties provided by law, any person who intentionally engages in acts of reprisal, retaliation, threats, coercion, or similar acts against a state employee or applicant for state employment for having made a protected disclosure shall be liable in an action for damages brought against him or her by the injured party.  Punitive damages may be awarded by the court where the acts of the offending party are proven to be malicious.  Where liability has been established, the injured party shall also be entitled to reasonable attorney’s fees as provided by law.  However, any action for damages shall not be available to the injured party unless the injured party has first filed a complaint with the State Personnel Board pursuant to subdivision (a), and the board has issued, or failed to issue, findings pursuant to Section 19683.

  • Training

    • All CCHCS civil service employees are required to complete the read and sign training via the online Learning Management System upon hire and annually thereafter.

  • References

    • California Government Code, Title 2, Division 1, Chapter 6.5, Article 3, California Whistleblower Protection Act, Section 8547 et seq.

    • California Labor Code, Division 2, Part 3, Chapter 5, Section 1102.5

    • California Penal Code, Part 3, Title 7, Chapter 8.2, section 6129(c)(2)

    • California Department of Corrections and Rehabilitation Department Operations Manual, Article 14, Section 31140.10, Reporting Misconduct and Protecting Employees from Retaliation

    • Health Care Department Operations Manual, Administrative Policy, Chapter 5, Article 1, Section 4 Reporting of Actual or Suspected Incidents of Fraud, Errors, and Improper Governmental Activities Policy

  • Revision History

    • Effective: 08/2019

5.1.10 External Audits

  • Policy

    • California Correctional Health Care Services (CCHCS) headquarters (HQ) operations and processes are reviewed periodically by external audit agencies. When an external audit agency initiates an audit, investigation, or compliance review, herein referred to as an audit, CCHCS shall cooperate fully and ensure timely and comprehensive responses. The CCHCS’ Internal Audit Program (IAP) may serve as the audit liaison between external audit agencies and CCHCS HQ program areas. The IAP responsibilities may include coordination and collaboration between the external auditor and CCHCS HQ program areas including scheduling entrance and exit conferences, assisting in obtaining documentation and ensuring all responses are accurate, within scope, and submitted timely. The IAP shall retain a copy of all documentation that is created, sent, or received in connection with external audits as required by policy, regulation, or statute.

  • Purpose

    • To define the role of the IAP and CCHCS HQ program areas during an audit performed by an external audit agency, including, but not limited to, the review of processes, written policies and procedures, products, services, systems, and employees.

  • Responsibility

    • The Deputy Director (DD), Policy and Risk Management Services (PRMS), or designee, is responsible for departmental compliance with this policy.

    • The IAP Senior Management Auditor, or designee, is responsible for the monitoring and evaluation of this policy.

    • CCHCS HQ program area DDs are responsible for ensuring:

      • Requested documentation and inquiry responses are provided timely to the IAP or the external audit agency as agreed upon prior to the start of an external audit.

      • A copy of the final audit report is provided to the IAP.

      • The implementation and monitoring of any Corrective Action Plan (CAP) in compliance with the external audit.

  • Applicability

    • This policy applies to any audits of CCHCS HQ operations and processes performed by an external audit agency with proper authority and jurisdiction. This policy does not apply to:  

    • Medical inspections performed by the Office of the Inspector General who is responsible for reviewing and reporting on the delivery of the ongoing health care provided to incarcerated persons in the California Department of Corrections and Rehabilitation.

    • Reviews conducted by court order or for purposes of litigation (e.g., Prison Law Office Plata Tours).

  • Procedure

    • Initial Contact from an External Audit Agency

      • Any CCHCS HQ program contacted by an external audit agency regarding an appraisal shall immediately notify the IAP via email at CCHCSInternalAudits@cdcr.ca.gov.

    • Entrance Conference

      • The IAP shall coordinate all entrance conferences and invite CCHCS HQ program staff.

    • Roles and Responsibilities During the External Audit

      • Following the entrance conference, the IAP and the CCHCS HQ program area DD, or designee, shall meet to determine the IAP’s specific role and responsibilities for the external audit The IAP’s responsibilities may include, but are not limited to:

        • Collecting and reviewing relevant and required documents.

        • Facilitating the timely submission of documentation.

        • Communicating with the CCHCS HQ program area and the external audit agency throughout the duration of the external audit.

        • Maintaining a list and electronic copies of information and documentation received from and provided to the external audit agency.

      • The IAP shall email their agreed upon audit-specific role and responsibilities to the CCHCS HQ program area DD and the DD, PRMS.

    • During the Audit

      • If the IAP serves as the audit liaison with the external audit agency and the CCHCS HQ program area, the CCHCS HQ program area shall:

        • Submit any documentation requested from an external auditor for audit activities to the IAP at CCHCSInternalAudits@cdcr.ca.gov. Any documents provided to the IAP, which are deemed to be legally privileged or protected, shall not be released to an external auditor.

        • Provide the IAP with a list of any requested information or documentation which the program is unable to provide and include a justification of why the information or documentation is unable to be provided.

        • Discuss any potential issues identified by an external auditor with the IAP.

      • If the IAP does not serve as the audit liaison with the external audit agency and the CCHCS HQ program area, the CCHCS HQ program area shall:

        • Submit any documentation requested from an external auditor for audit activities directly to the external audit agency and copy the IAP at CCHCSInternalAudits@cdcr.ca.gov.

        • Not submit any documents deemed to be legally privileged or protected to an external auditor.

        • Ensure the IAP is invited to the exit conference.

    • Closure of an External Audit

      • If the IAP served as the audit liaison with the external audit agency and the CCHCS HQ program area during the external audit, the IAP shall ensure:

        • All issues identified by the external audit agency are communicated to appropriate CCHCS leadership via email.

        • Responses are provided by the CCHCS HQ program area DD to the IAP within the deadline specified.

        • All requested documentation is submitted to the external audit agency timely.

      • If the IAP did not serve as the audit liaison with the external audit agency and the CCHCS HQ program area during the external audit, the CCHCS HQ program area DD shall ensure the IAP receives a copy of the external audit agency’s final audit report.

    • External Audit Follow-ups and CAPS

      • If the IAP served as the audit liaison with the external audit agency and the CCHCS HQ program area during the external audit then:

        • The IAP shall remain as the liaison between the external audit agency and the CCHCS HQ program area throughout the follow-up process.

        • The CCHCS program area shall ensure all follow-up inquiries from external audit agencies are referred to the IAP via email at CCHCSInternalAudits@cdcr.ca.gov.

        • If a CAP is required, the IAP shall coordinate the completion of the CAP, and if requested, provide assistance to the CCHCS HQ program area to ensure issues are accurately addressed. Assistance may include, but is not limited to:

          • Recommending to CCHCS HQ program areas to incorporate issues into active improvement projects, when appropriate.

          • Negotiating timeframes with external audit agencies to allow CCHCS HQ program areas sufficient time to complete CAP activities.

          • Referring CCHCS HQ program areas to Quality Management for consultation if the program needs assistance in determining improvement strategies, models, or techniques.

        • The IAP shall be responsible for submitting the CCHCS HQ program areas responses to the external audit agency.

      • If the IAP did not serve as the audit liaison with the external audit agency and the CCHCS HQ program area during the external audit, the CCHCS HQ program area DD shall ensure:

        • The CAP, if required, is complete and all issues are accurately captured and responded to.

        • Upon completion, the CAP, if required, is submitted to the external audit agency and IAP.

    • External Audit Retention

      • The IAP shall retain a copy of all documentation that is created, sent, or received, in connection with external audits as required by policy, regulation or statute.

  • References

    • Generally Accepted Government Auditing Standards, Report Distribution for External Auditors, 9.58and 8.103 f.

    • International Standards for the Professional Practice of Internal Auditing (Standards), 2050 – Coordination and Reliance

    • Statewide Health Information Policy Manual, Chapter 4, Section 4.2.1

  • Revision History

    • Effective: 07/2022

Article 2 – Human Resources

5.2.1 On‑Call/Standby and Callback

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR) must ensure that employees are compensated in accordance with the applicable Bargaining Unit (BU) Memorandum of Understanding (MOU) provisions (rank and file employees) or California Department of Human Resources (CalHR) policy (excluded employees), for On-Call/Standby assignments and/or Callback time.

    • Not all BU MOUs have negotiated the same provisions regarding On-Call/Standby and Callback.  This policy serves to clarify the differences and similarities of the individual MOUs and provides guidance for excluded employees associated with the applicable BUs.  The On-Call/Standby Provisions and Compensation matrix (Appendix 1) and the Callback Provisions and Compensation matrix (Appendix 2) are attached to identify which provisions are applicable to each BU referenced in this document.

    • Effective upon release of this policy and procedure On-Call/Callback hours may be compensated either in cash or accrued Compensating Time Off (CTO) provided the accrual of CTO does not exceed the established cap.  The decision to allow cash compensation will be reviewed annually in March and will be determined based on the fiscal status of the Department.

  • Procedure

    • On-Call/Standby Assignment General Guidelines

      • When there is a requirement that an employee be available during specified off-duty hours to receive communication regarding a requirement to return to work and be fit and able to return to work, if required, this time is considered On-Call/Standby.  The requirement to carry an electronic device or respond when contacted does not necessarily entitle the employee to On-Call/Standby compensation

      • Employees scheduled for On-Call/Standby assignments at a Correctional Treatment Center (CTC) (Appendix 3) are expected to return to the worksite in a reasonable amount of time.  Please refer to the BU MOU for specific requirements.

      • For BUs that contain a Work Week Group (WWG) not authorized to receive overtime compensation (e.g., E and SE), but include a provision to compensate for On-Call/Standby, compensation shall be paid in cash or CTO provided the accrual of CTO does not exceed the established cap. Any accrual of CTO that will cause the balance to exceed the cap shall be paid in cash.

      • Additionally, CalHR Personnel Management Liaisons 2002-040 specifically states that excluded employees in WWG E (e.g., Chief Medical Executive [CME] and Regional Medical Executive [RME]) are not eligible for On-call/Standby compensation.

    • On-Call/Callback Assignment for BU 16

      • For BU 16 employees (Dentists, Physicians, Podiatrists, and Psychiatrists), On-Call and Callback are defined as (BU 16, MOU Section 7.9 On-Call/Callback Assignment):

      • On-Call Assignment

        • On-call assignment is defined as a work-shift which is performed in addition to the Unit 16 employees’ regularly scheduled workweek in which the Unit 16 employee is:

          • Available by telephone or electronic paging device at all times; and

          • Normally immediately available to return to the facility for any required medical support deemed necessary by the employee.  If the State deems it necessary, the State shall issue a Unit 16 employee an electronic paging device during an on-call assignment.

        • Those employees completing an on-call assignment of seven days shall receive eight hours CTO or eight hours compensation at management’s discretion for each on-call assignment.

        • Unit 16 employees who complete on-call assignments of less than seven days shall receive pro-rata CTO or pro-rata pay.

      • Callback Assignment

        • Unit 16 employees who are required to return to the institution for a work shift in addition to the Unit 16 employees’ regularly scheduled workweek shall receive hour for hour credit (CTO) with four hours guaranteed.  In addition to the hour for hour credit, and four hours guaranteed, Unit 16 employees shall be compensated for one hour (CTO) for travel time.  If funds are available for cash compensation, the State may choose cash instead of CTO.  It is at the State’s discretion whether cash is paid or CTO is accumulated.  Returns to the institution shall be documented.

      • NOTE:  Physician and Surgeons scheduled for On-Call/Standby assignments at CTCs are expected to return to the worksite within one hour of receiving telephonic communication.  At non-CTCs, employees are expected to return within a reasonable length of time, relative to the patient’s illness or injury.

    • On-Call Assignment for Excluded Employees Affiliated with BU 16

      • Excluded employees in WWG SE affiliated with BU 16 (Chief Physician and Surgeon [CP&S], Supervising Dentist, Chief Psychiatrist, etc.) may be eligible to receive On-Call compensation.  For example, when such an employee is acting as the treating physician because a rank and file physician is not available or a Physician Assistant (PA) or Nurse Practitioner (NP) is On-Call, the On-Call compensation will apply.  The same conditions, restrictions, and definitions for On-Call compensation that apply to rank and file employees in BU 16 also apply to excluded employees affiliated with BU 16.

    • Callback Time for BU 18

      • For BU 18 (Psychiatric Technician and Senior Psychiatric Technician), Callback is defined as (NOTE: The BU 18 MOU has no provision for On-Call Assignments):

      • BU 18 MOU Section 5.3 Callback Time

        • An employee who has completed a scheduled work shift, or an employee on an authorized day off, when ordered back to work shall be credited with a minimum of four hours work time at the employee’s appropriate rate of pay provided the call back to work is without having been notified prior to completion of the work shift and the work begins more than two hours after the completion of the scheduled work shift.

    • Standby/Callback Assignment for BU 19

      • For BU 19 (Health and Social Services/Professional) employees who are covered by the Fair Labor Standards Act (FLSA), Standby and Callback are defined as:

      • BU 19, MOU Section 6.3 Standby

        • For covered employees, standby is defined as the express requirement that an employee be available during specified off-duty hours to receive communication regarding a requirement to return to work.  It shall not be considered standby when employees are contacted or required to work but have not been required to be available for receipt of such contact.

        • Each department, or designee, may establish procedures with regard to how contact is to be made and with regard to response time while on standby.

        • An employee who is required to be on standby status will be compensated in the following manner: for every four hours on standby, an employee shall receive one hour of compensating time off.  For every hours on standby or major fraction thereof (30 minutes or more), an employee shall receive fifteen minutes of compensating time off.

        • No standby credit will be earned if the employee is called back to work and receives callback credit during any given four-hour period.

        • Standby and CTO credited as a result of standby shall be considered time worked for purposes of qualifying for overtime.

        • At the discretion of the State, CTO credited as a result of standby may be paid in cash to the employees.

      • BU 19, MOU Section 6.2 Voluntary Callback

        • For employees who are covered by the FLSA, the State will credit a Unit 19 employee with a minimum of four hours regular work time for an authorized callback when an employee is called back to work after completion of his/her regularly scheduled work shift and has left the work premises.

        • Callback credit will commence when the employee begins work and will terminate when the employee stops working.  However, hours worked which are contiguous to an employee’s regular working hours, which may include a meal period after completion of a regular work shift, will not be considered callback.

        • At the discretion of the State, callback credit may be paid in cash to the employee.

    • BU 19 Exception

      • On-Call/Callback Assignment for BU 19 Specific WWG E Employees

      • Per the MOU side letter signed September 3, 2014, for BU 19 FLSA-excluded employees (Psychologist – Clinical, Correctional Facility [CF]; Sr. Psychologist, CF [Specialist]; and Clinical Social Workers [Health/CF]-Safety), On-Call and Callback are defined as:

        • On-Call Assignment

          • On-Call Assignment is defined as a work-shift which is performed in addition to the Unit 19 employees’ regularly scheduled workweek in which the Unit 19 FLSA exempt employee is:

            • Available by telephone or electronic paging device at all non-work times; and

            • Normally immediately available to return to the facility for any required mental health duties deemed necessary by the employer.

          • If the State deems it necessary, the State shall issue a Unit 19 employee a cell phone or electronic paging device during an on-call assignment.

          • Unit 19 employees will receive eight hours CTO or eight hours of compensation, at managements’ discretion, for each completed on-call assignment of seven days.

          • Unit 19 employees who complete an on-call assignment of less than seven days shall receive prorated in either cash or CTO, at the employer’s discretion.

          • NOTE: Excluded employees covered under the side letter agreement referenced above are not subject to the requirement to return to the institution within one hour of receiving a call that requires them to do so.

        • Callback Assignment

          • Unit 19 exempt employees who are required to return to the institution for a work shift in addition to the Unit 19 employees’ regularly scheduled workweek shall receive hour for hour credit (CTO) with four hours minimum work guaranteed.  The four hours begins when the employee arrives at the institution.

          • Unit 19 employees called back to an institution, under the provisions of 6.XA, and who then leave and are called back again within the same four hour period, shall only be compensated for additional hours worked beyond the four hour call back guarantee.

          • In addition to the hour for hour credit, and four hour minimum, Unit 19 employees shall be compensated one hour for travel time.  Compensation shall be either CTO or cash, at the employer’s discretion.  Returns to the institution shall be documented.

          • Unit 19 employees called back to an institution during a holiday shall receive either pay or CTO in accordance with Section 8.1 (Holidays), paragraph (I).

          • NOTE: Compensation for on-call/call back assignment shall not exceed 24 hours in any one-day period.

    • Standby/Callback Assignment for BUs 1, 4, 11, 15, 17, and 20

      • For BUs 1 (Administrative, Financial, and Staff Services), 4 (Office and Allied), 11 (Engineering and Scientific Technician), 15 (Allied Services), 17 (Registered Nurse) and  20 (Medical and Social Services), Standby and Callback are defined as:

      • BUs 1, 4, 11, 15, 17, and 20 MOU Section 19.12 Standby Time

        • “Standby” is defined as the express and absolute requirement that an employee be available during specified off-duty hours to receive communication regarding a requirement to return to work, and be fit and able to return to work, if required.  It shall not be considered standby when employees are contacted or required to return to work but have not been required to be available for receipt of such contact.

        • Each department, or designee, may establish procedures with regard to how contact is to be made (e.g., electronic paging device, phone) and with regard to response time while on standby.

        • An employee who is required to be on standby status will be compensated in the following manner: for every eight hours on standby, an employee shall receive two hours of CTO, which may be prorated on the basis of fifteen minutes CTO for each one hour of standby.  Standby may not be scheduled in less than one-hour increments.

        • No Standby credit will be earned if the employee is called back to work and receives call back credit.

        • Standby and CTO credited as a result of standby shall not be considered time worked for purposes of qualifying for overtime.

      • BUs 1, 4, 11, 15, 17, and 20 MOU Section 19.11 Callback Time

        • An employee who has completed a normal work shift, when ordered back to work, shall be credited with a minimum of four hours work time provided the call back to work is without having been notified prior to the completion of the work shift, or the notification is prior to completion of the work shift and the work begins more than three hours after the completion of that work shift.

    • On-Call Assignments for Mid-Level Practitioners

      • PAs and NPs may be scheduled to provide On-Call services.  PAs, NPs, and rank and file physicians shall be scheduled on an equal basis with no individual or group receiving preferential treatment.

      • Because there is a requirement that the PA or NP be supervised by a physician, when a PA or NP is placed On-Call, a CP&S, CME, or the RME is required to be On-Call as well.

    • Compensation

      • The employee can elect to receive pay or CTO; however, if the receipt of CTO will result in exceeding the established cap, the portion exceeding the cap must be paid and not accrued.  Callback compensation shall be at the straight time hourly rate.  Exception to this policy for BU 19 FLSA-excluded employees refer to BU 19 compensation.

      • NOTE: Employees in WWG E and SE are not eligible for Callback compensation unless specifically stated in the BU contract.

    • BU Matrix Headquarters and Field

      • The Bargaining Unit Matrix Headquarters and Field guide (Appendix 4), outlines the BUs, unions, classifications, and WWG for the BUs referenced in this policy.

    • On-Call and Callback Authorization form (CCHCS SB01)

      • All employees who are on authorized On-Call/Standby and Callback status are required to complete the Call/Standby Authorization form (CCHCS SB01A).

      • Prior to the On-Call/Standby start date, the manager/supervisor assigning the On-Call/Standby must complete sections 1 through 9, and sign and date sections 11 and 12 of the CCHCS SB01A.  At the completion of the assignment(s), the employee must complete Section 10 of the CCHCS SB01A and both the manager/supervisor and the employee will sign and date sections 13 through 16 of the CCHCS SB01A.

      • In addition to the CCHCS SB01A, the Callback Authorization form (CCHCS SB01B) must be completed by the employee for Callback assignments and submitted to the manager/supervisor. The manager/supervisor is responsible for the review and approval of all Callback assignments documented by the employee on the CCHCS SB01B.

      • Employees are responsible for ensuring that all approved On-Call/Standby and Callback time documented on the CCHCS SB01A and CCHCS SB01B are accurately reflected on the CDCR 998-A, Employee’s Record of Attendance.  Managers/supervisors are responsible for verifying that On-Call/Standby and Callback hours reflected on the CCHCS SB01A and CCHCS SB01B are accurately documented on the CDCR 998-A.  Managers/supervisors are also responsible for approving and signing the CDCR 998-A once the information has been verified.  If the hours documented on the CDCR 998-A do not reflect the On-Call/Standby and Callback hours as documented on the approved CCHCS SB01A and CCHCS SB01B, the CDCR 998-A shall be returned to the employee for correction.

      • At no time should the manager/supervisor approve On-Call/Standby or Callback hours that are not accurately reflected on the CCHCS SB01A and CCHCS SB01B, and CDCR 998-A.

      • The manager/supervisor and the employee shall keep a copy of the CCHCS SB01A and CCHCS SB01B, and the originals shall be submitted with the CDCR 998-A.

  • Appendices

    • Appendix 1: On-Call/Standby Provisions and Compensation

    • Appendix 2: Callback Provisions and Compensation

    • Appendix 3: Correctional Treatment Centers

    • Appendix 4: California Correctional Health Care Services, On-Call and Standby Bargaining Unit Matrix, Medical, Mental Health, and Dental Classifications

  • References

    • Code of Federal Regulations, Title 29, Subtitle B, Chapter V, Subchapter A, Part 553, Subpart A, Section 553.21(3)(A)

    • State of California Labor Code, Section 204.3(1)

    • California Department of Human Resources, Memorandums of Understanding July 2, 2013 through July 1, 2016, Bargaining Units 1, 4, 11, 15, 16, 17, 18, 19, 20

    • California Department of Human Resources, Personnel Management Liaison Memorandum 2002-040

  • Revision History

    • Effective: 06/2010
      Revised: 01/2017
      Reviewed: 03/2021

  • Appendix 1: On-Call/Standby Provisions and Compensation

    WWG 2WWG EWWG SE
    BU 16

    Article
    7.9
    N/AN/AThose employees completing an on-call assignment of seven (7) days shall receive eight (8) hours CTO or eight (8) hours compensation at management’s discretion for each on-call assignment.
     
    Unit 16 employees who complete on-call assignments of less than seven (7) days shall receive pro-rata CTO or pro-rata pay.
     
    On–call assignments apply to physicians.  At the Department’s discretion, there may be a physician & surgeon and psychiatric physician on-call on the same shift.
     
    Commencing with this agreement, employees may accrue up to 480 hours of CTO.  All hours in excess of 480 shall be compensated in cash.
     
    Unit 16 employees who are on-call on a holiday shall receive eight (8) hours CTO or equal compensation at management’s discretion.
    BU 17
     
    Article
    19.12
    It shall not be considered standby when employees are contacted or required to return to work but have not been required to be available for receipt of such contact.
     
    Each department or designee may establish procedures with regard to how contact is to be made (e.g., electronic paging device, phone) and with regard to response time while on standby.
     
    An employee who is required to be on standby status will be compensated in the following manner:  For every eight (8) hours on standby, an employee shall receive two (2) hours of CTO, which may be prorated on the basis of fifteen (15) minutes CTO for each one hour of standby.  Standby may not be scheduled in less than one-hour increments.
     
    No standby credit will be earned if the employee is called back to work and receives call back credit.
    Standby and CTO credited as a result of standby shall not be considered time worked for purposes of qualifying for overtime.
    N/AN/A
    BU 19
     
    Article 6.3

    And

    BU 19 FLSA Excluded
    Employees Side
    Letter Agreement
    For covered employees, standby is defined as the express requirement that an employee be available during specified off-duty hours to receive communication regarding a requirement to return to work.  It shall not be considered standby when employees are contacted or required to work but have not been required to be available for receipt of such contact.
     
    Each department or designee may establish procedures with regard to how contact is to be made and with regard to response time while on standby.
     
    An employee who is required to be on standby status will be compensated in the following manner:  for every four (4) hours on standby, an employee shall receive one (1) hour of compensating time off.  For every hour on standby or major fraction thereof (30 minutes or more), an employee shall receive fifteen (15) minutes of compensating time off.
     
    No standby credit will be earned if the employee is called back to work and receives callback credit during any given four-hour period.
     
    Standby and CTO credited as a result of standby shall be considered time worked for purposes of qualifying for overtime.
     
    At the discretion of the State, CTO credited as a result of standby may be paid cash to the employee.
    On-Call Assignment is defined as a work-shift which is performed in addition to the Unit 19 employees’ regularly scheduled workweek in which the Unit 19 FLSA exempt employee is:
    a. Available by telephone or electronic paging device at all non-work times; and
    b. Normally immediately available to return to the facility for any required mental health duties deemed necessary by the employer.
     
    If the State deems it necessary, the State shall issue a Unit 19 employee a cell phone or electronic paging device during an on-call assignment.
     
    Unit 19 employees will receive eight (8) hours CTO or eight (8) hours of compensation, at managements’ discretion, for each completed on-call assignment of seven (7) days.
     
    Unit 19 employees who complete an on-call assignment of less than seven (7) days shall receive prorated in either cash or CTO, at the employer’s discretion.
     
    On-call assignments shall only apply to Senior Psychologist (specialist), Psychologist – CF, and Clinical Social Worker (CSW) classifications.
     
    The State shall use qualified on-call personnel in the following order:
    a.        Volunteering Unit 19 employees,
    b.        Mandatory Assignments in inverse Seniority order. CDCR shall endeavor to utilize other available resources prior to making mandatory assignments under this language.
    For purposes of this section, qualified means a Unit 19 employee who possesses a current and unrestricted license, not under any adverse action, and not under investigation.
     
    Employees shall accrue up to 480 hours of CTO.  All hours in excess of 480 shall be compensated in cash.
    N/A
    BU 20
     
    Article
    19.12
    It shall not be considered standby when employees are contacted or required to return to work but have not been required to be available for receipt of such contact.
     
    Each department or designee may establish procedures with regard to how contact is to be made (e.g., electronic paging device, phone) and with regard to response time while on standby.
     
    An employee who is required to be on standby status will be compensated in the following manner:  for every eight (8) hours on standby, an employee shall receive two (2) hours of compensating time off (CTO), which may be prorated on the basis of fifteen (15) minutes CTO for each one (1) hour of standby.  Standby may not be scheduled in less than one (1) hour increments.
     
    No standby credit will be earned if the employee is called back to work and receives call back credit.
     
    Standby and CTO credited as a result of standby shall not be considered time worked for purposes of qualifying for overtime.
    N/AN/A
  • Appendix 2: Callback Provisions and Compensation

    WWG 2WWG EWWG SE
    BU 16

    Article
    7.9 B
    N/AN/AUnit 16 employees who are required to return to the institution for a work shift in addition to the Unit 16 employee’ regularly scheduled workweek shall receive hour for hour credit (CTO) with four (4) hours guaranteed.
     
    In addition to the hour for hour credit, and four (4) hours guaranteed, Unit 16 employees shall be compensated for one (1) hour (CTO) for travel time.  If funds are available for cash compensation, the State may choose cash instead of CTO.  It is the State’s discretion whether cash is paid or CTO is accumulated.  Returns to the institution shall be documented.
     
    Unit 16 employees called back to an institution, under the provisions of 7.9 (a), and who then leave and are called back again within the same four (4) hour period, shall only be compensated for additional hours worked beyond the four (4) hour call back guarantee.
     
    Unit 16 employees who are on call on a holiday shall receive eight (8) hours CTO or equal compensation at management’s discretion.
    BU 17
     
    Article
    19.11
    An employee who has completed a normal work shift, when ordered back to work, shall be credited with a minimum of four (4) hours work time provided the call back to work is without having been notified prior to completion of the work shift, or the notification is prior to completion of the work shift and the work begins more than three (3) hours after the completion of the work shift.
     
    When such an employee is called back under these conditions within four (4) hours of the beginning of a previous call or an additional call is received while still working on an earlier call back, the employee shall not receive an additional four (4) hours credit for the new call back.
     
    When such an employee is called back within four (4) hours of the beginning of the employee’s next shift, call back credit shall be received only for the hours remaining before the beginning of the employee’s next shift.
     
    When staff meetings, training sessions, or work assignments are scheduled on an employee’s authorized day off, the employee shall be credited with a minimum of four (4) hours of work time.
     
    When staff meetings and training sessions are scheduled on an employee’s normal work day and outside the employee’s normal work shift, overtime compensation shall be received in accordance with the rules governing overtime.
     
    For reporting purposes, compensable time begins when the employee reports to the job site or begins work from a different site which may include the employee’s home, approved by the department head or designee.
    N/AN/A
    BU 18
     
    Article 5.3
    An employee who has completed a scheduled work shift, or an employee on an authorized day off, when ordered back to work shall be credited with a minimum of four (4) hours work time at the employee’s appropriate rate of pay provided the call back to work is without having been notified prior to completion of the work shift and the work begins more than two (2) hours after the completion of the scheduled work shift.
     
    When staff meetings or work assignments are regularly scheduled on an employee’s authorized day off and the employee is required to attend, the employee shall receive callback compensation or shall work a minimum of four (4) hours.
     
    When staff meetings are regularly scheduled on an employee’s scheduled work day and outside the employee’s scheduled work shift and the employee is required to attend, overtime or other compensation shall be received at the appropriate rate of pay.
    N/AN/A
    BU 19
     
    Article
    6.2

    And

    BU 19 FLSA Excluded Employees Side Letter Agreement
    For employees who are covered by the FLSA, the State will credit a Unit 19 employee with a minimum of four (4) hours regular work time for an authorized callback when an employee is called back to work after completion of his/her regularly scheduled work shift and has left the work premises.
     
    Callback credit will commence when the employee begins work and will terminate when the employee stops working.  However, hours worked which are contiguous to an employee’s regular working hours, which may include a meal period after completion of a regular work shift, will not be considered callback.
     
    At the discretion of the State, callback credit may be paid in cash to the employee.
    Unit 19 exempt employees who are required to return to the institution for a work shift in addition to the Unit 19 employees’ regularly scheduled workweek shall receive hour for hour credit (CTO) with four (4) hours minimum work guaranteed.  The four (4) hours begins when the employee arrives at the institution.
    Unit 19 employees called back to an institution, under the provisions of 6.XA, and who then leave and are called back again within the same (4) four hour period, shall only be compensated for additional hours worked beyond the four (4) hour call back guarantee.
    In addition to the hour for hour credit, and four (4) hour minimum, Unit 19 employees shall be compensated one (1) hour for travel time.  Compensation shall be either CTO or cash, at the employer’s discretion.  Returns to the institution shall be documented.
    Unit 19 employees called back to an institution during a holiday shall receive either pay or CTO in accordance with Section 8.1 (Holidays), paragraph (I).
    Compensation for On Call/Call Back assignment shall not exceed 24 hours in any one-day period.
    Upon employee request and supervisory approval, following an arduous on-call/call-back the Department will attempt to grant the request for time off in taking into account operational needs.  If granted, the employee must use leave credits.
    N/A
    BU 20
     
    Article 19.11
    An employee who has completed a normal work shift, when ordered back to work, shall be credited with a minimum of four (4) hours work time provided the call back to work is without having been notified prior to completion of the work shift, or the notification is prior to completion of the work shift and the work begins more than three (3) hours after the completion of that work shift.
     
    When such an employee is called back under these conditions within four (4) hours of the beginning of a previous call or an additional call is received while still working on an earlier call back, the employee shall not receive an additional four (4) hours credit for the new call back.
     
    When such an employee is called back within four (4) hours of the beginning of the employee’s next shift, call back credit shall be received only for the hours remaining before the beginning of the employee’s next shift.
     
    When staff meetings, training sessions, or work assignments are scheduled on an employee’s authorized day off, the employee shall be credited with a minimum of four (4) hours of work time.  When staff meetings and training sessions are scheduled on an employee’s normal workday and outside the employee’s normal work shift, overtime compensation shall be received in accordance with the rules governing overtime.
     
    For reporting purposes, compensable time begins when the employee reports to the job site or begins work from a different site, which may include the employee’s home, approved by the department head or designee.
    N/AN/A
  • Appendix 3: Correctional Treatment Centers

    • As of January 2017

    • Correctional Treatment Centers

      AgencyInstitution NameAcronym
      403Centinela State PrisonCEN
      190California Health Care FacilityCHCF
      086California Institution for WomenCIW
      056California Men’s ColonyCMC
      076California Medical FacilityCMF
      084CSP- CorcoranCOR
      934High Desert State PrisonHDSP
      915Kern Valley State PrisonKVSP
      027CSP – Los Angeles CountyLAC
      025Mule Creek State PrisonMCSP
      182North Kern State PrisonNKSP
      394Pelican Bay State PrisonPBSP
      435Pleasant Valley State PrisonPVSP
      030Richard J. DonovanRJD
      284CSP – SacramentoSAC
      587Substance Abuse Treatment FacilitySATF
      674CSP – SolanoSOL
      095San QuentinSQ
      936Salinas Valley State PrisonSVSP
      180Wasco State PrisonWSP
    • NOTE:  Listing subject to change based upon departmental needs

  • Appendix 4: California Correctional Health Care Services, On-Call and Standby Bargaining Unit Matrix, Medical, Mental Health, and Dental Classifications

    Bargaining UnitsUnionsClassificationsWork Week Group
    1Professional, Admin., Financial & Staff ServicesService Employees International Union (SEIU)Associate Information Systems Analyst, Acct. Adm. Specialist, Administrative Assistant, Assoc. Health Program Advisor, Associate Information Systems Analyst, Assoc. Program Analyst Specialist, Assoc. Budget Analyst, Associate Governmental Program Analyst, Assoc. Personnel Analyst, Clinical Rec. Adm., Health Analyst, Health Analyst, Health Program Spec., Instr. Design-Tec., Management Services Technician, Pers. Technician, Personnel Specialist, Senior Info.  Systems Analyst, SR. Pers. Specialist, St. Info.  Systems Analyst, St. Program Analyst, Staff Services Analyst, System Software Specialist, Training OfficerVaries
    4Office & AlliedService Employees International Union (SEIU)Executive Secretary, Health Records Technician, Legal Secretary, Medical Secretary, Medical Transcriber, Office Assistant, Office Technician, Property Controller, Secretary, Stock Clerk2
    11Engineering and Scientific TechniciansService Employees International Union (SEIU)Laboratory Assistant, Senior Laboratory Assistant2
    15Allied ServicesService Employees International Union (SEIU)Cook Specialist, Correctional Supervising Cook, Custodian, Lead Custodian2
    16Physicians, Dentists, & PodiatristsUnion of American Physicians & Dentists (UAPD)Physician and Surgeon, Podiatrist, Staff Psychiatrist, DentistsSE
    17Registered NurseService Employees International Union (SEIU)Nurse Consultant, Nurse Instructor, Nurse Practitioner, Public Health Nurse, Registered Nurse2
    18Psychiatric TechniciansCalifornia Association of Psychiatric Technicians (CAPT)Psychiatric Technician, Senior Psychiatric Technician2
    19Health & Social Services ProfessionalAmerican Federation of State, County, and Municipal Employees (AFSCME)WWG E – Clinical Social Worker, Optometrist, Psychologist-Clinical, Senior Psychologist, CF [Specialist]
    WWG 2 – Occupational Therapist, Pharmacist, Physician Assistant, Recreation Therapist, Registered Dietitian
    E & 2
    20Medical & Social Services SpecialistsService Employees International Union (SEIU)Certified Nurse Assistant, Clinical Lab Tech, Licensed Vocational Nurse, Pharmacy Tech, Radiological Tech, Respiratory Care Practitioner, Senior Clinical Lab Tech, Senior Radiological Tech, Dental Assistant, Dental Hygienist2

5.2.2 Nepotism and Fraternization Exception Request

  • Policy

    • It is the policy of California Department of Corrections and Rehabilitation (CDCR) to recruit, hire, and assign all employees on the basis of merit and fitness in accordance with civil service statutes, rules, and regulations.  This policy is intended to uphold the merit principle of civil service by preventing and prohibiting preferential treatment or bias due to personal relationships.  Nepotism is antithetical to a merit-based personnel system and staff shall not use their personal relationships to aid or hinder others in the employment setting.  CDCR reserves the right to initiate mandatory reassignments, employee transfer, or take other administrative action to avoid or correct situations where the potential for employment decisions based on nepotism exists.

  • Procedure

    • Exception Request

      • The hiring manager or supervisor shall prepare the exception request in memorandum format (refer to the Nepotism and Fraternization Exception Request Memorandum Template).  The memorandum shall clearly identify the personal relationship of the employees in question and how an exception, if granted, will contribute to the operational needs of the organization and mitigated within the reporting structure.

    • Submission of Exception Request

      • The local Hiring Authority (HA), shall review mitigating factors of the exception request:

        • If the HA is a Chief Executive Officer, the exception request shall be forwarded to the Regional Health Care Executive (RHCE). RHCE shall review and provide their recommendation within three business days.

        • The exception request shall be forwarded to the Chief, Classification and Pay (C&P) and Transactions & Benefit Services (TBS) or the Regional Personnel Administrator (RPA).

      • The Chief, C&P/TBS or RPA shall review the exception request pursuant to California civil service laws and rules and other factors that may impact the exception decision and provide a written recommendation to the Deputy Director (DD), Human Resources (HR). The Chief C&P/TBS or RPA shall provide their recommendation within two business days.

      • The DD, HR, shall review and provide a final recommendation to CCHCS Office of Legal Affairs (COLA) within two business days.

      • COLA shall review and provide a final written determination to approve or deny the exception request to the DD, HR within five business days. After receiving the final determination from COLA, the DD, HR, or designee, shall provide a written response to the HA within one business day.

      • The HA shall ensure a copy of the response is retained in the candidate’s interview folder or forward a copy to the local Personnel Specialist for filing in the employee’s Official Personnel File (OPF).

        • If the exception request is approved:

          • The HA shall also ensure a copy of the approval is provided to the candidate or employee.

          • The supervisor and employee shall have memorandums documented in the OPF indicating their understanding of the conflict to DOM Section 33010.25 and methods which are being instituted to mitigate.

        • If the exception request is denied, an alternative means of resolving the policy conflict shall be implemented, including reassignment of one of the affected employees (if both are current employees), or selecting an alternate candidate.

  • References

  • Revision History

    • Effective: 07/2020

5.2.3 Live Scan Fingerprinting

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR) shall ensure that all prospective employees, contractors, and volunteers have cleared a criminal record check, which includes Live Scan fingerprinting requirements. California law authorizes certain governmental agencies/departments to conduct Criminal Offender Record Information (CORI) checks on individuals applying for a license/certification, employment, or as a contractor/volunteer within law enforcement agencies/departments.

    • All prospective employees and contractors responsible for patient care shall have a cleared CORI check prior to beginning employment. All other contractors and volunteers shall have a cleared CORI check prior to entering an institution to provide services.  All prospective institution and headquarters (HQ) employees not responsible for patient care shall have a CORI check conducted upon appointment.

    • All offers of employment or other invitations to provide services for anyone providing patient care are tentative until Live Scan fingerprinting requirements are met and approved by Human Resources (HR).

    • An exception may be granted for patient care providers (both employees and contractors) to access an institution for the purposes of obtaining classroom training and/or orientation; however, Live Scan clearance must be obtained before providing patient care.

    • CCHCS employees designated to perform Live Scan fingerprinting functions, and who may have access to confidential CORI, shall abide by all laws, policies, and training requirements set forth in applicable California Penal Code sections, California Government Code sections, Department of Justice (DOJ), and CDCR/CCHCS policies.  Each CCHCS employee designated to operate Live Scan fingerprinting systems and equipment and/or access CORI, shall read and complete a California Department of Justice, Employee Statement, Use of Applicant Criminal Offender Record Information form.

  • Purpose

    • To outline Live Scan fingerprinting requirements within CCHCS and DHCS for those conducting Live Scan fingerprinting, applying for employment, or providing services within CCHCS/CDCR facilities.

  • Applicability

    • Live Scan fingerprinting submissions are required in the following instances:

      • Non-Sworn Personnel: Employees in non-sworn classifications; those who are paid by the State.

      • Peace Officer Auxiliary: Employees in peace officer classifications including retired annuitants and those applying to become Peace Officers.

      • Contractor/Volunteer: Prospective CCHCS contractors, sub-contractors, volunteers, and interns.

      • Retired Peace Officer (RPO): RPO submissions for a Carry Concealed Weapon (CCW) permit and any peace officer employees retiring and requesting a CCW endorsement on their retired identification (ID) card.

      • CCHCS/DHCS Employees: Prospective employees who must obtain or renew a state license/certification to perform their job duties (e.g., Licensed Vocational Nurse, Pharmacist).

      • Retired Annuitants/Reinstatements: Prospective employees reinstated after a permanent break in state service.

      • Transfers from outside CDCR/CCHCS: Prospective employees applying to transfer from another State agency/department.

    • Exceptions

      • An applicant who lives out-of-state and cannot travel to California may submit a manual FD-258 Fingerprint Card. Alternatively, the exception process may be requested allowing the applicant to complete the Live Scan process at the assigned institution or HQ upon arrival in California.

    • Employee Transfers

      • When an employee is transferring from one CDCR office, institution, etc., to another, including a transfer from the Division of Juvenile Justice (DJJ) to Division of Adult Institutions (DAI) or DAI to DJJ, the hiring manager/supervisor shall contact the appropriate HQ or Regional Live Scan Analyst who shall coordinate with the Office of Peace Officer Selection (OPOS), via the Live Scan Unit email at CDCRLiveScan@cdcr.ca.gov, to verify that the employee has a Live Scan fingerprint record on file and shall initiate the No Longer Interested process with the appropriate personnel office.  Another Live Scan submission shall be necessary.

  • Procedure

    • Prior to Scheduling a Live Scan Fingerprinting Appointment

      • CCHCS HQ program Personnel Liaison (PL)/Regional Human Resources Office (RHRO)/ Regional Human Resources Field Liaison (RHRFL) staff shall ensure each prospective employee, contractor, or volunteer completes and signs a:

        • CDCR 1951, Supplemental Application for All CDCR Employees. Disclosure of prior arrests or convictions by a prospective employee, contractor, or volunteer, as noted on the CDCR 1951, must be compared with the results of the Live Scan.  If there are discrepancies, the candidate may be disqualified for the position.

        • CDC 1199, Applicant Notification and Acknowledgement. Applicants acknowledge notification of being fingerprinted for the purpose of obtaining a CORI check from DOJ, and if subsequently arrested or convicted of any violations of the laws, the applicant must promptly notify the hiring manager/supervisor.

      • Contractors and Volunteers

        • All communication with contractors and volunteers shall be conducted through the CCHCS HQ PL/institution’s contract analyst. 

        • Contractors and volunteers shall be accompanied to the Live Scan fingerprinting appointment by the CCHCS HQ PL/RHRO staff. 

        • ID cards shall not be issued, and services may not be commenced, until the contractor or volunteer’s Live Scan fingerprinting results are received and cleared by HR.

        • NOTE: The exception process noted herein shall be utilized for contractors and vendors that have not obtained or are pending Live Scan clearance.

    • Scheduling Live Scan Fingerprinting

      • The following outlines procedures for requesting LiveScan fingerprinting at CCHCS HQ/institutions:

      • HQ Staff

        • CCHCS HQ HR Reception Unit staff shall schedule and perform Live Scan fingerprinting for all prospective CCHCS/DHCS employees, contractors, and volunteers assigned to work at HQ.

        • The program PL or manager/supervisor shall notify CCHCS HQ HR Reception Unit staff of the need for Live Scan fingerprinting via email to CCHCSLiveScanIDAppts@cdcr.ca.gov.

        • Live Scan fingerprinting shall not be completed unless the identity of the prospective employee, contractor, or volunteer is verified via a state-issued driver’s license/ID card.

      • Institution Staff

        • RHRO staff shall schedule and perform Live Scan fingerprinting for all prospective CCHCS/DHCS employees, contractors, or volunteers assigned to work at an institution.

        • The contract analyst shall coordinate a date and time with the prospective contractor or volunteer, and RHRO staff to complete the Live Scan process.

    • DOJ/Federal Bureau of Investigation (FBI) Live Scan Applicant Response Results

    • Exception Process for Patient Care Providers

      • Circumstances may arise when CORI results are not obtained timely and a need is identified for a provider, either employee or contractor, to begin working.  Upon approval, via the Receiver’s Freeze Exemption Request process, authorization may be granted for an employee or contractor responsible for patient care to begin work for purposes of obtaining classroom training and/or orientation; however, Live Scan clearance (CORI) must be obtained before providing patient care.

      • Civil Service Employees
        The following procedures shall be followed if the exception process is approved for civil service employees.

        • Employee Pre-Employment

          • The patient care provider shall have a Live Scan fingerprint completed as soon as possible after a tentative offer is made.

          • The patient care provider shall complete and sign the CDCR 1951 and the Live Scan Acknowledgment form.

          • The Chief Executive Officer (CEO) shall approve all hires utilizing this process by approving the Live Scan Acknowledgment Form.

        • Tracking Live Scan Clearance

          • The RHRFL shall monitor and track all outstanding Live Scan clearances.

          • Upon receipt of Live Scan results, which may include Record of Arrests and Prosecutions (commonly referred to as a RAP sheet), the RHRFL shall compare the results with the CDCR 1951 completed by the employee.  If there are no discrepancies, the RHRFL shall notify the CEO and program manager by email, indicating the Live Scan results have been received and the employee is cleared.

          • If there is a discrepancy between the Live Scan results and the CDCR 1951, the RHRFL shall immediately notify the CEO to begin the review and determination process.

            • A copy of the CDCR 1951, CDCR 2164, Live Scan Acknowledgment Form, and RAP sheet shall be packaged and sent to the CEO for review.

            • A duplicate package shall also be prepared for the Warden’s review and acknowledgment.

          • If the outcome of the review and determination process results in a failure to clear the employee for continued employment, the CEO shall contact the assigned Health Care Employee Relations Officer (HCERO) and initiate termination of employment.

      • Contract Providers
        The following procedures shall be followed if the exception process is approved for contract providers responsible for patient care.

        • Contract providers shall have a Live Scan fingerprint completed as soon as possible after approved for placement.

        • Contract providers shall also complete the Gate Clearance process. This will ensure the provider is approved to access the institution in compliance with CDCR policy.

        • Contract providers may attend classroom training and/or orientation prior to Live Scan results being received and approved

        • Contract providers may not provide patient care until Live Scan results are received and approved.

        • The Health Care Contracts Section Manager or designee shall monitor and track Live Scan clearance.

        • The Health Care Contracts Section Manager or designee shall notify the CEO and program manager by email to advise if the contract provider was cleared to provide patient care.

    • DOJ/FBI CORI Subsequent Arrest Notification

      • Once a prospective employee, contractor, or volunteer has been fingerprinted for Live Scan, DOJ forwards a Subsequent Arrest Notification to CCHCS’s HR Reception Unit if/when an individual is arrested.  DOJ/FBI CORI Subsequent Arrest Notifications are maintained by the HR Reception Unit.

      • The Associate Director, HR, or designee shall review the Subsequent Arrest Notification and forward it to the HCERO, Performance Management Unit (PMU), CCHCS via the PMU Program Manager.

      • The HCERO shall determine if the employee notified CCHCS of the arrest, and if applicable, contact the Hiring Authority to determine the appropriate disciplinary action. 

      • Copies of a DOJ/FBI CORI Subsequent Arrest Notification and/or firearm denial/prohibition shall be provided by the Associate Director, HR, or program Section Chief to an affected employee, contractor, or volunteer upon request. 

      • Requests shall be placed in a sealed envelope (marked “Confidential”), and the employee, contractor, or volunteer is to obtain the notification in person.

      • CORI information may also be provided by the Associate Director, HR, or program Section Chief to other offices within the Department that are responsible for handling employee investigations and discipline (e.g., Office of Internal Affairs, PMU).

      • HQ HR Reception Unit staff shall track via the California Correctional Health Care Services Human Resources Headquarters – Subsequent Arrest Notification log, when and to whom a copy of CORI information was provided in the event of a DOJ audit.

      • HR Regional staff shall track via the California Correctional Health Care Services Human Resources Regional – Subsequent Arrest Notification log, when and to whom a copy of CORI information was provided in the event of a DOJ audit.

    • No Longer Interested Notification

      • Once an employee separates (regardless of the type of separation), or when a contractor’s or volunteer’s services are terminated or no longer needed, CCHCS has no legal authority to continue receiving Subsequent Arrest Notification information on the individual.  The OPOS 11T, No Longer Interested Notification shall be submitted to DOJ by CCHCS HQ Personnel Specialist/Institutional Personnel Office staff for any of the following:

      • Employees who have separated from CDCR/CCHCS. 

      • NOTE: An OPOS 11T should not be sent to DOJ for retired employees.

      • Contractors, volunteers, vendors, or other service providers whose services are no longer required/terminated.

      • Civil service applicants who were fingerprinted but not hired by CDCR/CCHCS.

  • References

    • California Government Code, Title 1, Division 4, Chapter 1, Article 2, Section 1043

    • California Labor Code, Division 2, Part 1, Chapter 3, Article 3, Section 432.9

    • California Penal Code, Part 4, Title 1, Chapter 1, Article 2.5, Sections 11075-11079

    • California Penal Code, Part 4, Title 1, Chapter 1, Article 3, Sections 11102.1 and 11105

    • California Department of Corrections and Rehabilitation, Department
      Operations Manual, Chapter 3, Article 6, Sections 31060.16, 31060.18, and 31070.3

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 10, Article 9, Section 101090.3

  • Revision History

    • Effective: 01/2017

5.2.4 Administrative Time Off

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR) may only authorize Administrative Time Off (ATO) pursuant to the parameters outlined below, California Government Code (GC), California Labor Code, California Code of Regulations (CCR), California Department of Human Resources (CalHR) policy, and/or Bargaining Unit (BU) Memorandum of Understanding (MOU) provisions.

  • Procedure

    • Authority to Approve Administrative Time Off

      • All requests for placing an employee on ATO shall be approved for up to five working days through the Hiring Authority (HA) chain of command with concurrence from the respective CCHCS/DHCS program Director/designee or Regional Health Care Executive (RHCE) as outlined in Approval Authority for Administrative Time Off (ATO).

      • After receiving approval from the respective Director/designee or RHCE, the requesting HA shall immediately notify the Health Care Employee Relations Officer (HCERO), Performance Management Unit, CCHCS.  The HCERO shall assist with writing the Notification of Administrative Time Off (ATO).

      • Once completed, with the assistance of the HCERO, the HA shall provide the Notification of ATO to the affected employee.

    • Administrative Time Off Exceeding Five Working Days

      • The information below summarizes the process for the approval for ATO exceeding five working days, as outlined in the Approval Authority for Administrative Time Off (ATO):

      • 6 – 30 Days of ATO

        • The HA shall contact his/her respective CCHCS/DHCS program Director/designee or RHCE prior to the employee’s fifth working day on ATO to request to continue an employee on ATO beyond five working days.

        • For requests to continue an employee on ATO beyond ten working days, the HA shall contact his/her respective CCHCS/DHCS program Director/designee or RHCE prior to the employee’s tenth working day on ATO.

        • If it is determined that an employee should be continued on ATO beyond 15 working days, the HA shall contact his/her respective CCHCS/DHCS program Director/designee or RHCE prior to the employee’s 15th working day on ATO.

        • If it is determined that an employee should be continued on ATO beyond 30 calendar days, the respective CCHCS/DHCS program Director/designee or RHCE shall notify the Receiver/designee prior to the employee’s 25th working day on ATO.

        • The HA must notify the HCERO of the approval or denial of an employee’s continued ATO use.

      • 31 Days or More of ATO

        • A justification from the HA establishing good cause for maintaining an employee on ATO in excess of 30 calendar days, shall be provided to the HCERO for submission to CalHR.

        • CalHR Extension Request Process

          • Requests to extend ATO for longer than 30 calendar days must be submitted, in writing, to CalHR, Personnel Services Branch, Labor Relations Division, via the CCHCS HCERO at least five working days prior to the expiration of the ATO. The HCERO is responsible for seeking approval in advance from CalHR in 30 calendar day increments. The Request for Approval – Administrative Time Off Extension memorandum must be labeled “Confidential”.  The following information must be included in the ATO extension request:

          • Employee Information:

            • Employee name.

            • Collective bargaining identifier.

            • Classification and job/working title.

            • Peace Officer (Yes or No).

            • Initial date ATO commenced.

            • Length of extension, if less than 30 calendar days is requested.

          • Reason ATO is needed:

            • Explain why ATO is the best alternative under the circumstances.

            • Explain why the employee cannot return to work.

            • A temporary reassignment was considered instead of ATO.

            • If a temporary assignment is rejected, state the reason why.

            • The employee cannot perform any work remotely while on ATO.

          • Projected Date for Termination of ATO:

            • Date the investigation or a Fitness for Duty Evaluation is expected to conclude.

            • If the original deadline needs to be extended, explain why.

          • HA or Designee Contact Information:

            • Name.

            • Email.

            • Phone number.

          • The extension request must be signed by the HA.

            • NOTEIf an investigation is underway, the HA does not need to describe specifics about the investigation, but should explain the potential harm that might arise from returning the employee to work (e.g., “Investigating allegations of child molestation; employee’s job duties include the supervision of children,” or “Investigating allegations of theft; employee’s job duties involve unlimited access to funds and no ability to secure the funds.”).

        • CalHR Extension Decision

          • CalHR will notify the HCERO regarding approval or denial of the ATO extension request.

          • If the request is approved, CalHR will specify the expiration date.

            • NOTE:  Approvals are typically for only 30 calendar days.

          • If the request is denied:

            • CalHR will explain the reason for the denial.

            • CalHR will work with the HCERO to determine if reconsideration of the ATO extension request is merited, or the employee must return to work.

              • NOTE:  If CalHR denies the ATO extension request, the employee must return to work.

    • Consultation with the Office of Internal Affairs Prior to Administrative Time Off due to Misconduct

      • Prior to granting ATO due to suspected misconduct, the Office of Internal Affairs (OIA) Central Intake Unit (CIU) must be consulted.

      • When a HA determines that ATO may be necessary, the HA shall consult with one of the following CDCR staff prior to placing the employee on ATO:

        • OIA Special Agent In-Charge

        • OIA CIU Chief

      • The purpose of the consultation is to ensure that no investigative protocol is compromised and for CIU to consider the case for expedited processing.

      • If an employee is placed on ATO after a case has been referred to OIA, immediately notify OIA of the action.

      • Referrals to OIA shall be made via the CDCR 989, Confidential Request for Internal Affairs Investigation/Notification of Direct Adverse Action. The HA shall request a blank copy of the CDCR 989 from the OIA.

        • NOTEFor priority processing, the CDCR 989 may be faxed to CIU, with a copy of the Notification of ATO memorandum.

    • Criminal Conduct

      • ATO may be approved when a CCHCS/DHCS employee:

      • Has been charged with a felony.

      • Is suspected of committing any serious violation of the CCR.

    • Misconduct

      • ATO may be approved when a CCHCS/DHCS employee:

      • Is suspected of smuggling contraband.

      • Has demonstrated unacceptable familiarity with incarcerated persons.

      • Has seriously jeopardized the security of the institution.

      • Has been served with a Notice of Adverse Action in which the penalty is dismissal or has been served a Notice of Rejection During Probation.

        • NOTEATO arising from dismissal or rejection during probation shall conclude on the effective date of the Notice of Adverse Action or Notice of Rejection During Probation.

    • Injury or Illness

      • ATO related to injury or illness:

      • Shall be approved for time lost on the date of a work-related injury or illness, even if the claim has not been approved for Worker’s Compensation benefits.

      • May be approved where an employee has a medical condition(s) and the Disability Management Unit has determined that a Fitness for Duty Evaluation is required.

    • Medical-Legal Evaluation

      • While a Worker’s Compensation claim is pending, an employee may be asked to attend a Medical-Legal Evaluation with an Independent Medical Evaluator (e.g., Qualified Medical Evaluator or Agreed Medical Evaluator) pursuant to California Labor Code, Sections 4060, 4061, or 4062.  The employee shall be placed on ATO for any time lost from work as a result of attending a Medical-Legal Evaluation.

      • NOTE:  If an employee is currently absent from work and is receiving Worker’s Compensation temporary disability benefits or checks from the State Compensation Insurance Fund, the employee will not be placed on ATO.

    • State Personnel Board Hearing

      • An employee shall be granted ATO to attend a meeting of the Department or State Personnel Board concerning a matter specifically affecting the employee’s position/classification in which the employee has requested to be heard.  Refer to the applicable BU MOU for details.

    • Governor-proclaimed State of Emergency

      • ATO may be granted for up to five working days during a state of emergency pursuant to the following criteria set forth in CCR, Section 599.785.5:

      • The employee works or resides in a county where a state of emergency has been proclaimed by the Governor and the HA determines at least one of the following conditions exists:

        • The employee’s normal place of business is closed temporarily during the employee’s normal work shift due to the effects of the emergency.

        • The emergency effectively precludes the employee’s ability to find reasonable routes of transportation from the employee’s normal residence to the work place.

        • The emergency presents an immediate and grave peril to the employee’s own safety, that of an employee’s immediate family member, or the employee’s principal residence.

        • The employee is actively involved in a formal, organized effort to protect the health and safety of the general public, such as where the employee is a member of the auxiliary fire or police department, or the employee is asked by local authorities to assist with sandbagging efforts.

        • The employee needs to take time off to apply for disaster assistance from the Federal Emergency Management Agency, because the employee is unable to apply for assistance before or after the employee’s normal work shift.

      • The employee is preregistered with and providing volunteer service to a state agency carrying out its responsibilities under the Governor’s Executive Order D-25-83.

        • The employee is required to notify the HA of the employee’s affiliation with the volunteer services and establish prior arrangements regarding notification of the HA in the event the employee is asked to participate in the State disaster response.

        • The HA shall release the employee to provide volunteer service when an emergency occurs, unless there is a critical departmental operating reason that prevents such a release.

      • Paid ATO shall not exceed five working days without prior approval; CalHR shall grant approval of paid ATO in excess of five working days if it finds that one of the aforementioned criteria continues to be met.

      • NOTE:  Employees called into service as specified in GC, Section 19844.5 (refer to Section (b)(10) below), are excluded from the aforementioned standards.

    • California Emergency Management Agency Service

      • Pursuant to GC, Section 19844.5, an employee called into service by California Emergency Management Agency (CalEMA)to engage in a search and rescue operation, disaster mission, or other life-saving mission conducted within the State is entitled to ATO. 

      • Only volunteers participating in the following organizations qualify:

        • California Explorer Search and Rescue Team

        • Drowning Accident Rescue Team

        • Wilderness Organization of Finders (also known as “WOOF” or Wilderness Finders Search Dog Teams)

        • California Rescue Dog Association

        • California Wing of the Civil Air Patrol

      • The employee shall be released to engage in the aforementioned activities at the Department’s discretion. However, leave shall not be unreasonably denied.

      • The period of duty shall not exceed ten calendar days per fiscal year, including the time involved in going to and returning from the duty.

      • A single mission shall not exceed three working days, unless an extension of time is granted by CalEMA and the Department.

      • If the employee receives a request to serve:

        • During normal working hours – The employee contacts the immediate supervisor regarding release.

        • Outside normal working hours – The employee contacts the immediate supervisor or designee regarding release.

        • NOTEAn employee serving in the aforementioned capacity shall receive ATO for the time taken. However, the employee shall not receive overtime compensation while on ATO.  Furthermore, the Department is not liable for disability or death benefit payments in the event the employee is injured or killed in the course of CalEMA service.  However, the employee remains entitled to any benefits currently provided by the employee’s agency.

    • Participation in State Civil Service Examinations

      • Upon notice to the employee’s immediate supervisor, employees shall be approved to participate in any State civil service examination conducted during the employee’s work hours, including employment interviews for positions within State service, in which the employee could be hired from an eligible list as part of the examination process.

      • Impacted employees in layoff status shall be granted reasonable time to attend State-sponsored job interviews, job fairs, and apply for open positions in agencies as noted in the relevant BU MOU.  Such requests shall not be unreasonably denied.

      • NOTE: The employee may be required to provide substantiation for the request.  Refer to the applicable BU MOU for details.

    • Organ or Bone Marrow Donation

      • An employee who has exhausted all available sick leave shall be granted the following leave(s) with pay:

      • An absence not exceeding 30 working days in any one-year period to any employee who is an organ donor.

      • An absence not exceeding five working days in any one-year period to any employee who is a bone marrow donor.

    • Blood and Blood Product Donation

      • Based on an applicable BU MOU and State policy, ATO may be approved for blood, plasma, platelets, and other blood product donations to a certified donation center.

    • Court Appearances

      • Based on an applicable BU MOU and State policy, ATO may be approved for court appearances and/or subpoenas, which compel the employee’s presence as a witness, and the employee is not a party to the legal action or an expert witness.

    • Precinct Board Member Service on Election Day

      • An employee appointed as a member of a precinct board who takes time off to serve as a member of that precinct board on Election Day shall receive payment of his/her regular wages or salary for that day. The time off shall be recorded as ATO for time keeping purposes.

      • Employees are entitled to retain any compensation they receive for service as a precinct board member.

      • Eligibility is subject to approval by the employee’s supervisor.

      • Any officer, deputy, or employee selected or appointed by an elected State Officer is excluded from the provisions of GC, Section 19844.7.

    • Restricted Access while on Disciplinary Administrative Time Off

      • When an employee is on ATO after being served with a Notice of Adverse Action, a Rejection During Probation, or while under investigation, the HA shall restrict the employee’s access to work-related facilities and/or electronic or computer systems as necessary. 

      • During the leave period, the employee is relieved of all duties, rights, and powers arising out of CCHCS/DHCS employment.

      • While on ATO, the employee shall be available by telephone during normal business hours (8:00 a.m. to 5:00 p.m.).  The employee shall be accessible during normal business hours and must be able to report to his/her regular work location as directed.

    • The employee shall request approval from the designated supervisor to attend medical appointments or utilize leave credits during ATO and shall be charged and reflect the appropriate leave credits on the CDCR 998-A, Employee’s Record of Attendance.  Upon receiving a request from an employee on ATO to use leave credits, the HCERO shall consult with the HA to obtain approval or disapproval.

    • Returning From Administrative Time Off

      • Employees are required to return to work at the end of their ATO expiration/termination date.  Any employee who is absent without leave (commonly known as AWOL) after receiving notice to return to work shall be separated pursuant to GC, Section 19996.2, which provides that absences, whether voluntary or involuntary, for five consecutive working days shall constitute automatic resignation from State service.

  • References

    • California Government Code, Title 2, Division 5, Part 2, Chapter 1, Article 2, Section 18524

    • California Government Code, Title 2, Division 5, Part 2, Chapter 7, Article 1, Sections 19572 and 19574.5

    • California Government Code, Title 2, Division 5, Part 2, Chapter 7, Article 2, Section 19592.2

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 2, Article 4, Sections 19844.5 and 19844.7

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 2.5, Article 11,
      Sections 19991, 19991.10, and 19991.11

    • California Labor Code, Division 4, Part 1, Article 2, Sections 4060-4062

    • California Labor Code, Division 4, Part 2, Article 2, Section 4600(e)(1)

    • California Code of Regulations, Title 2, Division 1, Chapter 3, Subchapter 1, Section 599.785.5

    • California Department of Human Resources, Personnel Management Liaison 2004-026, 2005-012, 2007-026, 2012-008, 2012-015, and 2014-025

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Sections 33030.27 – 33030.27.5

    • California Department of Corrections and Rehabilitation, “Consultation With the Office of Internal Affairs Prior to Administrative Time Off or Redirection of Staff” Memorandum, November 10, 2011

  • Revision History

    • Effective: 04/2017

5.2.5 Educational Rotation Program

  • Policy

    • California Correctional Health Care Services (CCHCS) provides patients with timely access to safe, effective, and efficient medical care and integrate the delivery of medical care with mental health, dental, and disability programs.  CCHCS and the Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR), may enter into agreements with accredited health care educational entities to provide broader clinical and educational experiences to students.

    • This policy provides guidance regarding the laws, rules, and processes related to the Educational Rotation Program for CCHCS and DHCS.  This policy applies only to unpaid educational rotations.  Residencies and other situations in which compensated health care services are provided are handled via a health care services agreement that CCHCS’ Medical Services Section solicits and are not governed by this policy.

  • Benefits to Students

    • An educational rotation provides benefits to students which include, but are not limited to:

    • Providing an opportunity to fulfill clinical requirements necessary to graduate.

    • Providing clinical experiences that integrate education, career development, and public service.

    • Providing the opportunity to apply knowledge and skills in a professional setting while still in school.

    • Enhancing the students’ resumes.

    • Providing networking and job reference opportunities.

    • Exposing students to health care in a correctional setting.

    • Increasing self-confidence.

  • Benefits to Employees

    • An educational rotation provides benefits to CCHCS and DHCS employees which include, but are not limited to:

    • Exposing employees to new ideas, viewpoints, and energy.

    • Fostering positive public relations.

    • Serving as a recruitment tool.

    • Providing opportunities to engage in clinical training.

    • Allowing CCHCS, DHCS, and educational entities to build and strengthen relationships.

  • Request Process

    • Educational entities contact the Educational Rotation Program Contract Liaison (CL) (i.e., program-designated analyst at headquarters [HQ]) for CCHCS and/or DHCS. If contacted by an educational entity, Workforce Development Unit (WDU) and/or the program should refer the educational entity representative to the CL.  Furthermore, when a student contacts HQ or an institution directly, the CL must work with the student’s educational entity representative (i.e., Contractor’s Designated Faculty Member [CDFM]) to formalize educational rotation participation.

    • The Educational Entity Representative contacts the CL to request educational rotation participation.

    • The CL:

      • Confirms the educational program’s accreditation status and other details (e.g., public, private, or for-profit college).

      • Confirms the nature of the educational experience in terms of:

        • Type of program

        • Number of student participants

        • Amount of time students will spend on-site

      • Confirms the program’s desire to participate in educational rotations for the specific course of study.

      • Confirms collective support for the program from program/institutional executives, including, but not limited to:

        • Chief Executive Officer (CEO)

        • Chief Medical Executive (CME)

        • Chief of Mental Health

        • Supervising Dentist

        • Other executives or program directors based on the type of program request being made

          • NOTE:  A HQ Mental Health Training Unit, DHCS, review must be completed prior to Mental Health programs participating in any educational rotations.

      • Ensures the program/institution has the clinical support for conducting the proposed program with:

        • Adequate space and equipment for the educational student population

        • Appropriate staff participation

        • On-site time requirements for the participants without negatively impacting program operations

      • Coordinates with nearby institutions and/or regional or statewide executives for rotations that would be appropriate for multiple institution participation.

      • Begins preparation of the scope of work (SOW) for the interagency agreement (IA) or contract.

      • Notifies WDU of the pending educational rotation details by providing a copy of the IA or contract.

  • Procurement/Contracting Requirements

    • Although CCHCS’ educational program agreements are zero dollar ($0.00) contracts, educational rotation programs must go through the procurement/contracting process to establish an IA or a contract.  While these agreements are not contracts for services, compliance with these requirements mitigates legal risk to CCHCS and DHCS.

    • An IA or contract primarily consists of an SOW and several exhibits that are attached to the SOW that define essential features or terms of the agreement including, but not limited to:

      • Business Associates Agreement (HIPAA)

      • Patient Privacy Regulations and Non Redisclosure Agreement

        • NOTE:  Health Insurance Portability and Accountability Act (HIPAA) language cannot be waived for private, for-profit, or out-of-state colleges.  In the case of California State or University of California colleges, a Non Redisclosure Agreement can be used in lieu of the HIPAA language.  The HIPAA Agreement and/or Non Redisclosure Agreement should be retained for three years.

      • Insurance requirements for schools and students

      • California Code of Regulations, Title 15, disclosures

      • Indemnification issues

  • Procurement/Contracting Process

    • The procurement/contracting process for educational rotation programs is as follows:

    • NOTE:  Edits to the related exhibits must be routed and approved by HQ and the CCHCS Office of Legal Affairs (COLA) and/or Department of General Services, depending on the contract changes (e.g., insurance requirements, indemnification issues).

    • The Procurement Contract Analyst guides relevant program/institution and educational entity staff through the contracting process.

    • The Host Program/Institution Educational Leadership (e.g., CEO/CME):

      • Writes a draft SOW that defines the following core features:

        • Activities

        • Requirements

        • CLs

        • Proposed on-site activity in terms of how many students may participate over what time period

      • Submits the draft SOW to the CL.

    • The CL submits the draft SOW to the CDFM for review, comments, and proposed revisions.

      • NOTE:  CCHCS and/or the CDFM may revise the draft SOW until it is suitable to both parties.

    • The CDFM reviews the SOW and provides comments and proposed revisions to the CL.

    • The CL:

    • The Procurement Contract Analyst:

      • Adds the required exhibits.

      • Prepares and forwards the complete IA or contract, including all necessary exhibits, to the CDFM for review.

    • The CDFM reviews the IA or contract.

      • NOTE:  Any requested changes must be routed back to the Procurement Contract Analyst.

    • The Procurement Contract Analyst:

      • Reviews the IA or contract changes requested by the CDFM, if applicable. 

      • When necessary (i.e., edits to the exhibits), forwards the requested IA or contract changes to COLA for review.

      • When the IA or contract is acceptable to all parties, completes the STD Form 213, Standard Agreement

      • Provides a copy of the final IA or contract to WDU.

    • COLA:

      • If consulted, reviews, suggests changes, or considers proposed changes to the IA or contract.

      • Notifies the Procurement Contract Analyst of the recommendation.

    • The Procurement Management/Educational Entity Officials executes the IA or contract.

    • The WDU monitors the overall progress of the Educational Rotation Program.

    • NOTE:  While the current contract is still in progress, requests may be initiated to extend or modify the educational rotation.  In such cases, a STD Form 213A, Standard Agreement Amendment is processed via the Program Contract Analyst.

  • Program Coordination

    • The tactical decisions and activities related to having students on-site are as follows. 

    • NOTE: The coordination efforts may occur concurrently with the procurement/contracting process (see above), or the CL and CDFM may wait until the contract is fully executed before beginning the coordination efforts

    • The CDFM:

      • Determines the exact calendar schedule.

        • The schedule is especially critical for those programs where a cohort class of multiple students will be on-site for a number of days each week over an instructional period.

        • For programs where a single student/intern/resident/master’s candidate will be on site, the student typically contacts the school’s CDFM regarding a correctional educational rotation.  In such cases, the CDFM will coordinate with the CL or connect the student with the CL to make arrangements.

      • Ensures students meet the tuberculosis (TB) testing requirement no earlier than 30 days prior to the start of on-site activities.

      • Ensures the CL receives the appropriate TB documentation on all participants.

      • Provides the CL with detailed information (e.g., background check) and signed Non Redisclosure Agreement on every student who will be involved in the program, including the information necessary to conduct future LiveScan processes.

        • NOTE:  Each student is individually accepted or rejected by the CL or designee as authorized by the program Director or CEO

    • The CL provides WDU with contact information on all student participants.

      • NOTE:  The information will be used to track and ultimately recruit students

    • The CL/CDFM (in collaboration with each other) ensures every student is provided onboarding/orientation that introduces the student to the relevant aspects of interacting with incarcerated persons in an institutional setting prior to arrival on-site.

    • The CL:

      • Ensures access details are confirmed prior to the student/faculty arrival to the institution, including, but not limited to:

        • Background check (e.g., LiveScan)

        • Signed Non Redisclosure Agreement

      • Notifies the Warden and/or other appropriate correctional personnel of the need to admit and escort students to and from the program clinical settings.

  • Training

    • The designated program/institution staff will:

    • Establish a training program that provides clear expectations for students, including the basis for evaluation.

    • Allow students to participate in appropriate activities and meetings.

    • Instruct the students on specific skill development tasks.

    • Facilitate active learning by explaining, clarifying, and encouraging the students to ask questions at appropriate times.

    • Provide experiences that offer a broad overview of the work and organization.

  • Selecting Educational Program Preceptors and Contacts

    • Any institution that participates in an educational program must have a designated on-site Educational Program Preceptor who is responsible for providing orientation of students and faculty and who oversees the educational experience of the students.

    • The designated on-site Educational Program Preceptor shall be available to students and faculty on a regular basis and shall possess expertise in the clinical area in which the student will rotate.

    • Even if the student will rotate through various units to gain broad-based experience, there should be a single overall Educational Rotation Program Contact who oversees the educational rotation as a whole.

    • When choosing an Educational Program Preceptor and/or Educational Rotation Program Contact, it is important to select a staff member who:

      • Is interested in working with college students.

      • Has time to invest in the educational rotation.

      • Possesses qualities such as leadership, strong communication skills, and patience.

        • NOTE:  An employee may not be required to participate in the Educational Rotation Program.

  • Educational Program Preceptor Responsibilities

    • The Educational Program Preceptor has the following responsibilities:

    • Ensure students and faculty complete the Health Care On-Site Medical Student/Resident Orientation Self Certification module prior to beginning the educational rotation, and retains the signed Self-Certification Form(s). 

      • NOTE:  The Self-Certification Form is located at the end of the module and should be retained for one year following the educational rotation period ending date.

    • Oversee and assign the students’ tasks.

    • Identify the different expectations between the clinical site and school to help students make a successful transition to the clinical environment.

    • Establish regular one-on-one meetings to:

      • Communicate goals, objectives, and expectations

      • Review progress on assignments

      • Provide clinical guidance

      • Provide feedback, guidance, and support

      • Discuss successes, areas for improvement, and overall performance

      • Maintain open, two-way communication

    • Track and submit students’ time to the CDFM, if requested.

    • Submit student evaluations to the CDFM, if requested

    • Ensure students return any departmental property and that electronic accesses (e.g., Electronic Unit Health Record [eUHR], Electronic Health Record System [EHRS], Mental Health Tracking System [MHTS]) are cancelled at the conclusion of the educational rotation.

    • May provide students with a letter of recommendation, if requested.

  • Student Responsibilities

    • Students have the following responsibilities:

    • Adhere to departmental policies, procedures, and rules governing professional behavior.

    • Report to the clinical site on time and prepared to complete the required number of hours agreed upon by the educational program.

    • Notify the Educational Program Preceptor if he/she is unable to report when scheduled.

    • Behave and dress appropriately for the institutional clinic environment.

    • Respect the confidentiality of the institutional clinic environment, employees, and patients.

    • Execute a Non Redisclosure Agreement prior to participation.

    • Discuss any problem with his/her Educational Program Preceptor and, if necessary, the CDFM.

  • Student Rights

    • Students have the same legal rights as State employees regarding protection against discrimination and harassment.  Students are not employees of the State, CCHCS, or CDCR, and do not have the same rights as State employees in other areas, including workers’ compensation, unemployment compensation, participation in the Public Employees Retirement System, civil service employee disciplinary procedures, or any other rights afforded to State employees based on civil service employment.

  • Student Schedule

    • Schedules shall be flexible depending on the individual educational requirements and Educational Program Preceptor’s schedule and availability.

  • Student Evaluations

    • Evaluation of performance is important to the student’s development, and should be provided throughout the entire rotation.

    • Regularly scheduled evaluations help avoid:

      • Miscommunication

      • Misunderstanding of clinical responsibilities

      • Failure to achieve specific goals and objectives

  • Educational Rotation Completion

    • An educational rotation should have a clearly stated end date that is identified before the educational rotation begins.

    • At the end of the educational rotation, the Educational Program Preceptor may:

      • Provide clinical students with a letter of recommendation, if requested

      • Provide evaluations to the students’ educational program (e.g., evaluations required for academic credit), if requested

    • The Educational Program Preceptor ensures clinical students return any departmental property and that electronic accesses (e.g., eUHR, EHRS, MHTS) are rescinded.

    • The Educational Program Preceptor notifies WDU when the educational rotation is completed.

    • WDU retains the clinical students’ contact information in order to notify students about potential job opportunities.

  • Recruitment of Student Graduates

    • Candidates who have participated in a correctional educational rotation provide an important recruitment and retention opportunity for CCHCS and DHCS, since such candidates have already been introduced to experiences unique to the correctional health care environment.  To take advantage of the opportunity to recruit these student graduates, WDU shall:

    • Maintain an up-to-date roster of all programs and students, including student contact information.

      • NOTE: The roster information shall be provided by the CL to WDU prior to any rotation.

    • Survey student via e-mail approximately one to two weeks after the end of the students’ educational rotation to better understand how the students reacted to the experience (e.g., what the students liked and did not like).  Survey Educational Program Preceptors, and other clinical leaders who observed educational rotation students, via e-mail approximately one to two weeks after the end of the students’ educational rotation.

      • All surveys will be administered using available survey tools (e.g., Survey Monkey).

      • Survey results will be assessed by WDU to ensure efficacy of the program.

      • Data will be compiled and shared with the relevant CCHCS management, enabling CCHCS to improve the education programs.

    • Create a talent pool within the CCHCS and DHCS, Applicant Tracking System.

    • Remain in contact with students as part of CCHCS’ and DHCS’ recruitment efforts.

    • Share student hiring data and feedback with stakeholders.

  • References

    • United States Code, Title 29, Chapter 8, Fair Labor Standards Act

    • California Department of Human Resources, Student Internship Program Guide

  • Revision History

    • Effective: 12/2015

5.2.6 Leave of Absence

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR) shall comply with California Government Code (GC), Sections 19991.1 through 19991.13, State rules and regulations, and Bargaining Unit (BU) Memorandum of Understanding (MOU) provisions regarding leave of absences (LOA) for health care employees.

  • Purpose

    • To provide resources and procedures to ensure consistent application of the GC, State rules and regulations, and MOUs relating to LOAs.

  • Eligibility

    • Eligibility criteria can differ depending on the type of leave being requested, applicable GC or California Code of Regulations (CCR) Sections, State rules and regulations, and BU MOUs.  Statutes occasionally have different eligibility requirements and provide different levels of leave benefits for the same type of leave.  Human Resources (HR) may be contacted for assistance with eligibility verification information.

    • For assistance with eligibility verification information, headquarters (HQ)/regional office health care employees should contact their Senior Personnel/Personnel Specialist (hereafter referred to as Personnel Specialist [PS]), and institution health care staff should contact the Regional Human Resources Field Liaison (RHRFL) at their institution.

    • When determining a rank and file employee’s eligibility for any LOA, the BU’s MOU shall be followed.  If the MOUs do not provide a provision for LOA, then the GC and CCR shall apply.  If the MOU is in conflict with the GC and CCR, the provisions of the MOU shall be followed for rank and file employees.

    • Excluded employees (managers, supervisors, and confidential designations) are governed by GC and California Department of Human Resources policies.  MOU provisions cannot be applied to excluded employees.

    • The following criteria must be considered when determining employee eligibility:

      • Tenure (e.g., permanent, limited term, temporary).

      • Employee Designation (rank and file, managerial/supervisory, confidential).

      • BU provisions (rank and file employees).

      • Length of State service.

  • Ineligibility

    • Pursuant to CCR, Title 2, Section 599.781 and respective MOUs, an LOA is prohibited for any employee who:

    • Is accepting another position in State service.

    • Is leaving State service to enter other employment, except as permitted in the GC.

    • Does not intend to, nor can reasonably be expected to, return to State service on or before the expiration of the leave.

  • Formal Discretionary LOA

    • A discretionary LOA may be granted upon the employee’s request, eligibility verification, and appropriate approval by the program Deputy Director, Regional Health Care Executive (RHCE), Chief Executive Officer (CEO), or authorized designee, hereafter referred to as Hiring Authority (HA).  Employees shall provide written substantiation to support the request for a discretionary LOA.  Requests for an LOA shall not be unreasonably denied.  A discretionary LOA may be granted by the HA for the following reasons:

      • Adoption or parental leave (up to one year).

      • To attend to personal or family matters.

      • Civilian volunteer during a military emergency.

      • Education.

      • Employee is loaned to another governmental agency (for performance of a specific assignment), non-profit organization, or a recognized college/university upon the request of CCHCS, DHCS, CDCR, or the receiving entity.

      • Medical reasons.

      • To run for public office.

      • To seek or accept other employment during a layoff situation or otherwise lessen the impact of an impending layoff.

      • Union leave.

      • Other acceptable reasons.

    • Employees who have exhausted paid leave may be eligible for a discretionary unpaid LOA for a period not to exceed one year.

  • Formal Mandatory LOA

    • A mandatory LOA shall be granted upon the employee’s request, eligibility verification, and appropriate approval by the HA for the following reasons:

      • Adoption (up to 12 weeks).

      • To attend training or education covered under Veteran’s benefits.

      • Bone marrow donor (limited to five days in any one-year period for this purpose).

      • Pregnancy, childbirth, and recovery (up to four months).

      • To care for a newborn child (up to 12 weeks).

      • Military leave.

      • Organ donor (if the donor employee has exhausted all sick leave; this leave is limited to 30 days in any one-year period for this purpose).

      • While receiving permanent disability payments and obtaining re-training services after a work related injury.

    • All of the above provide a lesser amount of time off than GC, Section 19991.1 permits, and to the extent permitted by law, shall run concurrently with the discretionary one-year unpaid LOA permitted under GC, Section 19991.1.

  • Hiring Behind an Employee on LOA

    • If a manager/supervisor requests to fill behind an employee on an LOA, the position must be filled on a limited-term basis. The Classification and Pay (C&P) Analyst/RHRFL shall work with the manager/supervisor to fill the position.

    • In instances where the LOA is for a short duration (i.e., 60 days or less), the department head or designee may consider utilizing an Out-of-Class (OOC) assignment.

  • Employee Responsibilities

    • It is the employee’s responsibility to submit a Request for Leave of Absence form to the respective manager/supervisor within a reasonable amount of time before the effective date of the LOA, when practical.

    • The request must contain the following information:

      • Beginning and end dates of the LOA, not to exceed one year (any change to the length of the LOA must be approved by the program Deputy Director, RHCE, CEO, or authorized designee).

      • The specific reason for the LOA (e.g., medical or parental).

      • Pertinent documentation supporting the LOA request.

  • Manager/Supervisor Responsibilities

    • When an employee requests an LOA, the manager/supervisor shall:

      • Verify the employee’s eligibility.

        • For HQ/Regional Office staff, contact the PS.

        • For institution staff, contact the RHRFL.

      • Provide a recommendation for approval or denial of the LOA.

      • Forward the request package through the chain of command to the program Deputy Director, RHCE, CEO, or authorized designee.

      • Notify the employee in writing when the LOA has been approved or denied.

      • Notify assigned C&P Analyst:

        • That the employee has been granted an LOA, and provide the commencement/return dates so that the program’s organizational chart may be updated.

        • If the program will be hiring behind the employee while on LOA.

    • Sixty days prior to the expiration date of the LOA, the manager/supervisor shall:

      • Contact the employee to verify the return date and obtain any necessary documentation (e.g., licensing, credentials, tuberculosis test clearance, and medical release).

      • Coordinate any training needs upon the employee’s return.

  • PS/Regional C&P Analyst/RHRFL Responsibilities

    • At HQ/Regional Offices:

      • The PS shall work with the employee, manager/supervisor, HR Transactions Manager, and/or designee, to assist in obtaining information and documents for the LOA.  The PS shall address HQ employee’s concerns, and the Regional C&P Analyst shall address Regional Office employee’s concerns.

    • At Institutions:

      • The RHRFL shall act as the liaison for the employee, manager/supervisor, Institution Personnel Officer (IPO), and/or designee to assist in obtaining information and documents for the LOA.  The RHRFL shall work with the IPO and/or designee to address the employee’s concerns.

  • HQ and Regional C&P Analyst/RHRFL Responsibilities

    • Upon an employee’s return from LOA, the HQ or Regional C&P Analyst, or RHRFL shall generate a Request for Personnel Action (RPA) to return the employee to a funded position.

  • Extensions

    • Pursuant to GC, Section 19991.1, any extension of an LOA may be granted by the HA or designee.  Extensions beyond the original LOA may be requested by the employee using the Request for Leave of Absence form with additional substantiating documentation.

    • Consistent with the aforementioned provisions, requests for LOA extensions which exceed the one year limitation may only be considered with sufficient written substantiation and must be approved as follows:

      • For HQ Employees:  By the program Deputy Director, after receiving a recommendation from the HR Transactions Manager and Disability Management Unit (DMU) if applicable.

      • For Regional Office Employees:  By the program Manager/RHCE, after receiving a recommendation from the Regional Personnel Administrator and DMU if applicable.

      • For Institution Employees:  By the CEO, after receiving a recommendation from the Regional Personnel Administrator and DMU if applicable.

        • NOTE:  In all cases, an extension must be requested 30 days prior to the expiration of the original LOA.

  • LOA Denial

    • Per GC, Section 19991.1, discretionary LOAs are permissive and not an absolute right.  However, many MOUs state LOAs shall not be unreasonably denied.  The specific MOU that applies in any given situation shall be consulted when an employee requests an LOA.

  • Termination of an LOA

    • Pursuant to MOUs and CCR, Title 2, Section 599.782, an LOA may be terminated:

    • Upon the expiration of the approved LOA.

    • By the Department, prior to the expiration date, with written notice (see applicable MOU to determine the required notification).

    • By the employee, prior to the expiration date with the approval of the HA or designee.

  • LOA Request Process

    • The procedure for processing a request for an LOA and the responsibilities of all individuals/units involved are as follows:

    • Employee

      • Contact assigned PS at HQ, Regional C&P Analyst at Regional Offices, or RHRFL at institutions to review alternatives to LOA, impact to State service and pay, and continued health premium payments prior to requesting an LOA.

      • Consult with the PS at HQ, PS at Regional Offices, or RHRFL at institutions regarding any necessary attendance records and paycheck release arrangements while on an LOA.

      • Complete and submit a Request for Leave of Absence form along with any supporting documentation to respective manager/supervisor.  The request must include the beginning and ending dates of the LOA (for a period not to exceed one year).

      • If approved, consult with the PS at HQ, PS at Regional Offices, or RHRFL at institutions regarding any necessary attendance records and paycheck release arrangements while on an LOA.

      • Contact immediate manager/supervisor 30 days prior to expiration of an LOA regarding return date.

      • Contact Benefits Unit at HQ, the PS at Regional Offices, or the RHRFL at institutions 30 days prior to expiration of LOA to discuss reinstatement of benefits (if applicable).

      • If an extension is needed, contact manager/supervisor 30-days prior to the end of an LOA, and complete and submit a new Request for Leave of Absence form with supporting documentation.

    • Manager/Supervisor

      • Review applicable MOU to ensure compliance with eligibility and limitations.

      • Consult with appropriate personnel representative regarding LOA eligibility questions:

        • HQ/Regional Offices:  Contact the Transactions Manager/Regional C&P Analyst.

        • Institutions:  Contact the RHRFL

      • Consult with appropriate personnel representative to discuss coverage options and/or initiate recruitment behind the employee:

        • HQ/Regional Offices: Contact the C&P Analyst/Regional C&P Analyst.

        • Institutions:  Contact the RHRFL

      • Submit for processing the LOA request:

        • HQ:  Forward the request package to the PS for personnel and payroll processing and forward a copy to the HR Transactions Manager for tracking purposes.  Forward the LOA request package, along with a recommendation to approve/deny, through the chain of command to the program Deputy Director/CEO, or designee.

        • Regional Offices:  Forward the request to the Regional C&P Analyst who will retain a copy and prepare a recommendation to approve/deny, and route through the chain of command to the program Deputy Director/RHCE, or designee for approval.

        • Institutions:  Forward the request to the RHRFL who shall retain a copy and prepare a recommendation to approve/deny, and route through the chain of command to the CEO, or designee for approval.

    • Program Deputy Director/RHCE, CEO, or Designee

      • Approve/deny the recommendation and document decision on the Request for Leave of Absence form.

      • For HQ, the program Deputy Director shall consult with HR Transactions Manager or designee to assist with the decision process.

      • For Regional Offices, the program Deputy Director/RHCE shall consult with the Regional Personnel Administrator to assist with the decision process.

      • For institutions, the CEO shall consult with the Regional Personnel Administrator to assist with the decision process.

      • Once approved/denied, return request package to the employee’s manager/supervisor.

    • Manager/Supervisor

      • Notify and provide the employee a copy of the Request for Leave of Absence form with the documented decision.  If approved:

        • HQ:  Forward the request package to the PS for personnel and payroll transaction processing, and notify the Benefit Services.

        • Regional Offices:  Forward the request package to the Regional C&P Analyst, who shall retain a copy and forward to the PS for personnel and payroll transaction and benefit processing.

        • Institutions:  Forward the request to the RHRFL who shall retain a copy and forward the original to the IPO or designee for processing.

      • If denied, the manager/supervisor must provide a written response to the employee and retain a copy in the employee’s supervisory file and forward a copy as follows:

        • HQ:  Forward a copy to the PS.

        • Regional Offices:  Forward a copy to the Regional C&P Analyst.

        • Institutions:  Forward a copy to the RHRFL.

    • RHRFL

      • Once the RHRFL receives the final LOA approval, the RHRFL shall:

      • Forward request to the IPO or designee for processing.

      • Email the Position Control Analyst to flag the employee’s position number and indicate “LOA” (include length of time, if known) on the position master roster.

      • Forward a copy of the LOA to the Regional C&P Analyst and Regional HR Manager.

      • Notify appropriate DMU representative of the approved LOA when related to pregnancy or for medical issues.

      • Ensure all Master Position, Vacancy, and Recruitment reports are updated to reflect the approved LOA information.

    • HQ C&P Analyst

      • Consult with the employee’s manager/ supervisor to ensure adequate coverage while the employee is on an LOA.  If coverage is needed, the types of coverage may be contingent upon the length of the LOA.

      • Prepare appropriate documentation [e.g., OOC, Receiver’s Freeze Exemption Request (RFER), and RPA].

      • Prior to the employee’s return, the C&P Analyst will generate the RPA to return the employee to their position number, if necessary.

    • Regional C&P Analyst

      • Email the Position Control Analyst to flag the employee’s position number and indicate “LOA” (include length of time, if known) on the position master roster.

      • Forward a copy of the LOA to the PS and HR Transactions Manager for processing.

      • Notify appropriate DMU representative of the approved LOA when related to pregnancy or for medical issues.

      • Ensure all Master Position, Vacancy, and Recruitment reports are updated to reflect the approved LOA information and initiate recruitment efforts.

      • Consult with the employee’s manager/ supervisor to ensure adequate coverage while the employee is on an LOA.  If coverage is needed, the types of coverage may be contingent upon the length of the LOA.

      • Prepare appropriate documentation (e.g., OOC, RFER, and RPA) and initiate recruitment efforts.

      • Prior to the employee’s return, generate the RPA to return the employee to their position number, if necessary.

    • PS

      • Review applicable MOU or other laws and regulations to ensure compliance with eligibility and limitations.

      • Complete the appropriate transaction to update employee’s employment history to reflect the LOA.

      • Email the Position Control/C&P Analyst and personnel liaisons when applicable, to inform of the employee’s effective date of LOA to update reports, documents, or data systems in accordance with local office procedures.

      • Inform the Benefit Services Analyst to notify employee of the options to continue medical/dental benefits, if necessary.

        • NOTE: In Regional offices, the PS notifies the employee of the option to continue medical/dental benefits, if necessary.

      • Create a standardized memorandum reminding manager/supervisor 60 days prior to expiration date.

      • Create a standardized memorandum reminding HQ C&P Analyst/RHRFL 30 days prior to expiration date.

      • Upon the employee’s return, process the appropriate documentation to update employment history to return the employee to active status.

    • HQ Benefits Analyst/ Regional Office PS/Institution PS

      • Provide employee on unpaid LOA with Direct Payment Authorization (PERS-HBD-21) form for health care premium information.

      • Provide Family Medical Leave Act (FMLA)/California Family Rights Act health care coverage information when leave is related to FMLA qualifying events.

    • Selection Services Analyst

      • Employees returning from Military Leave are afforded certain rights to retain placement on employment eligibility lists.

      • The Selection Services Analyst is responsible for providing those services detailed in the Military Leave Handbook.

  • References

    • Code of Federal Regulations, Title 29, Subtitle B, Chapter V, Subchapter C, Part 825, Subpart A, Section 825.100, Family Medical Leave Act

    • California Government Code, Sections 12945.2, 18522, 19143, 19253.5, 19585, 19858.3 – 19858.7, 19878 – 19885, 19889.3, 19991.1  19991.13

    • California Code of Regulations, Title 2, Sections 599.752 – 599.753, 599.776, 599.781 – 599.782, and 599.785

    • California Unemployment Insurance Code, Sections 2781 – 2783

    • Military Leave Handbook https://www.calhr.ca.gov/employees/Pages/military-leave.aspx

    • Memorandums of Understanding

  • Revision History

    • Effective: 02/2016

5.2.7 Duty Statements and Organizational Charts

  • Policy

    • California Correctional Health Care Services (CCHCS) shall comply with California Department of Human Resources’ (CalHR) requirements for preparing duty statements and organizational charts as applicable.

  • Purpose

    • To provide the duty statement and organizational chart requirements within CCHCS, inform CCHCS staff of CalHR’s requirements, and ensure compliance with Government Code Sections 1292612926.1 and 12940.

  • Applicability

    • This policy sets forth the requirements for Human Resources (HR) offices located at headquarters (HQ) and regions (for regional offices and institutions) to develop duty statements and organizational charts as required in retaining delegated authority for position allocation.  CalHR requires all departments to submit a complete set of organizational charts annually and prior to any major reorganization pursuant to Personnel Management Liaison Memorandum 2007-026. In compliance with the current Delegation Agreement with CalHR, HR shall submit a complete set of organizational charts for CCHCS by January 1 of each calendar year.

  • Procedure

    • Duty Statement

      • HR and the program shall coordinate the development and modification of duty statements.  A duty statement is a written description of the job responsibilities assigned to a specific position.  Job responsibilities are based on the approved State Personnel Board classification specifications and allocation guidelines (if guidelines exist for the classification).  The duty statement shall include the following:

        • A complete and detailed information header (e.g., program name, position number, unit, classification, working title, and assigned location).

        • A standardized statement summarizing CCHCS’ commitment to building and maintaining a culturally diverse workplace and working as a team.

        • A primary domain (Information Technology classifications only).

        • A general statement describing the program/division and/or position overview.

        • A detailed account of essential functions required to perform in the position. 

        • The knowledge, skills, and abilities; desirable qualifications, special requirements, or continuing education requirements, etc. found in the classification specification, if applicable.

        • A detailed description of the work conditions and environment.

        • A location for the employee’s and supervisor’s signature and date on the duty statement.

      • Every employee shall review and sign a duty statement prior to or upon hire.  Managers/supervisors shall review the duty statement with each employee, obtain the employee’s signature, and sign the duty statement to verify that the duties have been discussed with the employee. 

      • The original signed duty statement shall be placed in the employee’s Official Personnel File (OPF) and a copy placed in the employee’s supervisory file for reference as needed for periodic review with the employee.  The employee may also retain a copy. 

      • Duty statements shall be reviewed and/or updated any time a vacancy occurs or as duties change, whether resulting from a reclassification or organizational restructuring.  Any revisions to a duty statement shall require HR’s review and approval. Upon approval, the employee and the manager/supervisor shall sign the revised duty statement, submit a signed copy (wet or electronic) to HR for placement in the employee’s OPF, and retain a copy in the supervisory file.

    • Standardized Duty Statements

      • In collaboration with HQ programs, HQ Classification and Pay (C&P), regional management, and institution Subject Matter Experts (SME), HR develops standardized duty statements for selected classifications. Standardized duty statements are duty statements written for positions within the same classification that are assigned the same function and general duties regardless of the location of the assignment.

      • Standardized duty statements shall be used for selected classifications. 

      • The standardized duty statements replace all existing duty statements in the selected classifications.  Standardized duty statements shall be used for processing appointments in these classifications. 

      • Any proposed change to a standardized duty statement, establishment of new assignments within the selected classifications, or development of standardized duty statement for a newly selected classification shall be approved by the Deputy Director (DD), HR, CCHCS, following HR’s established process for requesting personnel actions.

      • In the event a new program is established that authorizes positions with standardized duty statements, a review shall be conducted by the appropriate HR office to determine if standardized duty statements shall be developed and a recommendation provided to the DD, HR, for consideration.  In all instances (i.e., proposed change, new assignment within the classification, or new program), revision or development of duty statements shall be coordinated by the appropriate HR office in collaboration with the appropriate HQ program, HQ C&P, regional management, and SME(s).

    • Human Resources Responsibilities

      • The DD, HR, CCHCS has overall responsibility for the implementation and oversight of this policy. HQ and Regional C&P Analysts and Field Liaisons shall be responsible for:

      • Disseminating approved duty statements to the appropriate program, regional office, or institution.

      • Coordinating distribution of duty statements to the appropriate manager/supervisor.

      • Collecting duty statements signed by both employee and manager/supervisor.

      • Ensuring a signed copy is forwarded to the HQ HR, Regional HR, and Institution Personnel Office for filing in the OPF.

      • Tracking the receipt of signed duty statements for all affected employees.

    • Organizational Charts

      • Each unit, program, section, and branch within CCHCS shall have an official, current organizational chart.  The purpose of an organizational chart is to reflect the management structure and reporting relationships of subordinate staff.

      • Organizational structures shall be developed in accordance with classification specifications and allocation guidelines. 

      • Organizational charts shall serve as a point-in-time reflection of vacancies, temporary positions, approved exceptional allocations, Training and Development assignments, Out-of-Class assignments, and pending hires; organizational charts shall be updated for each request for personnel action that is processed.

      • HQ C&P and Regional HR offices maintain the official organizational charts.  Programs may maintain their own working charts; however, any formal changes to the organizational structure shall first be approved by the DD, HR, CCHCS.

      • On an annual basis, the Receiver and Undersecretary, Health Care Services, and each Director, DD, Assistant DD, Regional Health Care Executive, and Chief Executive Officer shall review their organizational chart and certify the accuracy of their organizational structure by signing the organizational chart.  This process shall be coordinated by HQ HR and conducted in October each calendar year.

  • References

  • Revision History

    • Effective: 10/2016
      Revised: 07/2022

5.2.8 Bilingual Services

  • Policy

    • California Correctional Health Care Services (CCHCS) shall ensure that the public, including those who are non-English speaking or limited-English proficient, is provided equal access to the available services and information of CCHCS pursuant to the provisions of the Dymally-Alatorre Bilingual Services Act (DABSA).

  • Purpose

    • To maintain a process that CCHCS shall follow to comply with the DABSA to ensure equal access to available services and information.

  • Responsibility

    • All CCHCS employees are responsible for ensuring that the public is treated with dignity and respect, identifying the language needs, and utilizing available bilingual resources to assist non-English speaking/limited-English proficient members of the public, when needed.

  • Procedure

    • Bilingual Language Survey

      • CCHCS is mandated to conduct a biennial Bilingual Language Survey and report their results to the California Department of Human Resources (CalHR) by October 1 of every even-numbered year. CCHCS Disability Management and Support Services (DMSS), shall conduct the mandatory biennial Bilingual Language Survey at a specified physical address and geographic location for testing every even-numbered year during any ten days identified by CDCR.

      • The CCHCS Bilingual Testing Coordinator (BTC) shall assume the duties of the Language Survey Coordinator and coordinate the Language Survey process.

      • The Assistant Deputy Directors, Regional Personnel Administrator, or designee shall assign the staff to perform the duties of the Language Survey Liaison and coordinate the Language Survey process within their respective institutions/programs.

      • The Language Survey Coordinator shall:

        • Obtain current survey instructions through CalHR.

        • Coordinate with the CalHR Bilingual Services Program to ensure the survey is conducted in accordance with the instructions issued.

        • Coordinate the biennial Bilingual Language Survey.

        • Conduct training for the Language Survey Liaisons.

        • Conduct monitoring and respond to questions regarding the Language Survey process.

        • Receive all completed survey information, review for accuracy, make corrections, and compile summary data for all units/institutions.

        • Submit the results of the Bilingual Language Survey to CalHR by October 1 of every even-numbered year.

      • The purpose of the Bilingual Language Survey is to determine:

        • The number of:

          • Public contact employees at each location.

          • Certified bilingual employees in direct public contact at each location and the languages they speak, other than English.

          • Additional qualified bilingual public contact employees needed to reach compliance as determined by CalHR.

          • Anticipated vacancies in direct public contact positions.

        • The number and percentage of non-English speaking members of the public served by each location, by native language.

        • The use of alternative options for interpretation services.

        • All required translated materials that have been translated and the language into which they were translated.

        • A list of all translated materials that are required to be accessible to non-English speaking/limited-English proficient members of the public.

    • Implementation Plan

      • The Implementation Plan is the plan of action of a state agency regarding their bilingual programs, and the progress made in correcting any deficiencies found in the language survey.

      • By October 1 of every odd calendar numbered year, the BTC shall submit a bilingual language implementation plan to CalHR.

      • The implementation plan shall:

        • Gather information related to the services provided to non-English speaking/limited-English proficient members of the public.

        • Address deficiencies in bilingual staffing and/or translated written materials identified in the language survey.

    • Performance and Service Standards

      • CCHCS shall achieve effective communication with non-English speaking/limited-English proficient members of the public by providing bilingual interpreters, translated written materials, and bilingual services.

      • Bilingual Interpreters

        • For each non-English speaking group that represents a minimum of five percent of the public served by a CCHCS office, that office shall employ an appropriate number of certified bilingual employees or arrange for suitable alternatives as permitted by the DABSA.

        • To be certified bilingual, a state employee must have passed an oral or written fluency examination in a non-English language and been certified in that language for the purpose of verbal or written communication.

      • Translated Written Materials

        • The CDCR Office of Personnel Services, Quality Management, shall maintain a list of materials that have been translated, and the languages into which they have been translated, and shall distribute all translated materials to offices statewide so that they are available to the public upon request.

        • Where appropriate, each CCHCS office shall make available translated materials that:

          • Solicit or require the furnishing of information from an individual.

          • Provide the individual with information.

          • Describe information that may affect the individual’s rights, duties, or privileges.

      • Bilingual Services

        • The CCHCS contracts with telephonic or other interpreter services to ensure it has qualified bilingual interpreters for languages which it does not employ certified bilingual staff.

        • All interpreters utilized by CCHCS shall be qualified and certified to perform the services requested for the language(s) in which they are proficient.

        • The BTC shall maintain instructions for utilizing the Language People Interpreting and Translating Service (telephone interpreter) to provide effective telephonic communication between staff and non-English speaking/limited-English proficient members of the public when a CCHCS bilingual interpreter is not available to provide effective face-to-face communication in their native language.

      • Public Contact Employees shall:

        • Participate in the biennial Bilingual Language Survey and be informed on how to conduct a meaningful language survey.

        • Provide effective telephone and face-to-face communication between staff and non-English speaking/limited-English proficient members of the public.

        • Receive access to guidelines for providing services to non-English speaking/limited-English proficient members of the public.

        • Identify non-English speaking/limited-English proficient people as early as possible during the initial contact.

        • Contact a qualified interpreter as soon as possible to ensure that no significant delay in service takes place.

        • Ensure that translated documents, translation guides and ads are available at all offices that serve non-English speaking/Limited-English proficient members of the public. Where translated documents are not available, a qualified interpreter shall be provided to explain the information in question.

    • Questions or Assistance

      • CCHCS employees who require assistance with non-English speaking/limited-English proficient members of the public can seek the assistance from any CCHCS certified bilingual employee.  Additionally, public contacts or telephone calls with non-English speaking/limited-English proficient members of the public can be handled through telephonic language interpreters.

    • Complaints

      • Complaints about interpreter/translation services are to be filed by utilizing the Language Access Complaint Form.

      • The completed form may be submitted to CCHCS_EEO@cdcr.ca.gov.

  • References

    • Dymally-Alatorre Bilingual Services Act, California Government Code, Title 1, Division 7, Chapter 17.5, Sections 7290-7299.8

    • California Department of Human Resources, Bilingual Services Program

  • Revision History

    • Effective: 04/2017
      Revised: 02/2022

5.2.9 Exit Survey and Exit Interview

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services, California Department of Corrections and Rehabilitation (CDCR) shall provide permanent and limited-term employees who are voluntarily separating from CCHCS/CDCR (e.g., transfer to another state agency, resignation, retirement) or laterally transferring to a different CDCR facility or CCHCS program, the opportunity to participate in the CCHCS Exit Survey and Exit Interview (ESEI) process. 

    • The ESEI process is voluntary. Employees are not required to participate in any aspect of the process, but are encouraged to do so. Employees may choose to only complete the online Exit Survey or only participate in an Exit Interview.  Participation in one aspect of the process does not mandate participation in the other.

  • Overview

    • Employee turnover can be one of the greatest financial costs to an organization in addition to the operational costs, as remaining staff are impacted with increased workload and the potential loss of valuable knowledge. The benefits of determining the cause(s) of employee turnover and increasing employee retention are evident on both a strategic and practical level.

    • The ESEI shall provide CCHCS information on those factors that most commonly predict attrition and retention (i.e., the work environment, organizational culture, applicability of processes and systems, and quality of management). The ESEI process is generally seen by existing employees as a sign of a positive organizational culture. The process is designed to discover the causes behind employees’ separating or transferring, share the information with executive leadership and ultimately result in improvement to the organization.

    • The ESEI process shall provide the separating or transferring employee an opportunity to:

      • Provide feedback;

      • Leave the organization, CDCR facility or CCHCS program feeling valued; and

      • Potentially create a path for return in the future.

    • The ESEI process offers both a quantitative process, one of data points and anonymity and a qualitative process, one of communication and engagement. Together, they are designed to target the way individuals choose to convey information. The ESEI process is designed to create a multi-targeted assessment of the underlying causes of employee turnover. As such, all employees who engage in the Exit Interview are encouraged to complete the online Exit Survey so that all necessary data points can be captured.

  • Purpose

    • The data from the ESEI process, combined with other human resources metrics (e.g., vacancy rates, length of vacancies, employee movement within CCHCS), will provide executive leadership with an understanding of employment trends and employee needs so that CCHCS can create mechanisms to improve recruitment and retention strategies aimed at addressing employee issues.

  • Procedure

    • In order to ensure all employees are given the opportunity to participate in the ESEI process, upon notification of an employee voluntarily separating or laterally transferring, the employee’s manager/supervisor, designee, or assigned Personnel Liaison shall initiate the ESEI process no later than two weeks before the employee’s last day of physical work.

    • The employee’s manager/supervisor shall access the CCHCS Service Portal via the Lifeline intranet page, then click on the Employee Separation tab under Human Resources to report the details of the employee separation or transfer to initiate the ESEI process. The CCHCS Service Portal shall auto-generate an email notification of the employee’s separation to the Workforce Development and Talent Management (WD&TM) Section via the ESEI inbox at CCHCSExitSurvey@cdcr.ca.gov.

    • Exit/Transfer Survey

      • The WD&TM Section shall send an email to the separating or transferring employee upon receipt of the CCHCS Service Portal notification. The email shall contain a link to either an Exit Survey or a Transfer Survey, depending on the separation type and an option for the employee to express their interest in participating in an Exit Interview by responding to the email.

      • Employees shall have access to the electronic Exit or Transfer Survey during their last two weeks at work.

      • Employees shall be allowed sufficient state time and use of a state computer to complete the survey prior to their last day of work.

    • Exit Interview

      • Difficult to Recruit Classifications

        • Upon receipt of a separation notification for those classifications deemed difficult to recruit, the assigned WD&TM Section Manager shall automatically schedule an Exit Interview, although participation remains voluntary.

        • Difficult to recruit classifications include:

          • Nurse Practitioner

          • Physician Assistant

          • Physician and Surgeon

          • Staff Psychiatrist

          • Psychiatric Nurse Practitioner

      • Employee Requested

        • The Exit Interview shall be conducted by the assigned WD&TM Section analyst/manager during the last week of employment and should take approximately 30 minutes to conduct. The employee’s direct supervisor shall not attend.

        • The Exit Interview shall be scheduled at a mutually convenient time for the separating or transferring employee and the WD&TM Section analyst/manager.

        • If an employee declines an Exit Interview but communicates verbally or in writing the reasons for the decision to separate or transfer directly to their supervisor/manager, the supervisor/manager shall document this information in an email and send to CCHCSExitSurvey@cdcr.ca.gov. If the information was relayed in a written format, the written document from the separating or transferring employee shall also be sent directly to CCHCSExitSurvey@cdcr.ca.gov.

    • Reporting

      • The WD&TM Section provides a quarterly Exit Survey Interview report for Human Resources leadership and executives to review outcomes and reported trends. Any potential legal issues or concerns identified shall be addressed via a separate formal reporting method, which includes the sharing of high-level results of the ESEI process with Directors/Deputy Directors when a concern has been identified. Reported concerns will not be associated with individual survey data, and all anonymity shall be protected.

  • Revision History

    • Effective: 05/2017
      Revised: 08/2021

5.2.10 Merit Issue Complaints

  • Policy

    • Appointments and promotions shall be made on the basis of merit and fitness within state civil service.  California Correctional Health Care Services (CCHCS) shall comply with California laws and rules governing civil service appointments.  All Merit Issue Complaints filed with CCHCS shall be immediately reviewed, investigated, and resolved at the lowest possible level.

  • Purpose

    • To describe the process for filing and responding to Merit Issue Complaints within CCHCS.

  • Procedure

    • Types of Merit Issue Complaints

      • Merit Issue Complaints may be filed for reasons including, but not limited to, the following:

      • Interference with promotional opportunities.

      • Disputes regarding the effective dates of appointments or promotions.

      • Applicability of alternate salary ranges.

      • Denial of Merit Salary Adjustments

      • Interference with a person’s access to any State Personnel Board appeals process

      • The designation of managerial positions pursuant to California Government Code Chapter 10.3. State Employer-Employee Relations, Section 3513.

      • An employee who believes they have been discriminated against within the state civil service because of political affiliation or opinion.

    • Filing a Merit Issue Complaint

      • CCHCS employees shall file their Merit Issue Complaint in writing with the respective personnel office (either regional or within headquarters [HQ], Human Resources [HR]) within three years of the alleged violation of State Personnel Board’s (SPB) regulation or policy in the hiring and selection process.  The personnel office shall be contacted regarding the time for filing a Merit Issue Complaint and the department’s levels of review.  No particular form is required; however, the SPB Appeals/Complaint Form may be used.

      • The employee filing the complaint shall provide enough factual information, detail and any substantiating documentation for CCHCS to ascertain the nature of the complaint.

      • All Merit Issue Complaints shall be submitted to the attention of the Deputy Director (DD), HR.

    • Responding to a Merit Issue Complaint

      • CCHCS HR shall respond within 90 calendar days of the date of receipt of the Merit Issue Complaint. The personnel office shall inform employees or applicants, by certified or regular mail and by email (with read receipt), at the time the complaint is received, of their right to challenge the department’s denial of the complaint or failure to respond by filing a complaint with the SPB Appeals Division and the timeframe for filing. The following outlines the procedures for responding to a Merit Issue Complaint:

      • HR shall inform the employees or applicants at the time the complaint is received.

      • HR shall obtain and review all relevant documents (e.g., job advertisements; screening criteria forms; state applications; information regarding members of the interview panel; interview questions, notes, and scores; hiring documents) and contact the relevant program for additional information if needed.

      • Based on their review of all relevant documents, HR shall draft a proposed response to the complaint. 

      • The DD, HR, or designee shall review and forward the signed response to the complainant by certified or regular mail and email (with read receipt).

    • Appealing a Merit Issue Complaint

      • An employee may appeal to the SPB Appeals Division within 30 calendar days after:

        • CCHCS’ written response denying the complaint.

        • CCHCS’ failure to respond to the employee’s written complaint within 90 calendar days.

      • Additional information regarding filing an appeal with the SPB’s Appeals Division may be accessed at: http://www.spb.ca.gov/appeals/appeals_procedures.aspx.

  • References

    • California Government Code, Title 2, Division 5, Part 2, Chapter 2, Article 2, Sections 18670 – 18683

    • California Code of Regulations, Title 2, Division 1, Chapter 1, Subchapter 1.2, Article 1, Sections 51.1 – 52.10,

    • California Code of Regulations, Title 2, Division 1, Chapter 1, Subchapter 1.2, Article 9, Section 66.1

    • California Code of Regulations, Title 2, Division 1, Chapter 1, Subchapter 2, Article 6, Section 548.61

    • State Personnel Board Appeals Resources Guide http://spb.ca.gov/content/appeals/Appeals_Resource_Guide.pdf

  • Revision History

    • Effective: 09/2017
      Revised: 07/2022

5.2.11 Institutional Worker Supervision Pay

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services, California Department of Corrections and Rehabilitation (CDCR) shall uniformly and consistently apply the Institutional Worker Supervision Pay (IWSP) Differential program, as set forth in the CalHR Pay Differential 67 Institutional Worker Supervision Pay (IWSP) Differential.  Institutional worker supervision shall include “active supervision of the conduct and work” including, but not limited to, on-the-job training and work performance evaluations of at least two incarcerated workers who substantially replace civil service employees for a total of 173 or 120 hours per pay period.

  • Eligibility Criteria

    • Designated rank and file employees in the Bargaining Units (BU) listed below and the excluded classifications aligned with those BUs are eligible to receive the IWSP Differential if they meet any of the following criteria:

    • Bargaining Unit Criteria

      • BU R01, R19, S01, and S19 only:  Employees must have regular, direct responsibility for work supervision, on-the-job training, and work performance evaluation of at least two incarcerated workers who substantially replace civil service employees for a total of at least 173 hours per pay period.

      • BU R04, R15, S04, S15, and S17 only:  Effective April 1, 2017, employees must have regular, direct responsibility for work supervision, on-the-job training, and work performance evaluation of at least two incarcerated workers who substantially replace civil service employees for a total of at least 120 hours per pay period.

        • The pay differential shall only be included in overtime calculations for Fair Labor Standards Act eligible classes.

        • The pay differential shall not be included to calculate Nonindustrial Disability Insurance or lump-sum vacation, sick leave, and excess hours due to fluctuating work schedules.

      • This pay differential may also apply to employees having direct supervisory responsibility over incumbents who meet the conditions stated in Sections (b)(1)(A) and (B) above.

      • Employees in all BUs listed above shall have a valid and approved STD. 610, Health Questionnaire (With Physician’s Report), on file in accordance with the Personnel Management Policy Procedures Manual, Section 375 (Medical Clearance).

    • Movement to Another Classification

      • Upon movement to another classification in State service, whether through promotion or transfer, employees receiving IWSP shall move from their IWSP combined salary rate (base salary plus IWSP) to compute the appointment rate.

  • Institutional Worker Supervision Procedures

    • Initial Institutional Worker Supervision Pay Request

      • The initial IWSP Differential request and supporting documentation must be submitted to the appropriate Regional Human Resources Field Liaison (RHRFL) by the supervisor of the employee requesting IWSP Differential.  The request consists of the following documents and is maintained in the employee’s Official Personnel File (OPF) under the pay history section:

      • Approved STD. 610 (placed in a sealed envelope at the back of the OPF).

      • Employee Duty Statement reflecting direct incarcerated worker supervision.

      • Employee organizational chart reflecting the incarcerated worker supervision.

      • CCHCS Supervisor’s Certification of Eligibility for Pay Differential form

      • Inmate Job Description.

    • Roles and Responsibilities

      • Once an employee has met all criteria and the Regional Human Resources (HR) Manager has approved the IWSP Differential, the following obligations apply: 

      • Each employee participating in the IWSP Differential program shall:

        • Be aware of IWSP Differential program requirements.

        • Maintain current and updated Inmate Job Descriptions.

        • Provide incarcerated workers on-the-job training.

        • Notify the appropriate custody staff when an incarcerated worker does not appear for work.

        • Review and sign incarcerated worker timesheets.

        • Ensure that all required monthly documentation is completed.

        • Notify his/her supervisor/Institutional Personnel Office when no longer eligible for IWSP Differential (Refer to Section (b) Eligibility Criteria).

        • Maintain incarcerated worker work performance evaluations.

        • Retain copies of all documentation pursuant to CDCR Department Operations Manual (DOM), Section 13030.32, Retention and Destruction of Personnel Information.

      • Each manager/supervisor shall:

        • Become familiar with IWSP Differential program requirements.

        • Review the Inmate Job Description to ensure it includes duties and responsibilities which substantially replace the duties and responsibilities of a civil service employee.

        • Review the CDCR 998-A, Employee’s Record of Attendance.

        • Review the CDCR 1697, Inmate Work Supervisor’s Time Log, to ensure the employee meets the criteria.

        • Complete a Monthly IWSP Certification form for employees each pay period.  The Monthly IWSP Certification form is available at the Institutional Personnel Office.

        • Submit the completed Monthly IWSP Certification form with the employee’s CDCR 998-A and CDCR 1697 to the Institutional Personnel Office by the third work day of the following pay period.

        • Immediately notify the RHRFL and Institutional Personnel Officer (IPO) using the Monthly IWSP Certification form when the employee is no longer eligible for IWSP Differential.

      • BU 15 Food Administrators shall certify that Food Service Operations staff meet IWSP Differential criteria by using the Monthly IWSP Certification form and attaching an STD. 671, Miscellaneous Payroll/Leave Actions form listing all eligible employees.

      • It is the responsibility of the IPO or designee to:

        • Review the employee’s CDCR 998-A, Monthly IWSP Certification form, and CDCR 1697(s) to confirm eligibility requirements have been met.  Upon verification, sign the Monthly IWSP Certification form.

        • Notify the employee in writing by the fifth work day of each month if he/she is no longer eligible to receive IWSP Differential.

        • Notify the employee when an IWSP Differential overpayment has occurred and shall be collected in accordance with the appropriate BU Memorandum of Understanding and California Government Code, Section 19838.

      • The RHRFL shall:

        • Verify the employee has met initial eligibility requirements to receive IWSP Differential. 

        • Provide the IWSP Differential pay request documentation approved by the Regional HR Manager to the Institutional Personnel Office.

        • Retain copies of the request and all supporting documentation pursuant to CDCR DOM, Section 13030.32, Retention and Destruction of Personnel Information.

  • Institutional Worker Supervision Pay Audits

    • Quarterly Regional Audits

      • The Regional Human Resources Office (RHRO) shall:

        • Conduct quarterly internal IWSP program audits.

        • Document findings of non-compliance and coordinate with Institutional Personnel Office staff to ensure any IWSP salary overpayments identified as part of the audit are established and collected.

        • Maintain a Quarterly IWSP Audit Log in the RHRO for a period of three years.

    • Annual Audits

      • CDCR HR may conduct an annual audit of the IWSP Program.

    • Audit Results

      • CCHCS RHRO shall:

      • Request the audit results from the RHRFL for health care employees to track and confirm compliance with policy.

      • Work with Institutional Personnel Office staff to ensure any IWSP salary overpayments identified as part of the audit are established and collected.

      • Document findings of non-compliance and conduct on-the-job-training for staff on identified errors.

  • Links

  • References

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 2, Article 3, Section 19838

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 15, Information Practices, Section 13030.32, Retention and Destruction of Personnel Information

    • California Department of Corrections and Rehabilitation, Personnel Information Bulletin 2017-003, Annual Audit for Institutional Workers Supervision Pay

    • Department of Human Resources, Pay Differential 67 for Bargaining Units 1, 4, 15, 19, and Excluded Employees

    • Memorandums of Understanding 7.2.16 – 4.1.20 Agreements for Bargaining Units 1, 4, 15, and 19

    • Personnel Management Policy Procedures Manual, Section 375, Medical Clearances

  • Revision History

    • Effective: 10/2018
      Reviewed: 01/2020

5.2.12 Lapse in Certification

  • Policy

    • California Correctional Health Care Services (CCHCS) adheres to the rules and regulations adopted by the California State Personnel Board (SPB) and the California Department of Human Resources in the application and administration of special pay differentials (Pay Diff) and/or alternate range criteria (ARC).  Employees in designated health care classifications may be entitled to receive a special Pay Diff and/or a higher ARC placement for possessing a valid certification as described in their respective SPB Classification Specification, Pay Diff, or ARC.

    • Employees who do not maintain their certification are no longer entitled to receive the Pay Diff and/or ARC placement and shall be moved into the pay range which corresponds to their current certification status.

  • Purpose

    • To identify the actions required when an employee fails to maintain their certification, including the processes for either:

    • Removing a Pay Diff.

    • Adjusting ARC placement.

    • NOTE:This policy does not address expiration of any license/certification that is required as a condition of employment.  Refer to Administrative Policy 2.11, Expired License, Certification, or Registration Policy and Procedure for additional information.

  • Responsibility

    • The headquarters (HQ) Human Resources (HR) Classification and Pay (C&P) Non-Punitive Termination Analyst (NPTA) and Regional NPTA shall:

      • Monitor employee certification status and expiration dates, in coordination with the Credentials Verification Unit (CVU), which shall provide a monthly Certification Status Report to HQ HR Executives, Regional Personnel Administrators (RPA), and identified HQ/Regional personnel managers.

      • Coordinate removal of any Pay Diff or movement to a lower ARC placement with the applicable HQ/Regional Transactions Unit or Institution Personnel Office.

    • The NPTA’s Staff Services Manager I shall conduct monthly certification audits, and the RPA/Associate Director (AD), C&P/Transactions and Benefit Services (TBS), HQ HR or designee, shall conduct quarterly certification audits to ensure compliance with the expired certification process.

    • Employees shall provide their manager/supervisor, the CVU, and the appropriate C&P NPTA or Regional NPTA/Regional HR Field Liaison, with any correspondence from the respective certification authority that changes the status of their certification (e.g., denials, expirations, restrictions, revocations, or suspensions).

  • Procedure

    • Pay Differential Removal/Movement To Lower Alternate Range Criteria Placement Package

      • If an employee’s certification, for which they were receiving a Pay Diff or higher ARC placement, lapses for any reason, the NPTA shall prepare the appropriate Pay Diff removal package or movement to a lower ARC placement which shall contain the following documents:

      • Lapsed Certification Transmittal

      • Lapsed Certification Notice

      • Copy of employee’s most recent certification information

      • Personnel Information Management System history (with Social Security number redacted)

    • Lapsed Certification Notice To Recipients

      • The NPTA shall obtain the appropriate Chief Executive Officer (CEO)/AD, C&P/TBS, HQ HR’s signature and disseminate the Lapsed Certification Notice as follows:

      • Original to employee

      • Copies to:

        • CVU

        • Employee’s Official Personnel File

        • Employee’s manager/supervisor

        • Personnel Specialist (PS) via the HR Transactions Manager/Institutional Personnel Officer (IPO)

    • Pay Differential Removal And/Or Movement To A Lower Alternate Range Criteria Placement Package Recipients

      • The NPTA shall disseminate the Pay Diff removal package and/or movement to lower ARC placement package as follows:

      • CEO (institutions only)

      • RPA (institutions/regions only)

      • AD, C&P/TBS, HQ HR

      • PS via the HR Transactions Manager/IPO

    • Renewing Eligibility For Special Pay Differential And/Or Movement To Higher Alternate Range Criteria Placement

      • If an employee has provided acceptable proof of renewal of their certification, or if CCHCS has otherwise independently verified that the certification has been renewed, the NPTA shall:

        • Notify CVU staff via email to CredentialsVerificationUnit@cdcr.ca.gov of the renewal of certification.

        • Notify the employee’s manager/supervisor of the renewal of certification.

        • Forward a copy of the proof of renewal to the PS/HR Transactions Manager/IPO with direction to process the transaction to add the Pay Diff and/or movement to higher ARC placement. 

        • Update the Licensing/Certification Tracking Log to reflect the renewal of certification and new expiration date.

        • Review the employee’s employment history to confirm the renewal of certification information, Pay Diff and/or movement to the higher ARC placement is updated.

      • If the employee’s employment history is not updated within 30 calendar days from the date the proof of renewal of certification was provided to the PS/HR Transactions Manager/IPO, the NPTA shall elevate the item to the HR Transactions Manager/RPA/IPO for follow-up.

  • References

    • California State Controller’s Office Personnel Action Manual

    • California Department of Human Resources Classification Specifications (various)

    • Memoranda of Understanding (various)

  • Revision History

    • Effective: 03/2022

5.2.13 Expired License, Certification, or Registration

  • Policy

    • Employees in classifications that require licenses, specified certifications, or registrations as a condition of employment are required to maintain a current and active license, certification, or registration for continued employment. An employee who does not maintain the required license, certification, or registration as described in the applicable State Personnel Board Specification shall be subject to Non-Punitive Termination for failure to meet conditions of employment in accordance with California Government Code (GC) Section 19585. Such employees shall not be placed on an unpaid leave of absence, demoted, transferred, redirected to a non-patient care assignment, or be required to use leave credits. 

    • NOTE: Not all certifications expire. Only certifications with an expiration date are required to be current and active.

  • Purpose

    • The purpose of this policy is to outline the processes that shall be followed when an employee’s license, certification, or registration is due to expire, or when the employee fails to renew a required license, certification, or registration including, but not limited to:

    • Tracking license, certification, or registration expiration dates.

    • Sending courtesy reminders to affected employees.

    • Serving a Non-Punitive Termination.

    • Withdrawing a Non-Punitive Termination (if necessary).

  • Responsibility

    • Headquarters/Regional Human Resources

      • The headquarters and Regional Non-Punitive Termination Analysts are responsible for the following processes:

        • Tracking/monitoring employee license, certification, or registration expiration dates in coordination with the Credentials Verification Unit (CVU).

        • Ensuring employee licenses, certifications, or registrations are current and active.

        • Monitoring changes in an employee’s license, certification, or registration status affecting their ability to provide patient care.

        • Sending courtesy reminders to affected employees.

        • Serving Non-Punitive Termination notices.

        • Withdrawing a Non-Punitive Termination (if necessary).

        • Monitoring employee certification status and expiration dates, and conducting monthly audits with the assistance of Management Information Retrieval System reports which Position Control provides to Human Resources (HR) personnel staff and managers monthly.

      • The Staff Services Manager I who manages the Non-Punitive Termination Analyst (NPTA) is responsible for reviewing the monthly audits conducted by the NPTA.

      • Regional Personnel Administrators and the Associate Director, Classification and Pay/Transactions and Benefit Services, or designees, are responsible for conducting quarterly audits to ensure compliance with the expired license, certification, or registration and the certification process.

    • Licensed/Certificated Employees

      • Licensed/certificated employees affected by this policy are responsible for providing proof of current and active license/certification at time of appointment and, thereafter, timely license/certification renewal.

        • NOTE: Failure of CCHCS HR staff to provide a license/certification expiration courtesy reminder to an employee does not relieve the employee of the obligation to maintain a current and active California license/certification.

      • All licensed/certificated employees are responsible for notifying the Hiring Authority and CVU, if applicable, of any license/certification status change (e.g., denial, expiration, revocation, suspension, probationary status, restrictions).

        • NOTE:  Employees whose license/certification expired while on long-term sick leave receive a Return from Leave License Expiration Notice, indicating they are required to renew their license/certification before returning to work.  If an employee is on approved leave, CCHCS Office of Legal Affairs shall be consulted about whether it is appropriate to serve a Non-Punitive Termination.

  • Permissive Reinstatement After Non-punitive Termination

    • An employee who is non-punitively terminated is eligible for permissive reinstatement pursuant to GC, Section 19140, if the employee obtains the required license, certification, or registration for employment. Reinstatement is subject to Re-employment and State Restriction of Appointments laws, rules, and policies.

  • Links

  • References

    • California Business and Professions Code, Division 7, Chapter 1, Part 3, Section 17505.2

    • California Government Code, Title 2, Division 5, Chapter 5, Section 19140

    • California Government Code, Title 2, Division 5, Chapter 7, Section 19585

    • California Government Code, Title 2, Division 5, Chapter 7, Section 19587

    • California Health and Safety Code, Division 2, Chapter 2, Article 3, Section 1277

    • California Penal Code, Part 3, Title 7, Section 5068.5

  • Revision History

    • Effective: 03/2022

5.2.14 Family and Medical Leave Act, California Family Rights Act, and Pregnancy Disability

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS), California Department of Corrections and Rehabilitation (CDCR) shall comply with Family and Medical Leave Act (FMLA), California Family Rights Act (CFRA), Fair Employment and Housing Act (FEHA), Code of Federal Regulations, California Government Code (GC) Section, California Code of Regulations, Bargaining Unit (BU) Memoranda of Understanding (MOU) provisions, and state policy regarding leave of absence (LOA).  State employees are eligible for various types of LOA pursuant to GC, respective MOU (if subject to collective bargaining), and federal and state laws.  This policy supplements the Health Care Department Operations Manual, Section 5.2.6, Leave of Absence, and provides more detailed information regarding job protections and benefits afforded by the FMLA, CFRA, and Pregnancy Disability Leave (PDL) pursuant to the FEHA.

  • Purpose

    • To ensure consistent application of laws, regulations, and BU MOUs relating to FMLA, CFRA, PFL, and PDL.

  • Procedure

    • The coordination of leave entitlements afforded to a state employee can be very complex; therefore, employees are advised to contact their Human Resources office for assistance.

    • FMLA, CFRA, PFL, and PDL Eligibility Criteria

      • To be eligible for FMLA and CFRA job protection and benefits, a state employee shall:

        • Have worked for the state for at least 12 months.

          • NOTE: The 12 months of employment do not have to be consecutive.

        • Have physically worked at least 1,250 hours during the 12-month period immediately preceding the commencement of the leave.

          • NOTE:  Overtime, Military Leave, Administrative Time Off (ATO), and hours restored pursuant to GC, Section 19584, any administrative order, and a settlement agreement in any court or administrative forum are considered time worked for FMLA and CFRA qualification purposes.  Time off utilizing leave credits (e.g., vacation, sick leave, furlough) are not considered time worked for FMLA and CFRA qualification purposes.

      • To be eligible for PFL, a state employee shall:

        • Be covered by SDI.

        • Have earned at least $300 in the past 5 to 18 months.

        • Submit PFL claim within 41 days from the date the family leave begins.

          • NOTE: Do not file before the first day of leave.

        • Only claim 8 weeks of benefits per 12-month period.

      • All employees who are disabled due to pregnancy and childbirth are entitled to PDL. Unlike FMLA and CFRA, there is no 1,250 minimum hours worked or length of employment eligibility requirement for PDL.

    • FMLA,CFRA, and PDL Entitlement

      • An FMLA and CFRA leave eligible employee may take up to a total of 12 work weeks of unpaid leave during any 12-month period for one or more of the following reasons:

        • The birth and care of a newborn child of the employee within one year of birth.

        • The placement of a child for adoption or foster care with the employee and to care for the newly placed child within one year of placement.

        • Care for a family member (spouse, child, parent, registered domestic partner, grandparents, grandchildren, and siblings as well as for the child of a domestic partner) with a serious injury or illness in accordance with CFRA expansion.

          • NOTE: Parents who are both employed by the state are each entitled to 12 workweeks of family leave for a., b., c. above.

        • A serious health condition that makes the employee unable to perform the essential functions of their job.

        • A qualifying exigency arising out of the fact that the employee’s spouse, domestic partner, child, or parent is a covered military member on “covered active duty” or a reservist who faces a recall to active duty, if a “qualifying exigency exists.”

        • Caring for a spouse, child, parent, or next of kin who is a “covered service member” injured while serving in the military. Employees are eligible for up to 26 weeks of military caregiver leave to care for a covered service member with a serious injury or illness.

      • An employee disabled by pregnancy or childbirth is entitled to up to 4 months of PDL. PDL is paid for the first four weeks before the baby is born, then six weeks after the birth. Upon exhaustion of the paid benefit, the employee shall use PFL, if eligible.

      • PDL runs concurrently with FMLA leave; however, it is a separate entitlement from leave taken pursuant to CFRA.

    • Notice Requirements

      • Employees applying for FMLA, CFRA, or PDL job-protected leave are required to provide a 30-day advance notice to their manager or supervisor of their need to take FMLA, CFRA, or PDL leave, when the need is foreseeable and such notice is practicable.  If 30 days’ notice is not foreseeable (e.g., not knowing when leave will be required to begin, a change in circumstances, or a medical emergency), employees shall give as much notice as possible of their need for leave.

    • Medical Certification Requirements

      • Employees who request leave for themselves or to care for a family member shall provide written certification for the eligible individual with a serious health condition. If the leave is for the employee’s own serious health condition, the certification shall include a statement that the employee is unable to work at all or is unable to perform the essential functions of their position.

      • Employees shall be required to provide updated certification each time the certification on file is expired based on the dates provided by the health care provider or as often as every six months in conjunction with an absence.

    • Use of Leave Credits

      • An eligible employee may use their paid accrued leave (e.g., vacation, annual leave, personal leave), during a qualified FMLA, CFRA, or PDL event with no limitation; however, sick leave may only be used in accordance with the applicable collective BU MOU agreement or applicable civil service laws, rules, and state policies.  Whether an employee chooses to use paid accrued leave credits during their FMLA, CFRA, or PDL-qualifying absence or not, CCHCS shall count this leave against the employee’s protected leave entitlements under the law.

      • If the leave is FMLA, CFRA, or PDL-qualifying, no limitation shall be placed on the employee’s use of accrued vacation, annual leave, or personal leave credits.

      • CCHCS is responsible for designating an employee’s use of leave credits as qualifying FMLA, CFRA, or PDL leave, based on information received from the employee.

    • Maintenance of Health Benefits

      • FMLA and CFRA

        • The state shall maintain health, dental, and vision insurance coverage under “any group plan” for an employee on FMLA and CFRA-qualifying leave whenever such insurance was provided before the leave was taken, and on the same terms as if the employee had continued to work.

        • Accounts receivables shall be established for the employee’s share while the employee is on unpaid leave and collected upon the employee’s return. In some instances, the employer may also recover the employer’s share of the premiums paid to maintain health coverage for an employee who fails to return to work for reasons unrelated to the original reason for the leave.

      • PDL

        • The state is required to maintain up to four months of health, dental, and vision insurance coverage for employees who are disabled due to pregnancy, childbirth, or a related medical condition.  The time period that benefits are continued under FMLA and CFRA cannot be used to satisfy this requirement of PDL.  In other words, the benefit continuation requirement under CFRA does not begin until the benefit continuation requirement under FMLA and PDL has been fulfilled.

    • Calculation of Leave Usage

      • When an employee takes leave on an intermittent or a reduced work schedule, only the amount of leave actually taken may be counted towards the employee’s leave entitlement.  The actual workweek is the basis of leave entitlement.

      • Where an employee takes leave for less than a full workweek, the amount of leave used is determined as a proportion of the employee’s actual workweek.  Time that an employee is not scheduled to report for work may not be counted towards the leave entitlement.

      • Mandatory overtime hours that are not worked by the employee because of an FMLA, CFRA, or PDL-qualifying reason shall be considered leave (counted) for the purpose of calculating the employee’s remaining leave entitlement.  The PFL benefit amount is calculated from the employee’s highest quarterly earnings over the past 5 to 18 months, before the start of their claim. The Employment Development Department has an online Disability Insurance and Paid Family Leave Calculator.

      • However, if overtime hours are worked on an “as needed basis” and are not part of the employee’s usual or normal workweek, such voluntary overtime hours not worked due to an FMLA, CFRA, or PDL-qualifying reason, shall not be counted.

    • Reinstatement Rights

      • Upon return from FMLA, CFRA, and PDL leave, an employee is entitled to be returned to the same or comparable position the employee held when the leave commenced or to an equivalent position with equivalent pay, benefits, and other terms and conditions of employment, except in limited circumstances unrelated to the leave (such as layoffs).

      • As a condition of reinstatement of an employee whose leave was due to the employee’s own serious health condition, which made the employee unable to perform their job, the employee shall obtain and present a fitness for duty certification from the health care provider that the employee is able to resume work. Failure to provide such certification shall result in denial of reinstatement.

    • Military Caregiver Leave and Qualifying Exigency Leave Under FMLA

      • Military Caregiver Leave (MCL) and Qualifying Exigency Leave (QEL) expand FMLA rights by providing military families with two additional types of FMLA entitlements.  The law contains provisions regarding:

        • Employer coverage

        • Employee eligibility for the law’s benefits

        • Entitlement to leave

        • Maintenance of health benefits during leave

        • Job restoration after the leave

        • Notice and certification of the need for FMLA leave

        • Protection for employees who request or take FMLA leave

      • The law also requires employers to keep certain records, such as a copy of military orders, copy of a meeting announcement, appointment, or a copy of a bill for service.

    • Military Caregiver Leave

      • Eligible employees are entitled to take up to 26 workweeks of unpaid job-protected leave in a 12-month period to care for a covered service member with a serious illness or injury incurred in the line of active duty.  This leave may be taken intermittently or on a reduced schedule basis when medically necessary.

      • Employees who are eligible for MCL include the covered service member’s:

        • Parent

        • Spouse

        • Child

        • Next of kin in the following priority order:

          • Custodial blood relatives

          • Siblings

          • Grandparents, aunts, uncles, and first cousins

          • Family members sharing the same relationship (e.g., siblings) shall all be considered next of kin and each will be entitled to leave for caregiving.  However, a husband and wife who are FMLA-eligible and work for the same employer may be limited to a combined total of 26 workweeks of caregiver leave.

        • MCL is not in addition to the 12 workweeks of FMLA leave normally available to eligible employees but is aggregated with all other types of FMLA-qualifying leave during the applicable 12-month period, provided that the employee may not take more than 12 workweeks of leave for any other FMLA-qualifying reason during this period.  For example, in a single 12-month period, an employee could take 12 weeks of FMLA leave to care for a newborn child and 14 weeks of MCL, but could not take 16 weeks of leave to care for a newborn child and 10 weeks of MCL.

        • The 12-month period begins on the day the employee begins MCL and ends 12 months thereafter.

        • Because MCL is available on a per service member per injury basis, an eligible employee may be entitled to take more than one such leave during the course of their employment to care for different service members or for the same service member with a subsequent injury or illness.  In such circumstances, MCL is still limited to no more than 26 workweeks during the applicable period.

        • A certification form is required to be completed by either:

          • US Department of Defense (DOD) health care provider

          • US Department of Veterans Affairs health care provider

          • DOD TRICARE network authorized private health care provider

          • DOD non-network TRICARE authorized private health care provider

    • Qualifying Exigency Leave

      • The military family leave provisions of the FMLA entitle eligible employees of covered employers to take FMLA leave for any “qualifying exigency” arising from the foreign deployment of the employee’s spouse, son, daughter, or parent with the Armed Forces or to care for a service member with a serious injury or illness if the employee is the service member’s spouse, son, daughter, parent or next of kin.

      • QEL may be taken for any qualifying exigency arising out of the fact that a covered military member is on active duty or called to active duty status.  Employees who are family members of a covered military member shall be entitled to take up to 12 workweeks of FMLA leave for “qualifying exigencies” during the 12-month period established by the employer for FMLA leave.

      • Covered active duty means:

        • A member of the Regular Armed Forces, duty during deployment of the member with the Armed Forces to a foreign country; or

        • Members of the Reserve components of the Armed Forces (members of the National Guard and Reserves), duty during deployment of the member with the Armed Forces to a foreign country under a call or order to active duty in support of a contingency operation.

          • NOTE: Deployment to a foreign country includes deployment to international waters.

      • This leave may be taken intermittently or on a reduced leave schedule basis and may be counted against the employee’s 12 workweek FMLA entitlement.  However, because QEL is an FMLA-qualifying reason for leave, an eligible employee may take all 12 workweeks of their FMLA leave entitlement as QEL, or the employee may take a combination of 12 workweeks of leave for both QEL and leave for a serious health condition.

      • If the need for leave is foreseeable, the employee shall provide notice as soon as practicable, regardless of how far in advance the leave is being requested.

      • A separate certification form is used in connection with this leave.  As part of the certification process, the employee is required to provide copies of their military orders or other military documentation, facts regarding the exigency, dates of active duty service, and approximate date on which the qualifying exigency commenced or will commence.

      • QEL is not available to family members of service members who are in the Active Regular Armed Forces.  It is available only to family members of service members of the reserve components (Army National Guard, Army Reserve, Navy Reserve, Marine Corps Reserve, Air National Guard Reserve, Air Force Reserve, and Coast Guard Reserve) or retired service members of the Active Regular Armed Forces or Reserves.

      • An employee is entitled to use QEL for the following purposes (These are further defined in FMLA regulations.):

        • Issues arising from short-notice deployment (i.e., deployment on seven or less days of notice).

        • Military events, official ceremonies, or programs related to active duty or call to activity duty status of a covered service member.

        • Childcare and school activities

        • Financial or legal arrangements

        • Counseling

        • Rest and recuperation leave during deployment. Eligible employees may take up to 5 days of leave for each instance of rest and recuperation.

        • Post-deployment activities (e.g., arrival ceremonies and reintegration briefings)

        • Additional activities agreed upon by the employer and employee

  • References

    • Code of Federal Regulations, Title 29, Subtitle B, Chapter V, Subchapter C, Part 825, Sections 825.100 – 825.313

    • California Code of Regulations, Title 2, Division 3, Part 2.8, Chapter 6, Article 1, Sections 12945.1 and 12945.2

    • Health Care Department Operations Manual, Chapter 5, Article 2, Section 5.2.6, Leave of Absence

    • Bargaining Unit Memorandum of Understanding, California Department of Human Resources, Benefits Administration Manual – Family and Medical Leave Act of 1993

    • State of California, Department of Fair Employment and Housing

  • Revision History

    • Effective: 11/01/2022

Article 3 – Information Technology

5.3.1 Lost and Stolen IT Assets

  • Policy

    • California Correctional Health Care Services (CCHCS) staff shall submit an Information Security Incident Report (ISIR) via a Solution Center ticket, to Local Information Technology (IT) staff within three days of identifying a lost or stolen IT asset.

  • Applicability

    • This policy applies to all CCHCS staff, contracted personnel, volunteers, and vendors utilizing IT assets.

  • Procedure

    •  Attempting to Locate Lost IT Assets

      • Staff shall search the surrounding area where the IT asset was last assigned/seen.

      • Staff shall inform their supervisor or manager that the IT asset is missing to determine if others may be aware of the asset being moved to another location. If still unable to locate the IT asset after notifying supervisor or manager, staff shall follow the process as outlined in Section (c)(3), Reporting Lost or Stolen IT Assets.

    • Determining IT Asset Disposition

      • Local IT shall:

      • Determine the IT asset disposition by checking all applicable databases and network activity of the IT asset, per the Information Technology Services Division (ITSD) Lost and Stolen IT Assets Procedure.

      • Widen the search of the surrounding area (arrange with California Department of Corrections and Rehabilitation/CCHCS Program Supervisors):

        • Notify the Chief Executive Officer or CCHCS site leadership to perform site-wide CCHCS physical inventory (local IT staff will provide asset information to site leadership and inform them of all activities performed to locate missing asset).

        • If the IT asset is lost/stolen at an institution:

          • Notify the Watch Commander, Investigative Services Unit, and Warden of the missing IT asset

          • Provide the asset tag number and model.

          • CCHCS Local IT staff shall assist program staff with physical inventory of equipment, if needed.

    • Reporting Lost or Stolen IT Assets

      • Staff shall obtain a local law enforcement report to complete required notifications for stolen IT assets.

        • In the event an IT asset is stolen on state property, the local law enforcement agency is the California Highway Patrol (CHP). The Department of General Services STD. 99, Report of Crime or Criminally Caused Property Damage on State Property, form is required in the event CHP is involved.

      • Staff shall notify local IT immediately via a Solution Center ticket when an IT asset is determined lost/stolen. Local IT shall assist, as necessary, in documenting the following information within the ticket:

        • If IT Asset is determined stolen:

          • Name of the local law enforcement department reported to.

          • Report number.

          • If crime occurred on state property, complete the STD. 99 and notify the nearest CHP office. Return the completed STD. 99 form to the Information Security Office (ISO).

        • Phone number of the device (if applicable).

        • Model of the device.

        • Serial number of the device.

        • Asset tag number of the device.

        • Last location of the IT asset.

        • Did it contain sensitive, confidential, or Protected Health Information?

        • If capable, was the IT asset password/PIN protected?

        • Include the ISO on the Solution Center ticket. The ISO shall add pertinent information to the ticket.

      • Within three business days, and once determined appropriate to do so, Local IT shall direct staff to complete the CCHCS ISIR, located on the Information Security page of Lifeline under “Information Security Reporting Procedure, How to Report an Information Security Event”.

        • The completed ISIR shall be attached to the Solution Center ticket.

      • Local IT staff shall send notification containing the above information to appropriate parties, per the ITSD Lost and Stolen IT Assets Procedure.

      • For mobile phones, local IT shall attempt to locate the phone per the ITSD Lost and Stolen IT Assets Procedure.

      • If an IT asset was lost/stolen in an institution, the local hot trash custody processes shall be followed for any components that are missing.

    • Finding a Lost/Stolen IT Asset

      • If a lost/stolen IT asset is found, local IT shall:

      • Update and resolve the CCHCS Solution Center ticket.

      • Notify all parties involved.

      • Update the IT asset disposition in all applicable locations.

  • References

  • Revision History

    • Effective: 01/2022

5.3.2 Camera Use

  • Policy

    • California Correctional Health Care Services (CCHCS) staff shall ensure all CCHCS cameras, camera-enabled devices, and video monitoring equipment on state grounds are for health care purposes only including, but not limited to, taking photographs or conducting Telemedicine, Telepsychiatry, or Telepsychology encounters. 

  • Purpose

    • To safeguard confidential information and reduce opportunities for harassment, unauthorized disclosure and distribution, CCHCS regulates the use of electronic equipment used to capture or store images such as smart phones, video equipment, cameras, tablets, handheld scanners, and flash drives.

  • Responsibilities

    • The Hiring Authority, or designee, shall approve the use of state-issued cameras, camera-enabled devices, and video monitoring equipment in advance.

    • The CCHCS Deputy Director of Communications and Institution Public Information Officer shall be consulted for the added supervision or security arrangement when media’s use of cameras or video-enabled devices are to be accommodated.

    • The Information Technology Services Division is responsible for managing the procurement, architecture, data communication network, implementation, access control, ongoing hardware and software support contracts and licensing for the camera-enabled audio or video systems.

  • Procedure

    • Usage

      • CCHCS authorizes the use of cameras or video-enabled devices for:

        • Conducting state business;

        • Facilitating the delivery of health care related instruction;

        • Providing patients with access to care;

        • Monitoring and improving patient outcomes (e.g., wound care, Root Cause Analysis, Performance Improvement Work Plans).

      • Employees shall not use cameras or video-enabled devices to create or convey offensive, harassing, vulgar, obscene, or threatening images or communications.  Similarly, transmitting sexually oriented messages, videos or images at work using camera-enabled devices is forbidden pursuant to Department Operations Manual (DOM), Section 31010.5, Conduct Violations; and Section 31010.6, Sexual Harassment Violations.  Camera-enabled devices on CCHCS premises or at state-sponsored events shall not be used to defame, embarrass, or disparage the state, employees, patients, customers, or vendors, or be used to video record or photograph privileged or confidential material.

    • Guidelines

      • All CCHCS mobile devices (includes laptops and tablets) shall be issued with the camera enabled as the default setting.

      • Any photography or video recording within an institution, where patient images or videos may be captured, shall be handled pursuant to DOM Section 13010.17, Photographs, Films, and Videotapes.

      • Cameras or video-enabled devices with lens covers shall remain closed when the camera is not in use.

      • The staff working in clinical settings shall obtain written consent from the patient being photographed or video recorded.

        • The CDCR 7120, Informed Consent for Clinical Photography/Digital Imaging, shall be completed and scanned into the health record for each patient.

        • If the patient is unable to provide consent, staff shall document that on the CDCR 7225, Refusal of Examination and/or Treatment, for clinical documentation purposes.

      • Employees shall report any violations of this policy to their supervisor in writing.  Any images or videos taken on CCHCS property using CCHCS equipment are considered state property.  Any images or videos found in violation of this policy are subject to confiscation.  Violation of this policy may result in discipline, up to and including termination of employment.

    • Unauthorized Disabling or Tampering

      • Unauthorized disabling of or tampering with installed cameras or video-enabled devices shall be cause for disciplinary action.

  • References

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 13, Section 13010, Public/Media Information

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 13, Section 13010.17, Photographs, Films, and Videotapes

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 2, Article 12, Section 22030.12.1, Sensitive Property

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 1, Section 31010.5, Conduct Violations

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 1, Section 31010.6, Sexual Harassment Violations

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Section 48010.5 – Acceptable Uses and Ethics

    • Health Care Department Operations Manual, Chapter 3, Article 1, Section 3.1.20 – Clinical Photography Digital Imaging

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.15, Acceptable Use

  • Revision History

    • Effective: 06/16/2023

5.3.3 CCHCS‑Issued Mobile Phone

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain standards and requirements regarding approval, distribution, and acceptable use of CCHCS-issued mobile phones.  CCHCS staff and contracted personnel that are issued a CCHCS mobile phone to conduct official state business shall abide by the procedure and guidelines stated herein.

  • Applicability

    • This policy applies to all CCHCS staff and contracted personnel.

  • Responsibilities

    • The hiring authority (HA), or designee, is responsible for approving requests to issue mobile phones and to ensure appropriate usage of the phone.

    • The Information Technology Services Division (ITSD) is responsible for issuing mobile phones.

    • The ITSD is responsible for managing the procurement, architecture, data communication network, access control, and ongoing hardware and software support contracts for the mobile phones.

  • Procedure

    • Requesting a New Mobile Phone

      • All requests for mobile phones shall be submitted through a Solution Center ticket:

        • By, or on behalf of, the Chief Executive Officer (CEO) or HA, or

        • With an attached email of approval from the CEO or HA.

      • By approving the mobile phone request, the CEO, HA, or designee, acknowledges approval to incur monthly charges for the phone line in their institutional or program budget.

    • Transferring a Mobile Phone

      • The CEO or HA may request the transfer of a mobile phone between staff in the same CCHCS institution or program and billing unit by submitting a request through the Solution Center.  The ITSD is responsible for completing the transfer request following the CCHCS IT Asset Transfer Process.

    • Deactivating and Returning a Mobile Phone

      • Following the CCHCS Employee Separation Process, when staff with a CCHCS-issued mobile phone separate from CCHCS, the supervisor shall submit a ServiceNow request to deactivate the device prior to the separation date. The supervisor shall ensure the mobile phone is returned to the ITSD.

      • The IT Desktop Support technician shall update the ServiceNow request when the phone is received.

    • Security

      • Physical Security

        • CCHCS mobile phone users shall take reasonable steps to prevent damage or loss to the mobile phone.

        • Mobile phones shall not be left unattended and be stored securely in a locked location when not in use.

        • Staff shall follow all applicable regulatory and traffic laws while using the mobile phone.

      • Data Security

        • CCHCS mobile phone users shall:

          • Take reasonable steps to protect the mobile phone from cybersecurity threats and attacks.

          • Use a passcode to protect the mobile phone.

          • Ensure automatic software updates are turned on and mobile phones are updated to the most current software operating system to ensure access to new software patches.

    • Lost, Stolen, or Damaged Mobile Phone

    • Usage and Restrictions

      • CCHCS-issued mobile phones shall be used for CCHCS business only pursuant to HCDOM, Section 5.3.15, Acceptable Use.

      • All CCHCS mobile phones are issued with the camera enabled. Mobile phone users shall adhere to the HCDOM, Section 5.3.2, Camera Use, when utilizing the camera.

      • Only CCHCS-approved applications may be downloaded from the CCHCS Catalog on mobile phones.

      • CCHCS mobile phone users shall not change any configurations or standard features.

      • Any unauthorized disabling of or tampering with configuration or installed software shall be subject to corrective or disciplinary action in accordance with CCR, Title 15, Section 3392, et seq. and Department Operations Manual, Chapter 3, Article 22, Employee Discipline, Sections 33030.8, 33030.9, 33030.15.

      • Employees shall report any violations of this policy to their supervisor.

    • Shared Usage

      • Mobile phones may be assigned to an individual for use on a shared basis for a designated function by a CCHCS service unit.

      • In the instance a mobile phone is used on a shared basis, it shall be assigned to the person responsible for the group, and this individual shall be accountable for the device.

  • References

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 13, Section 13010 – Public/Media Information

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 2, Article 12, Section 22030.12.1 Sensitive Property

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 41, Section 48010.5 – Acceptable Uses and Ethics

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.1, Lost and Stolen Assets

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.2, Camera Use

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.15, Acceptable Use

  • Revision History

    • Effective: 06/16/2023

5.3.4 Digital Signature Security

  • Policy

    • Any use of digital signature technology within California Correctional Health Care Services (CCHCS) must comply with all requirements stated in the California Government Code Section 16.5 and California Code of Regulations, Title 2, Division 7, Chapter 10, Digital Signatures. This information can be reviewed at:   https://www.sos.ca.gov/administration/regulations/current-regulations/technology/digital-signatures/government-code-16-5 and https://www.sos.ca.gov/administration/regulations/current-regulations/technology/digital-signatures.

      • Digital Signature Usage

        • The use of a digital signature shall have the same force and effect as the use of a manual signature if and only if it embodies all of the following attributes:

          • It is unique to the person using it.

          • It is capable of verification.

          • It is under the sole control of the person using it.

          • It is linked to data in such a manner that if the data are changed, the digital signature is invalidated.

      • Authorized Digital Signature Solutions

        • CCHCS authorizes the use of only Public Key Infrastructure (PKI) digital certificate based digital signature technology for the purposes of applying a digital signature to electronic forms or documents.

      • Approved PKI Solutions

      • Approved Digital Certificate Algorithms

        • Digital certificates that are intended to apply digital signatures must comply with FIPS 186-2 standards.  FIPS 186-2 requires that one of the following digital signature (ds) algorithms by employed: Digital Signature Algorithm (DSA), RSA (Rivest, Shamir and Adleman), or ECDSA (Elliptical Curse Digital Signature Algorithm).

  • Purpose

    • This policy is intended to detail the requirements for the developing and/or using digital signature technology with CCHCS systems and data.

  • Applicability

    • This policy applies to all CCHCS Information Technology (IT) assets and/or anyone that accesses or uses any CCHCS IT asset.

  • Responsibility

    • All CCHCS Employees and Contractors are responsible for:

      • Reviewing and understanding this policy as it relates to their job role and responsibilities

      • Complying with all policy provisions

      • Communicating any risks or issues associated with the effectiveness of this policy and/or its enforcement to the CCHCS Office of Information Security (OIS)

      • Immediately reporting any known areas of non-compliance to the CCHCS OIS

    • Information Security Officer (ISO) is responsible for:

      • Authoring and enforcing this CCHCS Information Security Policy

      • Developing a performance metric to help articulate the organizational value of this policy and its effectiveness

      • Reporting policy performance metrics to the Chief Information Officer (CIO)

      • Managing the annual enterprise information security policy update process and ensuring tasks are completed effectively and on time

    • Organizational Unit Managers are responsible for:

      • Reviewing and understanding this policy as it relates to the objectives and operations of their organizational unit

      • Continually assessing the effectiveness of this policy as it relates to their organizational unit’s objectives and operations and reporting any issues or risks to CCHCS’s ISO

      • Promoting policy awareness, understanding, and compliance within their organizational business unit

      • Immediately reporting any known areas of non-compliance to the CCHCS OIS

    • CIOs are responsible for:

      • Reviewing and approving this policy

      • Promoting policy awareness, understanding, and compliance throughout the organization

      • Ensuring necessary resources are provided to support policy development, implementation, and compliance efforts

  • Procedure

    • Digital Certifcates

      • Digital Certificate Storage: CCHCS requires that all digital certificates that will be used for digital signatures must be stored on a FIPS 140-2 certified Smart Card device.  The Smart Card must also be configured to require a  PIN to access the digital certificate stored on the Smart Card.

      • Certificate Revocation Verification: Prior to applying a digital signature to an electronic document, the validity of the digital certificate used to apply the digital signature must be verified by performing a Certificate Revocation List (CRL) lookup.

      • CRL Publishing: Any PKI deployed to support digital signature must update the associated CRL to an Internet accessible HTTP website at least once every 24 hours.

      • Identity Proofing Requirements for Digital Certificate Requests: All CCHCS employees or contractors that require a digital certificate to apply a digital signature for CCHCS transactions must have their identity verified to ensure the requester is who he or she claims to be.   CCHCS requires the verification process to include at least one in-person or face-to-face meeting whereby the requester presents an official U.S. Government, Military, or State identification card to a CCHCS agent authorized to verify identity prior to receiving the digital certificate.  If electronic verification is used as part of the ID proofing process the requester must be assigned a unique username and must be challenged to provide knowledge of a secret password that is known only by the requester.

    • Use and Application of Digital Signatures

      • Authorized Users of Digital Signature

        • Only users formally authorized by CCHCS management to use digital signature technology can apply a digital signature to a CCHCS IT asset.  Formal authorization can be achieved by completing a Digital Signature Request form, having it signed by designated CCHCS management, and having it stored on file for audit retrieval purposes.  The Digital Signature Request form is available through CCHCS IT Division.

      • Authorized Usage of Digital Signature

        • Digital signatures can only be used with those IT assets that have been formally authorized by CCHCS management for use with digital signature technology.

      • Applying a Digital Signature

        • When applying a digital signature, controls must be in place to ensure user credentials are valid and verified.  Controls must also be in place to ensure all communications between the application and the Smart Card containing the digital certificate are appropriate secured and encrypted.

      • Lost or Stolen Smart Cards

        • All lost or stolen Smart Cards must be reported to the ISO immediately and no longer than 24 hours from the time it is recognized the Smart Card is missing.

    • Enforcement, Auditing, and Reporting

      • Violation of CCHCS’s enterprise information security policies by an employee or contractor may result in immediate revocation of access rights to CCHCS’s IT assets.  Additionally violations of security policies are subject to disciplinary action.  The specific disciplinary action that shall be taken depends upon the nature of the violation and the impact of the violation on the CCHCS’s information and/or data assets and related facilities. A partial list of potential disciplinary actions follows:

        • Written reprimand 

        • Suspension without pay 

        • Reduction in pay 

        • Demotion 

        • Dismissal 

        • Criminal prosecution (misdemeanor or felony, State or federal).

      • CCHCS reserves the right to consider legal remedies, or prosecution, against any person or entity for violations of any Law or regulatory compliance matter.

  • Review and Approval

    • This policy is approved by CCHCS’s CIO and will remain authorized and enforceable until replaced by an updated version.  This policy will be reviewed annually by CCHCS’s ISO to ensure that it stays current.  Changes to this policy will only be applied by CCHCS’s ISO.  All CCHCS employees and contractors may submit suggested changes for the policy to the ISO in writing.  The ISO may use the suggestions as part of the annual policy review and update process.  The primary dissemination vehicle for the CCHCS Information Security Policies will be the CCHCS Intranet.

  • Resources

  • References

    • California Government Code Section 16.5

    • California Code of Regulations, Title 2, Division 7, Chapter 10, Digital Signatures

  • Revision History

    • Effective: 03/2011
      Revised: 03/07/2023

5.3.5 Electronic Mail Retention

  • Policy

    • California Correctional Health Care Services (CCHCS), Information Technology Services Division (ITSD) shall retain all sent and received electronic mail (e-mail) from the CCHCS E-mail System regardless of whether it has been opened or not, for a period of three years.  E-mail messages are subject to federal and state laws.

  • Purpose

    • The purpose of this policy is to establish parameters to effectively capture, manage, and retain e-mail messages.  Policy guidelines cover information that is either stored or shared via e-mail, including e-mail attachments.

  • Applicability

    • This policy applies to all CCHCS staff utilizing the CCHCS E-mail System network.

  • Responsibility

    • CCHCS’s Chief Information Officer shall authorize and enforce this policy.

    • Organizational users shall review, understand, and comply with this policy.

    • ITSD shall ensure adequate processes and procedures are in place to comply with policy directives.

  • Control and Maintenance

    • If litigation is pending or future litigation is reasonably probable, the law imposes a duty upon CCHCS to preserve all documents and records that pertain to the litigation.  A litigation hold directive overrides any retention policy until the litigation has been cleared.

    • This policy specifies the period for which CCHCS ITSD shall retain e-mails but does not supersede the record retention schedule of any area of CCHCS. Each area of CCHCS is responsible for ensuring retention of records in compliance with that area’s own record retention schedule.

    • This policy shall be reviewed annually by CCHCS ITSD to ensure compliance with federal and state law. 

    • CCHCS employees and contractors may submit inquiries regarding the policy to ITSD by submitting an Information Technology Solution Center ticket.

  • References

    • California Government Code, Title 1, Division 7, Chapter 3.5, Inspection of Public Records, Article 1, Section 6250-6265

    • California Penal Code, Part 4, Title 3, Chapter 2, Criminal Offender Record Information, Section 13100-13104

    • California Code of Regulations, Title 15, Division 3, Chapter 1, Subchapter 4, Article 1, Section 3261.2, Authorized Release of Information

    • California State Administrative Manual, Section 5320, Training and Awareness for Information Security and Privacy

    • Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 1, Article 16, Section 13040.11.1, Retention of Public Records Act Requests

    • Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 36, Section 47090.10, Instant Messaging Retention

    • Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 38, Section 47110.16, E-Mail Retention

  • Revision History

    • Effective: 01/2017
      Reviewed: 03/07/2023

5.3.6 Information Security Policy Development and Maintenance

  • Policy

    • California Correctional Health Care Services (CCHCS) has adopted the following principles to govern information security policy development and maintenance.

      • Risk will be identified, assessed, and managed

      • Risk tolerance levels will be constantly recalibrated

      • Accountability over assets will be established

      • Least privilege principle will be used to determine the degree of access

      • Incompatible responsibilities will be separated

      • Information and system integrity, confidentiality and availability will be maintained

      • Personal privacy will be addressed

      • Ethical behavior will be practiced

      • IT Systems will be compliant with all applicable legal, statutory, and regulatory requirements

  • Purpose

    • Information security policies express CCHCS management’s requirements for appropriately protecting enterprise Information Technology (IT) assets.  Information security policies are meant to address all applicable organizational, business, legal, and regulatory information security requirements that are necessary to help ensure the confidentiality, integrity, and availability of CCHCS’s IT assets.   The objective of this policy is to explain the process used to develop and maintain CCHCS information security policies.

  • Applicability

    • This policy applies to all CCHCS IT assets and/or anyone that accesses or uses any CCHCS IT asset.

  • Responsibility

    • All CCHCS Employees and Contractors are responsible for:

      • Reviewing and understanding this policy as it relates to their job role and responsibilities

      • Communicating any risks or issues associated with the effectiveness of this policy and/or its enforcement to the CCHCS Office of Information Security (OIS)

      • Immediately reporting any known areas of non-compliance to the CCHCS OIS

    • ISO is responsible for:

      • Authoring and enforcing this CCHCS information security policy

      • Developing a performance metric to help articulate the organizational value of this policy and its effectiveness

      • Reporting policy performance metrics to the Chief Information Officer (CIO)

      • Managing the annual enterprise information security policy update process and ensuring tasks are completed effectively and on time

    • Organizational Unit Managers are responsible for:

      • Reviewing and understanding this policy as it relates to the objectives and operations of their organizational unit

      • Continually assessing the effectiveness of this policy as it relates to their organizational unit’s objectives and operations and reporting any issues or risks to CCHCS’s ISO

      • Promoting policy awareness, understanding, and compliance within their organizational business unit

      • Immediately reporting any known areas of non-compliance to the CCHCS OIS

    • CIO is responsible for:

      • Reviewing and approving this policy

      • Promoting policy awareness, understanding, and compliance throughout the organization

      • Ensuring necessary resources are provided to support policy development, implementation, and compliance efforts

  • Procedure

    • Information Security Policy Development

      • By the final business day of January each year, CCHCS CIO will appoint an Information Security Policy Review (ISPR) Committee.  The ISPR Committee must include sufficient members to appropriately represent the enterprise in an effective and efficient manner.  This committee will be accountable for representing and addressing information security policy development and maintenance activities. Each member will be accountable for ensuring their organizational unit’s information security policy requirements are addressed.  CCHCS’s ISO is responsible for managing the information security policy development process.

    • Information Security Policy Review

      • The appointed CCHCS ISPR Committee will meet regularly throughout the first half of the calendar year to assess the effectiveness and efficiency of existing information security policies, develop proposed changes to information security policies, and produce final proposed policy changes to the ISO by the final business day in June.  The ISO will review all proposed policy changes and will produce a final set of recommended policy changes to the CIO by the final business day in July.  The CIO will review the recommended policy changes and will provide his or her final approvals to the ISO by the final business day in August.  The ISO will incorporate all approved policy changes into new policy versions and will manage the iterative release cycle.  The iterative release cycle must ensure proper document versioning and change management procedures to capture any policy changes and provide a repository of previous versions. The iterative release process must also include updating any information security policy education and awareness components and effectively communicating any policy changes to the enterprise user population.  This policy review cycle is outlined in the graphic below.
        ISPR and ISO Review Process: February through June is ISPR Review, July is I S O ISPR Review, August is CIO ISPR Review, and September through December is Policy Updates

    • Information Security Policy Implementation

      • Authorized policy version updates will go into effect starting January 1st of each calendar year.

    • Information Security Policy Awareness, Understanding, and Accountability

      • All new CCHCS employees and contractors must sign an information security policy statement of compliance and accountability document before accessing any CCHCS IT assets.  The statement of compliance and accountability document is meant to indicate that a signee: a) is aware of CCHCS’s information security policies, b) understands how to comply with CCHCS’s information security policies, and c) is accountable for ensuring compliance with CCHCS information security policies.  In addition to the original signing of the statement of compliance and accountability, all CCHCS employees and contractors must resign the statement of compliance and accountability annually.  Information security policies must be made available to any authorized requestor.

    • Enforcement

      • Violation of CCHCS’s information security policies by an employee or contractor may result in immediate revocation of access rights to CCHCS’s IT assets.  Violations of security policies are subject to disciplinary action.  The specific disciplinary action that shall be taken depends upon the nature of the violation and the impact of the violation on the CCHCS’s IT assets and related facilities. A partial list of potential disciplinary actions follows:

        • Written reprimand

        • Suspension without pay

        • Reduction in pay

        • Demotion

        • Dismissal

        • Criminal prosecution (misdemeanor or felony, State or federal)

      • CCHCS reserves the right to consider legal remedies, or prosecution, against any person or entity for violations of any law or regulatory compliance matter.

  • Review and Approval

    • This policy is approved by CCHCS’s CIO and will remain authorized and enforceable until replaced by an updated policy version.  This policy will be reviewed annually by CCHCS’s ISO to ensure that it is current.  Changes to this policy will only be applied by CCHCS’s ISO.  All CCHCS employees and contractors may submit suggested changes for the policy to the ISO in writing.  Upon due consideration, the ISO may use the suggestions as part of the annual review and update of the policy. The primary dissemination vehicle for the CCHCS information security policies will be the CCHCS Intranet.

  • Resources

  • Revision History

    • Effective: 01/2011
      Revised: 03/07/2023

5.3.10 Change And Configuration Management

  • Introduction and Overview

    • Business functions are highly dependent on secure and stable Information Technology (IT) operating environments. Secure and reliable IT environments are enabled through both maintaining standard configurations and establishing processes and procedures to effectively manage changes to the operating environments.

    • The goal of formalized IT change management is to facilitate IT changes as defined in enterprise standards, guidelines, and procedures while minimizing negative impacts to the organization.

    • The goal of IT configuration management is to establish, implement, and manage information asset baseline configurations and maintain consistency throughout the system lifecycle.

    • This policy establishes California Department of Corrections and Rehabilitation, California Correctional Health Care Services, and California Prison Industry Authority (hereinafter referred to as department) requirement for formal change and configuration management.

  • Objectives

    • The objective for this policy is to establish department requirements for standardized methods and procedures for the management of information asset configurations and changes to department information and technology environments, while integrating security and risk considerations.

  • Scope and Applicability

    • The scope of this policy extends to all State information assets owned and operated by the department, information assets managed by third parties on behalf of the department, and all information assets that process or store department information in support of department services and mission.

    • This policy applies to Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • The department shall:

    • Formally manage all changes to information assets.

    • Utilize the Change Control Board, which includes a change advisory board that meets on a regular basis to review changes to information assets.

    • Ensure that the change advisory board comprises representation from appropriate stakeholders, and in particular from impacted business areas.

    • Ensure that the change advisory board includes formal security representation, and that change management processes formally integrate security evaluations and risk impact assessments in all change activities.

    • Establish comprehensive enterprise-wide change management, comprised of supporting processes, workflows, and a centralized repository for all changes, including changes to baseline configurations.

    • Establish, implement, and manage department operating baselines for information asset configurations.

    • Establish and implement technologies, processes, and procedures to maintain and manage information asset configurations.

    • Ensure third parties and contractors are subject to change and configuration management policies, discipline, and practices. Any changes to department information assets proposed by service providers, regardless of whose environment they operate in, shall be governed by department change and configuration management processes.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all Owners of Information Assets, Information Asset Custodians, and users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually and updated accordingly. 

      • Is required to audit and assess compliance with this policy at least once every 2 years.

    • Department Information Security Officer (ISO):

      • Shall assist Owners of Information Assets and Information Asset Custodians in the identification of data security controls and processes.

      • Shall ensure that data security controls, methods, and processes meet department and applicable regulatory requirements for security.

    • Department Owners of Information Assets and Program Management:

      • In collaboration with the Information Asset Custodians shall ensure that this policy and its directives are implemented and enforced.

    • Department Information Asset Custodians:

      • Shall implement configuration and change management technology, process, and workflow controls as approved by Owners of Information Assets.

      • Shall maintain change and configuration management records for a minimum period of 12 months. Secure deletion or destruction of these records shall be in accordance with the records retention schedule.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal.

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with the State of California Government Code section 11549.3.

  • Revisions

    • The CIO or Designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, 19C, Project Approval Lifecycle Stage 3 – Solution Development

    • Statewide Information Management Manual, Sections 58C, 58D, 66B, 5305-A, 5310-A and B; 5325-A and B; 5330-A, B, and C; 5340-A and C; and 5360-B

    • State Administrative Manual, Section 5315, Information Security Integration

    • State Administrative Manual, Section 5315.5, Configuration Management

    • State Administrative Manual, Section 5355, Endpoint Defense

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-2, CM-3, CM-4, CM-5, CM-6, CM-9

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 45, Section 49020.9

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 02/2022

5.3.11 Endpoint Security

  • Introduction and Overview

    • Department information assets are often used to conduct business functions internally as well as with other State and non-department persons and devices on the Internet. Devices used for such department business purposes are comprised of servers, network devices, and end user devices including mobile computers, tablets, and smart phones; such devices are collectively called “endpoints” or “endpoint devices.”  Some department information assets are more prone to loss or theft due to their size, mobility, or location of use.

    • The department needs to ensure that endpoints are suitably protected to prevent unauthorized access to data and information that may reside on the endpoints.

  • Objectives

    • Objectives for this policy are to define the requirements to protect department endpoints that may routinely interact with unknown or untrusted devices on the Internet, or that are more susceptible to loss or theft.

  • Scope and Applicability

    • The scope of this policy extends to all State information assets owned and operated by the department, information assets managed by third parties on behalf of the department, and all information assets that process or store department information in support of department services and mission.

    • This policy applies to Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • The department shall ensure that:

    • All department endpoints are identified and endpoint asset inventories are documented and continually updated.

    • Risks to individual department endpoint device types and the data they access, process, and store are assessed.

    • The requisite endpoint protection controls, as referenced in the Statewide Information Management Manual, are implemented and maintained to mitigate risks to each endpoint.

    • Endpoint protection controls include people (asset users), processes, and technology controls.

    • Endpoint protection controls are continuously monitored.

    • Endpoint protection controls are reviewed at least annually.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all Owners of Information Assets, Information Asset Custodians, and users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually and updated accordingly. 

      • Is required to audit and assess compliance with this policy at least once every 2 years.

    • Department Information Security Officer (ISO):

      • Shall assist Owners of Information Assets and Information Asset Custodians with the identification and selection of endpoint protection controls.

      • Shall ensure that endpoint protection controls meet department requirements for security and privacy.

    • Department Owners of Information Assets and Program Management:

      • In collaboration with the Information Asset Custodians shall ensure that the endpoint protection controls are defined, documented, and implemented, and that implementation is reviewed annually.

      • In collaboration with the Information Asset Custodians shall ensure the endpoint protection controls commensurate with the sensitivity or criticality of the asset are implemented for assets under their purview.

    • Department Information Asset Custodians:

      • Shall implement the requisite endpoint protection controls based upon the sensitivity or criticality of the assets as defined by the Owners of Information Assets.

      • Shall maintain and update endpoint protection technologies based on best practices.

      • Shall maintain records of endpoint protection controls and ensure proper change management.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal.

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with the State of California Government Code section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, 5305-A, Information Security Program Management Standard

    • Statewide Information Management Manual, 5355-A, Endpoint Protection Standard

    • State Administrative Manual, Section 5355, Endpoint Defense

    • State Administrative Manual, Section 5355.1, Malicious Code Protection

    • National Institute of Standards and Technology, Special Publications 800-53, Security Assessment and Authorization, CA-7

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-2, CM-3, CM-6, CM-7, CM-10, CM-11

    • National Institute of Standards and Technology, Special Publications 800-53, System and Communications Protection, SC-8, SC-10, SC-11, SC-13, SC-18, SC-23, SC-24, SC-28, SC-38, SC-42, SC-43

    • National Institute of Standards and Technology, Special Publications 800-53, System and Information Integrity, SI-2, SI-3, SI-4, SI-5, SI-7, SI-8, SI 11

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3, RA-5

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-3, PE-19, PE-20

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 41, Section 48010.5

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 02/2022

5.3.12 Security Analytics And Continuous Monitoring

  • Introduction and Overview

    • Information technology environments that support department business functions and services are complex and dynamic computer network environments, which process, manipulate, and store large amounts of data and information. In order to detect unexpected and suspicious activities and events within such complex networks, it is important to continuously monitor computing environments. Continuous monitoring allows the department to rapidly identify anomalous or suspicious activities and events, analyze these events, and respond accordingly.

  • Objectives

    • The objective for this policy is to define department requirements for continuous monitoring of department networks and information assets for signs of malicious use, anomalies, and unexpected behavior and usage patterns.

  • Scope and Applicability

    • The scope of this policy extends to all State information assets owned or operated by the department, and governs the facilities and information assets owned or operated on behalf of the department by business partners and service providers.

    • This policy applies to Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • The department shall ensure that:

    • A strategy for security analytics and continuous monitoring will be defined, documented, and implemented.

    • The strategy will be based on security risk management principles in order to determine optimal monitoring locations, methods, and techniques.

    • The department’s security analytics and continuous monitoring strategy will be integrated with the department’s security and event logging and monitoring strategy, threat assessments, and security analytics and event correlation.

    • The department’s continuous monitoring is linked to incident response management and other department incident management processes.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all Owners of Information Assets, Information Asset Custodians, and users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually, and updated accordingly. 

      • Is required to audit and assess compliance with this policy at least once every 2 years.

    • Department Information Security Officer (ISO):

      • Shall assist Owners of Information Assets and Information Asset Custodians with the implementation of this policy.

      • Shall assist Owners of Information Assets and Information Asset Custodians in the analysis and assessment of risks posed by anomalous activities or identified events.

    • Department Owners of Information Assets and Program Management:

      • In collaboration with the Information Asset Custodians shall ensure that this policy is implemented and implementation is reviewed annually.

    • Department Information Asset Custodians:

      • Shall implement technology and process controls.

      • Shall maintain records of security monitoring controls implemented.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in DOM Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal.

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with the State of California Government Code section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • State Administrative Manual, Section 5335, Information Security Monitoring

    • State Administrative Manual, Section 5335.1, Continuous Monitoring

    • State Administrative Manual, Section 5335.2, Auditable Events

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-2, AU-6, AU-7, AU-13

    • National Institute of Standards and Technology, Special Publications 800-53, Incident Response, IR-5, IR-10

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-6

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology, Special Publications 800-53, Security Assessment and Authorization, CA-7

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 41, Section 48010.5

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 02/2022

5.3.13 Server Configuration

  • Introduction and Overview

    • This document defines the policy for all servers, physical and virtual, owned or operated by the department.  Effective implementation of this policy minimizes the risk of server vulnerabilities that can result in system unavailability, data corruption, unauthorized access, information and resource misuse, and service disruption.

  • Objectives

    • The objective of this policy is to establish the base configuration of internal server equipment that is owned and operated by the department.  Effective implementation of this policy will minimize unauthorized access to department proprietary information and technology.

  • Scope and Applicability

    • The scope of this policy extends to all information assets owned or operated by the department, including critical infrastructure, as well as information assets owned or operated by third-parties on behalf of the department.

    • This policy applies to Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • The department shall:

      • Only create server service accounts when necessary.

      • Use the Principle of Least Privileged to limit user access rights to a minimum.

      • Not use administrative accounts (e.g., root, administrator, O365 Global) when a non-privileged account will suffice.

      • Disable/lock/delete all accounts except those required to provide necessary services.

      • Change the default passwords for all accounts and follow password security best practices outlined in Statewide Information Management Manual (SIMM) 5300-A, Org-Defined Standards, (National Institute of Standards and Technology [NIST] IA-5(1)).

      • Limit access to administrative accounts to only those who have operational need and have been authorized.

      • Ensure service accounts are not part of Local Administrators or Domain Administrator accounts.

      • Authorize and document all administrative (privileged) accounts.

      • Encrypt all passwords and all sensitive and confidential data while in transit. Passwords shall adhere to State Org-Defined Policy. (See State Administrative Manual [SAM] 5350.1, SIMM 5300-B and NIST, Special Publications [SP] 800-63B, FIPS 140-2).

      • Authenticate users over encrypted protocols.

      • Log all access to the server and services that are protected through access control methods.

      • Establish and implement controls to ensure that service account functions are authorized using service account credentials only.

    • Systems Configuration and Maintenance

      • Servers shall be patched and hardened before attaching them to the network.  Security patches shall be installed on the system not less than monthly. If an intelligence source advises of an imminent threat, patches shall be installed according to documented information technology standards.

      • Servers shall be physically secured in locations accessible only to authorized personnel.

      • Only required services shall be enabled or installed on the server. Services that are not required shall be uninstalled or disabled.

      • Regular back-ups of the server shall be completed according to the back-up and retention policy and tested on a periodic schedule.

    • Monitoring

      • The server shall capture and archive critical user, network, system, and security event logs to enable review of system data for forensic and recovery purposes.

      • Security-related events shall be reviewed and investigated. Events include, but are not limited to:

        • Account lockouts

        • Failed user account logins

        • Evidence of unauthorized access to privileged accounts

        • Anomalous occurrences that are not related to specific applications on the server

      • Security incidents shall be handled immediately in accordance with SAM and SIMM and reported to the department Information Security Officer (ISO), the data owners or their designees.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all Owners of Information Assets, Information Asset Custodians, and users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually, and updated accordingly. 

      • Is required to audit and assess compliance with this policy at least once every 2 years.

    • Department ISO:

      • Shall assist Owners of Information Assets and information asset custodians in the identification of data security controls and processes.

      • Shall ensure data security controls, methods, and processes meet department and applicable regulatory requirements for security.

      • Shall participate in all incidents involving information security.

    • Department Owners of Information Assets and Program Management:

      • In collaboration with the Information Asset Custodians, shall ensure that this policy is implemented and implementation is reviewed annually and as appropriate.

      • Shall audit user access rights and privileges to ensure alignment with individual job roles and functions on an annual or more frequent basis as appropriate.

    • Department Information Asset Custodians:

      • Shall review accounts with privileged access no less than semi-annually and verify that continued privileged access is required.

      • In collaboration with Owners of Information Assets, shall ensure the information security control measures are commensurate with the sensitivity or criticality of information assets under their purview.

      • Shall assist Owners of Information Assets in identifying data security controls commensurate with the classification of the data.

      • Shall document, implement, monitor, and maintain data security protection controls based upon the sensitivity or criticality of the assets.

      • Shall develop and implement tools, technologies, processes, and procedures to support, monitor, and maintain data security controls.

      • Shall maintain data security records.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the California Deparmtent of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with the State of California Government Code section 11549.3.

  • Revisions

    • The CIO or Designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, Section 5300-B, Foundational Framework

    • Statewide Information Management Manual, Section 5305-A, Information Security Program Management Standard

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5310.4, Individual Access to Personal Information

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • State Administrative Manual, Section 5310.7, Security Safeguards

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5340.1, Incident Response Training

    • State Administrative Manual, Section 5340.2, Incident Response Testing

    • State Administrative Manual, Section 5340.3, Incident Handling

    • State Administrative Manual, Section 5340.4, Incident Reporting

    • State Administrative Manual, Section 5350.1, Encryption

    • State Administrative Manual, Section 5365, Physical Security

    • State Administrative Manual, Section 5365.1, Access Control for Output Devices

    • State Administrative Manual, Section 5365.2, Media Protection

    • State Administrative Manual, Section 5365.3, Media Disposal

    • Federal Information Processing Standards, FIPS 199

    • Federal Information Processing Standards, FIPS 140-2

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-3, AC-4

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-2, AU-3, AU-13

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-8

    • National Institute of Standards and Technology, Special Publications 800-53, Identification and Authentication, IA-5(1)

    • National Institute of Standards and Technology, Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-5, PE-19, PE-20

    • National Institute of Standards and Technology, Special Publications 800-53, Planning, PL-4

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology, Special Publications 800-53, Security and Communications Protection, SC-4, SC-8, SC-13, SC-17, SC-28

    • National Institute of Standards and Technology, Special Publications 800-63B, Digital Identity Guidelines, Authentication and Lifecycle Management

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 41, Section 48010.5

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 02/2022

5.3.14 Access Control

  • Introduction and Overview

    • Information assets owned by the California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA) are strategic assets intended for official business use, and are entrusted to State personnel and business partners in the performance of their job related duties.

    • Access may enable or restrict the ability to do something with a resource. Access control, then, is the selective restriction of these abilities and is comprised of both physical and logical access.

  • Objectives

    • Objectives for this policy are to:

    • Enable the development and implementation of a CDCR, CCHCS, and CALPIA (hereinafter referred to as department) identity and access management strategy that comprehensively addresses all access to department information assets.

    • Document requirements for the appropriate control and management of physical and logical access to, and the use of department information assets.

    • Require the use of appropriate authentication methods based on the type and sensitivity of information assets being accessed.

    • Govern the use of privileged access rights, such as those assigned to Administrator and Privileged Accounts.

  • Scope and Applicability

    • This policy applies to all personnel; all information assets owned or operated by the department; and all forms of physical and logical access to department information assets, including using wired, wireless, and remote access network connections. All department personnel shall comply with this policy.

  • Policy Directives

    • Before department Information Technology infrastructure network access, users shall be identified and authenticated.

    • Users accessing sensitive or confidential information shall be appropriately provisioned before accessing department owned or operated information assets and associated facilities.

      • In the case of physical access to facilities, where access control is a manual process, authentication shall be accomplished by manual verification of an identity (e.g., photo ID).

    • Access to department information assets and associated permissions shall be approved by the respective department information asset owner.

    • Records of all user account creations, deletions, and changes to user access and permissions shall be maintained for a period of at least 12 months.

    • The department shall develop a comprehensive identity and access management strategy based on statutory and organizational business requirements, including:

      • Supporting unique identification, individual user types and groups, job roles and access methods.

      • Limiting access to information assets and associated facilities to authorized users, processes, or devices, and to authorized activities and transactions.

      • Defining roles and assigning responsibilities pertaining to access control tools, technologies and processes.

      • Developing and implementing standards, technologies and processes to support its access control strategy.

      • Formally defining and documenting user account types and groups, and access use cases, commensurate with employment responsibilities.

      • Employing multi-factor authentication for remote access, and risk-based user authentication methods to accommodate approved logical access use cases.

      • Publicly available or published access and authentication credentials, such as default credentials, anonymous credentials and guest credentials, shall not be re used, and shall be replaced as a matter of standard procedure.

      • Display a notification of system use or security warning banner message on each system that requires affirmative acknowledgement by the user before authentication.

    • The department shall ensure that access to non-active personnel is deactivated before or immediately after termination, as appropriate.

    • The department shall review and validate user access and associated access permissions and privileges at least every 12 months to ensure alignment with individual job roles and functions.

    • Certain department information technology support personnel and network administrators shall require specific privileges to perform their duties.

      • For all Administrators and Privileged Account holders, the department shall:

        • Identify and document all Administrator and Privileged Account holders.

        • Ensure that administrative and privileged accesses are granted to users through established or approved local provisioning processes.

        • Ensure that such users acknowledge the privileges and only use those accounts to fulfill the specific job responsibilities for which the privileges apply.

        • Ensure automated processes including service accounts with privileged access to information systems shall follow established standards for password rotation, limited access and auditing.

        • Review and validate the continued business need for all Administrator and Privileged Accounts on an annual basis or when staffing, resource, or job function changes occur.

    • User access and permissions shall be based on the principles of least privilege and separation of duties.

    • The department shall define and document all auditable system events related to data and information access that shall be recorded.

    • The department shall ensure access control management systems are configured to capture and record audit and security information related to access events.

    • Audit and security records shall be securely stored and protected against tampering; audit and security records shall be maintained for the period defined in the records retention schedule.

    • Monitoring and alerting of anomalous or suspicious activities and events is most effectively accomplished through automated and real-time reviews of audit and security logs.

    • The department shall implement suitable controls to monitor for unauthorized changes to user access. Where feasible, unauthorized changes shall generate automated alerts to notify responsible department individuals.

    • In the absence of automated monitoring and alerting, the department Information Security Officer (ISO) shall review access record reports on a quarterly basis.  Access records include: new user account creation requests, user access revocation requests, active user lists, and user termination lists.

  • Roles and Responsibilities

    • The department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all users of department Information Assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually, and updated accordingly.

      • Is required to audit and assess compliance with this policy at least once every two years.

    • Department Owners of Information Assets and Program Management:

      • In collaboration with the Information Asset Custodians shall ensure that this policy is implemented and implementation is reviewed at minimum annually.

      • Shall audit and assess user access rights and privileges to ensure alignment with individual job roles and functions on an annual basis.

    • Department Information Asset Custodians:

      • Shall implement user access and associated rights and privileges as requested and approved by Owners of Information Assets.

      • In collaboration with Owners of Information Assets, shall periodically review accounts with elevated privileges and verify that continued privilege account access is required.

      • In collaboration with Owners of Information Assets shall ensure access technology and process controls are commensurate with the sensitivity or criticality of information assets under their purview.

      • Shall revoke or modify individual user access rights and privileges upon notification from the Owners of Information Assets.

      • Shall maintain access records consistent with the retention schedule.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible or is technically impossible, if existing policy currently in place already meets these requirements, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variation as defined by the department ISO.

  • Authority

    • This policy complies with California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, Section 5305-A, Information Security Program Management Standard

    • State Administrative Manual, Section 5305.4, Personnel Management

    • State Administrative Manual, Section 5305.7, Risk Assessment

    • State Administrative Manual, Section 5315, Information Security Integration

    • State Administrative Manual, Section 5335, Information Security Monitoring

    • State Administrative Manual, Section 5335.1, Continuous Monitoring

    • State Administrative Manual, Section 5335.2, Auditable Events

    • State Administrative Manual, Section 5355, Endpoint Defense

    • State Administrative Manual, Section 5355.1, Malicious Code Protection

    • State Administrative Manual, Section 5360, Identity And Access Management

    • State Administrative Manual, Section 5360.1, Remote Access

    • State Administrative Manual, Section 5360.2, Wireless Access

    • State Administrative Manual, Section 5365.1, Access Control for Output Devices

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-1, AC-2 (1)(2)(3)(4), AC-3, AC-4, AC-5, AC-6 (1)(2)(5)(9)(10), AC-7, AC-8, AC-11, AC-12, AC-14, AC-17(1)(2)(3)(4), AC-18(1), AC 19(5), AC-20(1)(2), AC-21, AC-22, AC-24

    • National Institute of Standards and Technology, Special Publications 800-53, Audit & Accountability, AU-3, AU-6, AU-7, AU-8, AU-9, AU-10, AU 11, AU-13

    • National Institute of Standards and Technology, Special Publications 800-53, Awareness & Training, AT-2

    • National Institute of Standards and Technology, Special Publications 800-53, Identification & Authorization, IA-1, IA-2, IA-3, IA-4, IA-5, IA-6, IA-7, IA 8, IA-9, IA-10, IA-11

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment RA-1, RA-2, RA-3

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual,, Chapter 4, Article 45, Section 49020.6.1, 49020.7.1, 49020.9, 49020.10

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 03/2022

5.3.15 Acceptable Use

  • Introduction and Overview

    • Information assets owned by the California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA) (including but not limited to department  data and information, laptops, cell phones, and removable storage devices) are strategic assets intended for official business use, and are entrusted to State personnel in the performance of their job-related duties.

    • Inappropriate use of CDCR, CCHCS, and CALPIA (hereinafter referred to as department) information assets could negatively affect the confidentiality, integrity, or availability of the information, information systems, or other information assets of the department and the State of California.  Consequently, it is important for all users to access or use information assets in a responsible, ethical, and legal manner that safeguards department data and information.

    • Additionally, the appropriate use of information assets benefits the State and the department by strengthening the protection of the department and its personnel and business partners from illegal or potentially damaging activities.

  • Objectives

    • This policy defines and establishes the requirements for the appropriate use and safeguarding of department information assets.

  • Ownership of Information

    • Data and information in hard copy format and that which is electronically created, sent, received, processed, or stored on information assets owned, leased, administered, or otherwise under the custody and control of the department are the property of the State. Any information, not specifically identified as the property of other parties and that is transmitted, processed, or stored on the department’s and business partner Information Technology facilities and resources (including e-mail, messages, and files) is considered the property of the department.

    • Individual access and use of department information assets is neither personal nor private.  As such, department management reserves the right to monitor and log all employee use of department information assets with or without advanced notice.

  • Scope and Applicability

    • The scope of this policy extends to all information assets owned or operated by the department and to all personnel authorized to use these assets.

  • Policy Directives

    • The department shall ensure that users use and protect department information assets in accordance with this policy and applicable information security and privacy policies.

    • Department Unacceptable Use

      • The department shall ensure that users do not:

      • Use department information assets to engage in or solicit the performance of any activity that violates laws, regulations, rules, policies, standards, and other applicable requirements issued by the federal government, the State of California, and the department.

      • Use department information assets for personal enjoyment, private gain or advantage, personal gain, political activity, unsolicited advertising, unauthorized fundraising, or an outside endeavor not related to State business.

      • Engage in any activity that attempts to circumvent or alter the function of the department’s security controls (e.g., spoofing email, anonymous proxies, or unauthorized encryption), or other activities that may degrade the performance of information resources, or may deprive an authorized user access to department assets.

      • Share their work-related account(s), passwords, Personal Identification Numbers, security questions/answers, security tokens (e.g., smartcard, key fob), or similar information or devices used for authentication and authorization purposes.

      • Use department information assets to send or arrange to send emails or intentionally access sites that contain pornographic, racist, or offensive material, chain letters or unauthorized mass mailings, and malicious code.

      • Users shall not connect or otherwise attach unauthorized devices or equipment to the department network infrastructure.

  • Roles and Responsibilities

    • The department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • Is required to audit and assess compliance with this policy at least once every two years.

    • Department Information Asset Users:

      • Shall use and protect department information assets in accordance with this policy and applicable information security and privacy policies.

      • Shall report any security concerns pertaining to department information asset security of which they become aware to the department Information Security Officer (ISO), designee, appropriate security staff or their immediate supervisor. Security concerns with information assets may include unexpected software or system behavior, which could result in unintentional disclosure of information or exposure to security threats.

      • Shall report any suspected or actual activities or events indicating misuse or violation of this policy to the department ISO, designee, appropriate security staff or their immediate supervisor.

      • Shall be aware of and adhere to all department information security and privacy policies.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the department ISO.

  • Authority

    • This policy complies with California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, Section 5305-A, Information Security Program Management Standard

    • State Administrative Manual, Section 5305.3, Information Security Roles and Responsibilities

    • State Administrative Manual, Section 5320.4, Personnel Security

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 41, Section 48010.5

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 03/2022

5.3.16 Firewall Configuration

  • Introduction and Overview

    • Network firewalls act as a communications buffer between internal and external devices while simultaneously keeping out unwanted users, viruses, worms, or other malicious programs trying to access the protected network. Firewalls and the technology and procedures that support them help protect internal networks and manage traffic in and out of California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA)’s network.

  • Objectives

    • The objective of this policy is to define how firewalls are to be configured, implemented, and managed within the CDCR, CCHCS, and CALPIA (hereinafter referred to as department).

  • Scope and Applicability

    • The scope of this policy extends to all information assets owned or operated by the department, including mission critical infrastructure and information assets owned or operated by third parties (if applicable) on behalf of the department.

    • This policy applies to the department Chief Information Officer or their designee, Information Technology functions, information security sections, owners of critical infrastructure, Agency and Department Information Security Officers, Technology Recovery Plan coordinators, and Information Asset Custodians.

  • Policy Directives

    • The department shall use a multi-layered approach to protect computer resources and assets. Network security design shall include firewall functionality at all places in the network where opportunities exist for outside exploitation. This may include placing a firewall in areas other than the network perimeter to provide an additional layer of security and protect devices that are placed directly onto external networks (i.e. the Demilitarized Zone [DMZ]) or between different trusted and untrusted segments of the network.

    • Firewall Configuration

      • The department shall:

      • Implement configurations that restrict all inbound and outbound traffic associated with untrusted wired/wireless networks and hosts.

      • Deny all traffic by default and only allow inbound and outbound traffic thru approved exceptions.

      • Disable unnecessary user accounts and default accounts (e.g. Administrator, Guest, etc.).

      • Disable all unused and unnecessary ports, protocols, and services before deployment into a production environment.

      • Implement a DMZ that limits inbound traffic to the internal trusted network and permits authorized publicly accessible services, protocols, and ports/services.

      • Log all changes to firewall configuration parameters, enabled services, and permitted connectivity paths for a period of one year. The department data retention procedures shall be followed.

      • Physically secure firewalls in a location accessible only to authorized personnel.  The placement of firewalls in an open area within a general-purpose data center is prohibited.

  • Firewall Administration and Management

    • The following firewall management practices shall be utilized:

    • Configuration of rulesets and policies shall be managed through an internal change management process.

    • Firewall security logs shall be reviewed no less than every six months to detect any unauthorized entry attempts or network anomalies, and shall be retained for a period of one year.

    • All enterprise firewall rulesets shall be reviewed according to documented processes and procedures.

    • All new inbound and outbound connections requiring firewall rulesets to be applied shall have a valid business justification and the approval of the Information Asset Custodian on behalf of the Information Asset Owner.

    • Current security updates, patches, and anti-virus definitions shall be applied in accordance with documented standards, threat intelligence, and product/vendor guidance.

    • Administrative access shall be restricted to authorized and approved Information Asset Custodians and designated security personnel.

    • Access to management and administrative interfaces shall be available only from locations that are deemed appropriate.

  • Roles and Responsibilities

    • The department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • Is required to audit and assess compliance with this policy at least once every two years.

    • The department Information Security Officer (ISO) is responsible for the oversight and coordination of entity information security policies and procedures.

    • The department Owners of Information Assets and Program Management, in collaboration with the Information Asset Custodians, are responsible for ensuring the protection of information assets under their purview.

    • The department Information Asset Custodians:

      • In collaboration with the Information Asset Owners, are responsible for ensuring implementation of this policy and its directives.

      • Shall review firewall security logs in accordance with this policy.

      • Shall notify the department ISO and the asset owner shall a security incident occur.

    • The department Firewall Administrators are responsible for managing firewall policies, updates, upgrades, software, installations, as well as other network security solutions.  As access and network requirements change, firewall policies shall be updated to reflect these changes.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the department ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3 and State Administrative Manual-5350 Operational Security.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5310.4, Individual Access to Personal Information

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • State Administrative Manual, Section 5310.7, Security Safeguards

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5340.1, Incident Response Training

    • State Administrative Manual, Section 5340.2, Incident Response Testing

    • State Administrative Manual, Section 5340.3, Incident Handling

    • State Administrative Manual, Section 5340.4, Incident Reporting

    • State Administrative Manual, Section 5350.1, Encryption

    • State Administrative Manual, Section 5365, Physical Security

    • State Administrative Manual, Section 5365.1, Access Control for Output Devices

    • State Administrative Manual, Section 5365.2, Media Protection

    • State Administrative Manual, Section 5365.3, Media Disposal

    • Federal Information Processing Standard, FIPS 199

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-3 Access Enforcement, AC-4 Information Flow Enforcement

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-2 Event Logging, AU-3 Content of Audit Records, AU-13 Monitoring for Information Disclosure

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-8 System Component Inventory

    • National Institute of Standards and Technology, Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-5 Access Control for Output Devices, PE-19 Information Leakage, PE-20 Asset Monitoring and Tracking

    • National Institute of Standards and Technology, Special Publications 800-53, Planning, PL-4 Rules of Behavior

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9 Risk Management Strategy

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2 Security Categorization, RA-3 Risk Assessment

    • National Institute of Standards and Technology, Special Publications 800-53, Assessment, Authorization and Monitoring, CA-7 Continuous Monitoring

    • National Institute of Standards and Technology, Special Publications 800-53, System and Communications Protection, SC-4 Information in Shared Resources, SC-8 Transmission Confidentiality and Integrity, SC-13 Cryptographic Protection, SC-17 Public Key Infrastructure Certificates, SC-28 Protection of Information at Rest

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 45, Sections 49020.8, 49020.9 and 49020.10

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 03/2022

5.3.17 Physical and Environmental Protection

  • Introduction and Overview

    • Information assets owned by the California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA) (including but not limited to department  data and information, servers, laptops, tablets, cell phones, and removable storage devices) are strategic assets intended for official business use, and they are entrusted to State personnel in the performance of their job related duties.

    • Restricting physical access to information assets reduces the potential for their damage and misuse. Implementing and maintaining environmental controls provides optimal operating conditions for information assets that are critical to CDCR, CCHCS, and CALPIA (hereinafter referred to as department) business functions.

  • Objectives

    • Objectives for this policy are to establish physical security and environmental protection control requirements to safeguard department information assets against unauthorized access, use, disclosure, disruption, modification, or destruction.

  • Scope and Applicability

    • The scope of this policy extends to all State information assets owned or operated by the department, and governs physical access to department information assets.

    • This policy applies to all department personnel.

  • Policy Directives

    • The department shall define the control requirements for the physical environmental protection of information assets.

    • The department shall implement, manage, monitor, and regularly maintain physical security and environmental protection controls to safeguard State information assets for which they have custodianship.

    • Personnel identification systems and facility access controls shall be implemented for all personnel and visitors. Access logs shall be reviewed at minimum annually.

    • Environmental controls shall be implemented in computer rooms and data centers, including but not limited to, temperature and humidity regulators, fire detection and suppression, and electrical power conditioning.

    • Supporting controls, processes, and procedures to control physical access (e.g., security gates), handling digital media, and emergency processes and procedures shall be implemented.

    • Service records of periodic maintenance of physical and environmental protection controls (e.g., heating/cooling unit servicing) and results of tests of environmental controls (e.g., power outage) shall be retained for a minimum of six months.

    • Security risks shall be identified, remediated, and reported to the department Information Security Officer (ISO).

  • Roles and Responsibilities

    • The department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • Is required to audit and assess compliance with this policy at least once every two years.

    • The department Owners of Information Assets and Program Management:

      • Shall formally approve and authorize access and revocation of access to information assets.

      • In collaboration with the Information Asset Custodians shall validate access to information assets under their purview on an annual basis, or when staffing, resource or job function changes occur.

      • In collaboration with the Information Asset Custodians shall validate protection requirements for information assets under their purview on an annual basis.

    • The department Information Asset Custodians:

      • In collaboration with the Owners of Information Assets shall define protection requirements for information assets under their purview.

      • Shall implement, manage, maintain, monitor, and periodically test physical and environmental protection controls to safeguard State information assets for which they have custodianship and as defined by the respective Owners of Information Assets.

      • Shall track and monitor all access to information assets, including physical access, as defined by Owners of Information Assets, and physical and environmental controls to validate correct operation.

      • Shall maintain all maintenance records and results of periodic tests.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the CDT OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • State Administrative Manual, Section 5325, Business Continuity Planning

    • State Administrative Manual, Section 5360, Identity and Access Management

    • State Administrative Manual, Section 5365, Physical Security

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-1, PE-2, PE-3, PE-4, PE-5, PE-6, PE-8, PE-9, PE-10, PE-11, PE-12, PE-13, PE-14, PE-15, PE-16, PE-17

    • National Institute of Standards and Technology, Special Publications 800-53, Maintenance, MA-1, MA-2, MA-3, MA-4, MA-5

    • National Institute of Standards and Technology, Special Publications 800-53, Contingency Planning, CP-2, CP-3

    • National Institute of Standards and Technology, Special Publications 800-53, Incident Response, IR-1, IR-2, IR-3, IR-4, IR-5, IR-6, IR-7

    • National Institute of Standards and Technology, Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 45, Section 49020.9, 49020.10

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 03/2022

5.3.18 Security Assessment and Authorization

  • Introduction and Overview

    • California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA) is responsible for the integration of information security and privacy within the organization. This includes, but is not limited to, the design and early identification of appropriate security controls in information asset acquisitions, in the design of new systems, or existing systems that are undergoing substantial redesign, including both in-house and outsourced solutions.

    • The CDCR, CCHCS, and CALPIA (hereinafter referred to as department) shall ensure its Information Security Officer (ISO) and, where applicable, its Privacy Program Coordinator and Technology Recovery Coordinator, are actively engaged with both the owners of information assets, and any relevant project, procurement, and technical personnel, to identify and implement the appropriate security controls required to manage risk to acceptable levels. Where applicable, the department ISO shall also work with other stakeholders, as appropriate.

  • Objectives

    • The objective for this policy is to establish a documented security assessment and authorization plan.

  • Scope and Applicability

    • The scope of this policy extends to all State and Agency information assets owned or operated by the department.

    • This policy applies to the department ISO, Privacy Officer, Privacy Program Coordinator, program management, Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • The department shall ensure that a plan for assessing security controls in department information assets is defined and documented. The plan shall include the following:

    • Roles and responsibilities for security assessments and authorization.

    • Assessments are integrated in life cycle processes and operational assessments, and identify weaknesses and deficiencies early in information asset acquisition, development, and integration processes.

    • Essential information needed to make risk management decisions as part of security authorization processes is provided to the defined risk decision makers.

  • Roles and Responsibilities

    • The department Chief Information Officer (CIO) or Designee:

      • Owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • Is responsible for ensuring that this policy is reviewed annually, and updated accordingly.

      • Is required to audit and assess compliance with this policy at least once every two years.

    • The department Information Security Officer (ISO) shall facilitate security assessments and authorizations, and shall provide advice as appropriate.

    • The department Owners of Information Assets and Program Management in collaboration with Information Asset Custodians shall:

      • Ensure that this policy is implemented and shall review the policy’s implementation annually.

      • Ensure requisite security controls are implemented in accordance with applicable security requirements and documented authorizations for information assets.

      • Ensure that any security control gaps and residual risks being accepted are formally documented.

      • Ensure that records and results of assessments and risk decisions are maintained.

      • Ensure that records and results of assessments and risk decisions are provided to information security officers in a timely manner.

    • The department Information Asset Custodians shall implement the requisite security controls based upon the sensitivity or criticality of the assets as defined by the owners of information assets.

    • The department Privacy Officer/Privacy Program Coordinator shall ensure that privacy threshold and privacy impact assessments are completed as part of the security assessment and authorization process.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards, and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, The department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the department ISO.

  • Authority

    • This policy complies with California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, Section 5305-A, Information Security Program Management Standard

    • State Administrative Manual, Section 5305.7, Risk Assessment

    • State Administrative Manual, Section 5315, Information Security Integration

    • State Administrative Manual, Section 5315.9, Security Authorization

    • National Institute of Standards and Technology, Special Publications 800-53, Asset, Authorization, and Monitoring, (CA), CA-1, CA-2, CA-4, CA-6

    • National Institute of Standards and Technology, Special Publications 800-53, System and Information Integrity Policy and Procedures (SI), SI-1, SI 6, SI-12

    • National Institute of Standards and Technology, Special Publications 800-37, Risk Management Framework for Information Systems and Organizations: A Systems Life Cycle Approach for Security and Privacy

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 4, Article 45, Sections 49020.9

    • California Government Code, Section 11549.3

  • Revision History

    • Effective: 03/2022

5.3.19 Audit and Accountability

  • Introduction and Overview

    • In order to detect and respond to signs of attack, anomalies, and suspicious or inappropriate activities, California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, requires an audit and security event logging strategy to continuously monitor access and activities conducted using department information assets.

    • Information assets owned by the department are strategic assets intended for official business use, and are entrusted to state personnel and business partners in the performance of their job-related duties. Since inappropriate or unauthorized access and use of department information assets could result in harm to the state and to the department, it is important to detect and respond to signs of attack, anomalies, and suspicious or inappropriate activities in a timely and proper manner.

  • Objectives

    • This policy guides the development and implementation of department event logging and continuous monitoring strategy and supporting processes to identify and respond to indicators of attack, anomalies, and suspicious or inappropriate activities.

  • Scope and Applicability

    • The scope of this policy extends to all information assets owned or operated by the department.

    • This policy is applicable to department Owners of Information Assets and Information Asset Custodians.

  • Policy Directives

    • Department Owners of Information Assets in collaboration with Information Asset Custodians and the department Information Security Officer (ISO) shall develop and implement an event logging and continuous monitoring strategy of access and activities conducted using department information assets. This strategy shall include, at a minimum, the following items:

    • Define and document the audit logging requirements and security events that shall be recorded, monitored, and reviewed.

    • Identify and implement controls for audit trails and auditability of events for each system as well as for the internal network, accounting for segregation of duties, as appropriate.

    • Perform, at minimum, monthly monitoring of event logs of critical information assets to identify and respond to indicators of attacks, anomalies, and suspicious or inappropriate activities in a timely manner.

    • Define secure storage and retention of event logs.

    • Clearly define roles and responsibilities for event logging and monitoring.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two (2) years.

    • Department Information Security Officer (ISO)

      • The ISO shall guide the development and implementation of the department event logging and continuous monitoring strategy.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets in collaboration with Information Asset Custodians are responsible for ensuring the protection of information assets under their purview.

      • Owners of Information Assets shall participate in the development and implementation of an event logging and continuous monitoring strategy.

      • Owners of Information Assets shall ensure assets are independently and continuously monitored based on the criticality of information assets.

    • Department Information Asset Custodians

      • Information Asset Custodians shall participate in the development and implementation of an event logging and continuous monitoring strategy.

      • Information Asset Custodians shall implement and maintain the department event logging and continuous monitoring strategy.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual 5305-A, Information Security Program Management Standard

    • Statewide Information Management Manual 5340-A, Incident Reporting and Response Instructions

    • State Administrative Manual, Section 5335, Information Security Monitoring

    • State Administrative Manual, Section 5335.1, Continuous Monitoring

    • State Administrative Manual, Section 5335.2, Auditable Events

    • National Institute of Standards and Technology Special Publications 800-53, Audit and Accountability, AU-1, AU-2, AU-3, AU-4, AU-5, AU-6, AU-7, AU-8, AU-9, AU-10, AU-11

    • National Institute of Standards and Technology Special Publications 800-53, Physical and Environmental Protection, PE-2, PE-6, PE-8

    • National Institute of Standards and Technology Special Publications 800-53, Risk Assessment, RA-3

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 22

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.20 Data Retention and Destruction

  • Introduction and Overview

    • The purpose of this policy is to ensure that necessary records and documents are adequately protected and maintained. Records that have reached the records retention maximum lifespan or that are no longer deemed necessary by the California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, are to be destroyed at the proper time and in a secure manner, consistent with records management policies outlined by the Secretary of State’s Office. The policy also describes the obligations of department employees to retain electronic and non‑electronic documents and their proper disposal.

  • Objectives

    • The objective of this policy is to establish the requirements for retaining or disposing of paper and electronic documents including but not limited to:

    • E-mails, texts, chats, and instant messages.

    • Video, audio, and image files.

    • Word processing and spreadsheet files.

    • Website activity and history.

    • Information posted on social networking websites.

    • Voice mails and video mail.

    • Computer programming information, system and audit logs, configuration details.

    • Physical paper documents, media and artifacts.

  • Scope and Applicability

    • The scope of this policy extends to all state information assets owned or operated by the department, as well as information assets owned and operated by third parties (if applicable) on behalf of the department.

    • This policy applies to the department’s Chief Information Officer (CIO) or designee, program management, Owners of Information Assets, Department Information Security Officers, Records Management Coordinators (RMC), Records Management Assistant Coordinators (RMAC), Technology Recovery Plan Coordinators, and Information Asset Custodians.

  • Policy Directives

    • Pursuant to California Government Code Sections 12270-12279, the department shall set records retention schedules to address legal, statutory, and compliance requirements as well as litigation needs, business processes, and data privacy concerns. Storage requirements shall be coordinated with the department RMC to ensure compliance with the State Records Management Act.

    • The department shall:

      • Ensure that roles and responsibilities for the identification, classification, and life cycle management of all department data and information assets are defined, documented, and implemented.

      • Ensure that all department information assets, including information and information systems, are categorized according to their criticality to department in accordance with SAM 5305.5, as well as to their sensitivity and susceptibility to inadvertent damage, loss or exposure and corresponding impacts to department.

      • Ensure that methods to protect the confidentiality, integrity, and availability of department data and information assets according to their classification are defined, documented, and implemented.

      • Ensure that conditions for access to and use of department information assets for all personnel are defined and documented.

      • Ensure that all personnel with access to department data and information assets are trained regarding data access and handling according to their roles and responsibilities.

      • Ensure that department data and information assets are used solely for their intended purpose.

      • Ensure that department data and information assets are securely destroyed and disposed of once they are no longer required by the department.

      • Ensure regular backups shall be completed based on department back-up and retention policy.

  • Data Retention Requirements

    • Retention procedures shall specify:

      • Steps used to archive information and locations where this information is stored.

      • The appropriate destruction of stored information, electronic or other format, after the identified retention period expires. Such steps shall adhere to the requirements outlined in this policy.

      • Chain of custody and handling of stored information, electronic or other format, when under litigation.

    • In certain instances, individual business units have unique record retention requirements outside of documented groups. These requirements shall be documented as part of internal processes and procedures and communicated to the Information Security Officer (ISO), RMC and RMAC. Such requirements may include contractual obligations with customers or business contacts or data retention requirements to maintain business operations. In some instances, departments may need to retain electronically stored information for a historical archive.

    • During the appropriate retention period for electronic records, archived data shall be retrievable. Doing so requires the following protocols:

      • As new software or hardware is implemented, appropriate department support staff shall ensure new systems and file formats can read legacy data. This may require that older data is converted to newer formats where possible.

      • Data that is encrypted shall be retrievable. The department shall implement key management procedures to ensure encrypted data can be decrypted when needed.

    • When establishing record retention periods, the department shall rely on (in order of precedence):

      • Federal and state laws and statutes and regulations.

      • State guidelines, recommendations, rules, and statutory requirements.

      • Internal department requirements and policies.

  • Audit Controls and Management

    • Documented procedures shall be in place for this policy and reviewed annually and updated as needed. Effective organizational management, audit controls, and employee practices include:

    • Documented record retention schedules and archival information of the department.

    • Procedures and anecdotal evidence of data migrations to manage electronic record compatibility with newer systems.

    • Documented encryption and decryption strategies that allow for retrieval of archival electronic records.

    • Employee procedures and documentation of records management and archival processes.

    • Direct observation of archival records organization and storage.

  • Expiration of Retention Period

    • Once a record or data has reached its designated retention period date, the Owner of Information Assets shall refer to the department Data Retention Schedule for appropriate action in accordance with the California State Records Management Act.

  • Sanitization and Destruction

    • When no longer usable, hard drives, diskettes, tape cartridges, CDs, ribbons, hard copies, print-outs, and other similar items used to process, store or transmit sensitive or confidential data shall be properly disposed of in accordance with measures established by SAM 5900 and 1600. (See NIST 800-88, Guidelines for Media Sanitization for further assistance.)

      • Physical media (paper print-outs and other physical media) shall be disposed of by one of the following methods:

        • Shredded using department issued cross-cut shredders.

        • Placed in locked shredding bins for third party shredding to come on-site, retrieve bins and securely shred.

      • Electronic/Magnetic media (hard drives, tape cartridges, CDs, printer ribbons, flash drives, printer and copier hard drives, smart devices, etc.) shall be disposed of by one of the following methods: (See NIST 800-88, Guidelines for Media Sanitization, Appendix A for further details.)

        • Clear – applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques.

        • Purge – applies physical or logical techniques that render Target Data recovery infeasible.

        • Destroy – renders Target Data recovery infeasible and results in the subsequent inability to use the media for storage of data.

    • IT systems that have been used to process, store, or transmit sensitive or confidential information shall not be released from the department’s control until the equipment has been sanitized and all stored information has been cleared using one of the above methods.

  • Suspension of Record Disposal in Event of Litigation Hold

    • Preservation of data is a response to issues involving litigation, legislation, and requests for data pursuant to public records requests. The department shall comply with multiple federal and state laws, legal proceedings, state regulations and standards for the proper preservation and delivery of relevant physical and electronically stored information (ESI) in a timely and reliable manner. Legal counsel shall take such steps as necessary to promptly inform all staff of any suspension in the further disposal of documents. Please refer to the department eDiscovery and Litigation Hold Policy for further details.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or Designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or Designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or Designee is required to audit and assess compliance with this policy at least once every two (2) years.

    • Department Information Security Officer (ISO)

      • The ISO shall ensure processes exist for the secure destruction of paper and electronic records when no longer needed.

      • The ISO shall ensure specific retention requirements for sensitive or confidential data as defined by the Owners of Information Assets are adhered to.

      • The ISO shall ensure the safe and secure disposal of confidential data and information assets.

      • The ISO shall assist Owners of Information Assets and Information Asset Custodians in the identification of data security controls and processes.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets shall ensure that no document is retained for longer than is legally or contractually allowed.

      • Owners of Information Assets shall implement data retention and disposal guidelines limiting data storage and retention times in accordance with legal, regulatory, and business requirements.

      • Owners of Information Assets shall define and enforce data retention requirements.

    • Department Information Asset Custodians

      • Information Asset Custodians shall assist Owners of Information Assets in identifying data retention security controls commensurate with the classification of the data.

      • Information Asset Custodians shall document, implement, monitor, and maintain data retention security protection controls as defined by Owners of Information Assets.

      • Information Asset Custodians shall develop and implement tools, technologies, processes, and procedures to support, monitor and maintain data retention security controls.

    • Department Records Management Coordinator (RMC) and Records Management Assistant Coordinator (RMAC)

      • The RMC, pursuant to Gov. Code 12274, shall assist the RMACs, Owners and Custodians of Information Assets in establishing proper data retention periods.

      • The RMC shall assist in training identified RMACs and entity staff in records retention.

      • The RMACs shall ensure that required data retention periods are maintained and data beyond the lifecycle of established policy is properly disposed.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, Information Security Officer (ISO), and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5310.4, Individual Access to Personal Information

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • State Administrative Manual, Section 5310.7, Security safeguards

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5340.1, Incident Response Training

    • State Administrative Manual, Section 5340.2, Incident Response Testing

    • State Administrative Manual, Section 5340.3, Incident Handling

    • State Administrative Manual, Section 5340.4, Incident Reporting

    • State Administrative Manual, Section 5350, Encryption

    • State Administrative Manual, Section 5365, Physical access

    • State Administrative Manual, Section 5365.1, Access Control for Output Devices

    • State Administrative Manual, Section 5365.2, Media Protection

    • State Administrative Manual, Section 5365.3, Media Disposal

    • Federal Information Processing Standard, FIPS 199

    • National Institute of Standards and Technology Special Publications 800-53, Access Control, AC-3, AC-4

    • National Institute of Standards and Technology Special Publications 800-53, Audit and Accountability, AU-2, AU-3, AU-13

    • National Institute of Standards and Technology Special Publications 800-53, Configuration Management, CM-8

    • National Institute of Standards and Technology Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • National Institute of Standards and Technology Special Publications 800-53, Physical and Environmental Protection, PE-5, PE-19, PE-20

    • National Institute of Standards and Technology Special Publications 800-53, Planning, PL-4

    • National Institute of Standards and Technology Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology Special Publications 800-53, Security Assessment and Authorization, CA-7

    • National Institute of Standards and Technology Special Publications 800-53, System and Communications Protection, SC-4, SC-8, SC-13, SC‑17, SC-28

    • National Institute of Standards and Technology Special Publications 800-53, System and Services Acquisition, SA-11

    • National Institute of Standards and Technology Special Publications 800-53, System and Information Integrity, SI-12

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 1, Article 23, Sections 14060.6.5, 14060.6.6

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 38, Section 47110.15

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.21 Data Security

  • Introduction and Overview

    • California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, collects, processes, transmits, and stores large amounts of data to support essential missions and business functions. Some data maintained by the department may be sensitive or confidential, and may require special precautions to protect it from unauthorized modification, or deletion as per the State Administrative Manual.

    • The department has the responsibility to classify its data and information assets, and to implement suitable controls to protect it from unauthorized access, corruption, or loss.

  • Objectives

    • The primary objective for this policy is to define department requirements to manage the confidentiality, integrity, and availability of department data and information assets throughout their lifecycles: from collection, creation, storage, and use, to destruction and disposal.

  • Scope and Applicability

    • The scope of this policy extends to all state and agency data and information assets owned or operated by the department, and operated by third parties on behalf of the department, and governs all state and department data and information assets in all forms and media types, including digital and physical formats.

    • This policy applies to all department personnel.

  • Policy Directives

    • The department shall:

    • Ensure that roles and responsibilities for the identification, classification, and life cycle management of all department data and information assets are defined, documented, and implemented.

    • Ensure that all department information assets, including information and information systems, are categorized according to their criticality, as well as their sensitivity and susceptibility to inadvertent damage, loss, or exposure and corresponding impact to the department.

    • Ensure that methods to protect the confidentiality, integrity, and availability of department data and information assets according to their classification are defined, documented, and implemented.

    • Ensure that conditions for access to and use of department information assets for all personnel are defined and documented.

    • Ensure that all personnel with access to department data and information assets are trained regarding data access and handling according to their roles and responsibilities.

    • Ensure that department data and information assets are used solely for their intended purpose.

    • Ensure that department data and information assets are securely destroyed and disposed of once they are no longer required by the department.

    • Ensure that the proper authorities are notified of data security incidents as required.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

    • Department Information Security Officer (ISO)

      • The ISO shall assist Owners of Information Assets and Information Asset Custodians in the identification of data security controls and processes.

      • The ISO shall participate in incidents involving data security.

      • The ISO shall ensure that data security controls, methods and processes meet department and applicable regulatory requirements for security and privacy.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets shall ensure that this policy is implemented and reviewed annually, and updated as necessary.

      • Owners of Information Assets shall ensure that roles and responsibilities for the identification, classification, and life cycle management of all data and information assets under their purview are defined, documented and implemented.

      • Owners of Information Assets shall ensure confidentiality and integrity controls commensurate with asset classification are implemented for data and information assets under their purview.

      • Owners of Information Assets shall ensure that conditions and rules for access, availability, and use of data and information assets under their purview are commensurate with asset classification.

    • Department Information Asset Custodians

      • Information Asset Custodians shall assist Owners of Information Assets in identifying data security controls commensurate with the classification of the data.

      • Information Asset Custodians shall document, implement, monitor, and maintain data security protection controls as defined by Owners of Information Assets.

      • Information Asset Custodians shall develop and implement tools, technologies, processes, and procedures to support, monitor and maintain data security controls.

      • Information Asset Custodians shall notify respective Owners of Information Assets and the department Information Security Officer (ISO) and the Privacy Officer of all security incidents pertaining to the security of department data, particularly if the incident is related to personally identifiable information (PII).

      • Information Asset Custodians shall maintain data security records as defined by Owners of Information Assets commensurate with the classification of the data.

    • Department Users

      • Users of department information assets shall be aware of and adhere to all department information security and privacy policies.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual 5305-A, Information Security Program Management Standard

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5310.4, Individual Access to Personal Information

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • State Administrative Manual, Section 5310.7, Security safeguards

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5340.1, Incident Response Training

    • State Administrative Manual, Section 5340.2, Incident Response Testing

    • State Administrative Manual, Section 5340.3, Incident Handling

    • State Administrative Manual, Section 5340.4, Incident Reporting

    • State Administrative Manual, Section 5350, Encryption

    • State Administrative Manual, Section 5365, Physical access

    • State Administrative Manual, Section 5365.1, Access Control for Output Devices

    • State Administrative Manual, Section 5365.2, Media Protection

    • State Administrative Manual, Section 5365.3, Media Disposal

    • Federal Information Processing Standard, FIPS 199

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-3, AC-4

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-2, AU-3, AU-13

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-8

    • National Institute of Standards and Technology, Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-5, PE-19, PE-20

    • National Institute of Standards and Technology, Special Publications 800-53, Planning, PL-4

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology, Special Publications 800-53, Security Assessment and Authorization, CA-7

    • National Institute of Standards and Technology, Special Publications 800-53, System and Communications Protection, SC-4, SC-8, SC-13, SC-17, SC-28

    • National Institute of Standards and Technology, Special Publications 800-53, System and Services Acquisition, SA-11

    • National Institute of Standards and Technology, Special Publications 800-53, System and Information Integrity, SI-12

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, Section 49020.6, 49020.6.1, 49020.6.2

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 46, Section 49030.4

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.22 eDiscovery and Litigation Hold

  • Introduction and Overview

    • Preserving data is necessary in response to reasonably foreseeable litigation, subpoenas, or Public Records Act (PRA) requests, and may be required under applicable state and federal laws and regulations. Data may include both physical and electronically stored information (ESI). ESI is broadly defined as any information stored in an electronic medium, regardless of its manner of creation or use.

  • Objectives

    • The objective of this policy is to establish California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, requirements for identification, preservation, capture, and delivery of relevant data in response to requests for information, audit, archive, and legal proceedings.

  • Scope and Applicability

    • The scope of this policy extends to all information assets owned or operated by the department, as well as information assets owned or operated by third parties (if applicable) on behalf of the department.

    • This policy applies to the department’s Chief Information Officer (CIO) or their designee, data owners, legal compliance staff, Agency and Department Information Security Officers, Privacy Officers, Privacy Program Coordinators, Records Management Coordinator (RMC), Records Management Assistant Coordinators (RMACs), Information Asset Custodians, and all users of department information systems.

  • Policy Directives

    • The department shall:

    • Preserve specific active and archived stored information and follow department data classification procedures when a litigation hold request is made.

    • Provide a written litigation hold notice to all involved parties with clear instructions on what should be preserved and held.

    • Ensure data and metadata are stored in a manner such that the data source is known and secured.

    • Ensure necessary and appropriate record retention systems are created and maintained consistent with the records management policies outlined by the Secretary of State’s Office.

    • Ensure proper controls for the preservation of data are implemented, including electronic communications which may reasonably be subject to legal proceedings.

    • Establish a process for the intake and fulfillment of PRA requests.

    • Establish standard protocols for the collection, analysis, and delivery of data including chain of custody, data integrity and auditability of records.

    • Provide Records Retention and eDiscovery training to appropriate staff.

    • Return or destroy all preserved or archived data to the affected individuals and resume the normal destruction schedule after the legal duty to preserve evidence ends.

  • Electronically Stored Information Subject to Discovery

    • ESI is any information stored in an electronic medium, regardless of its format, location, or medium. ESI is subject to discovery in civil litigation and may also be requested under the PRA. ESI includes, but is not limited to:

      • E-mails, texts, chats, and instant messages.

      • Video, audio, and image files.

      • Word processing and spreadsheet files.

      • Website activity and history.

      • Information posted on social networking websites.

      • Voice mails and video mail.

      • Computer programming information, system and audit logs, configuration details.

    • In the event of a litigation hold, this policy shall supersede requirements set forth in the Data Retention and Destruction Policy.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

      • The CIO or designee is responsible for establishing eDiscovery teams in order to efficiently and properly coordinate the responses to PRA requests and information, audit, archive and legal proceedings.

    • Department Information Security Officer (ISO)

      • The ISO is responsible for the oversight of all department data preservation and compliance requirements and ensures that all applicable standards and guidelines are maintained and reviewed regularly.

      • The ISO shall assist in the development of data preservation, planning, and production of entity data assets.

      • The ISO shall assist the RMC, RMACs, Owners of Information Assets, and Information Asset Custodians with ensuring that data preservation, storage, integrity, and delivery meet the SAM 5310, 5310.5, 5310.6 and SAM 5305 requirements for security and privacy.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets and program management supporting the department mission, state essential functions, or critical infrastructure shall participate in records retention processes, and ensure data is classified, labeled, and managed according to defined standards.

      • Owners of Information Assets supporting the department mission, state essential functions, or critical infrastructure shall ensure that records management is incorporated into standard business operation practices.

      • Owners of Information Assets shall ensure that all pertinent data that is required for the eDiscovery process is preserved and maintained according to the department’s defined standards.

    • Department Information Asset Custodians

      • Information Asset Custodians shall only assist with authorized data collection and preservation requests.

      • Information Asset Custodians shall ensure that the integrity of the data collection and preservation process is maintained and the request is fulfilled.

      • Information Asset Custodians shall ensure the requested data is secure and available to the legal team as needed.

    • Department Legal Counsel

      • Legal Counsel shall provide the department eDiscovery designee a written notice to suspend routine or intentional purging of relevant data including overwriting, reusing, deleting, or any other destruction of electronic relevant information.

      • Legal Counsel shall notify appropriate parties when the obligation to retain the preserved data ends.

    • Department Records Management Coordinator (RMC) and Records Management Assistant Coordinator

      • The RMC, pursuant to Gov. Code 12274, shall assist the RMACs, Owners, and Custodians of Information Assets in establishing appropriate data retention periods.

      • The RMC shall assist in training identified RMACs and entity staff in records retention.

      • The RMACs shall ensure that required data retention periods are maintained and data beyond the lifecycle of established policy is properly disposed.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual, Section 5305-A, Data Retention and Destruction

    • State Administrative Manual, Section 5010, Maintenance Records

    • State Administrative Manual, Section 1600, Records Management

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • Federal Information Processing Standard, FIPS 199

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-3, AC-4

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-2, AU-3, AU-13

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-8

    • National Institute of Standards and Technology, Special Publications 800-53, Media Protection, MP-1, MP-2, MP-3, MP-4, MP-5, MP-6, MP-7

    • National Institute of Standards and Technology, Special Publications 800-53, Physical and Environmental Protection, PE-5, PE-19, PE-20

    • National Institute of Standards and Technology, Special Publications 800-53, Planning, PL-4

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology, Special Publications 800-53, Security Assessment and Authorization, CA-7

    • National Institute of Standards and Technology, Special Publications 800-53, System and Communications Protection, SC-4, SC-8, SC-13, SC 17, SC-28

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 1, Article 16, Sections 13040.7, 13040.7.1, 13040.7.2

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 36, Section 47090.10

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 38, Sections 47110.7, 47110.16

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, Section 49020.10.6

    • California Government Code Section 6250

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.22.1 Health Care Litigation Support eDiscovery and Litigation Hold

  • Policy

    • California Correctional Health Care Services (CCHCS) shall protect and preserve electronically stored information (ESI) under health care (medical, mental health, and dental) for litigation and California Public Records Act (PRA) purposes. ESI is discoverable under the California Code of Civil Procedure, Sections 2031.010(a), (e) and  2031.030(a)(2), (c)(1). No data will be disclosed without first being reviewed by the Health Care Litigation Support Section (LSS) and, when needed, CCHCS’ Office of Legal Affairs (COLA) to ensure legal necessity, relevance, and  removal of all privileged information.

  • Responsibilities

    • The Deputy Director, Policy and Risk Management Services, or designee, has the authority to coordinate the protection and preservation of ESI, release records requested for litigation, investigation, and PRA purposes and shall ensure departmental compliance with this policy.

    • The Associate Director (AD), Risk Management Branch (RMB), shall designate a CCHCS Litigation Coordinator and CCHCS PRA Coordinator, or designee, responsible for coordinating the preservation, retention, discovery, and response to all health care-related litigation and PRA requests.

    • LSS is responsible for coordinating the preservation, retention, discovery, and production of ESI relevant to health care-related litigation and PRA requests.

  • Procedure

    • Litigation Hold

      • Litigation holds may be placed on ESI including, but not limited to, health records; health care grievances; emails; text messages; voice mail messages; video, audio, and image files; website activity and history; hard drives; state-issued cell phone data; and personnel records for which CCHCS is the custodian of records.

      • LSS staff shall:

        • Preserve or retain ESI as required when a request or retention letter is received from the Office of Attorney General (OAG), CDCR Office of Legal Affairs (OLA), COLA, contract counsel, or private law office.

        • Conduct preservation or retention in the manner, timeframe and for the specific active and archived ESI as required in the letter of preservation or retention.

        • Follow department data classification procedures when a litigation hold request is made, and if requested, provide a written litigation hold notice to all involved parties with clear instructions on what should be preserved and held.

        • Ensure proper controls for the preservation of ESI are implemented, as it may be subject to legal proceedings.

      • Litigation holds shall be released upon closure of a lawsuit or dismissal of a defendant.

    • eDiscovery for Litigation

      • The eDiscovery process, which includes identifying, obtaining, and exchanging ESI, shall only be used for litigation or investigational purposes to ensure the security of sensitive or pertinent information.

      • To fulfill litigation or investigation obligations, LSS shall utilize eDiscovery software to:

        • Conduct email searches.

        • Facilitate access to eDiscovery software for the OAG, OLA, COLA.

        • Coordinate with CCHCS and CDCR staff on eDiscovery efforts.

        • Manage necessary storage and production in consultation with the Information Technology Services Division as directed by the OAG, OLA, COLA, or contract counsel.

    • eDiscovery for Public Records Act Requests

      • Any member of the public may request email records pursuant to California Government Code, Sections 7920.000-7930.215.

      • LSS staff shall conduct an eDiscovery search within parameters responsive to the request.

      • Additional information related to PRA requests is outlined in the Health Care Department Operations Manual, Section 5.1.2, California Public Records Act Requests.

  • Training and Resources

    • LSS staff shall utilize the Health Care Litigation Support Section Operating Standards and resource documents available on the CCHCS Intranet.

    • LSS shall provide Records Retention and eDiscovery training to appropriate staff.

  • References

    • California Code of Civil Procedure, Part 4, Title 4, Chapter 14, Article 1, Section 2031.010(a), (e) and Section 2031.030(a)(2), (c)(1)

    • California Government Code Title 1, Division 10, Chapter 3.5 Inspection of Public Records, Sections 7920.000-7930.215

    • Health Care Department Operations Manual, Chapter 5, Article 1, Section 5.1.2, California Public Records Act Requests

  • Revision History

    • Effective: 08/02/2023

5.3.23 Identification and Authentication

  • Introduction and Overview

    • Information assets owned by California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, are intended to be accessed by authorized entities and used exclusively for department business purposes. Consequently, it is imperative that all entities requesting access to department information assets are uniquely identified prior to being granted access.

  • Objectives

    • The objective for this policy is to establish department requirements to control access to information assets by uniquely identifying the entities requesting access before access is granted.

  • Scope and Applicability

    • The scope of this policy extends to all state and agency information assets owned and operated by the department, information assets managed by third parties on behalf of the department, and all information assets that process or store department information in support of department services and mission.

    • This policy applies to all department personnel and processes acting on behalf of the department.

    • This policy governs physical and logical access. Logical access includes local access and network, including remote access.

  • Policy Directives

    • The department shall ensure that a department identity and access management (IAM) strategy is developed, clearly defined, documented, and implemented.

    • The department IAM strategy shall include the following:

      • Requirements to meet all state and federal requirements.

      • The unique identification of all authorized personnel or processes acting on behalf of the department that access department information assets prior to being granted access.

      • The use of appropriate credentials for the identification of non-state personnel.

      • Implement methods that enable non-repudiation of access requests to information assets containing sensitive and confidential data, and protect related audit logs for a period of no less than six months.

      • Implementation of a suitable IAM infrastructure supporting department requirements.

      • Implementation of safeguards to protect the confidentiality, integrity, and availability of the supporting IAM infrastructure.

      • Definition and implementation of authentication mechanisms based on the type and method of access and the inherent risks associated with each access use case.

      • Control and management of access by administrative and privileged users, including the ability to immediately revoke access when necessary.

      • Requirement to implement application level identification and authentication in addition to platform level access to provide additional security, as appropriate by Owners of Information Assets.

      • Definition, documentation, and implementation of audit and security activity and event logging requirements for privileged use.

      • Identification, development, and implementation of supporting identity and access management processes and procedures.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets shall ensure that this policy is implemented and shall review the policy’s implementation annually.

      • Owners of Information Assets in collaboration with Information Asset Custodians shall ensure that identification and authentication technologies and process controls commensurate with the sensitivity or criticality of the asset are implemented for assets under their purview.

    • Department Information Asset Custodians

      • Information Asset Custodians shall assist Owners of Information Assets in selecting and implementing identification and authentication technologies and process controls commensurate with the sensitivity or criticality of the asset.

      • Information Asset Custodians shall maintain the identification and authentication infrastructure and supporting processes and procedures.

      • Information Asset Custodians shall maintain identification and authentication records as defined by Owners of Information Assets for a minimum of twelve (12) months, or as defined by the department’s Information Security Officer (ISO).

    • Department Users

      • Users shall report any incidents of possible misuse or violation of this policy to the department ISO, designee, appropriate security staff or their immediate supervisor.

      • Users shall be aware of and adhere to all department information security and privacy policies.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of State information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual 5340-A, Incident Reporting and Response Instructions

    • Statewide Information Management Manual 5360-A, Telework and Remote Access Security Standard

    • State Administrative Manual, Section 5335, Information Security Monitoring

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5360, Identity and Access Management

    • National Institute of Standards and Technology, Special Publications 800-53, Identification and Authentication, IA-1, IA-2, IA-3, IA-4, IA-5, IA-6, IA 7, IA-8, IA-9, IA-10, IA-11, IA-12

    • National Institute of Standards and Technology, Special Publications 800-53, Access Control, AC-1, AC-2, AC-3, AC-4, AC-5, AC-5, AC-7, AC-8, AC 9, AC-10, AC-11, AC-12, AC-13, AC-14, AC-15, AC-16, AC-17, AC-18, AC-19, AC 20, AC-21, AC-22, AC-23, AC-24, AC-25

    • National Institute of Standards and Technology, Special Publications 800-53, Audit and Accountability, AU-1, AU-2, AU-10, AU-11, AU-12, AU-13

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, Sections 49020.5, 49020.10

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.24 Incident Response

  • Introduction and Overview

    • California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, management shall promptly investigate incidents involving loss, damage, misuse of information assets, or improper dissemination of information. Incidents could also include unauthorized access of information asset and incidents negatively affecting the operation, confidentiality, integrity, or availability of information assets. All entities are required to report information security incidents in accordance with the state information security notification and reporting requirements.

    • Effective incident management includes the formulation, adoption, and maintenance of a written incident management plan that provides for the timely assembly of appropriate staff that are capable of developing a response to, appropriate reporting about, and successful recovery from a variety of incidents. A defined and documented security incident response plan shall enable the department to detect, respond, and recover from security incidents in a timely and organized manner so as to minimize the impacts of the security incident.

  • Objectives

    • The objective for this policy is to establish the requirements for a department security incident response plan.

  • Scope and Applicability

    • The scope of this policy extends to all state and agency information assets owned or operated by the department as well as information assets managed by third parties on behalf of the department.

    • This policy applies to all department personnel.

  • Policy Directives

    • The department shall:

    • Ensure that a security incident response plan and related procedures, including specific responses to incidents involving Personally Identifiable Information (PII) are defined, documented and implemented.

    • Ensure that the security incident response plan and procedures clearly define and document roles and responsibilities to address the full incident life cycle, including:

      • Security incident detection and identification

      • Security incident response management

      • Incident handling team(s), with broad participation from other department stakeholders, under the coordination of a designated incident manager.

      • Preservation of evidence, including tracking and maintaining the evidence pertaining to chains of custody and evidence.

    • Ensure that mechanisms and procedures are implemented to enable personnel to report security incidents to the appropriate security staff and the department’s Office of Information Security. Ensure all department personnel are aware of incident reporting mechanisms and procedures.

    • Immediately report incidents through the California Compliance and Security Incident Reporting System (Cal-CSIRS) providing the incidents meet the reporting requirements. Cal-CSIRS requires specific details about the incident and shall notify the California Department of Technology Office of Information Security (OIS), as well as the California Highway Patrol (CHP) Computer Crimes Investigation Unit.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee shall ensure that the department has a formally documented and operational incident response plan to address incidents involving the loss, damage, misuse or unauthorized access of information assets, and breaches of security involving personal information in any form, in the most expedient and effective manner.

      • The CIO or designee shall ensure that the security incident response plan and procedures describe the necessary roles and responsibilities, and activities to enable security incident handlers to effectively prepare for, detect, analyze, contain, eradicate and recover from security incidents.

      • The CIO or designee shall ensure that security incident response management is integrated across the department, and with other state and department contingency and emergency management plans, teams and advisory resources.

      • The CIO or designee shall ensure that all department personnel receive incident response and awareness training and education in accordance with the individual’s functional role within the department.

      • The CIO or designee shall ensure that department incident response capabilities are exercised at least annually to test incident response effectiveness, and that results from tests are documented and reviewed to continuously improve capabilities.

      • The CIO or designee shall ensure that post-mortem/lessons-learned sessions following security incident response activities and tests are completed in order to continually improve incident response capabilities.

      • The CIO or designee shall ensure that all security incidents and department responses are monitored and documented, and all related activities and decisions are recorded.

      • The CIO or designee shall ensure that the department incident response plan, procedures and supporting documentation are updated at minimum on an annual basis.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

    • Department Information Security Officer (ISO)

      • The ISO shall assist Owners of Information Assets and Information Asset Custodians in the development of department incident response plans.

      • The ISO shall participate in incident response and management activities.

    • Department Owners of Information Assets and Program Management.

      • Owners of Information Assets shall participate and provide assistance with and decisions related to responding to incidents involving information assets under their purview, as required, and as requested by incident managers, the Chief Information Officer (CIO) or Designee and the department ISO.

    • Department Information Asset Custodians

      • Information Asset Custodians shall participate and provide assistance with incident response activities as directed and guided by incident managers, ISOs, and Owners of Information Assets, as appropriate.

      • Information Asset Custodians shall maintain records related to and supporting individual incident responses.

    • Department Users

      • Users shall be aware of and adhere to all department information security and privacy policies.

      • Users shall report any incidents of possible misuse or violation of this policy to the department ISO, designee, or appropriate security staff or their immediate supervisor.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual 5340-A, Incident Reporting and Response Instructions

    • Statewide Information Management Manual 5340-B, Information Security Incident Report (Cal-CSIRS)

    • Statewide Information Management Manual 5340-C, Requirements to Respond to Incidents Involving a Breach of Personal Information

    • State Administrative Manual, Section 5340, Information Security Incident Management

    • State Administrative Manual, Section 5340.1, Incident Response Training

    • State Administrative Manual, Section 5340.2, Incident Response Testing

    • State Administrative Manual, Section 5340.3, Incident Handling

    • State Administrative Manual, Section 5340.4, Incident Reporting

    • National Institute of Standards and Technology, Special Publications 800-53, Contingency Planning, CP-2, CP-9, CP-10, CP-13

    • National Institute of Standards and Technology, Special Publications 800-53, Incident Response, IR-1, IR-2, IR-3, IR-4, IR-5, IR-6, IR-7, IR-8, IR 9, IR-10

    • National Institute of Standards and Technology, Special Publications 800-53, Program Management, PM-9

    • National Institute of Standards and Technology, Special Publications 800-53, Risk Assessment, RA-2, RA-3

    • National Institute of Standards and Technology, Special Publications 800-53, Security Assessment and Authorization, CA-7

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, 49020.12, 49020.12.1, 49020.12.2

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.25 Security and Privacy Awareness Training

  • Introduction and Overview

    • A well-trained workforce, aware of information privacy and security risk, plays a crucial role in protecting organizations against a variety of information security threats. Consequently, a formal privacy and security awareness training program is a key component of California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA)’s, hereinafter referred to as department, information security program.

  • Objectives

    • Objectives for this policy are to establish the requirement of a formal and effective department privacy and security awareness and training program for all department personnel.

  • Scope and Applicability

    • The scope of this policy applies to all department personnel and governs all forms of access to department information assets.

  • Policy Directives

    • The department shall:

    • Establish a formal department privacy and security awareness training program, with clearly defined roles and responsibilities, designed to be delivered to all personnel with access to department information assets.

    • Provide privacy and security awareness training to all personnel upon commencement of their employment with the department, and on an annual basis thereafter.

    • Ensure role-based privacy and security awareness training content is delivered commensurate with personnel roles and responsibilities.

    • Ensure effectiveness of the security awareness program through a process of tracking and reporting metrics.

    • Maintain individual records of all security and privacy training undertaken annually by department personnel for a period of three years or as defined in the records retention schedule.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

    • Department Information Security Officer (ISO)

      • The ISO shall ensure the development implementation, and compliance of the department’s security awareness training program.

    • Department Privacy Officer

      • The Privacy Officer shall ensure the development, implementation, and compliance of the department’s privacy awareness training program.

    • Department Users

      • Users shall participate in all required privacy and security awareness training annually.

      • Users shall be aware of and adhere to all department information security and privacy policies.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • The department Information Security Officer (ISO), Chief Privacy Officer or Coordinator and Training Coordinator shall provide department program management with regular reports on personnel participation in, and the effectiveness of privacy and security and awareness training.

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • State Administrative Manual, Section 5305.3, Information Security Roles and Responsibilities

    • State Administrative Manual, Section 5320, Training and Awareness for Security and Privacy

    • State Administrative Manual, Section 5320.1, Security and Privacy Awareness

    • State Administrative Manual, Section 5320.2, Security and Privacy Training

    • State Administrative Manual, Section 5320.3, Security and Privacy Training Records

    • State Administrative Manual, Section 5320.4, Personnel Security

    • National Institute of Standards and Technology, Special Publications 800-53, Planning, PL-4

    • National Institute of Standards and Technology, Special Publications 800-53, Awareness and Training, AT-1, AT-2, AT-3, AT-04

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 41, Section 48010.5

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, Sections 49020.4, 49020.7.2, 49020.7.3, 49020.7.3.1

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.26 Software Management and Licensing

  • Introduction and Overview

    • State entities are required to establish and maintain an inventory of all information assets, including information systems, information system components, software, and information repositories (both electronic and paper). The inventory shall contain a listing of all programs and information systems identified as processing, storing, or transmitting California Department of Corrections and Rehabilitation (CDCR), California Correctional Health Care Services (CCHCS), and California Prison Industry Authority (CALPIA), hereinafter referred to as department, information.

    • The department uses computer software applications that are owned by the state, as well as commercial software and open-source software (OSS) licensed for use from vendors.

    • This policy identifies department requirements for the management of department software assets.

  • Objectives

    • The objective of this policy is to establish formalized control and management of all types of software including the development of requisite tools, processes procedures and standards.

  • Scope and Applicability

    • The scope of this policy extends to all state and agency software assets owned or licensed by the department.

    • This policy applies to the department Information Security Officer, Program Management, Owners of Information Assets, and Information Asset Custodians.

  • Policy Directives

    • The department shall:

    • Maintain a detailed inventory of all approved department state-owned, commercial and open-source software, including licensing requirement(s), currency, and the cost of the software.

    • Control and manage all instances and usage of approved department software installed on department information assets in order to comply with all applicable legal, copyright, and licensing requirements.

    • Establish a continuous monitoring process to identify, detect, and remove all unapproved department software installed or operating on department information assets.

    • Develop, implement, and maintain a software management plan.

    • Identify and track any department software that is at end-of-support /end-of-life, and shall ensure that maintenance agreements and processes are in place where appropriate to ensure software can remain operational to meet business requirements.

    • Establish and maintain controls to prevent unauthorized personnel from installing software applications on state information assets.

  • Roles and Responsibilities

    • Department Chief Information Officer (CIO) or Designee

      • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

      • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

      • The CIO or designee is required to audit and assess compliance with this policy at least once every two years.

    • Department Information Security Officer (ISO)

      • The ISO shall assist and provide advice in the evaluation and selection of department software.

      • The ISO shall assist and provide advice in the identification of security requirements that software shall comply with.

    • Department Owners of Information Assets and Program Management

      • Owners of Information Assets shall ensure that this policy is implemented and shall review the policy’s implementation annually.

      • Owners of Information Assets shall ensure that software assets under their purview are controlled and managed.

    • Department Information Asset Custodians

      • Information Asset Custodians shall implement software management, licensing, and usage controls as approved by Owners of Information Assets.

      • Information Asset Custodians shall maintain all department software licenses associated with commercial products on behalf of Owners of Information Assets.

  • Enforcement

    • Non-compliance with this policy may result in disciplinary or adverse action as set forth in the Department Operations Manual, Chapter 3, Article 22.

    • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their general counsel, ISO, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

    • The consequences of negligence and non-compliance with state laws and policies may include department and personal:

      • Loss of delegated authorities.

      • Negative audit findings.

      • Monetary penalties.

      • Legal actions.

  • Auditing

    • The department has the right to audit any activities related to the use of state information assets.

    • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

  • Reporting

    • Violations of this policy shall be reported to the department ISO.

  • Security Variance Process

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISO.

  • Authority

    • This policy complies with State of California Government Code Section 11549.3.

  • Revisions

    • The CIO or designee shall ensure that the contents of this article are current and accurate.

  • References

    • Statewide Information Management Manual 5305-A, Information Security Program Management Standard

    • Statewide Information Management Manual 120, Software Management Plan Guidelines

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5315.7, Software Usage Restrictions

    • State Administrative Manual, Section 4846.1, Software Management Plan

    • State Administrative Manual, Section 4846.2, Software Management Policy Reporting Requirements

    • National Institute of Standards and Technology, Special Publications 800-53, Configuration Management, CM-8, CM-10, CM-11

    • National Institute of Standards and Technology, Special Publications 800-53, System and Information Integrity, SI-7

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 3, Article 22

    • California Department of Corrections and Rehabilitation, Department Operations Manual Chapter 4, Article 45, Section 46030.4

    • California Government Code Section 11549.3

  • Revision History

    • Effective: 11/30/2022

5.3.27 Generative Artificial Intelligence

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain requirements for all CCHCS workforce members on the appropriate use of Generative Artificial Intelligence (Gen AI) in its operations including, but not limited to, content creation, data analysis, and decision-making. CCHCS values information security and is committed to providing the necessary resources and training to support a secure environment.

  • Purpose

    • This policy defines the roles and processes for using Gen AI and applies to all information assets owned or operated by CCHCS or third parties on behalf of CCHCS.

  • Responsibility

    • The Chief Information Officer (CIO), CCHCS, shall act as primary executive sponsor for this policy.

  • Governance Roles

    • The CIO shall:

      • Determine risk response for all Gen AI uses and purchases, whether intentional or unintentional and shall not delegate the determination.

      • Ensure that all users of information assets are aware of this policy and acknowledge their individual responsibilities.

      • Review this policy annually and update as necessary to remain compliant with National Institute of Standards and Technology (NIST) PL-1 and California state regulations.

    • The Information Security Officer (ISO) shall:

      • Participate in risk assessments associated with Gen AI and related technologies.

      • Ensure that all use of Gen AI and related technologies are governed and approved prior to implementation.

      • Audit and assess compliance with this policy at least once every two years.

    • Information asset owners and program management shall ensure:

      • Personnel using Gen AI are trained for use according to their roles and responsibilities.

      • Risks associated with the use of Gen AI are identified, managed, monitored, and captured in the appropriate risk registry.

      • Gen AI applications are documented and inventoried.

      • All Gen AI usage has a qualified human reviewer as the ultimate decision maker for any process, input, or output that would directly impact a human.

      • A non-Artificial Intelligent (AI) alternative process is available if there are identified risks to humans, services, or systems.

    • Information Asset Custodians shall:

      • Implement, maintain, and monitor Gen AI access and security controls.

      • Collaborate with information asset owners and program management as necessary.

    • Information Asset Users shall be aware of and adhere to all information security and privacy policies.

  • Coordination Among Business Units

    • Information security policy development, review, and authorization shall be facilitated by the Regulation and Policy Section who is responsible for ensuring interdisciplinary participation from all business units.

    • This interdisciplinary engagement ensures policy alignment with operational reality, clinical needs, security and privacy obligations coupled with federal and state mandates.

  • Compliance

    • CCHCS workforce members shall adhere to all CCHCS Information Security policies and procedures.

    • Non-compliance with this policy may result in corrective or disciplinary action, up to and including termination as set forth in California Department of Corrections and Rehabilitation Department Operations Manual, Chapter 3, Article 22 and Title 15 Chapter 1.

    • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request an exemption as defined by the Chief information Security Officer.

  • Directives for AI Usage

    • CCHCS shall ensure:

      • Gen AI procurements shall complete all processes and assessments for Gen AI as outlined in the Statewide Information Management Manual and the State Administrative Manual.

      • Gen AI and related technologies are approved and governed prior to use for official business purposes to ensure compliance with applicable industry standards, regulations, and laws.

        • Governance shall be conducted by a committee of relevant business stakeholders and technical experts from CCHCS as determined by the CIO and ISO.

      • The CIO and ISO shall document and inventory all Gen AI applications. The inventory shall contain a System Security Plan, which includes, but is not limited to:

        • System documentation.

        • Incident response plans.

        • Data dictionaries, if applicable.

        • Links to implementation software or source code.

        • Names and contact information for relevant AI actors.

      • CCHCS workforce members using Gen AI with data and information assets are trained regarding Gen AI use according to their roles and responsibilities.

      • Use of Gen AI in clinical settings, such as diagnostic support, care documentation, or summarization, include clinical validation and oversight by a licensed health care staff.

      • Gen AI tools shall not be integrated with Electronic Health Record Systems or clinical decision systems without explicit risk assessment and approval by the CIO and an equivalent Chief Medical Officer, if applicable.

      • Gen AI tools do not process or store Protected Health Information (PHI) or Personally Identifiable Information (PII) unless explicitly reviewed and approved by the Privacy Office and the CIO.

      • Use of Gen AI for data analysis in connection with any research project is prohibited unless the specific Gen AI model complies with all applicable federal and state laws and regulations, including but not limited to the HIPAA, the Common Rule (45 Code of Federal Regulations [CFR] Part 46), and state privacy and information security laws.  If a Gen AI model is used with a research project the following shall occur:

        • De-identified of PHI and PII in accordance with 45 CFR 164.514.

        • Undergo an expert review and receive determination that the risk of re-identification is minor.

        • Incorporate safeguards to prevent bias and promote equity as outlined in California Government Code 11549.63.

        • Be approved by or receive a letter of exemption from an Institutional Review Board where required.

      • Gen AI and related technologies shall utilize the NIST 800-53 Revision 5 family of security controls at the moderate baseline.

      • Gen AI usage shall have a qualified human reviewer for any process, input, and output that could potentially yield unwanted impact to:

        • A person’s civil liberties, rights, physical or psychological safety, or economic opportunity.

        • A group such as discrimination against a population sub-group.

        • Democratic participation or educational access.

        • The business operations, reputation, information security or finances of an organization.

        • Interconnected and interdependent information assets.

        • The global financial system, supply chain, or interrelated systems.

        • Natural resources, the environment, or planet.

        • A human.

      • Gen AI usage shall have a non-AI process available if it could potentially harm the items listed in subsection (J).

  • References

    • Code of Federal Regulations, Health Insurance Portability Accountability Act, Summary of HIPAA Privacy Rule (45 CFR Parts 160, 164 Subparts A, C, and E)

    • Code of Federal Regulations, Health Insurance Portability Accountability Act, Security Rule (45 CFR 164 Subpart C)

    • Executive Order 14110 (Oct 2023) – “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence”

    • Executive Order N-12-23

    • California Civil Code, Division 1, Part 2.6, Section 56-56.16, et seq., Confidential Medical Information Act

    • California Civil Code, Division 3, Part 4, Section 1798.100, et seq., California Consumer Privacy Act & CPRA & 2023 Update

    • State Administrative Manual, Section 4986, Artificial Intelligence Introduction

    • State Administrative Manual, Section 4986.3, Gen AI Use Identification and High-Risk Inventory

    • State Administrative Manual, Section 4986.9, Gen AI Procurement

    • State Administrative Manual, Section 4986.10, Privacy for Gen AI

    • State Administrative Manual, Section 4986.11, Security for Gen AI

    • State Administrative Manual, Section 4986.12, Acceptable Use of Gen AI

    • State Administrative Manual, Section 4986.13, Gen AI Workforce Training

    • State Administrative Manual, Section 5305.5, Information Asset Management

    • State Administrative Manual, Section 5310.4, Individual Access to Personal Information

    • State Administrative Manual, Section 5310.6, Data Retention and Destruction

    • Statewide Health Information Policy Manual Section 3.3.5: Access Control

    • Statewide Information Management Manual, 5305-F, Generative Artificial Intelligence Risk Assessment

    • Statewide Information Management Manual, 5310-C, Privacy Threshold Assessment and Privacy Impact Assessments

    • Statewide Information Management Manual, 180 – Statement of Work Guidelines

    • Statewide Information Management Manual, 71A – Certification of Compliance with IT Policies Preparation Instructions

    • Statewide Information Management Manual, 71B – Certification of Compliance with IT Policies Template

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.15, Acceptable Use

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.19, Audit and Accountability

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.21, Data Security

  • Revision History

    • Effective: 03/18/2026

Article 4 – Labor Relations

5.4.1 Official Notice to Labor Organizations

  • Policy

    • The California Correctional Health Care Services (CCHCS), Labor Relations Unit (LRU), is responsible for maintaining, planning, organizing, developing, monitoring, and administering CCHCS’ labor relations policies, programs and services to ensure compliance with California Government Code (GC) Section Codes 3512 through 3539.5.

    • The LRU shall provide Official Notice, to labor organizations when a change in policy, procedure, or past practice meets the threshold for Official Notice under the Memorandum of Understanding, as defined by the GC, Sections 3512 through 3524; or the Excluded Employee Bill of Rights, GC, Sections 3525 through 3539.5.  Once Official Notice has been provided to a labor organization, they may request to meet via the formal meet and confer process. The LRU represents for CCHCS in the formal meet and confer process between recognized labor organizations and the state.

  • Purpose

    • To define the LRU’s process for providing Official Notice to labor organizations which may be required when there are proposed changes in program, policy, procedure or other terms and conditions of employment.

  • Applicability

    • This policy shall be applicable for all situations that may require an Official Notice to labor organizations including, but not limited to changes that:

    • Affect working conditions of employees.

    • Relate to employees’ hours of work, wages, or other terms and conditions of employment.

    • Modify staffing, programs, or assignments including activation and deactivation.

  • Procedure

    • Institution Roles And Responsibilities

      • When institution management proposes or identifies necessary changes that may affect working conditions, hours of work, wages, or other terms and conditions of employment, supervisors/managers, with the Labor Relations Analyst (LRA) assistance, shall complete the Negotiation Preparation Tool and assemble necessary documentation for submission to the LRU.

      • The institution LRA shall assist local management in completing the Negotiation Preparation Tool, ensure all appropriate and necessary documents are included, and submit the finalized Negotiation Preparation Tool to LRU.

      • The Hiring Authority (HA) shall ensure that the Negotiation Preparation Tool package includes accurate, complete, and finalized documents. The Negotiation Preparation Tool must be signed by the Chief Executive Officer (CEO) or Regional Health Care Executive.

      • The LRU shall:

        • Review the Negotiation Preparation Tool package submitted by the institution and determine if an Official Notice(s) is required to the labor organizations. 

        • Review the Negotiation Preparation Tool package for potential impact to employees, including workload, safety, and logistics. Depending on the classifications that are impacted (e.g., Registered Nurses [RN], Dentists, Psychologist, Physicians, etc.), multiple notices may be required. If LRU identifies Division of Adult Institutions employees to be impacted, a copy of the Negotiation Preparation Tool shall be forwarded to CDCR Office of Labor Relations and LRA.

        • Provide direction and guidance to the LRA, supervisors/managers, and the HA in their respective roles and responsibilities.

    • Headquarters/Program Roles And Responsibilities

      • When management from a headquarters (HQ) program proposes or identifies necessary changes that may affect working conditions, hours of work, wages, or other terms and conditions of employment, supervisors/managers shall complete the Negotiation Preparation Tool and assemble necessary documentation, for submission to the LRU.

      • The HQ program Deputy Director (DD)/Director shall ensure that the Negotiation Preparation Tool package includes accurate, complete, and finalized documents. The Negotiation Preparation Tool must be signed by the DD or Director.

      • The LRU shall:

        • Provide assistance to HQ management, and review the Negotiation Preparation Tool package and determine whether or not Official Notice(s) is required to the labor organizations. 

        • Review the Negotiation Preparation Tool package for potential impact to employees including workload, safety, and logistics. Depending on the classifications that are impacted (e.g., RNs, Dentists, Psychologist, Physicians, etc.), multiple notices may be required.

    • Completing The Negotiation Preparation Tool And Summary Memorandum

      • Management shall complete the Negotiation Preparation Tool and prepare a summary memorandum for the appropriate authority signature and submit the package to the LRU. The summary memorandum shall include the following:

        • A description of the policy/procedure change, including the proposed implementation date. The implementation date must be at least 30 to 60 days in the future or after the organization has been provided Official Notice (see below).

          • Requires 30-Day Notice Period

            • American Federation of State, County, and Municipal Employees

            • California Association of Psychiatric Technicians

            • Service Employees International Union

            • Union of American Physicians and Dentists

            • Supervisory Organizations

          • Requires 60-Day Notice Period

            • International Union of Operating Engineers

          • Requires 30 to 60-Day Notice Period (based on whether the implementation is at one institution, two institutions, or statewide)

            • California Correctional Peace Officers Association

        • The reason for the change. Include copies of any applicable court orders, laws, injunctions, and/or governing deadlines.

        • The perceived or alleged impact to employees, including workload, safety, and logistics.  Include current process and the proposed new process.

        • A description of all related staffing changes, including the classifications and number of staff that may be affected.

        • One or more subject matter experts, at a supervisory/managerial level, who will participate in the formal meet and confer process (name, title, classification, and phone number).

      • Provide the following documents associated with the change, as applicable. All documents must be in final and approved versions (no drafts).

        • Policy/Local Operating Procedure

        • Health Care Department Operations Manual/Department Operations Manual

        • Memorandums

        • Post Orders

        • Duty Statements

        • Training Curriculum

        • Schedules

        • Regulation Revision

        • Post Assignment Schedule

        • Master Assignment Roster

        • Organizational Charts

        • Relevant Clinical Care Guides

    • Submission of the Negotiation Preparation Tool

      • The institution supervisor/manager shall submit the completed Negotiation Preparation Tool package to the institution LRA.  For HQ, programs submit the package to the DD/Director.

      • The LRA/CEO/DD/Director shall review, sign, and submit the Negotiation Preparation Tool package to the LRU mailbox at m_CCHCSLaborNegotiatPrepTool@cdcr.ca.gov.

        • Once the LRU receives the Negotiation Preparation Tool package, the assigned staff shall review the contents of the package to determine if an Official Notice(s) is required.

          • If the LRU determines that no Official Notice(s) is required, the HA and LRA shall be informed of that determination.

          • If the LRU determines that an Official Notice(s) is required, the LRU staff shall prepare the Official Notice(s) and send it to the affected labor organization(s).

        • A copy of the Official Notice(s) shall be sent to the HA and LRA. After the Official Notice(s) is sent, and if the affected labor organization(s) request to meet regarding the proposed changes, the LRU shall coordinate with the LRA and the HA in preparation for the meet and confer process.

  • References

  • Revision History

    • Effective: 01/2022

Article 5 – Business Services

5.5.1 Access to Leased Space

  • Policy

    • California Correctional Health Care Services (CCHCS) shall authorize CCHCS Business Operations Section staff access to all areas of CCHCS leased space.

  • Applicability

    • This policy applies to all CCHCS Business Operations Section staff requiring access to all areas of CCHCS leased space.

  • Procedure

    • CCHCS, Business Operations Section, Space Management Unit, is responsible for the management of all CCHCS leased space, including space planning, safety and security issues, and building maintenance. Reasons for access include, but are not limited to:

    • Workplace Safety: Monitor building suites, office spaces, storage rooms, and file rooms with regular spot checks to ensure all areas are safe and in compliance with the State Fire Marshal and California Occupational Safety and Health Administration standards and regulations.

    • Repair/Maintenance: Coordinate building maintenance and repairs including escorting contractors and/or vendors in areas that require attention.  Monitor office space temperature for heating and cooling changes.

    • Moves/Reconfigurations: Coordinate staff moves, repair, modify, and add or remove conventional and modular furniture. 

    • Paper Delivery/Shred and Recycle Pickup: Delivery of paper to copy and print stations.  Coordinate monthly pickup and emptying of shred and recycle bins located in all CCHCS leased space.

    • Mail Delivery/Pickup: Delivery and pick-up of mail twice daily to designated locations.

    • Secured Areas: In order to gain access to secured areas (e.g., Central Fill, Human Resources) the Business Operations Section must notify Program Management and provide the purpose for the visit.  Some areas may require staff/guests to sign-in before entering.

      • For maintenance issues within secured areas, contractors or vendors shall be escorted by the Business Operations Section staff. 

      • In the event of an emergency or urgent matter, the Business Operations Section may enter secured areas without prior notice.

  • References

    • Health Care Department Operations Manual, Chapter 5, Article 5, Section 5.5.3, Staff Setup and Office Move Requests

  • Revision History

    • Effective: 09/2017

5.5.2 Building Security and Access

  • Policy

    • California Correctional Health Care Services (CCHCS), Business Operations Section (BOS), shall manage physical building security and access including: access cards, physical keys, security cameras, security guards, panic buttons, and intrusion alarms for physical properties occupied by CCHCS.  Building access shall be restricted and security shall be closely monitored to ensure the safety and well-being of all staff (including contractors) and visitors.

  • Applicability

    • This policy applies to all staff and visitors on physical property where building security or access is monitored or managed by the BOS.

  • Procedure

    • Building Security

      • Staff shall carry their California Department of Corrections and Rehabilitation (CDCR) identification badge and building access card on their person at all times.

      • Staff shall present their CDCR identification badge when entering a secured area where security guards or reception staff are stationed.

      • Staff or visitors without a valid CDCR identification badge shall sign in as a visitor and be escorted by a staff member with a valid CDCR identification badge while in the building.

      • Staff shall immediately report all security incidents or perceived threats to the BOS by calling (916) 691-3002 during business hours, Monday through Friday, 8:00 a.m. to 5:00 p.m., excluding State holidays, or (916) 691-3099 outside of normal operating hours.

      • Staff shall ensure that doors close and completely latch behind them when entering or exiting a door within a CCHCS property.

      • Staff shall not hold, prop open, or otherwise prevent any exterior or interior door from closing on CCHCS properties.

      • Staff shall not tamper with, bypass, or circumvent card readers electronically or physically to gain unauthorized entry into a secure area.

    • Building Access

      • To request a new access card, temporary access card, access modification, or access card reactivation, staff shall submit a manager-approved Service Request Form through the CCHCS Service Portal.  The form is available at the following link: Business Operations – Service Request Form.pdf – All Documents (sharepoint.com)

      • Requests for 24/7, after-hours, weekend access, and access for institution staff or non-CDCR/CCHCS staff must be approved by the requesting program’s Deputy Director, or designee.

      • Requests for access to restricted areas (i.e., non-general access areas) shall be approved by the Deputy Director, or designee, responsible for the oversight of the program located within the restricted area.

      • All access requests are subject to BOS management review.

      • Staff shall sign for their own access card upon receipt.

        • Elk Grove Campus and Sacramento Office staff shall retrieve access cards from the BOS located at Building C in Elk Grove, California.

        • Regional Offices staff shall retrieve access cards from their designated onsite BOS representative.

      • Staff shall not knowingly provide access to anyone who does not possess an access card, CDCR identification badge, or have the necessary access permissions to enter a secured area.

      • Staff shall not share usage of their assigned access card with other staff or visitors for any reason.

      • Lost, stolen, or damaged access cards shall be reported to the BOS immediately through the CCHCS Service Portal via the following link: https://cchcsprod.servicenowservices.com/sp?sysparm_stack=no

        • In the event of a lost, stolen, or damaged access card, a temporary access card shall be issued for a period of no longer than five business days.

        • Staff shall pay a replacement fee of $5.00 to CDCR Accounting.

        • The BOS shall issue a replacement access card once proof of payment has been provided.

      • Staff shall immediately return all found or recovered access cards to the BOS.

        • Staff shall not be reimbursed for access card replacement fees if the access card is located after the replacement fee has been paid.

      • Access cards that have not been used to gain entry for a period of 30 calendar days may be suspended by the BOS.

      • Upon staff separation/termination from CDCR/CCHCS, supervisors and managers shall be responsible for the collection of access cards and physical keys no later than the date of separation/termination from employment and shall return access cards and physical keys to the BOS.

        • Upon staff termination, termination notices or memorandums shall be routed to the BOS. 

        • Access card deactivation requests shall be submitted through the CCHCS Service Portal. Access cards and/or physical keys shall be returned to the BOS the day following the staff’s separation date as follows:

          • For staff located at the Elk Grove Campus, return to the BOS located at: Building C, 1st floor, Suite 100, via interoffice mail.

          • For staff located at CCHCS Regional Offices, return to the onsite BOS representative.

          • For staff located at Depot Park, Central Fill Pharmacy, or institutions, return via interoffice mail to the BOS located at the Elk Grove Campus: Building C, 1st floor, Suite 100, or mailed to the following P.O. Box.

            • Attn: Business Operations Section
              Building C, Suite 100
              P.O. Box 588500
              Elk Grove, CA  95758-8500

    • Physical Keys

      • To request physical keys to an office or cubicle, staff shall submit a manager-approved Service Request Form through the CCHCS Service Portal.

      • A Key Control Log for each CCHCS location shall be retained by the BOS to track the issuance of physical keys.

      • Staff shall sign for their own physical keys upon receipt.

        • Elk Grove Campus and Sacramento Offices staff shall retrieve physical keys from the BOS located at Building C in Elk Grove, California.

        • Regional Offices staff shall retrieve physical keys from their designated onsite BOS representative.

      • Upon receiving the requested physical key, staff shall sign and acknowledge receipt of the physical key on the Key Control Log provided by the BOS.

      • Staff shall not duplicate, distribute, destroy, or transfer ownership of physical keys.

      • Managers/supervisors shall be responsible for returning physical keys to the BOS which are assigned to their staff the following day after relocation or separation of staff.

    • Panic Buttons

      • Panic buttons shall only be activated by staff in the event of:

        • A life-threatening emergency.

        • A situation necessitating immediate armed emergency response.

        • A situation where it is impractical or unsafe for staff to use a telephone.

      • Acceptable criteria for activating a panic button shall be as follows:

        • Obvious criminal activity and/or workplace violence situation.

        • Serious disturbances by an individual or group.

      • Upon pressing a panic button, and only when it is safe to do so, staff shall:

        • Dial 9-9-1-1 to provide further details of the emergency and additional information which may assist emergency response personnel in quickly resolving the situation.

        • Contact the BOS emergency line at (916) 691-3099 to provide further details such as the reason for the panic button activation and the location where the emergency response personnel are required.

      • In the event that a panic button is pressed accidentally, immediately contact the BOS customer support line at (916) 691-3002 to provide notification of the mistake and to cancel emergency response.

    • Intrusion Alarms

      • Physical properties occupied by CCHCS have intrusion alarms which are armed between 6:00 p.m. and 6:00 a.m., Monday through Friday, and 24-hours a day on Saturdays, Sundays, and State holidays.

      • Staff shall not touch, tamper with, modify, or clear alarms on intrusion alarm panels unless authorized to do so, in any form of writing, electronic, or otherwise from the BOS.

      • Staff with an access card provided by the BOS will not set off intrusion alarms when entering or exiting the building as building access cards will bypass intrusion alarms for a period of 60 seconds upon a successful card read on the card reader.

      • Staff shall not hold, prop, or otherwise prevent doors from closing.  A door which is held open for 60 seconds or longer will activate intrusion alarms.

      • Staff shall ensure that, when entering or exiting, the door properly closes and latches behind them to prevent activating an intrusion alarm accidentally or creating an unnecessary security issue.

      • Staff shall immediately report an intrusion alarm incident by calling the BOS emergency line at (916) 691-3099, upon becoming aware of the intrusion alarm.

      • Non-BOS staff shall not contact intrusion alarm monitoring companies or local law enforcement directly to cancel the dispatch of emergency responders.

  • Revision History

    • Effective: 01/2018
      Revised: 12/2020

5.5.3 Staff Setup and Office Move Requests

  • Policy

    • California Correctional Health Care Services (CCHCS), Business Operations Section (BOS) shall maintain a process to provide services for the setup and movement of office and cubicle space.

  • Applicability

    • This policy applies to all staff who utilize office space in any CCHCS leased location.

  • Procedure

    • Staff Setup Requests

      • Staff setup requests shall be submitted for the following staff:

        • New

        • Transfer

        • Current

        • Returning from extended leave (e.g., paternity, maternity, administrative)

        • Promotion

      • The requesting program shall identify a space to assign to the staff.  If office or cubicle space is unavailable, the requesting program shall contact the Space Management Unit (SMU) to discuss alternatives.

        • All office or cubicle space allocations shall adhere to State Space Allowances Standards (State Administrative Manual, Section 1321.14). Deviation from this standard shall require a detailed justification submitted with the staff setup or move request and shall be reviewed by BOS management. Additional management approval may be required based on the type of deviation.

        • Staff are entitled to a single space assignment and shall not be assigned a space in multiple locations or buildings.

      • A staff setup request shall be initiated by submitting a manager-approved Service Request Form through the CCHCS Service Portal no less than ten business days prior to the staff’s official start date.

      • BOS shall review the request on a first-come, first-served basis.  Upon approval, the setup of the space and equipment shall be coordinated with Information Technology Services Division (ITSD) staff.

      • The requesting program shall be notified via the CCHCS Service Portal when the staff setup has been completed and the space is ready for occupancy.

    • Staff Move Requests

      • A staff move request shall be initiated by submitting a manager-approved Service Request Form through the CCHCS Service Portal no less than ten business days in advance of the requested move.

      • BOS shall review the request on a first-come first-served basis.  Upon approval, BOS shall coordinate the move request with ITSD staff and third party moving companies if necessary.

    • Individual Staff Moves of Less Than Ten Staff

      • Individual staff moves shall occur during regular business hours, 8:00 a.m. to 5:00 p.m., one day per week to be mutually agreed upon by local SMU and ITSD staff.  If the scheduled move date falls on a State holiday, the move shall occur the next business day following the State holiday.

      • Staff shall not be moved outside of the weekly schedule except to prevent potential health and safety issues.

    • Program Moves of Ten or More Staff

      • In addition to the manager-approved Service Request Form, the requesting program shall submit the following with their request.

        • Program Information Sheet.

        • Memorandum justifying the business need for the move request and the impact on operations if the request is not approved.

      • The requesting program shall designate a liaison to assist BOS in coordination of move efforts and communications with impacted staff.

      • Larger moves shall generally occur after business hours to limit the disruption to staff and mitigate potential health and safety risks during the move.  Moves may occur during business hours when deemed necessary by BOS.

      • Move dates shall be mutually agreed upon by all involved parties and are subject to change based on a variety of circumstances including, but not limited to:

        • Construction/alteration schedules

        • Modular furniture installation schedules

        • State holidays

        • Contractor availability

        • Severe weather

    • General Move Practices/Guidelines

      • All moves shall receive approval from BOS management prior to staff movement.  Staff shall not move themselves to another space without authorization from BOS.

      • Staff, except those designated as ITSD Desktop Support staff, are not authorized to move equipment regardless of classification, experience, training, or any other factors.

      • Staff shall be responsible for packing and labeling the items in their own workspace utilizing the boxes and labels provided by BOS.  If staff are out of the office or unable to pack their own items, the staff’s manager shall be responsible for ensuring the staff’s workspace is packed prior to the move date.

      • Any item which does not have a label shall not be moved.  Item(s) too large to box, or that otherwise cannot be boxed, shall have a label placed on each unpacked item.

      • Managers and supervisors shall be responsible for ensuring vacated workspaces are cleared of all items.

      • Personal items not belonging to the State shall be the staff’s responsibility to move (e.g., pictures, plants, radios, clocks, fans).  Staff shall not receive compensation for or replacement of personal items lost or damaged during a move.

      • Staff shall not move any items into their new workspace until BOS has completed their portion of the move.

      • All furniture (e.g., credenzas, storage/supply cabinets, bookcases) must be emptied prior to the move.

      • All notes (e.g., post-its, papers, flyers) must be removed from all equipment and bulletin/cork boards scheduled to be moved.

      • The requesting program shall be notified via the CCHCS Service Portal when the requested move has been completed.

  • Links

  • References

  • Revision History

    • Effective: 05/2017
      Revised: 12/2020

5.5.4 Individual Workspace Reconfiguration

  • Policy

    • California Correctional Health Care Services (CCHCS), Business Operations Section (BOS) shall maintain a process for staff to request individual workspace reconfigurations.  Cubicle and office designs shall be based on standard/typical furniture layouts.  Deviations from the standard/typical furniture layouts may be accommodated for certain building constraints as deemed necessary by BOS staff.

  • Applicability

    • This policy and procedure applies to all staff who are assigned a workspace in any CCHCS leased space managed by the BOS.

  • Procedure

    • The Space Management Unit, the BOS, is responsible for the management of all CCHCS leased space, modular systems furniture, and conventional office furniture.  There are two types of reconfigurations: Reasonable Accommodation/Ergonomic Evaluation reconfigurations and Legitimate Business Need reconfigurations.

    • Requests for individual workspace reconfigurations which deviate from the standard/typical office configuration due to a request for an approved reasonable accommodation or ergonomic evaluation from the Disability Management Unit (DMU) shall adhere to the following process:

      • Reasonable Accommodation: Workspace reconfiguration includes, but is not limited to:

        • Lighting changes.

        • Workspace reconfigurations.

        • Sit/stand workstations.

        • Air purifiers.

        • Equipment containing heating elements.

          • The Request for Reasonable Accommodation (RRA) may be submitted by an employee verbally, in writing, or via a CDCR 855, Request for Reasonable Accommodation.  The employee shall submit the RRA to their manager/supervisor or Return to Work Coordinator for processing.

      • Ergonomic Evaluation: Workspace reconfiguration includes, but is not limited to:

      • Cost Estimate Approval

        • Once DMU has determined the appropriate accommodation, a cost estimate memorandum shall be provided to the program’s Deputy Director, or designee, for approval.

        • Once the cost estimate is approved, it shall be sent to the Fiscal Management Section for review and approval to ensure the funding is available and the cost is included in the program’s spend plan.

        • The expense of the individual workspace reconfiguration shall be charged to the program. 

        • If funding is unavailable, the request for reconfiguration shall be approved and the cost estimate signed by the Director, Health Care Policy and Administration.

      • Request for Workspace Reconfiguration

        • A signed Service Request Form and approved cost estimate shall be attached to the service request to the BOS through the CCHCS Service Portal.

        • If the cost estimate is not approved, the BOS shall not proceed with the requested workspace reconfiguration.

      • Completion of Work:  BOS staff shall coordinate with the appropriate subcontractors and the staff member(s) in the impacted workspace(s) to complete the workspace reconfiguration.

    • Requests for an individual workspace reconfiguration that deviate from the typical office configuration for a legitimate business need shall adhere to the following process.

      • Legitimate Business Need

        • Any staff member can submit the request through the CCHCS Service Portal.

        • The staff member shall complete and attach a Service Request Form

        • The Service Request Form shall include the legitimate business need for the workspace reconfiguration and shall be approved and signed by the program’s Deputy Director or designee. 

        • The Deputy Director, Business Services, shall review the request for workspace reconfiguration and determine if a reconfiguration is necessary. 

        • If the request is approved, the Deputy Director, Business Services, shall sign the bottom of the Service Request Form. 

        • If the request is not approved, the BOS shall not proceed with the requested reconfiguration.

      • Approved Cost Estimate

        • If the Deputy Director, Business Services, approves the request for workspace reconfiguration, BOS staff shall provide a cost estimate memorandum to the program’s Deputy Director or designee, for approval.

        • Once the cost estimate is approved by the program and the BOS, it shall be sent to the Fiscal Management Section by the requesting program for review and approval to ensure the funding is available and the cost is included in the program’s spend plan. 

        • The expense of the individual workspace reconfiguration shall be charged to the program requesting the reconfiguration.

        • If funding is unavailable, the request for reconfiguration shall be approved and the cost estimate signed by the Director, Health Care Policy and Administration.

      • Request for Reconfiguration: Upon cost estimate approval, the cost estimate shall be attached to the existing request for reconfiguration ticket by the requesting program in the CCHCS Service Portal.

      • Completion of Work: BOS staff shall coordinate with the appropriate subcontractors and the staff member(s) in the impacted workspace(s) to complete the workspace reconfiguration.

  • Links

  • Revision History

    • Effective: 02/2019
      Revised: 12/2020

5.5.5 Requesting Standard Office Supplies

  • Policy

    • California Correctional Health Care Services (CCHCS) Business Operations Section (BOS) Operations Support Unit shall provide access to standard office supplies from CCHCS headquarters for all CCHCS and Division of Health Care Services (DHCS) offices including the Central Fill Pharmacy, Health and Imaging Records Center (HIRC), regional offices, and the Division of Juvenile Justice (DJJ).

  • Procedure

    • Business Operations Liaison and Alternate

      • Each program shall identify a BOS liaison and an alternate.  The Business Operations liaison shall be the primary contact for any standard office supply request submitted.

      • The program shall provide the program name and contact information of the BOS liaison and alternate via email to the Staff Services Manager I, Operations Support Unit, and shall ensure the contact information is current at all times.

    • Supply Requisition Form

      • Standard office supplies shall be requested by submitting through the CCHCS Service Portal a manager-approved Supply Requisition Form which is accessed via Lifeline as follows:

      • Select the following link: Business Operations Resources (sharepoint.com).

      • Select “Business Operations” located on the left side of the screen under the Business Services section of Policy and Administration.

      • Select “Resources” in the Quick Links box on the right side of the screen and select the “Operations Support” tab.

      • Select “Supply Requisition Form.”

      • All information is required to be completed.

      • Obtain manager signature on Supply Requisition Form via DocuSign.

      • Save the manager-approved Supply Requisition Form to your computer.

    • Create a Request in the CCHCS Service Portal

      • Standard office supply requests shall be submitted via the CCHCS Service Portal via the following link:  https://cchcsprod.servicenowservices.com/sp?sysparm_stack=no

      • The CCHCS Service Portal can also be accessed via Lifeline.

        • Select the following link: https://cdcr.sharepoint.com/sites/cchcs_lifeline.

        • Select “Business Operations” located on the left side of the screen under the Business Services section of Policy and Administration.

        • Select “CCHCS Service Portal” located in the Applications box.

      • Select “Business Operations Request”

      • Fields with red “*” must be completed. Use drop down arrows where indicated to complete the form.

      • Select “Add Attachment” and select the saved, signed Supply Requisition Form. Select “Open”.

      • Select “Submit”.  This will generate a ticket number for tracking purposes and will send the ticket to the BOS Operations Support Unit for processing.

    • Pick-up and Delivery

      • Once the BOS Operations Support Unit has fulfilled the supply request, notification of pick-up or delivery shall be completed as follows:

        • If the requestor is located in buildings C or D, an email shall be sent notifying the liaison or alternate the order is ready for pick-up.

        • If the requestor is located in buildings B, E, F, G; the HIRC; or Central Fill Pharmacy, an email shall be sent with notification of the delivery date.

        • If the requestor is located in a regional office the supplies will be delivered to the requestor and a shipping confirmation email shall be sent with the tracking number.

      • With the exception of regional offices, smaller supply items shall be placed in a red storage box.  The storage boxes shall be returned within 24 hours to the BOS office located at 8260 Longleaf Drive, Building C, Suite 100.  Boxes may also be placed in the program’s mail pick-up location.

    • Supplies Not Listed on the Supply Requisition Form

      • The program shall request non-standard office supplies not on the Supply Requisition Form by creating a Purchase Requisition through the Acquisitions Management Unit.  For information regarding Purchase Requisitions:

      • Select the following link: Acquisitions Management – Home (sharepoint.com).

      • Select “Acquisition Management” located on the left side of the screen under the Business Services section of Policy and Administration.

      • Select “Resources” located in the Quick Links box on the right side of the screen.

      • Select the “Ordering Process and Deadlines” tab.

      • Select the “AMS Workbook – The Ordering Process, Health Care Goods and Support (non-Provider) Services” for detailed instructions.

  • Revision History

    • Effective: 01/2018
      Revised: 08/2021

5.5.6 Conference and Quiet Rooms

  • Policy

    • California Correctional Health Care Services (CCHCS) shall ensure that staff have access to conference and quiet rooms, as well as ensure that all conference and quiet rooms are well maintained.

  • Applicability

    • CCHCS employees who require the use of conference rooms or quiet rooms.

  • Procedure

    • General Guidelines

      • Conference rooms of various sizes shall be made available to CCHCS staff through the automated reservation system in the Microsoft Outlook Calendar.

      • Quiet rooms may be reserved using the STD 101, State Appointment Calendar posted outside of each quiet room.

      • Conference rooms and quiet rooms are available to all CCHCS staff for use during normal operating business hours on a “First-Come First-Served” basis.

        • If there are no suitable conference rooms available for use, the Real Estate Services Division and Building and Property Management Branch has provided the following directory of conference rooms available in Department of General Services-owned buildings for use by State agencies: Reserve a Conference Room for State Business (ca.gov).

    • Conference Room Guidelines

      • Conference room reservations shall be made through the automated reservation system in the Microsoft Outlook Calendar for conference rooms located in common, accessible areas.  For step-by-step instructions on reserving a conference room, see the following instruction guide: Reserving a Conference Room.pptx.

        • Staff shall follow the general guidelines below when reserving a conference room through the automated reservation system:

          • Do not reserve a date/time that is already reserved.  Should a date/time that has already been reserved be unavailable, it is up to the two individual parties making the reservation to discuss alternative scheduling.

          • If a room has a “tentative” reservation, contact the requestor of that reservation before reserving that room.

          • Do not mark the conference room reservation as “PRIVATE.”

          • Cancel the reservation as soon as it becomes apparent that the room is no longer needed.

          • Do not contact Business Operations Services (BOS) or the Information Technology Services Division (ITSD) to reserve a conference room on your behalf.  Assistance with conference room reservations are available if necessary by submitting a request through the CCHCS Service Portal.

          • On the reservation, describe the purpose of the reservation and list a contact person/meeting organizer who can be contacted for any questions.

        • Certain locations do not offer automated reservations of conference rooms.  Refer to the following conference room directory for a list of available conference rooms, seating capacity, available equipment, and the method used to make a reservation: Conference-Rooms-Directory.pdf.

    • Conference/Quiet Room Usage

      • Use of conference and quiet rooms shall comply with all applicable state and local building/fire codes and health and safety laws.

      • Conferences and events must not exceed the maximum room occupancy set forth by the State Fire Marshal.

      • No extraordinary electrical or mechanical equipment, such as crock pots, shall be used without prior arrangements and approval from the Business Operations Space Management Unit.  To request the use of such electrical or mechanical equipment, submit a request through the CCHCS Service Portal in the Solution Center: https://cchcsprod.servicenowservices.com/sp.

      • Tape, nails, staples, thumb-tacks, etc. may not be used on facility walls, ceilings, or windows and candles or other open flames are not permitted.

      • The meeting organizer is responsible for making necessary arrangements to prepare the room for their event, including set-up and take down. Tables, chairs and other furniture shall be arranged carefully so as not to damage any wall or equipment.

      • Furniture may be moved within the meeting room in order to accommodate special events, but must be returned to the original arrangement at the conclusion of the event. If furniture is to be temporarily removed from any room, the meeting organizer must submit a request through the CCHCS Service Portal at least five business days in advance so BOS may coordinate these efforts.

      • The meeting organizer is responsible for cleaning up after each event, including a wipe-down of the tables, chairs, and floors as needed.  If any food waste was placed in the trash cans, the meeting organizer must submit a request through the CCHCS Service Portal to ensure janitorial staff removes all trash.

      • All food and beverages must be consumed within the conference room and/or adjacent break room areas, if applicable. If food and/or beverages were dropped or spilled, it is the meeting organizer’s responsibility to submit a request through the CCHCS Service Portal to ensure janitorial staff cleans the affected area.

      • Break rooms, hallways, and restrooms that are adjacent to conference rooms shall remain available to all CCHCS staff as they are considered common areas. Audio transmissions and attendee voices must be kept at a reasonable volume to avoid disruption to neighboring rooms and office areas.

      • The meeting organizer is responsible for notifying attendees of the meeting location and ensuring all attendees have appropriate access to buildings, meeting areas, and common areas such as restrooms.  For inquiries regarding building and meeting room access, submit a request through the CCHCS Service Portal.

      • Some conference rooms provide access to audio/video technologies, such as teleconferencing and videoconferencing equipment.  If assistance with equipment is required, the meeting organizer shall submit a request through the Solution Center for ITSD staff to assist during the event at least five business days in advance of the event.

    • Violations

      • Use of conference and quiet rooms shall comply with all applicable state and local building/fire codes and health and safety laws.

      • Conferences and events must not exceed the maximum room occupancy set forth by the State Fire Marshal.

  • References

    • California Code of Regulations, Title 19, Division 1, State Fire Marshal

    • California Code of Regulations, Title 24, Part 9, California Fire Code

    • California Building Standards Law, Health and Safety Code, Division 13, Part 2.5, Sections 18901-18949.31

  • Revision History

    • Effective: 07/2015
      Revised: 12/2020

5.5.7 Emergency Notification System Registration

  • Policy

    • California Correctional Health Care Services (CCHCS) shall ensure staff is notified timely in the event of an emergency.  The Business Continuity Unit (BCU) shall utilize the Emergency Notification System (ENS) to notify staff via work desk phone, work email, and state issued cell phone.  Staff are required to register in the ENS in order to receive notification and can be notified via personal devices if contact information is provided.

  • Applicability

    • This policy applies to all CCHCS headquarters (HQ) staff and all staff who occupy office space in any CCHCS leased location.

  • Compliance and Accountability

    • Management of each operating entity is responsible for ensuring that all business units under their authority comply with this policy in accordance with the standards that are issued and established in CCHCS.

  • Procedure

    • The ENS shall be managed by BCU, which is responsible for maintaining account access and sending alerts to all CCHCS HQ staff and all staff who occupy office space in any CCHCS leased location. 

    • Registering in the ENS

    • The BCU shall:

      • Provide information regarding the ENS registration process at the New Employee Orientation.

      • Maintain active and inactive user accounts.

      • Remind staff to update their profile information when there is a location move.

      • Conduct bi-monthly testing with all registered ENS users.

      • Review the status of all CCHCS staff bi-annually to ensure they are currently active within the ENS.

  • Revision History

    • Effective: 05/2017

5.5.8 Automated External Defibrillator

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain Automated External Defibrillators (AED) in all headquarters (HQ) facilities and leased office buildings for use in an emergency by authorized users.

  • Purpose

    • To describe how the AED shall be used in conjunction with Cardio-Pulmonary Resuscitation (CPR) in cases of sudden cardiac arrest at CCHCS facilities, in accordance with accepted protocols, including those developed by the American Red Cross and American Heart Association.

  • Applicability

    • This policy applies to all CCHCS HQ staff and all staff who utilize office space in any CCHCS leased location.

  • Procedure

    • Authorized Users

      • Anyone that has successfully completed an approved Cardio-Pulmonary Resuscitation (CPR) and AED training program.

      • Anyone at their discretion may provide voluntary assistance to individuals of medical emergencies.  The emergency medical response of these individuals may include CPR, AED, or basic first aid.

    • Training

      • Certification Training:

        • Anyone may complete training to provide basic first aid and CPR and to use the AED. Training is provided by the Business Continuity Unit (BCU).

        • The AED Program Coordinator is responsible for maintaining updated records of all staff that attend and pass the basic first aid, CPR, and AED procedures courses offered by the BCU.

      • Recertification Training:

        • Basic first aid, CPR and AED certification remain active for two years and shall be renewed through a renewal course that provides training on basic first aid, CPR, and AED procedures.

        • Recertification and renewals for AED shall be monitored by the BCU.

    • AED Use

      • The AED is used to treat individuals who experience sudden cardiac arrest. It is only to be applied to individuals who are unconscious, without a pulse, not breathing normally, and/or showing no signs of circulation such as normal breathing, coughing, or movement.

      • CPR shall be performed in conjunction with the AED.

        • The AED analyzes the heart rhythm and advises the operator if a shockable rhythm is needed. If a shockable rhythm is needed, the AED charges to the appropriate energy level and delivers a shock.

      • Before using the AED on an individual:

        • Assess the scene for safety.

        • Determine the individual’s unresponsiveness.

        • Dial 9-911 and advise dispatch of the individual’s status.

        • If unresponsive, position the individual on his/her back face up.

        • Open the individual’s airway.

        • Check for a pulse and/or signs of circulation such as normal breathing, coughing, or movement.

        • If there is no pulse and/or signs of circulation, obtain an AED device immediately.

        • Press the ON/OFF button to turn on the AED.

        • Follow the AED verbal instructions.

      • Use of the AED and CPR shall continue as appropriate during the course of emergency care until the individual resumes pulse and respiration and/or local Emergency Medical Services arrive on the scene.

    • Medical Response Documentation

      • Post-Incident Internal Documentation:

        • When an AED is used by staff, the AED Incident Report shall be completed within 24 hours by that staff member. The AED Incident Report can be requested through the BCU by email via: BusinessContinuityOffice@cdcr.ca.gov.

        • The AED Incident Report shall be submitted to the AED Program Coordinator, BCU, and the Return-to-Work Coordinator.

        • The AED Program Coordinator shall report AED use to the local county Health and Human Services office.

      • Post-Incident External Documentation:

        • The AED Program Coordinator shall contact the AED vendor to download event data from the AED. The data must be retained in the AED Program Coordinator’s records for seven years.

    • Post-Event Review

      • A review of each medical event where an AED was used shall be conducted by the AED Program Coordinator.

      • All key participants in the medical event, including the AED Program Medical Director, shall participate in a review that includes:

        • Actions that went well during the medical event.

        • Opportunities for improvement.

        • Critical incident stress debriefing.

      • A summary of the post-event review shall be completed by the AED Program Coordinator within 30 business days and retained for four years.

    • Responsibilities

      • The AED Program Medical Director shall:

        • Write a prescription for purchase and use of the AED device.

        • Review and approve guidelines and updates for emergency procedures related to the use of AEDs and CPR.

        • Evaluate post-event review forms and electronic files downloaded from the AED.

      • The CCHCS BCU shall assume responsibility for program coordination and the role of the AED Program Coordinator as follows:

        • Organize AED training for Emergency Response Team members.

        • Maintain records of AED training in accordance with accepted protocols, including those developed by the American Red Cross and American Heart Association.

        • Coordinate monthly equipment and accessory maintenance per manufacture’s recommendations and for record keeping.

        • Review and revise the AED procedures annually as needed.

        • Work as a liaison between CCHCS and the AED manufacturer.

        • Organize meetings and work with the Medical Director to maintain records, AED guidelines, and protocols as necessary.

        • Communicate with the Medical Director on issues related to AED procedures, including post-event reviews.

    • System Verification and Review

      • Annual AED Program Review:

        • Once each year, the AED Program Coordinator shall conduct and document a system readiness review, including the following elements:

        • Training records.

        • Equipment operation.

        • Maintenance records.

      • Periodic Systems Check:

        • Once each calendar month, the AED Program Coordinator shall conduct and document a system check including, but not limited to the following elements:

        • Emergency kit supplies.

        • AED battery life.

        • AED operation and status.

      • Annual Equipment Check:

        • Once each year, the local Fire Department shall conduct an equipment check including the following elements:

        • Check expiration dates of battery pack and electrodes.

        • Check AED operational status.

        • Perform AED self-diagnostic check.

    • AED Equipment and Maintenance

      • The AED is approved for the CCHCS AED program and conforms to all State and local standards. The location of each AED is listed on the building directory floor maps throughout the CCHCS locations and on the Business Continuity Lifeline page.

      • All AED equipment and accessories shall be maintained by the CCHCS BCU in a state of readiness and pursuant to manufacturer guidelines.

      • The CCHCS BCU shall ensure maintenance checks are performed and recorded monthly on the AED Monthly Maintenance Check form.  Written documentation is recorded on a card stored with each AED, and electronic records are kept with the BCU.

      • Following the use of emergency response equipment, all equipment shall be cleaned and/or decontaminated by the BCU. The AED is to be cleaned with a soft cloth dampened with 90 percent isopropyl alcohol, soap and water, or chlorine bleach.

      • The BCU shall contact the AED manufacturer representative regarding equipment which requires troubleshooting or repairs.

  • References

    • California Code of Regulations, Title 22, Division 9, Chapter 1.8

    • California Emergency Medical Services Authority, Health and Safety Code Sections (1797.190 – 1797.196)

  • Revision History

    • Effective: 09/2017

5.5.9 Cleaning and Disinfecting

  • Policy

    • California Correctional Health Care Services (CCHCS) shall maintain cleaning and disinfecting processes of frequently used surfaces and touch points of all shared spaces and in common areas within all CCHCS occupied facilities, leased or owned, in order to reduce exposure to pathogens.

  • Procedure

    • Cleaning and Disinfecting Common Areas

      • In an effort to minimize the risk of exposure to microorganisms, janitorial services staff shall clean and disinfect commonly used surfaces and touch points, which includes:

        • Elevator buttons;

        • Exterior building door handles;

        • Toilets;

        • Light switches;

        • Restroom door handles and keypads;

        • Restroom sinks, faucets, soap, and paper towel dispensers;

        • Stall knobs and countertops;

        • Floors; and

        • Handrails.

      • The approved cleaning and disinfecting products are listed in the Environmental Protection Agency’s (EPA) approved product list and shall be supplied by Property Management.

    • Cleaning and Disinfecting Shared Offices, Cubicles, Conference Rooms, and Computer and Electronic Equipment

      • Individuals utilizing shared offices, cubicles, conference rooms, and equipment (e.g., keyboards, monitors, mouse, tablets, touch screens, remote controls, and other electronic equipment) are responsible for cleaning and disinfecting the area to include chairs, tabletops, cabinet handles and door handles prior to and after each use.  Hand sanitizer shall be applied to the hands of any individual utilizing equipment prior to and after each use.

      • Cleaning and disinfecting products shall be supplied by the Business Operations Section (BOS) as a standard supply item and shall be requested on an as-needed basis per Health Care Department Operations Manual, Section 5.5.5, Requesting Standard Office Supplies.

      • Cleaning and disinfecting products supplied by the BOS to the requesting program shall be stored either in shared spaces used by staff or in common use areas that remain accessible to all program staff.

      • The only approved cleaning solutions for Information Technology (IT) equipment are those specifically intended for electronic components, containing at least 70% isopropyl alcohol.

        • All other cleaning agents are prohibited from use on IT equipment.

        • Care shall be taken when wiping down IT equipment.  IT equipment shall not be sprayed, and hand sanitizer wipes shall not be used.

        • To prevent damage, IT equipment shall be turned off or disconnected from the power source prior to cleaning and disinfecting.

    • Cleaning and Disinfecting State Vehicles

      • Staff who drive a state vehicle shall clean and disinfect the vehicle prior to and after each use, which includes:

        • Wiping high touch points such as key, key fob, steering wheel, steering column, seat belts, center console, door interiors, door pockets, interior door handles, exterior door handles, seat pockets, seat surfaces, areas between seats and consoles, areas between seats and doorjambs, cup holders, compartments, instrument panel, accessory panel, touchscreen, rearview mirror, side mirrors, visors, visor mirrors, dashboard, vents, gear stick, gear shift and trunk release.

      • Cleaning and disinfecting supplies shall be provided by the BOS at the time of vehicle check-out.

  • References

    • Health Care Department Operations Manual, Chapter 5, Article 5, Section 5.5.5, Requesting Standard Office Supplies

  • Revision History

    • Effective: 11/2020
      Revised:  06/16/2023

5.5.10 Building Evacuation

  • Policy

    • This policy establishes the emergency evacuation procedures to be used by all California Correctional Health Care Services (CCHCS) headquarters (HQ) facilities staff and all staff who occupy office space in any CCHCS leased location, and describes the obligations for all staff when evacuating an HQ building.  It is the responsibility of all staff to be knowledgeable of their designated evacuation location and for all supervisors/managers to have an updated Supervisor’s Evacuation Roster form completed and available at all times which is located at the following link: Business Operations – Supervisor’s Evacuation Roster (Fillable).pdf under the “HQ Emergency Preparedness” tab.

  • Applicability

    • This policy applies to all CCHCS headquarters staff and all staff that occupy office space in any CCHCS leased location.

  • Procedure

    • Building Evacuation

      • Upon notification of a building evacuation, all staff shall safely and expeditiously evacuate the building using the nearest exit, report to their designated evacuation location, and follow directions given by the Zone Warden.

      • Elevator use is prohibited. Staff shall use the nearest safe stairway to reach the ground level to exit the building.

      • Staff requiring assistance to evacuate shall be assisted to the nearest safe outer stairway by an assigned Disabled Persons Monitor.

        • Any staff requiring assistance and unable to proceed down the stairway shall wait by the safest stairway in their area until the Disabled Persons Monitor arrives to assist them down.  If the staff member cannot navigate the stairs, both the staff member and the Disabled Persons Monitor shall wait for emergency responders (e.g., fire department) to assist.

        • Any staff member who requires assistance shall complete a Request for Emergency Evacuation Assistance form which can be found at the following link: Request for Emergency Evacuation Assistance.doc (sharepoint.com) under the “HQ Emergency Preparedness” tab and submit to their supervisor/manager as soon as the need is identified.  The supervisor/manager shall submit a copy via email to the Business Continuity Unit (BCU) at BusinessContinuityOffice@cdcr.ca.gov.

      • Supervisors/managers shall bring their Supervisor’s Evacuation Roster with them upon evacuation to account for their staff’s whereabouts.  Supervisors/managers shall appoint a back-up to be responsible for their rosters should they not be in the office.

      • All visitors shall stay with the unit they are visiting and exit with that unit to the designated evacuation location.  The Visitors Sign-In sheet shall be collected by the security staff and brought to the Building Coordinator to ensure all visitors are accounted for.

      • If staff are in another building or unit when an evacuation occurs, they shall evacuate with the unit closest to them and notify the Zone Warden that they are from another building or unit. The Zone Warden shall communicate with the Building Coordinator to ensure staff are accounted for.

      • Upon arrival at the designated evacuation location, supervisors/managers shall perform a roll call to ensure all staff on their Supervisor’s Evacuation Rosters are accounted for.

      • Zone Wardens shall collect all Supervisor’s Evacuation Rosters from supervisors/managers once outside at their assigned evacuation locations.

      • Once the Zone Wardens receive all Supervisor Evacuation Rosters, each Zone Warden shall notify the Building Coordinator.

      • All CCHCS HQ staff shall remain in the designated evacuation location until notified by the Building Coordinator or emergency responders that they may safely re-enter the building.

    • Evacuation Follow-Up

      • Immediately following the completion of a building evacuation, a meeting shall take place with the Emergency Response Team (ERT) members to discuss any issues.  Each member shall complete an Emergency Response Team Evacuation Survey provided by the BCU within one week of the evacuation.

      • Building Coordinators shall complete an After Action Report provided by the BCU based on their observations and results of the Emergency Response Team Evacuation Surveys.  After Action Reports are used by the BCU to analyze and measure the success of building evacuations and to evaluate progress from subsequent evacuations.  After Action Reports are distributed during the bi-monthly meetings to members of the Steering Committee who decide on the priorities and order of business of the BCU.

      • The BCU concludes a building evacuation was successful by the following:

        • Staff exited the building safely within five minutes.

        • All staff were accounted for at the evacuation locations.

      • If a building evacuation is unsuccessful, the BCU shall coordinate additional training with the ERT members.

  • References

  • Revision History

    • Effective: 07/2017

5.5.11 Mail Center

  • Policy

    • California Correctional Health Care Services (CCHCS), Business Operations Section (BOS) shall ensure that all mail is retrieved, sorted, and delivered in a timely manner.

  • Applicability

    • This policy applies to all CCHCS headquarters, regional offices, Health and Imaging Records Center, Central Fill Pharmacy, Division of Health Care Services, and Division of Juvenile Justice staff located in Elk Grove, Sacramento, Fresno, Bakersfield, Rancho Cucamonga, Diamond Bar, Santa Ana, and Ontario, California.

  • Procedure

    • Daily Routine – CCHCS Headquarters

      • Mail Center employees shall retrieve mail from the United States Postal Service (USPS) and sort each business day.

      • Internal mail delivery and retrieval are made once in the morning and once in the afternoon on each business day.

      • External mail delivery and retrieval are made once each business day.

      • Staff located in Elk Grove shall be notified, by BOS, to pick up multiple packages or packages weighing more than 25 pounds.

    • Daily Routine – CCHCS Regional Offices

      • BOS staff shall retrieve mail from the USPS once each business day and sort the mail daily.

      • Deliver Human Resources mail to the receptionist.

      • Deliver regional mail to the recipients.

      • Meter mail throughout the day.

    • Daily Retrieval and Delivery Locations CCHCS Headquarters

      • Internal locations shall include the following:

        • 8220 Longleaf Drive, Elk Grove (Building B)

        • 8260 Longleaf Drive, Elk Grove (Building C)

        • 8280 Longleaf Drive, Elk Grove (Building D)

        • 9260 Laguna Springs Drive, Elk Grove (Building E)

        • 9266 Laguna Springs Drive, Elk Grove (Building F)

        • 9272 Laguna Springs Drive, Elk Grove (Building G)

      • External locations shall include the following:

        • Post Office Box 588500, Elk Grove (CCHCS – Headquarters)

        • 1515 S Street, Sacramento (California Department of Corrections and Rehabilitation – Headquarters)

        • 10000 Goethe Road, Sacramento (Regional Accounting)

        • 9838 Old Placerville Road, Sacramento (Facility Planning and Activation)

        • 10111 Old Placerville Road, Sacramento (Internal Affairs)

        • 3301 C Street, Sacramento (State Controller’s Office)

        • 600 North Market, Sacramento (Correct Care Integrated Health)

        • 707 Third Street, West Sacramento (Department of General Services)

        • 300 Capitol Mall, Sacramento (State Controller’s Office – Personnel)

        • 8300-8330 Valdez Avenue, Sacramento (Health Records Center)

        • 8364 Rovana Circle, Sacramento (Central Fill Pharmacy)

    • Mail Center Schedule – CCHCS Headquarters

      • The Mail Center is open from 8:00 a.m. to 5:00 p.m. each business day.

      • Mail received by the Mail Center before 4:00 p.m. shall be processed on the same day.

      • Mail received after 4:00 p.m. shall be processed the next business day.

    • Mail Center Schedule – CCHCS Regional Offices

      • Mail can be dropped off daily on business days from 8:00 a.m. to 5:00 p.m. at the regional analyst’s desk.

      • Mail received by the regional analyst before 3:30 p.m. shall be processed on the same day.

      • Mail received after 3:30 p.m. shall be processed the next business day.

    • Courier Service

      • The courier service for deliveries requiring overnight service within California is General Logistics Systems (GLS).

        • GLS delivers packages in the morning and picks up in the afternoon.

        • To send a package via GLS, a label request must be attached to the package.  To create a GLS shipping label request:

          • Select the following link: Lifeline – Home (sharepoint.com).

          • Select “Business Operations” located on the left side of the screen under the Business Services section of Policy and Administration.

          • Select “Resources” in the Quick Links box on the right side of the screen and select the “Operations Support” tab.

          • Select “Request for GLS Shipping Label.”  Only one label per package needs to be completed.

          • Print the label and attach it to the package with a single piece of tape.

          • The package can be delivered to the BOS located in Building C, Elk Grove, Suite 100, the regional analyst at your location, or placed in the outgoing mail box in your work area for pick up.

          • If there are multiple packages or packages weighing more than 25 pounds, the packages shall be brought to the BOS or regional analyst.

      • The courier service provider for out-of-state deliveries is Federal Express (FedEx).

        • FedEx delivers packages throughout the day.

        • Prior arrangements must be made by the program for FedEx to pick up packages.

        • To ship a package via FedEx, a label request must be attached to the package.  To create a FedEx shipping label request:

          • Select the following link: Lifeline – Home (sharepoint.com).

          • Select “Business Operations” located on the left side of the screen under the Business Services section of Policy and Administration.

          • Select “Resources” in the Quick Links box on the right side of the screen and select “Operations Support” tab.

          • Select “Request for FedEx Shipping Label.”  Only one label per package needs to be completed.

          • Print the label and attach it to the package with a single piece of tape.

          • The package can be delivered to the BOS located in Building C, Elk Grove, Suite 100, or placed in the outgoing mail box in your work area for pick up.

          • If there are multiple packages or packages weighing more than 25 pounds, the packages shall be brought to the BOS or regional analyst.

      • Supplies (e.g., envelopes, plastic bags) for both courier services are available in the BOS located in Building C, Elk Grove, Suite 100, or with the regional analyst.

    • Folding and Inserting Services

      • Folding and inserting documents into envelopes is available upon request. 

      • Requests shall be made by submitting a ticket through the CCHCS Service Portal. To find the CCHCS Service Portal:

        • Select the following link: Lifeline – Home (sharepoint.com).

        • Select “Business Operations.”

        • Select “CCHCS Service Portal.”

        • Select “Business Operations Request.”

        • Complete required areas. Requestor must include in the description how the materials will be provided.

        • Click on “Submit.” This will generate a ticket number and will send the request to the BOS for processing.

      • A notification when your request is completed shall be provided by the Mail Center.

    • Mass Mailing

      • Mass mailings (e.g., State Restrictions of Appointment letters, inquiry letters), or projects that include a substantially larger volume of items (e.g., mental health posters, booklets) to mail require 3-4 days to complete. Contact the Mail Center at (916) 691-3034 for assistance.

    • Acceptable Items for Delivery or Shipping

      • Only items related to official state business shall be delivered or shipped using state resources.  State resources shall not be utilized to deliver or ship items that are personal in nature (e.g., greeting cards, gifts) or do not support official state business.

  • Resources

  • Revision History

    • Effective: 02/2018
      Revised: 12/2020

5.5.12 Safe Mail Handling

  • Overview

    • A wide range of potential threats can be introduced in the workplace by way of incoming mail. Threats that involve chemical and biological substances and contraband are both dangerous and disruptive. All staff who handle mail shall be able to identify these threats and eliminate or mitigate the risk they pose to the workplace, staff, and daily operations.

  • Responsibility

    • All staff who handle incoming mail are responsible for following safe mail handling procedures as outlined within this procedure.

  • Procedure

    • Precautions

      • Staff shall always be aware of surroundings and suspicious mail.  The following steps and general precautions for handling incoming mail shall be taken.

      • Wash hands with soap and warm water before and after handling mail.

      • Inspect and open received mail in an isolated location.

      • Do not eat, drink, or smoke around mail.

      • Disposable plastic or rubber gloves may be appropriate if a staff has open cuts or skin lesions on hands. To safely remove gloves:

        • Grasp the outside of one glove at the wrist. 

        • Peel the glove away from your body, pulling it inside out.

        • Hold the glove you just removed in your gloved hand.

        • Peel off the second glove by putting your fingers inside the glove at the top of your wrist.

        • Turn the second glove inside out while pulling it away from your body, leaving the first glove inside the second.

        • Pay close attention that you do not touch the exterior of the glove.  The idea is to flip the gloves inside-out so that you will not have to touch the contaminated exterior.

        • Dispose of the gloves safely.  Do not reuse the gloves.

        • Clean your hands immediately after removing gloves.

    • Initial Inspection and Opening of Mail

      • Visibly and physically inspect each item for key characteristics of suspicious or potentially dangerous mail including, but not limited to:

        • Excessive packaging.

        • Oily stains, discolorations, or odors.

        • No return address.

        • Excessive weight.

        • Uneven or lopsided packaging.

        • Excessive security material e.g. string, tape, etc.

        • Postmark from a city or state that does not match the return address.

        • Powdery substance felt through or left on the envelope or package.

      • If no threats are discovered, sort and deliver the envelope or package.

    • Handling of Suspicious or Potentially Dangerous Mail

      • Do not open the envelope or package (or open any further).

      • Do not shake the envelope or package, show it to others, or empty its contents.

      • Leave the envelope or package where it is or gently place it on the nearest flat surface.

      • If possible, gently cover the items (e.g., use a trash can, article of clothing).Shut off any fans or equipment in the area that may circulate the material.

      • Alert others nearby to relocate to an area away from the site of the suspicious item.

      • Take essential belongings (e.g., cell phones, keys, purse) in case returning to the office is delayed.

      • Leave and close the door to the space containing the suspicious envelope or package, cover the threshold area under the door with a towel or a coat if possible, and section off the area to keep others away.

      • To prevent spreading any powder or hazardous substance to the face, wash hands thoroughly with soap and water.

      • Suspicious mail may lead to an investigation. Staff who process and encounter suspicious mail shall not destroy potential evidence by vacuuming powder, disposing of dangerous packages, or similar activities.

      • Suspicious mail may lead to an investigation. Staff who process and encounter suspicious mail shall not destroy potential evidence by vacuuming powder, disposing of dangerous packages, or similar activities.

    • Incident Reporting

      • California Correctional Health Care Services staff shall notify appropriate supervisory staff if suspicious or potentially dangerous mail is discovered and provide all documentation of the incident including, but not limited to:

        • The addressee’s name or location.

        • Description of the suspected dangerous envelope or package.

        • The time of the discovery.

        • Description of how the discovery was made.

        • Where the secured dangerous envelope or package is located.

      • The Operations Support Manager or Business Services Officer shall notify the Associate Director and Staff Services Manager IIs for incidents occurring in the Business Operations mail room.

      • In emergency situations, any staff member shall call first responders or 9-1-1 and report as much detailed information that is available.

      • Staff shall not alert the media about the situation.

  • Revision History

    • Effective: 05/2020

5.5.13 Confidential Information Destruction

  • Policy

    • California Correctional Health Care Services (CCHCS), Division of Juvenile Justice (DJJ) and Division of Health Care Services (DHCS) employees shall protect the confidential information of its contractors, staff, and patients and shall comply with State and federal regulations to protect/destroy such information when discarded.

    • Proper adherence to these guidelines provides an enterprise-wide approach for document management and destruction and helps to protect and reduce risk to contractors, staff, and our patients.  In addition, all information for confidential destruction must comply with all CCHCS and State Administrative Manual requirements including, but not limited to, adherence to document retention practices.  Failure to adhere to the requirements within the policy may result in disciplinary action.

  • Purpose

    • To outline the official Confidential Information Destruction policy of CCHCS and provide a guideline to all staff regarding acceptable methods for destroying discarded information in order to protect confidential information (e.g., Personally Identifiable Information, Protected Health Information).

  • Applicability

    • All CCHCS, DHCS, DJJ, California Department of Corrections and Rehabilitation staff, and contractors at the headquarters facility and regional offices are required to adhere to this policy.

  • Procedure

    • Key to the Confidential Bins

      • The vendor shall provide a key to the locks for all confidential bins in the facility to the Business Operations Section (BOS).  The key shall not be shared with any other staff and shall be engraved or otherwise marked to identify it is the key to the confidential bins.   

      • The key shall be kept in a secure, locked location within BOS, accessible only to authorized staff.

      • If the key to the confidential bins is lost, the BOS shall arrange for the lock to all confidential bins to be re-keyed by the vendor and for a new key to be issued.

    • Confidential Bins

      • Confidential bins shall only be opened by an authorized BOS staff or vendor representative.

      • Location of confidential bins shall be according to volume of waste generated and available space within each building.

      • Confidential bins are located on each floor in every building.

      • Confidential bins shall not be moved from their designated locations.

    • Confidential Shredding Chain of Custody

      • Staff shall deposit their documents to be destroyed into a locked confidential bin.

      • Paper shall be separated from items that are not considered confidential information.  For example, if a binder has 50 sheets of paper and only four sheets of paper are considered confidential, only those four sheets shall be placed in the confidential bins.  The remaining sheets of paper shall be deposited in the recycle bin.

      • Items that should not be placed into the bins include, but are not limited to, the following:

        • Newspapers

        • Magazines

        • Boxes

        • Cardboards

        • Plastic

        • Paper clips

        • Binder clips

        • 3-ring binders

      • Items that are acceptable include the following:

        • All types and colors of office paper (rubber bands and staples are acceptable).

        • File folders (remove hangers).

      • The vendor shall be on-site twice a month to shred confidential documents.

      • If the confidential bins are full, inquire with BOS to determine if additional bins are available.  If additional bins are unavailable, the program will need to store items in a secure location.

  • References

    • Code of Federal Regulations, Title 45, Subtitle A, Subchapter C, Part 164, Subpart E, Section 164.530(c)

    • Health Care Department Operations Manual, Chapter 2, Article 2, Section 2.2.4, Minimum Necessary Use and Disclosure of Protected Health Information

  • Revision History

    • Effective: 01/2018

5.5.14 Digital Reprographics Services

  • Policy

    • California Correctional Health Care Services (CCHCS) shall provide work-related digital reprographics services, also known as print services, from CCHCS headquarters (HQ) for all HQ and Division of Health Care Services offices including the Central Fill Pharmacy, Health Records Center, regional and satellite offices, and Division of Juvenile Justice.

  • Procedure

    • General Guidelines

      • Digital reprographics services shall be requested by submitting a manager-approved Digital Reproduction Work Order (work order) through the CCHCS Service Portal.  For business card requests only, a manager’s approval is not required for Staff Services Managers II or above.

      • The work order form can be accessed via Lifeline.

        • Select the following link: https://cdcr.sharepoint.com/sites/cchcs_lifeline.

        • Select “Business Operations,” located on the left side of the screen under the Business Services section of Policy and Administration.

        • In the Quick Links section located on the right side of the page, select “Resources,” then select the “Operations Support” tab.

        • Select “Digital Reproduction Work Order.”

        • All information is required to be completed.

        • Obtain manager signature via DocuSign.

      • Digital reprographics services are requested via the CCHCS Service Portal via the following link: https://cchcsprod.servicenowservices.com/sp?sysparm_stack=no.

        • The CCHCS Service Portal can also be accessed via the Lifeline Intranet.

          • Select the following link: https://cdcr.sharepoint.com/sites/cchcs_lifeline.

          • Select “Business Operations,” located on the left side of the screen under the Business Services section of Policy and Administration.

          • In the Applications box located on the right side of the page, select “CCHCS Service Portal”.

        • Select “Reprographics Request.”  Complete all areas.

        • Select “Submit.” This will generate a ticket number for tracking purposes and will send the ticket to the Business Operations Section for processing.

        • If the manager/supervisor is not in the approval drop down, the requestor will need to submit the request through the “Business Operations Request” on the CCHCS Service Portal.

        • Select “Business Operations Request”.  Complete all areas.

        • Upload the signed Reproduction Work Order.

        • Select “Submit.”   This will generate a ticket number for tracking purposes and will send the ticket to the Business Operations Section for processing.

      • Upon completion, the requestor will be notified, via the CCHCS Service Portal, that their requested printed materials are completed and ready for pick up. If the requestor is not located at the Elk Grove Campus, printed materials shall be shipped or delivered to the requestor or their indicated delivery location(s).

    • Acceptable File Types and Formats

      • Files can be attached to the Customer Request Program ticket. The following formats are acceptable:

        • Word

        • Publisher

        • Excel

        • PDF

      • If the file is too large, it can be saved to a thumb drive, CD, or sent via email.

      • Inter-office mail can be used as an option for delivery to the Digital Reprographics Unit.  The requestor shall include the print request ticket number for reference.

    • Acceptable Print Requests

      • Training materials

      • Official reports

      • Work-related documents

      • Work-related posters

    • Unacceptable Print Requests

      • Birthday banners/posters

      • Baby shower banners/posters

      • Holiday party banners/posters

      • Pictures/collages

      • Appreciation banners/posters

      • Other non-work-related products

    • Delivery Options

      • If the order requires shipping, the requestor shall select one of the following mail carriers:

        • General Logistics Systems

        • FedEx

        • United States Postal Services

      • Attach a distribution list to the ticket for all direct shipments from the Digital Reprographics Unit. The following information shall be included on the distribution list:

        • List of locations/department name

        • Attention to:

        • Address

        • Sender

  • Revision History

    • Effective: 11/2017
      Revised: 08/2021

5.5.15 Supplier Communication

  • Policy

    • California Correctional Health Care Services (CCHCS)/Division of Health Care Services (DHCS) shall conduct acquisition activities in an open and fair environment that promotes competition among prospective suppliers.  CCHCS encourages the exchange of product or service information among all interested parties and shall stay within procurement integrity requirements.

    • CCHCS/DHCS staff shall:

      • Treat suppliers equitably, without discrimination, and without imposing unnecessary constraints on the competitive market.

      • Be open, fair, and impartial in all processes.

      • Maintain consistency in all processes and actions.

      • Act and conduct business with honesty, avoiding the appearance of impropriety.

  • Applicability

    • This policy and procedure applies to all CCHCS/DHCS staff.

  • Procedure

  • References

    • Department of General Services, State Contracting Manual, Volume 1, Chapter 9, Section 9.07, Ethics

    • Department of General Services, State Contracting Manual, Volume 2, Chapter 2, Procurement Planning

    • Department of General Services, State Contracting Manual, Volume 3, Chapter 2, Procurement Planning

    • National Association of State Procurement Officers, Effective Communication between State Procurement and Industry (2012)

  • Revision History

    • Effective: 08/2017

5.5.16 Records Management Program

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS) shall establish and maintain a Records Management Program consistent with state and agency statutory requirements.  All official records shall be retained for the minimum periods stated in the STD 73, Records Retention Schedules, as approved by California Records and Information Management (CalRIM) pursuant to California Government Code, Sections 14740-14746.  CCHCS and DHCS employees shall apply efficient and economical management methods in the creation, utilization, maintenance, retention, preservation, and disposal of state records.

  • Purpose

    • To ensure official records are managed and disposed of in a manner consistent with approved records and information management guidelines and procedures to ensure that records are available as needed at the least possible cost.

  • Applicability

    • This policy and procedure is applicable to all CCHCS and DHCS programs at headquarters and regional offices.

  • Procedure

    • Headquarters and Regional Offices Responsibilities

      • The Directors or Deputy Directors of the program shall designate staff as a Records Management Assistant Coordinator (RMAC) to:

      • Conduct a records inventory utilizing the STD 70, Records Inventory Worksheet.  Once completed, retain the results of the active files until the next scheduled inventory. 

      • Ensure that records are covered by an approved retention schedule not more than five years old.  Prior to the expiration of a retention schedule, programs shall conduct another inventory and re-evaluate the STD 73.

      • Use the guidelines applicable to the program area located on the CalRIM website https://www.sos.ca.gov/archives/records-management-and-appraisal/ when creating the STD 73.  The STD 73 shall address all records created and maintained by the program; provide an accurate description of each record series; and state the period of time each record series should be retained in office, department, and/or records center space before destruction or transfer to the state archives.

      • Review the completed STD 73 for accuracy and obtain the approval of the program manager responsible for the records.

      • Email the STD 73 to the Records Management Coordinator (RMC) at: m_CDCRCCHCSBusinessOps@cdcr.ca.gov for approval.

        • Once the RMAC has an approved STD 73 from CalRIM and is ready to move appropriate records to the State Records Center (SRC), complete the STD 71, Records Transfer List, and submit to the RMC.  The RMAC shall mark the boxes containing the records identified in the STD 71 with a black permanent marker with the list number from the STD 71 and the sequential box number in the designated area.

        • The RMAC shall review the “Basic SRC Guidelines” which contains the SRC expectations.

        • Boxes accepted by the SRC can only be one cubic foot (15x12x10) and only have the list and box numbers.  There should be no other writing on the front or back.

        • Boxes can be obtained from BOS by submitting a ServiceNow Ticket.

        • The RMC shall pre-inspect the boxes before the program submits a Customer Request Ticket once boxes are labeled and the STD 71 is completed.

      • Submit the STD 71 electronically once pre-inspection is completed by the RMC, and the STD 71 is filled out completely.  To electronically submit the STD 71 to the RMC, fill out section 16 at the bottom of the form and click the “Submit to RMC” button at the top of the STD 71.  There will be a prompt to input the RMC’s email address which is m_CDCRCCHCSBusinessOps@cdcr.ca.gov.  This will notify the RMC automatically via email for approval. The program will receive a confirmation via email from the RMC with the approved date and time for the boxes to be delivered to the SRC.

      • Submit a ticket through the Customer Request Program with the approved appointment time and date for delivery of the boxes to the SRC.

      • Coordinate with the BOS to pick up the boxes and deliver them to the SRC.

    • RMC Responsibilities

      • The RMC shall:

      • Maintain the CCHCS and DHCS Records Management Program.

      • Conduct research into records retention requirements.

      • Review and approve the STD 73 on behalf of CCHCS and DHCS.

      • Disseminate announcements of records management activities.

      • Review and sign the STD 71 and STD 73 forms. The forms shall be emailed to the Records Management analyst at CalRIM to review and approve.

      • Receive the approved copies of the STD 71 and STD 73 from CalRIM.

      • Provide CalRIM approved copies to the RMAC for their records.

      • Pre-inspect the boxes prepared by the program.

      • Send the forms to the SRC for scheduling a date and time for delivery.  The SRC shall send an email to the RMC with the date and time the boxes can be delivered to the SRC.

      • Notify the RMAC by sending a confirmation email of date and time for the boxes to be delivered to the SRC.

      • Once the boxes are stored at the SRC, CalRIM will send a copy of the STD 71 with the storage numbers stamped on the form to the RMC, and the RMC shall forward a copy to the RMAC for their records.

      • Monitor and track CCHCS and DHCS program adherence to Records Management Program Policy and Procedure for compliance.

  • Disposition of Records

    • Records Stored at the SRC

      • When a record has reached the end of its retention period and is stored at the SRC, the SRC will notify the RMC using an Authorization for Records Destruction report. The records will be destroyed when the original copy of the report has been returned to the SRC showing the RMC’s signature indicating that the records are approved for destruction or justifying an extension for the records in question.

    • Records Stored In-House

      • When a record has reached the end of its retention period and contains sensitive personal information, it must be destroyed using witnessed confidential shredding. If a record is less sensitive, it may be destroyed using regular recycling.  A Records Destruction Log will be kept by the RMC to collect information such as the disposition date, authorization (Records Retention Schedule number and Item number), volume, medium, and any remarks pertinent to the disposition of the record.

  • Training

    • Training classes are provided by the California Secretary of State to State entity RMC, RMAC, and managers interested in the development, preparation, and maintenance of State entity Records Retention Schedules. Classes are presented the third Wednesday of every month except December.

  • Forms

  • References

  • Resources

  • Revision History

    • Effective: 03/2020

5.5.17 Prohibition on the Purchase of Promotional Items

  • Policy

    • California Correctional Health Care Services (CCHCS) staff shall not use State funds to purchase any promotional items.  The purchase of novelty gift items or giveaways for purposes of recruitment, advertising, and/or morale boosting is prohibited, absent specific statutory authority.

    • Persons involved in the purchase of promotional items may incur personal liability for the items purchased.  Unlawfully purchased items are subject to orders of restitution (i.e., personal liability) against the individual who improperly uses the state contracting process pursuant to the State Administrative Manual, Section 3504.  Consequences could lead to employee discipline including but not limited to, reimbursement, and/or restitution, after consideration of all facts and circumstances surrounding the improper purchase.

    • This policy is supported by the California State Constitution, Article 16, Section 6, which states in part, “any gift of public funds is strictly prohibited.”

  • Applicability

    • This policy applies to all CCHCS staff.

  • References

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 2.5, Article 10 (Activities), Section 19990

    • California Government Code, Title 1, Division 4, Chapter 1, Article 4 (Prohibitions Applicable to Specified Officers), Section 1090

    • California Constitution, Article 16, Section 6 (Prohibition on Gifts of Public Funds)

    • Acquisitions Management Bulletin #15-001, Prohibition on the Purchase of Promotional Items

    • State Administrative Manual, Chapter 3500 Purchases, Section 3504 Prohibited Practices

  • Revision History

    • Effective: 05/2016

5.5.18 Fleet Asset Acquisitions

  • Policy

    • Fleet assets used by California Correctional Health Care Services (CCHCS) and/or Division of Health Care Services staff shall be acquired in one of the following two ways:

    • Fleet assets located at California Department of Corrections and Rehabilitation (CDCR) adult institutions shall be purchased, managed, and maintained by CDCR.  CDCR is responsible for the purchase of the fleet asset and maintenance and repair costs including all parts and/or accessories.

    • Fleet assets located at CCHCS headquarters and/or regional offices shall be leased from the Department of General Services and managed and maintained by CCHCS Business Operations under the terms of the lease(s).

  • Procedure

    • CDCR-Managed Fleet Assets

      • Staff shall communicate inquiries regarding the replacement or addition of CDCR-managed fleet assets through the CCHCS chain of command.

    • CCHCS-Managed Fleet Assets

      • Staff shall communicate inquiries regarding CCHCS-managed fleet assets to the CCHCS Business Operations Customer Service Line at (916) 691-3002.

  • Revision History

    • Effective: 02/2017

5.5.19 Pooled Vehicle Reservations

  • Policy

    • California Correctional Health Care Services (CCHCS) headquarters Business Operations Section (BOS) shall ensure that all CCHCS and Division of Health Care Services (DHCS) employees located at the Elk Grove Campus, Central Fill Pharmacy, Health Records Center, regional, and satellite offices abide by all policies and procedures pertaining to the use of pool vehicles in the conduct of state business.

    • CCHCS headquarters BOS shall manage pool vehicles in an economical and efficient manner to ensure that they are available to authorized staff.  All drivers shall possess a valid California Driver’s license, current Defensive Driver Training Certificate, and be a current CCHCS/DHCS employee.

  • Applicability

    • All CCHCS and DHCS employees at the following locations who operate a vehicle in the conduct of state business shall comply with this policy.

      • Headquarters – Elk Grove Campus

      • Health Records Center

      • Central Fill Pharmacy

      • Regional and satellite offices

    • Consequences of noncompliance may result in the loss of privileges to utilize a CCHCS pool vehicle.

  • Procedure

    • Reservation Requirements

      • Drivers shall provide a copy of the Department of General Services (DGS) Defensive Driver Training Certificate at the time of the vehicle reservation request if one has not been previously submitted to the BOS. The DGS Defensive Driver Training can be found at the following link Enroll in Defensive Driver Training (ca.gov).  The certificate is valid for four years and must be renewed every four years thereafter in accordance with State Administrative Manual, Section 0751. The certificate can be attached to the ticket through the CCHCS Service Portal, emailed to the BOS, or emailed to the local Regional BOS analyst.

      • The driver shall go online to the CCHCS online Learning Management System to read and sign the “Pool Vehicle Reservations Policy and Procedure Acknowledgement” form prior to confirmation of vehicle reservation.  This form acknowledges the driver has read, understands, and agrees with the terms and consequences of the policy.  The form shall be completed every two years.

    • Vehicle Availability

      • Types of Vehicles

        • Passenger vans that seat up to seven.

        • Sedans that seat up to five.

        • Sedans that seat up to four.

      • Timeframes

        • BOS’s hours are 8:00 a.m. to 5:00 p.m., Monday through Friday, with the exceptions of state holidays.

        • The vehicle binder can be picked up after 4:30 p.m. the day before if leaving the next day before 8:00 a.m.

        • Vehicles can be reserved on an hourly or daily basis.

        • Reservations can be made for a maximum of three consecutive days for the Elk Grove Campus.

        • Reservations can be made for a maximum of five consecutive days for regional offices.

        • For reservation requests that exceed the maximum allowable time, the employee may reserve a rental car through Concur Travel Services, which is located in the Travel Portal on Lifeline.

        • If a pool or rental vehicle is not available, approval from the program’s management to allow use of a privately owned vehicle for state business is required and an approved STD 261, Authorization to Use Privately Owned Vehicle on State Business, must be on file.  Refer to the Health Care Department Operations Manual, Section 5.5.20, Use of Privately Owned Vehicles and Rental Vehicles in the Conduct of State Business.

    • Reservation Procedures

      • Pool vehicles are requested via the CCHCS Service Portal at the following link: Vehicle Reservation – CCHCS Service Portal (servicenowservices.com)

      • The CCHCS Service Portal can also be accessed via Lifeline.

        • Select the following link: https://cdcr.sharepoint.com/sites/cchcs_lifeline.

        • Select “Business Operations” located on the left side of the screen under the Business Services section of Policy and Administration.

        • Select “CCHCS Service Portal,” located in the Applications box.

        • Select “Business Operations Services.”

        • Select “Vehicle Reservation.”

        • Complete the user fields.

        • Attach a copy of the Defensive Driver Training certificate, if applicable.

    • Driver Responsibilities

      • All drivers shall:

      • Use the vehicle for state business only.

      • Use safety equipment such as seatbelts and require the same of their passengers. Passengers who are not state employees or who are not on state business are not allowed in vehicles.

      • Not smoke in vehicles.

      • Not carry or transport firearms, weapons, and ammunition in vehicles.

      • Complete the mileage log, located inside the vehicle’s binder in its entirety.

      • Personally pay all citations, moving violations, and/or bridge toll road evasion fines cited while operating the vehicle.

      • Return the vehicle with the gas tank at least half full.

        • A Voyager card is provided for purchasing the gas and is located inside the key pouch.

        • Instructions on how to use the Voyager card can be found inside the vehicle binder.

        • Instructions on how to charge electric vehicles can be found inside the vehicle binder.

      • Remove all trash and personal belongings before returning the vehicle.

      • Return the vehicle on or before the date and time stated in the reservation.

      • Park pool vehicles in a vehicle cage at headquarters and regional offices.  Secure the gates to the vehicle cage if leaving or returning before or after the working hours of 7:30 a.m. and 5:00 p.m.  A key/fob that allows access to the closed/locked vehicle cage is located on the key ring. 

      • Not park vehicles at or in the vicinity of the employee’s home overnight.  Requests for an exception must be submitted through the CCHCS Service Portal in the form of a written justification. Exceptions shall be considered on a case-by-case basis and approved by the Associate Director, BOS.

      • Immediately notify BOS or the local Regional BOS analyst if the designated pick-up time for keys is delayed, the vehicle will not be returned on time, or a reservation must be cancelled.

      • Immediately report any damages to the vehicle to BOS or the local Regional BOS analyst.  If return of the vehicle is after hours, inform BOS or the local Regional BOS analyst the next business day.

    • Consequences of Noncompliance with Driver Responsibilities

      • Consequences of noncompliance violations are based on each occurrence, not necessarily the same violation. An email shall be sent to the employee and the supervisor/manager notifying of each violation and consequence. Adherence to driver responsibilities, listed above in Section (c)(4), shall be monitored and tracked by BOS.

      • First violation: an email shall be sent to the employee and the supervisor/manager notifying of the violation.

      • Second violation: loss of pool vehicle usage for 30 days and notification to the driver’s program’s Deputy Director.

      • Third violation: loss of pool vehicle usage for six months.

      • Fourth violation: BOS management reserves the right to permanently suspend pool vehicle usage.

    • Accidents

      • In the event of an accident, drivers shall:

        • Obtain the other party’s information, i.e., name, address, insurance carrier.  The STD 269, Accident Identification, located in the vehicle binder can be used for this purpose.

        • Complete a STD 270, Report of Vehicle Accident.

        • Have the supervisor/manager review the circumstances of accident and complete an STD 270, State Driver Accident Review, and submit with the STD 270 to the DGS, Office of Risk and Insurance Management (ORIM) within two business days after the accident.  ORIM can be contacted 24 hours a day, seven days a week at (916) 376-5300, (916) 376-5302, or (800) 900-3634.  Voicemail is available on evenings, weekends, and state holidays.

        • Submit copies of all forms to BOS or the Regional BOS analyst within two business days after the accident.

      • BOS shall collect and track all accident information to ensure compliance with the timeframes established by DGS and noted above.

  • Forms

  • References

    • Management Memo 11-04

    • State Administrative Manual Sections 0750, 0752, 2420

    • Health Care Department Operations Manual, Section 5.5.20, Use of Privately Owned Vehicles and Rental Vehicles in the Conduct of State Business

  • Revision History

    • Effective: 07/2017
      Revised: 10/2019

5.5.20 Use of Privately Owned Vehicles and Rental Vehicles in the Conduct of State Business

  • Policy

    • California Correctional Health Care Services (CCHCS) headquarters Business Operations Section (BOS) shall ensure all CCHCS and Division of Health Care Services (DHCS) employees located at the Elk Grove Campus, Central Fill Pharmacy, Health Records Center, regional and satellite offices abide by all policies and procedures pertaining to the use of privately owned or rental vehicles in the conduct of state business as established by the Department of General Services (DGS).

    • In the event that a state-owned pool vehicle is unavailable, CCHCS and DHCS employees may use a state-contracted rental vehicle.  Privately owned vehicles (POV) on state business may be used if approved by a supervisor/manager.  CCHCS shall not require employees to use their POV unless it is a formal condition of employment.

  • Applicability

    • All CCHCS and DHCS employees at the following locations who operate a vehicle in the conduct of state business shall comply with this policy.

    • Headquarters – Elk Grove Campus

    • Health Records Center

    • Central Fill Pharmacy

    • Regional and satellite offices

  • Use of Rental Vehicles

    • Driver Responsibilities

      • If pool vehicles from BOS are not available, a rental car may be reserved through Concur Travel Services, which is located in the Travel Portal on Lifeline.

      • Defensive Driver Training (DDT) must be completed prior to use of any vehicle for state business.  Once completed, a copy of the DDT certificate shall be given to the supervisor/manager and a copy shall be submitted to the Staff Development Unit at CCHCSSDULMSTrainingHelp@cdcr.ca.gov and renewed every four years. 

      • Fines imposed on an employee for traffic offenses committed in a rental vehicle while conducting state business are the responsibility of the employee including, but not limited to, parking and toll violations.

    • Vehicle Accidents – Driver Responsibilities

      • In the event of an accident in a rental vehicle, the driver shall:

      • Obtain the other party’s information, e.g., name, address, and insurance carrier. The STD 269, Accident Identification, can be used for this purpose.  Copies can be kept with the employee when traveling on state business.

      • Report the accident immediately to DGS, Office of Risk and Insurance Management (ORIM).  ORIM is available 24 hours a day, seven days a week at (916) 376-5300, (916) 376-5302, or (800) 900-3634.  Voicemail is available on evenings, weekends, and state holidays.

      • Complete a STD 270, Report of Vehicle Accident, and distribute as noted on the STD 270. 

      • Have the supervisor/manager review the circumstances of the accident, complete a STD 274, State Driver Accident Review, and submit with the STD 270 to ORIM within two business days after the accident.

  • Use of Privately Owned Vehicles

    • Driver Responsibilities

      • A POV shall not be utilized unless it is verified by BOS that:

        • State-owned pool vehicles are not available first, and;

        • State-contracted rental vehicles are also not available.

      • DDT shall be completed prior to use of vehicle for state business.  Once completed, a copy of the DDT certificate shall be given to the supervisor/manager and a copy shall be submitted to the Staff Development Unit at CCHCSSDULMSTrainingHelp@cdcr.ca.gov and renewed every four years.

      • STD 261, Authorization to Use Privately Owned Vehicles on State Business, shall be signed by employee and supervisor/manager and renewed annually.

      • The STD 261 shall be retained by a supervisor/manager.

      • Employees shall receive prior approval from their immediate supervisors/managers for each use of their POV for state business.

      • Personal automobile insurance is the primary mechanism for monetary restitution for damages arising from automobile accidents.

      • Employees shall be covered by liability insurance for the minimum amount prescribed by state law ($15,000 for personal injury to, or death of, one person; $30,000 for injury to, or death of, two or more persons in one accident; $5,000 for property damage.) Vehicle Code, Section 16020, requires all motorists to carry evidence of current automobile liability insurance in their vehicle.

      • Employees must properly safeguard all belongings (personal and state-owned) in their POV.

      • Fines imposed on an employee for traffic offenses committed in a POV while conducting state business are the responsibility of the employee including, but not limited to, parking and toll violations.

    • Supervisor/Manager Responsibilities

      • Approve use of POV for state business.

      • Retain copies of the STD 261, which shall be renewed annually.

      • In case of an accident, the supervisor/manager shall review the circumstances of the accident, complete the STD 274, and submit with the STD 270 to DGS ORIM within two business days after the accident.

    • Vehicle Accidents – Driver Responsibilities

      • In the event of an accident in a privately owned vehicle, drivers shall:

      • Obtain the other party’s information, e.g., name, address, and insurance carrier. The STD 269 can be used for this purpose. Copies can be placed in the POV when traveling on state business.

      • Report the accident immediately to DGS, ORIM. ORIM is available 24 hours a day, seven days a week at (916) 376-5300, (916) 376-5302 or (800) 900-3634. Voicemail is available on evenings, weekends and state holidays.

      • Complete a STD 270 and distribute as noted on the STD 270. 

      • Have the supervisor/manager review the circumstances of the accident, complete a STD 274, and submit with the STD 270 to ORIM within two business days after the accident.

  • Forms

  • References

  • Revision History

    • Effective: 10/2019

5.5.21 Warehouse Operations

  • Policy

    • California Correctional Health Care Services (CCHCS), Business Operations Section (BOS), shall maintain a process for warehouse operations, shipping, receiving, and storage of goods/property.

  • Applicability

    • All CCHCS employees requiring storage at, or services provided by, the CCHCS Headquarters warehouse.

  • Procedure

    • Warehouse Access and Appointments

      • The warehouse hours of operation are Monday through Friday from 8:00 a.m. to 5:00 p.m.

      • CCHCS employees shall request warehouse access by submitting a Service Request form through the CCHCS Service Portal, at least one business day in advance of the requested visit. The request shall be entered into the Business Operations Request option, and Warehouse shall be selected from the drop down option under Issue Physical Location. Enter the following information in the Description of Issue field:

        • Time and date of the visit.

        • Anticipated duration.

        • Purpose.

        • Full names of all visitors.

      • CCHCS employees shall receive an email from the CCHCS Service Portal once their appointment request has been approved by BOS warehouse staff.

      • CCHCS employees visiting the warehouse are required to sign in/out of the visitor log located at the entry of the warehouse upon entering and exiting the warehouse.

      • CCHCS employees visiting the warehouse shall be escorted and provided access to their program’s designated storage area of the warehouse by BOS staff in which their program’s commodities are stored. Staff shall not enter or “shop” other areas of the warehouse.

      • BOS shall make exceptions to this policy for unforeseen hardships, safety issues, or emergencies in the following manner:

        • BOS may cancel or reschedule appointments due to unforeseen events such as emergencies, building maintenance efforts, or staff shortages. BOS shall attempt to provide as much notice as possible when the need arises to cancel or reschedule appointments.

        • In the event of an after-hours emergency necessitating entry to the warehouse, staff shall call the designated after-hours emergency line at: (916) 691-3099.

        • In the event of fire, life, and safety emergencies, or situations causing an undue hardship on the operations of CCHCS, an appointment to visit the warehouse shall not be required.

    • Warehouse Shipping and Receiving

      • CCHCS employees shall request to ship or transport items to or from the warehouse by submitting a service request through the CCHCS Service Portal. The request shall be entered into the Business Operations Request option, and Warehouse shall be selected from the drop down option under Issue Physical Location with the following documents attached and approved by a manager:

      • Shipping requests shall be submitted to BOS no less than five business days in advance of the expected shipment.

      • The requesting program shall be responsible for expenses incurred for shipping or transporting commodities.

      • Procured goods being shipped directly to the warehouse must include the following information in Systems, Applications and Products on the Purchasing Authority Purchase Order:

        • “Ship To” field shall begin with an “ATTN:” followed by the first name, last name, and phone number of the purchase requestor.

        • “Ship To” field shall list the warehouse address as follows: 8301 Valdez Avenue, Sacramento, CA  95828.

        • Delivery text shall read: “24-hour advance notice required prior to delivery

        • (916) 379-4439.”

        • A copy of the STD 65 purchase order shall be attached to the CCHCS Service Portal request for appointments made to receive procured items at the warehouse.

      • Upon receipt of goods/property at the warehouse, the property shall be kept in the staging area and the contact person on the packing slip or purchase order shall be contacted by BOS to visit the warehouse and verify receipt of goods.

      • Upon being contacted by BOS, staff shall make every effort to make a warehouse appointment and verify the receipt of goods within three business days.

      • Suspicious packages, which do not indicate a purchase order number or the name of the Program or staff which procured the item, shall not be accepted at the warehouse by BOS.

    • Warehouse Property Storage

      • Goods/Property stored within the warehouse shall be limited to items which are necessary for CCHCS’ operational needs. Storage of files, archives, or records are not permitted.

      • Methodology of property storage and general warehousing operations shall fall under the purview of BOS. Property shall be maintained in accordance with processes defined in the CCHCS Enterprise Asset Management Handbook.

      • Property stored in the warehouse shall be in compliance with all applicable state laws, regulations, and requirements, e.g., building and fire codes, and general industry safety orders.

      • Property with no foreseeable use or legal mandate for continued storage within a period of one year shall not be stored in the warehouse.

      • Unserviceable and surplus equipment shipments from institutions shall not be accepted at the CCHCS warehouse. Unserviceable and surplus equipment processes are defined in the CCHCS Enterprise Asset Management Handbook, Chapter 6.

      • Programs shall assess their storage area(s) quarterly and consolidate as appropriate to prevent accumulation of goods/property with no foreseeable use or legal mandate for continued storage.

      • Programs shall be responsible for tagging all property stored in their designated warehouse space with color-coded Property Disposition Tags, available at the entry of the warehouse, as follows:

        • Property to be used within a one-year period shall be printed on green paper.

        • Property with no foreseeable use, to be donated, or surveyed, shall be printed on red paper.

  • References

  • Revision History

    • Effective: 10/2021

Article 6 – Contracts and Procurement

5.6.1 Use of Federal Court Contracting Waiver

  • Policy

    • The California Correctional Health Care Services (CCHCS) or the California Prison Health Care Receivership Corporation (CPR) may solicit providers of, and award contracts for goods and/or services in accordance with the June 4, 2007 Federal Court Order Waiving State Contracting Statutes, Regulations and Procedures (“Federal Court Waiver”), and the alternative contracting procedures (“Alternative Contracting Procedures”) approved therein.

  • Responsibility

    • The Director, Health Care Policy and Administration, CCHCS shall ensure compliance with this procedure.

  • Procedure

    • Contracting units within CCHCS and CPR may seek guidance to award contracts under the Federal Court Waiver using the Alternative Contracting Procedures for those contracts within the scope of the Federal Court Waiver. Generally, such guidance should be sought where time is of the essence and use of standard state contracting procedures would delay or prevent delivery of essential goods and/or services.

    • Documentation and Checklist:

      • For each contract processed under the Alternative Contracting Procedure, the contracting unit shall create and maintain a Contract File containing the key documents identified in this procedure in hard copy. It is not necessary for the Contract File described in this procedure to be separate from the Standard Contract File otherwise maintained by the contracting unit.

      • The “Federal Court Waiver Contract Checklist” shall be completed by contracting units and submitted with each final contract approval package. A copy of the Federal Court Waiver Checklist shall be maintained in the Contract File.

      • The scope of this procedure is limited to complying with the requirements of the Federal Court Waiver. Other document retention practices may apply as required by other departmental procedures.

    • Determining if the Federal Court Waiver Applies:

      • As of the approval date of this procedure, the Federal Court has authorized the use of the Alternative Contracting Procedure for certain projects, including, but not limited to: information technology technical and operational infrastructure, health information management, telemedicine, recruitment and hiring, pharmacy, radiology services, laboratory services, credentialing, nursing leadership development, and asthma care.

      • Project area waiver limits can be located in the following location: https://cchcs.ca.gov/reports/. No plans to use the Alternative Contracting Procedure should proceed without the consultation and prior approval of the CCHCS Office of Legal Affairs (COLA). For the purpose of this procedure, the term “COLA” includes designated outside counsel.

    • Requesting Approval to Use the Alternative Contracting Procedure:

      • Contracting units planning to use the Alternative Contracting Procedure for a contract shall obtain the prior written approval of COLA, which shall:

      • Identify the appropriate waiver project area.

      • Identify the specific alternative process to be used (e.g., Expedited Formal, Urgent Informal, or Sole Source).

      • Be maintained by the contracting unit in the Contract File.

    • Soliciting a Contractor:

      • The Federal Court Waiver establishes an Alternative Contracting Procedure allowing the solicitation of contractors using one of three following processes:

      • Expedited Formal Process

        • Applicability

          • The Expedited Formal process shall be used for all higher cost contracts (e.g., contracts whose total contract price is estimated to be valued at $750,000 or more).

          • The Expedited Formal process also presumptively applies to contracts whose total contract price is estimated to be valued at $75,000 – $750,000, unless it is determined that urgent circumstances require use of the Urgent Informal process.

        • Procedure

          • Contracting units shall develop a Request for Proposal (RFP) or similar solicitation (e.g., Request for Qualifications or Request for Bids) for the desired goods and/or services. The prior written approval of COLA shall be obtained prior to issuing the RFP or similar solicitation.

          • Contracting units shall publish the RFP for a period of at least seven calendar days and retain evidence of all publications in the Contract File. RFPs shall be published on the CCHCS website and in a trade publication of general circulation and/or an internet-based public RFP clearinghouse (e.g., https://cchcs.ca.gov/project_rfp/). In addition, contracting units may send the RFP directly to potential contractors.

          • The contracting unit shall notify COLA, and COLA shall notify the parties in Plata v Newsom that the RFP has been published. The notice sent to the Plata parties shall be copied to the contracting unit and maintained in the Contract File.

          • The response period for the RFP shall be a minimum of 30 calendar days. All responses shall be maintained by the contracting unit in the Contract File. If fewer than three potential contractors submit proposals, the contracting unit shall make reasonable, good faith efforts to identify additional bidders and solicit their responses to the RFP. Such efforts shall be documented and maintained in the Contract File.

          • The contracting unit shall establish a selection committee consisting of at least three persons, all of whom with relevant experience, none of whom are affiliated with or otherwise have any conflict of interest with, any bidder, or have any conflict of interest in participating in the selection committee generally. Contracting units shall obtain certifications from the committee members to that effect and maintain the certification in the Contract File. The “Conflict of Interest Certification for Contractor Selection Committee Members” form shall be used for this purpose.

          • Criteria for selection of the recommended bidder may be set forth in the RFP and otherwise may, in the reasonable determination of the selection committee, including, but not limited to:

            • Cost factors;

            • Reputation of the bidder for responsiveness and timeliness of performance;

            • Quality of service or product performance;

            • Ability of the bidder to provide innovative methods for service delivery; and

            • Other similar factors the selection committee deems relevant.

          • The selection committee may conduct interviews of some or all of the bidders, may respond to questions posed by bidders, and provide additional information to bidders. For contracts whose total contract price is estimated to be valued at $750,000 or more, the selection committee shall conduct interviews of at least the top two bidders.

          • The selection committee, via the contracting unit, shall provide the Receiver or designee a written recommendation regarding the proposed contractor. The recommendation shall include an explanation of the basis for the recommendation. The selection recommendation may be submitted prior to or concurrent with the submission of the final contract for approval. A copy of the recommendation shall be maintained in the Contract File.

      • Urgent Informal Process

        • Applicability

          • The Urgent Informal process is designed to provide contracting units with the flexibility to move more quickly than permitted by the Expedited Formal process when urgent circumstances required. Nonetheless, it still requires a competitive bidding process to the extent possible.

          • Contract units may utilize the Urgent Informal bidding process for contracts whose total contract price is estimated to be valued at $75,000 – $750,000 if it is determined that urgent circumstances do not permit sufficient time to utilize the Expedited Formal bidding process because:

            • The additional delay that would result from utilizing the Expedited Formal process would substantially risk endangering the health or safety of incarcerated persons or staff, or

            • The contract is essential to the “critical path” of a larger project and the additional delay that would result from utilizing the Expedited Formal process would significantly interfere with timely or cost-effective completion of the larger project.

          • The Urgent Informal process may also be used for any contract whose total contract price is reasonably estimated to be valued at less than $75,000.

          • As set forth above, contracting units shall consult with COLA in determining if the use of the Urgent Informal process is appropriate.

        • Procedure

          • Contracting units shall make reasonable, good faith efforts to identify and solicit at least three proposals and will accept additional unsolicited bids that may be submitted, contracting units shall document all potential contractors solicited in the Contract File.

          • Contracting units may, at their discretion, develop an RFP prior to soliciting bidders, establish a response period with respect to any such RFP, and/or establish a selection committee to assist in the selection of the recommended bidder. Any written solicitation shall be maintained in the Contract File.

          • All responses, including verbal responses, shall be documented and maintained in the Contract File.

          • Criteria for selection of the recommended bidder, in the reasonable determination of the contracting unit, may include, but will not be limited to, cost, reputation of the bidder for responsiveness and timeliness of performance, quality of service or product performance, ability of the bidder to provide innovative methods for service delivery, and other similar factors the contracting unit deems relevant.

          • The contracting unit shall provide a written recommendation regarding the selection of the contractor to the Receiver, or designee, explaining the basis for the recommendation. The recommendation may be submitted prior to or concurrent with the submission of the final contract for approval. A copy of the recommendation shall be maintained in the Contract File.

      • Sole Source Process

        • Applicability

          • The Sole Source process is designed to permit contracting units to utilize a sole source when it is determined, after reasonable efforts under the circumstances, that there is no other reasonably available source.

          • The Sole Source process shall only be used as a last resort.

          • As set forth above, contracting units shall consult with COLA in determining if the award of a sole source contract is appropriate.

        • Procedure

          • The contracting unit shall document the efforts made to identity potential contractors and maintain the documentation in the Contract File.

          • The contracting unit shall provide a written recommendation regarding the proposed sole source award to the Receiver, or designee, explaining the basis for the recommendation. The recommendation may be submitted prior to or concurrent with the submission of the final contract for approval. A copy of the recommendation shall be maintained in the Contract File.

    • Contract Preparation

      • Proposed contracts using the Alternative Contracting Procedure shall be submitted by the contracting unit to COLA for review and written approval as to form and legality, prior to submission of the contract to the Receiver or designee for final approval.

      • Contracting units shall maintain the written approval of COLA in the Contract File.

    • Final Contract Routing & Contract Numbers

      • Contracting units shall route contracts processed under the Federal Court Waiver for final approval through the Receiver’s Custodian of Records. All final approval packages shall include:

        • A routing slip or transmittal letter including all necessary departmental approvals;

        • A recommendation for approval, including the contractor selection recommendation if not previously submitted (this may be included in the transmittal letter);

        • An original contract for signature; and

        • A copy of the completed Federal Court Waiver Contract Checklist.

      • The Receiver’s Custodian of Records shall maintain a log of all contracts executed by the California Department of Corrections and Rehabilitation (CDCR) or CPR under the Federal Court Waiver. After a contract is executed by the Receiver, or designee, the contract shall be returned to the Custodian of Records who shall log the CDCR agreement number, or assign and log a CPR contract number.

      • The Receiver’s Custodian of Records shall maintain original executed CPR contracts and copies of executed CDCR contracts (returning CDCR originals to the applicable contracting unit) in a central contract file. In addition, the Receiver’s Custodian of Records shall maintain all final approval packages, including the Federal Court Waiver Contract Checklist, in the central contract file. All original source documents identified in the Federal Court Waiver Contracts Checklist shall be maintained by the contracting unit in the unit’s Contract File.

    • Reporting

      • The Receiver’s Custodian of Records, in consultation with COLA and the applicable contracting unit as needed, shall be responsible for preparing the contracting report for inclusion in the Receiver’s Tri-Annual Report to the Court. The reports shall include a summary that:

      • Specifies each contract awarded during the quarter;

      • Provides a brief description of each such contract;

      • Identifies which of the projects or categories of projects the contract pertains to;

      • Identifies the method used to award the contract (e.g., Expedited Formal, Urgent Informal, or Sole Source);

      • Lists all bidders for each contract, identifies which bidders were solicited directly, and identifies  the successful bidder;

      • Notes if fewer than three bidders responded to a solicitation;

      • Explains the determination that one (or both) of the criteria for using the Urgent Informal process were satisfied for contracts using the Urgent Informal process whose total contract price is estimated to be between $75,000 – $750,000; and,

      • Explains the basis for determining that no other sources were reasonably available for contracts that are sole-sourced.

    • Approval and Review

      • The CCHCS Director of Health Care Policy and Administration and the COLA Chief Counsel shall review this procedure annually.

  • References

    • Plata v. Newsom, June 4, 2007 Order Waiving State Contracting Statutes, Regulations and Procedures

    • Plata v. Newsom, Supplemental Orders Waiving State Contracting Statutes, etc., dated 08/13/07 (Supp. Waiver No. 1), 01/25/08 (Supp. Waiver No. 2), 12/20/07 (Supp. Waiver No. 3), 04/23/08 (Supp. Waiver No. 4), 07/01/08 (Supp. Waiver No. 5), 07/02/08 (Supp. Waiver No. 6), 09/18/08 (Supp. Waiver No. 7) and 01/30/09 (Supp. Waiver No. 8).

  • Revision History

    • Effective: 06/2009
      Revised: 01/2022

5.6.2 Prison Health Care Provider Network Web Portal Access and Provider Directory Usage

  • Policy

    • California Correctional Health Care Services (CCHCS) contracts with a Prison Health Care Provider Network (PHCPN) contractor to provide a network of specialty physicians, hospitals, ambulances, and other health care service providers. Upon approval by CCHCS Direct Care Contracts Section (DCCS) Headquarters Management (HQM), the PHCPN contractor shall make network-related information available to designated personnel, as determined by each institution, with a need to access information via a web portal.

    • The web portal includes a Provider Directory and Information Warehouse. The Provider Directory houses the Provider Network and shall be utilized to canvass for current and active participating health care service providers within the PHCPN to meet patient health care service needs. The Information Warehouse contains information on health care utilization and the provider network’s performance for oversight and reporting. Designated personnel on the PHCPN Web Portal shall be granted access to the Provider Directory and/or the Information Warehouse, once the request has been approved by DCCS HQM.

  • Procedure

    • Web Portal Access

      • Users requesting access to the PHCPN Web Portal shall submit a DCCS Training Request Form to register for the Health Net Provider Directory training provided by Specialty Network Administration Program (SNAP). The DCCS Training Request Form is available on CCHCS Lifeline under “Direct Care Contracts,” “Quick Links” tab or at the following link: DCCS-TRNG-REQ-Form Rev 08.07.24.pdf.

      • At the time of training, instructions shall be provided on how to complete the Health Net Federal Services CCHCS – Access Request Form – Authorized User Form (herein referred to as Health Net Access Request Form). The user shall complete the Health Net Access Request Form, available on CCHCS Lifeline under “Direct Care Contracts,” “Resources,” “Forms” tab, “Health Care Provider Network” or at the following link: HealthNet-AccessRequestForm.pdf.

      • The Chief Executive Officer (CEO), Chief Medical Executive, Chief Nurse Executive, Chief Support Executive, or designee, shall electronically sign the form to approve the request. Their signature approves that the user’s initial profile can be created, modified, or deleted upon separation of duties. The user shall submit the approved form to the following SNAP inbox: snap@cdcr.ca.gov.

      • SNAP shall route the Health Net Access Request Form to DCCS HQM, or designee, who shall then review and approve, if necessary, sign each Health Net Access Request Form. DCCS HQM shall return the signed Health Net Access Request Form to SNAP for processing.

      • SNAP shall email the requestor indicating approval or denial of the request. If approved, the email notifies the user that their profile has been created and how to login to the Provider Network Web Portal Maintenance.

    • Provider Directory Usage

      • PHCPN Web Portal users who utilize the Provider Directory shall:

      • Canvass the PHCPN Provider Directory Tier 1 and Tier 2 service providers using the ProviderSearch tool. The ProviderSearch tool utilizes four available criteria: location type (address/radius, city, county, or state); provider name: provider identification number: or license number. The search shall be narrowed by plan/network type; and specialty and subspecialty.

        • Tier 1 and Tier 2 provider information are available based on access granted. Tier 1 providers are the preferred choice and shall be utilized first, if available, unless there is a health care need to send the patient to a Tier 2 provider.

        • Written approval (e-mail is acceptable) shall be obtained from the institution CEO, or designee if a Tier 2 service provider is selected. Approvals shall be sent to the SNAP inbox: snap@cdcr.ca.gov.

      • Contact SNAP for further direction if no available resources are found, or if the available resources are unable to fulfill a health care service need through the PHCPN Provider Directory.

  • References

  • Revision History

    • Effective: 05/2018
      Revised: 03/2022

5.6.3 Registry Workforce Management System and Timekeeping

  • Policy

    • The California Correctional Health Care Services (CCHCS) Medical Registry Network (MRN) and the Dental and Mental Health Registry Network (DMHRN) contractor(s) will make network-related information available, including provider utilization and timekeeping, to the California Department of Corrections and Rehabilitation (CDCR) and CCHCS via the Registry Workforce Management System (RWMS).

  • Procedure

    • Initial Access Request

      • CCHCS Direct Care Contracts Section (DCCS) Section Support Team (SST) is responsible for facilitating access to the RWMS for designated CDCR/CCHCS staff.  SST will notify the network contractor to authorize access to the system upon staff submission and completion of the proper forms and training as follows:

      • The CCHCS-MC-425 Registry Workforce Management System (Stafferlink) User Request & Confidentiality Statement which can be found on Lifeline under “Direct Care Contracts,” “Resources,” “Forms” tab, “Registry Networks,” or Direct Care Contracts – CCHCS-MC-425 Registry Networks Vendor Workforce Management System (Stafferlink) User Request & Confidentiality Statement.

      • The DCCS Training Request Form which is available on Lifeline under “Direct Care Contracts,” “Quick Links,” or DCCS-TRNG-REQ-Form.pdf.

      • The forms shall be submitted to the user’s manager or supervisor for review and approval.

      • The user’s manager or supervisor shall review, approve, and submit the forms to CCHCS DCCS Help Desk via e-mail at: CCHCSHealthcareContractsHelpDesk@cdcr.ca.gov.

      • Upon receipt, DCCS Help Desk staff shall route the form(s) to the SST training team for review and approval. SST training team shall retain approved forms for at least three years from the date of approval.

      • The SST training team shall enroll the user in the required RWMS training and submit the CCHCS-MC-425 form via e-mail to the Vendor Web Portal Administrator for action.

      • The Vendor Web Portal Administrator shall create the user profile and send an e-mail to the SST training team to confirm action taken.

      • The SST training team shall send RWMS login information to the user.

    • Request to Modify or Delete User Access

      • A request to modify or delete approved user access shall be made upon separation of staff from CDCR/CCHCS, when user access is no longer required or access requires adjustment.

      • Request to Modify User Access

        • The user shall complete the CCHCS-MC-425 (Refer to Section III.A.1.) and submit the form to their manager or supervisor for review and approval.

        • The user’s manager or supervisor shall review, approve, and submit the form to CCHCS DCCS Help Desk via e-mail at: CCHCSHealthcareContractsHelpDesk@cdcr.ca.gov.

        • Upon receipt, DCCS Help Desk staff shall route the form(s) to the SST training team for review and approval.

      • Request to Delete User Access

        • The user’s manager or supervisor shall initiate the request by selecting “Discontinue User” on a CCHCS-MC-425 form (Refer to Section III.A.1.) and submit the form to CCHCS DCCS Help Desk via e-mail at CCHCSHealthcareContractsHelpDesk@cdcr.ca.gov.

      • Upon receipt, DCCS Help Desk staff shall route the form to the SST training team. SST training team shall retain approved forms for at least three years from the date of approval.

      • The SST training team shall submit the form via e-mail to the Vendor Web Portal Administrator for action.

      • The Vendor Web Portal Administrator shall modify or delete the user profile as indicated and send an e-mail to SST training team to confirm action taken.

    • RWMS Usage

      • CDCR/CCHCS staff shall use the RWMS to:

        • Submit and review requests for registry providers.

        • Review registry provider profiles, credentials, and compliance.

        • Review and approve completed registry provider timecards.

        • Generate reports.

        • Provide updates, issues, or concerns to the registry network contractor.

      • For access, navigation, and retrieval of registry reports, refer to the user security group training materials provided by the registry network contractor which are available on Lifeline under “Direct Care Contracts,” “Networks,” “Medical Registry Network” tab, “Training Materials,” or at the following link: Resources (sharepoint.com).

        • The following documents shall be included:

        • Stafferlink Reference Guide-Institution/Facility Staff.

        • Stafferlink Reference Guide-Credentialing.

        • Stafferlink Reference Guide-Institution/Facility Management.

        • Stafferlink Reference Guide-Healthcare Invoicing Section.

        • Stafferlink Reference Guide-Headquarters.

    • Timekeeping

      • Within each institution/facility, the unit manager or supervisor shall designate the following:

        • A specific location(s) to maintain the DMHRN and MRN timecards for registry providers to sign in and out each day for hours worked.

        • At least one point of contact for the medical, dental, and mental health programs to assist the DMHRN and MRN contractor with obtaining CDCR/CCHCS authorized manager or supervisor signatures on timecards.

      • The unit manager or supervisor shall ensure the following:

        • The DMHRN or MRN registry provider(s) sign in and out on a daily basis in the designed areas.

        • All DMHRN and MRN registry provider(s) obtain a CDCR/CCHCS authorized manager or supervisor signature on the timecard for all regular hours worked, as well as a daily signature for any unanticipated on-call or callback hours worked on any given day.

        • All copies of the prior week’s timecards with the appropriate activation report completed are emailed to the DMHRN or MRN contractor each Monday by close of business at: timekeeping@vmssolution.com.

        • All timecard discrepancies are resolved in collaboration with the DMHRN or MRN contractor.

      • The following timesheet reference materials are available on Lifeline under the “Direct Care Contracts,” “Networks,” “Medical Registry Network” tab, or at the following link: Resources (sharepoint.com).

        • Sample Timesheet – Available under “Directives and Procedures.”

        • Timesheet User Guide – Available under “Directives and Procedures.”

        • MRN-DMHRN Timekeeping Process – Available under “Training Materials”.

  • References

    • California Code of Regulations, Title 15, Division 3, Chapter 1, Subchapter 5, Article 2, Section 3415, Employees of Other Agencies

    • California Correctional Health Care Services, Direct Care Contracts Section Directives and Procedures Resources (sharepoint.com)

  • Revision History

    • Effective: 05/2018
      Revised: 10/2021

5.6.4 Working with Temporary/Relief Registry Providers

  • Policy

    • The California Department of Corrections and Rehabilitation/California Correctional Health Care Services (CDCR, CCHCS) staff shall collaborate with a network contractor to develop and maintain a statewide Medical Registry Network and/or Dental and Mental Health Registry Network comprised of registry providers available to deliver temporary/relief medical, dental, and mental health care services to patients housed at CDCR institutions and facilities.

  • Procedure

    • Contract and Payment Rate Information

      • Contract information and payment rates shall be maintained as confidential between the contracting state entity and the network contractor.  Releasing this information to temporary/relief registry providers working at the institution/facility or network vendors could result in potential breach of contract or legal actions brought by the network contractor. Institution/facility staff shall:

      • Not discuss or release any contract information, including payment rates, with temporary/relief registry providers.

      • Inform temporary/relief registry providers that they must contact their network contractor or the network vendor about contract information and payment rates if they inquire.

    • Temporary/Relief Registry Providers Time Off and Work Schedule Changes

      • Approval for time off or schedule changes are granted only by the network vendor. The network contractor is responsible for coordinating any approved time off or schedule changes with the institution/facility staff and Direct Care Contract Section (DCCS) to ensure continued staffing coverage.  Institution/facility staff shall:

      • Refer the temporary/relief registry providers to their network vendor for time off or work schedule change approval.

      • Immediately notify the assigned DCCS analyst via email and document in the Registry Workforce Management System when approached by temporary/relief registry providers for time off or schedule changes.  DCCS shall coordinate with the network contractor and the institution/facility to ensure continued coverage is maintained and to request that the network vendor counsel the temporary/relief registry providers regarding the process for requesting schedule changes.

    • Holiday Pay Rates for Temporary/Relief Registry Providers

      • Holiday pay is allowed only when included in the contract and for the specific temporary/relief registry classifications listed under the allowance in the contract.

      • Authorization from the institution Chief Executive Officer (CEO)/Chief of Mental Health (CMH)/Chief Medical Executive (CME)/Supervising Dentist (SD)/Division of Juvenile Justice (DJJ)/Associate Director (AD) or respective designee is required to receive holiday pay.

      • If holiday pay is allowed, pay will commence on the first shift work hours before the holiday through the third shift work hours of the actual holiday.

      • The temporary/relief registry provider timecard is reviewed and authorized by the CEO, CME or respective designee as required to receive holiday pay.

      • If temporary/relief registry providers have questions about holiday or overtime pay, or any timekeeping/related topics, they shall be directed to their network vendor.

    • Temporary/Relief Registry Providers Disciplinary Process

      • Temporary/relief registry providers are not subject to the same Human Resources policies or procedures as civil service employees; therefore, institution/facility staff shall not pursue progressive discipline or provide an appeal process to temporary/relief registry providers who have been disciplined. However, temporary/relief registry providers working on-site at the institution/facility are required to adhere to all CDCR, CCHCS patient care and security policies and procedures.

      • Institution/facility staff shall report violations of CDCR, CCHCS patient care and security policies and procedures by temporary/relief registry providers to the network contractor by documenting in the Registry Workforce Management System.

      • Institution/facility staff shall also contact the DCCS Help Desk by e-mail at CCHCSHealthcareContractsHelpdesk@cdcr.ca.gov, or by telephone at (916) 691‑0698.

      • DCCS will work with the network contractor and institution/facility staff to resolve issues in accordance with contract requirements.

      • In cases of egregious performances that warrant removing a contractor and/or temporary/relief registry provider from an institution/facility, the institution/facility or Headquarters staff shall contact the DCCS Help Desk immediately upon removal by telephone or e-mail for instructions on how to proceed.

      • As a temporary measure and while pending a response from the DCCS Help Desk, institution/facility leadership may require temporary/relief registry providers to leave the institution/facility grounds immediately and revoke their access to the institution/facility by recovering their state ID badge and chits if their continued presence poses a safety and/or security risk to the institution/facility, other staff members, or patients.

  • References

    • California Code of Regulations Title 15, Chapter 1, Subchapter 5, Article 2, Section 3415, Employees of Other Agencies

    • California Correctional Health Care Services, Direct Care Contracts Section Directives and Procedures Resources (sharepoint.com)

    • California Correctional Health Care Services, Direct Care Contracts Section Broadcasts Resources (sharepoint.com)

  • Revision History

    • Effective: 08/2017
      Revised: 01/2022

5.6.5 Pharmaceutical Acquisitions

  • Policy

    • California Correctional Health Care Services (CCHCS) participates in the Statewide Pharmaceutical Program, also referred to as the Prescription Drug Bulk Purchasing Program, established by Government Code sections 14977-14982, and administered by the Department of General Services (DGS).

  • Applicability

    • This policy applies to all CCHCS staff involved with acquisitions of pharmaceutical products.

  • Procedure

    • Pharmaceutical acquisitions shall be made utilizing pre-existing sources and other acquisition processes according to the following guidelines:

    • Prescription bulk pharmaceuticals shall be purchased using the mandatory Pharmaceutical Wholesaler statewide contract.

    • Pharmaceutical products not available through the Pharmaceutical Wholesaler statewide contract shall be purchased using mandatory DGS contracts, when available.

    • Pharmaceutical products not included in a DGS contract may be obtained by following standard acquisition procedures (Refer to the CCHCS Acquisitions Customer Guide).

    • For pharmaceutical acquisition requests that meet blanket purchase order requirements as specified in the CCHCS Acquisitions Customer Guide, Section 3.4, the procedures contained within the guide shall be followed.  Otherwise, pharmaceutical acquisitions shall follow standard procedures as found in the Acquisitions Customer Guide.

  • References

    • Government Code, Title 2, Division 3, Part 5.5, Chapter 12, Purchase of Prescriptions Drugs for Government Agencies, Sections 14977-14982

    • Public Contract Code, Division 2, Part 2, Chapter 2, State Acquisitions of Goods and Services, Section 10290

    • Department of General Services, State Contracting Manual, Volume 2

  • Revision History

    • Effective: 08/2016
      Reviewed: 05/10/2023
      Revised: 06/09/2025

5.6.6 Direct Health Care Service Contractor and/or Provider Performance Issue Reporting

  • Policy

    • California Department of Corrections and Rehabilitation (CDCR) and California Correctional Health Care Services (CCHCS) staff shall document and report, in writing, any performance issues concerning a direct health care service contractor and/or provider to the Direct Care Contracts Section (DCCS).

  • Procedure

    • Institution or HQ Staff Responsibilities

    • DCCS Staff Responsibilities

      • The Help Desk staff shall:

        • Acknowledge receipt of all e-mails received through the Help Desk inbox and inform the submitting party that Specialty Network Administration Program (SNAP) staff will respond within three business days.

        • Notify SNAP via SNAP@cdcr.ca.gov following the receipt of the performance issue and forward the CCHCS-MC-411 and/or HPN PQI Referral Form and all relevant documents to SNAP within one business day.

        • Log and assign a tracking number to all inquiries related to contractor and/or provider reportable performance, and monitor the status of each inquiry.

      • SNAP staff shall:

        • Maintain a listing of incident reports/issues, monitor the status, and track all forms and related documents received from the Help Desk.

        • Communicate with the submitting party for further details/completion of the forms if the forms do not indicate enough details to fully address the incident/issue.

        • Review and determine a recommendation for an appropriate course of action for each performance issue received. If the issue is determined to be a critical incident, all forms and related documents shall be forwarded to DCCS Management.

      • DCCS Management shall:

        • Review and assess the incident report.  If the issue is deemed a clinical issue, forward all forms and related documents to Utilization Management (UM) leadership.

        • Follow-up with UM and assess whether a corrective action plan is required.

      • UM shall:

        • Review all forms and related documents of the incident.

        • Notify Health Net if a corrective action plan is needed.

    • Unsatisfactory Contractor and/or Provider Performance Monitoring

      • DCCS and/or UM shall follow-up with the institution, as needed, to confirm the contractor and/or provider’s on-going performance is acceptable.

        • If performance remains unsatisfactory and compliance does not occur within the specified timeline in the corrective action plan, DCCS Management may provide the contractor with a Notice of Stop Work, Notice of Contract Suspension, Notification of Breach of Contract, or Notice of Termination Agreement.

        • A Notification of Breach of Contract, Notice of Stop Work, or Notice of Contract Suspension shall be sent to the contractor when the contractor and/or provider fails to comply with the specified terms of the contract or corrective action plan.

          • A Notice to Stop Work or Notice of Contract Suspension may be issued to direct the contractor to suspend performance or stop performing services for a specified period of time.  This shall be the contractor and/or provider’s last opportunity to address the unsatisfactory performance and a timeframe in which to comply with contract terms shall be provided.  Cancellations, extensions, or modifications and timelines for each notice may vary based on contract language.

        • If performance remains unsatisfactory through the specified timeframe, a Notice of Termination Agreement may be issued. Contract termination with cause may be immediate, or without cause within 30 calendar days from date of Notice of Termination Agreement. However, timelines may vary based on contract language.

        • In the event of contract or provider termination, SNAP staff shall coordinate with the institution or HQ staff to determine if a new contract or provider is needed for the impacted service.

        • Unless and until a Notice of Termination Agreement is issued, the contractor and/or provider shall continue to provide health care services under the contract.

    • Contractor and/or Provider Immediate Removal

      • In cases of egregious performances that warrant removing a contractor and/or provider from an institution, the institution or HQ staff shall contact the Help Desk immediately upon removal by telephone or e-mail for instructions on how to proceed.

  • References

  • Revision History

    • Effective: 11/2017
      Revised: 01/2022

Article 7 – Fiscal Management Section

5.7.1 Payment of Non‑Contract Claims

  • Policy

    • California Correctional Health Care Services (CCHCS) and Division of Health Care Services (DHCS) shall pay undisputed claims timely for which payment is appropriate under a settlement agreement, an Order of a court or administrative tribunal that is final or that CCHCS/DHCS chooses not to appeal, or for other reasons (hereinafter referred to as non-contract claims).

  • Purpose

    • Establish a consistent approach for CCHCS/DHCS internal review and approval of non-contract claims to ensure payment of non-contract claims is legally appropriate, is approved by any impacted CCHCS/DHCS programs and/or California Department of Corrections and Rehabilitation (CDCR) institutions, and is within CCHCS/DHCS budget.

  • Applicability

    • This policy sets forth the process for CCHCS/DHCS internal approval of payment for certain types of claims, including, but not limited to, the following:

      • Claims filed with the Department of General Services’ Office of Risk and Insurance Management, such as claims by contractors related to invoices that CCHCS/DHCS has deemed are not properly payable under contract and claims by employees or others.

      • Claims before the Labor Commissioner, such as claims by subcontractors that have not been paid by a contractor for goods or services that CCHCS/DHCS received.

      • Appeals filed with the State Personnel Board or California Department of Human Resources by CCHCS/DHCS employees that result in reinstatements, back pay settlements, or other resolution that involves monetary payment.

      • Settlement of court or other administrative litigation, including commercial litigation, the assessment of fines against CCHCS/DHCS, and incarcerated person claims.

      • Other matters that are within the CCHCS/DHCS authority.

    • This policy is not applicable to the following:

      • Processes that are external to CCHCS/DHCS.

      • Payment of invoices that are payable pursuant to contract.

      • Payment of invoices that are payable pursuant to the Plata Court Orders dated March 30, 2006, and November 8, 2006.

      • Payment of invoices that are payable pursuant to Penal Code Section 5023.5.

      • Action on out-of-class grievances.

  • Responsibility

    • Responsibility for review and approval of non-contract claims pertaining to the Mental Health and Dental Services programs shall reside with the Undersecretary, Health Care Services.  Responsibility for review and approval of non-contract claims pertaining to Medical Services and all other areas within CCHCS shall reside with the Receiver, who hereby delegates review and approval to the Undersecretary, Health Care Services.  The Undersecretary, Health Care Services, hereby delegates review and approval, except as noted in (e)(2)(B), below, to the Director of Health Care Policy and Administration, the Chief Counsel of the CCHCS Office of Legal Affairs (COLA), the Associate Director of Fiscal Management or designee, the Deputy Director of any CCHCS program area, and the Chief Executive Officer of any CDCR institution impacted by the non-contract claim.  The appropriate level of review shall be determined by the value of the non-contract claim that is proposed to be paid, following the procedure set forth below.

  • Procedure

    • Requests for settlement or payment of claims, including requests for settlement authority for upcoming hearings in any judicial or administrative forum, shall be directed to the attention of the Chief Counsel, COLA.  The Chief Counsel shall seek recommendations from the assigned COLA Attorney, the Deputy Director of any CCHCS/DHCS program area, and the Chief Executive Officer of any CDCR institution that is impacted by the claim.

      • The COLA Attorney shall indicate the time within which reply to the request is needed, to ensure timely response to the request for settlement or payment of the claim.

      • The COLA Attorney shall secure a budget line item for funding from the Associate Director of Fiscal Management or designee, if the recommendation proposes payment of CCHCS/DHCS funds.

    • The COLA Attorney shall ensure preparation of a memorandum containing the recommendation(s) of persons within CCHCS/DHCS who have responded to the COLA Attorney’s request.  This memorandum shall be routed for the following approvals:

      • Recommendations for settlement or payment of claims of under $100,000:  Approvals are required by the Chief Counsel, the Deputy Director of any impacted CCHCS/DHCS program area, the Chief Executive Officer of any impacted CDCR institution, and the Director of Health Care Policy and Administration.

      • Recommendations for settlement or payment of claims of $100,000 or more:  Approvals are required by the Undersecretary, Health Care Services, for their respective areas of responsibility, in addition to the approvals required in (e)(2)(A).

    • Upon receipt of the required approvals or a decision not to approve the requested settlement or payment, the Chief Counsel shall arrange for appropriate response to the party requesting settlement or payment of the claim.

    • The original approval package shall be retained by COLA, which shall serve as CCHCS/DHCS custodian of records regarding these claims.

  • Contact

    • For questions regarding this policy and procedure, please contact the Associate Director, Fiscal Management, or the Chief Counsel, COLA.

  • References

    • Plata v. Brown, Order Re State Contracts, March 30, 2006

    • Plata v. Brown, Supplemental Order Re State Contracts, November 8, 2006

    • California Government Code, Title 1, Division 3.6, Part 3, Chapter 4.5, Sections 927- 927.13, Prompt Payment of Claims

    • California Government Code, Title 2, Division 5, Part 2, Chapter 2, Article 3, Sections 18701-18717, General Powers and Duties

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 1, Article 2, Sections 19816.2-19816.21, Powers and Duties

    • California Labor Code, Division 1, Chapter 1, Sections 50-64.5, General Powers and Duties

    • California Penal Code, Part 3, Title 7, Chapter 1, Section 5023.5

  • Revision History

    • Effective: 05/2012
      Revised: 07/2017

5.7.2, Out‑of‑State Travel Requests

  • Policy

    • California Correctional Health Care Services (CCHCS) out-of-state travel (OST) requests shall be approved in advance by the Undersecretary, Health Care Services; Secretary; and the Governor’s Office, as applicable, prior to traveling outside of California on official business only.

  • Purpose

    • Out-of-state travel is defined as any travel outside the State of California for the purpose of conducting state business.

  • Procedure

    • OST Blanket Request

      • OST Blanket Travel provides state agencies the authority, in advance, to approve travel listed in their department’s travel plan. The OST Blanket Travel requests are classified as either mission-critical or non-mission critical (discretionary) travel, based on the Out of State Blanket request form submitted by the requesting program.

      • The Fiscal Management Section (FMS) Technical Unit shall issue an OST Blanket Call Letter and OST Request form on an annual basis, generally issued between December and April, to inform all CCHCS program areas to submit a request for advanced approval. OST Request forms are due to FMS Technical Unit.

      • To be considered for OST Blanket, each program shall prepare and submit the OST request package one-year in advance, including all necessary forms and supporting documentation (with required signatures), as identified in the Call Letter, to the FMS OST mailbox: m_OutOfStateTravel@cdcr.ca.gov.

      • Upon approval, FMS shall forward the OST request package to CDCR’s Accounting Services Branch (ASB).

        • Medical Requests: ASB shall retain the OST request package for record keeping only. FMS shall forward a copy of the request package to the CDCR Agency Secretary.

        • Dental and Mental Health Requests: ASB shall route the OST request packages to the Secretary and the Governor’s Office, as applicable, for approval.

    • Individual Trip Requests

      • Individual OST requests are submitted when travel was not originally known or requested through the OST Blanket Request process.

      • To be considered for an Individual OST, the requester shall prepare an Individual Trip Request package to include the following:

        • A request memorandum (refer to the CCHCS and CDCR Individual OST Memorandum template);

        • Completed CDCR 3060, Out of State Individual Trip Request, and STD 257, Out-of-State Travel, which are available on the CDCR Out-of-State Travel page; and

        • Relevant event documentation (e.g., brochure, flyer, invitation and agenda).

      • Individual OST requests shall be submitted to FMS at least eight weeks in advance of the travel date to provide sufficient time to obtain the required approvals, as indicated in the steps below.

        • Medical Services Request

          • Medical Services requests are under the authority of the Receiver, or designee. Upon the end of the Receivership, Medical Services requests will align with Section (c)(2)(C)2.

          • The program shall submit a completed Individual OST request package, including an Individual OST Memorandum addressed to the Director of Health Care Policy and Administration, CDCR 3060, STD 257, and supporting documentation (e.g., brochure, flyer, invitation, and agenda) to support the trip to the FMS OST mailbox: m_OutOfStateTravel@cdcr.ca.gov.

          • The FMS analyst shall review the Individual Trip Request package and provide any feedback to the program.

          • The program shall complete necessary revisions and route the Individual Trip Request package to the program director and applicable program leadership for approval.

          • All levels of the traveler’s supervisory chain of command between the traveler and program director shall also review and approve the Individual OST request package.

          • Approvers shall indicate their approval by initialing in the memorandum’s Via field.

          • The program director shall sign the memorandum to indicate their approval of the costs, purpose of travel, and content of the presentation, if available.

          • The program shall submit the completed Individual Trip Request package to the FMS OST mailbox: m_OutOfStateTravel@cdcr.ca.gov.

          • The FMS analyst shall review and route the completed Individual Trip Request package to the following: 

            • Director, Health Care Policy and Administration, for approval and signature on the memorandum.

            • Program director and Undersecretary, Health Care Services, for approval and signature on the     STD 257.

          • Upon approval by the Director, Health Care Policy and Administration, Receiver, and Undersecretary, Health Care Services, the FMS analyst shall forward a copy of the Individual Trip Request package to ASB and the CDCR Agency Secretary and notify the program of their trip number once assigned by ASB.

        • Dental and Mental Health Services Requests

          • The program shall submit a completed Individual Trip Request package, including a memorandum addressed to the Associate Director of ASB, CDCR 3060, STD 257, and backup documentation (e.g., brochure, flyer, invitation, and agenda) to support the trip to the FMS OST mailbox: m_OutOfStateTravel@cdcr.ca.gov.

          • The FMS analyst shall review the OST request package and provide any feedback to the program.

          • The program shall complete necessary revisions and route the Individual Trip Request package to the program director and applicable program leadership for approval.

          • All levels of the traveler’s supervisory chain of command between the traveler and program director shall also review and approve the Individual OST request package.

          • Approvers shall indicate their approval on a route slip or by attaching an email indicating their approval.

          • The program director shall sign the memorandum to indicate their approval of the costs, purpose of travel, and content of the presentation, if available.

          • The program shall submit the completed Individual Trip Request package with all required signatures to the FMS OST mailbox: m_OutOfStateTravel@cdcr.ca.gov.

          • The FMS analyst shall review and route the completed Individual Trip Request package to the following:

            • Undersecretary, Health Care Services, for approval and signature on the STD 257.

            • ASB Associate Director for review and approval.

          • Upon approval, ASB shall forward the Individual Trip request to the CDCR Agency Secretary for approval.

          • ASB shall notify FMS of the outcome, and FMS shall notify the traveler and requester of the approval and ASB-assigned trip number or denial.

  • References

    • California Government Code, Title 2, Division 3, Part 1, Chapter 1, Article 9.5, Section 11139.8

    • Prohibition on State-Funded and State-Sponsored Travel to States with Discriminatory Laws, California Attorney General website

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Section 22020.25, Individual Request for Approval of Out-of-State Travel

    • State Administrative Manual, Section 760, Out-of-State Travel

    • State Administrative Manual, Section 761, Advance Blanket Approval

    • State Administrative Manual, Section 762, Criteria for Blanket Approval of Out-of-State Travel

    • State Administrative Manual, Section 763, Travel Plan

    • State Administrative Manual, Section 764, Individual Trip Approval

  • Revision History

    • Effective: 03/25/2024

5.7.3, Staffing Allocations

  • Policy

    • California Correctional Health Care Services (CCHCS) is responsible for developing and distributing staffing allocations. Staffing allocations are based on factors that include an institution’s mission, physical plant, clinic considerations, and population by risk level acuity. Staffing allocations are adjusted during the Fall Population and May Revision processes, and these allocations are distributed based on factors that include approved Budget Change Proposals (BCPs), Spring Finance Letters (SFLs), mission changes, program initiatives, and operational needs.

  • Responsibility

    • The Fiscal Management Section is responsible for collaborating with applicable program areas to conduct a comprehensive review of staffing allocations to determine adjustments in accordance with this policy.

    • Program areas are responsible for reviewing pending and approved legislation and court orders to determine the impact on operational needs and identifying required adjustments based on changes within an institution’s mission, physical plant, clinic considerations, patient volume, and population by risk level acuity.

    • The CCHCS Office of Legal Affairs and the Director, Health Care Services, shall review all program area assessments of impact of pending and approved legislation, and court orders.

  • Procedure

    • Staffing Model Ratios and Allocations

      • Staffing model ratio allocations by classification are determined and adjusted based on the following:

        • Risk level acuity that consists of High Risk 1, High Risk 2, Medium Risk, and Low Risk.

          • Special risk factors that increase the acuity level by one, include Female Factor, Age 50 and older, and Americans with Disabilities Act low and medium.

        • Licensed bed counts that consist of Correctional Treatment Center, Hospice, Mental Health Crisis Bed, Outpatient Housing Unit, Psychiatric Inpatient Program (PIP), and Skilled Nursing Facility designations.

          • For the purposes of this policy, PIPs are specific to those located at the California Health Care Facility (CHCF), California Medical Facility, Salinas Valley State Prison, San Quentin Rehabilitation Center, and California Institution for Women.

        • Integrated Substance Use Disorder Treatment Program population changes.

        • Approved new or augmented BCPs/SFLs.

        • Mission changes.

        • Program or operational adjustments that do not exceed the total authority determined through the Fall Population and May Revision processes.

    • CHCF Staffing

      • CHCF staffing allocations are determined by applicable BCPs, except where defined otherwise and based upon population risk level acuity.

  • References

    • California Code of Regulations, Title 22, Division 5, Chapter 1, Article 3, Section 70217 (a)(11)

    • California Code of Regulations, Title 22, Division 5, Chapter 3, Article 3, Section 72329.1

    • California Code of Regulations, Title 22, Division 5, Chapter 12, Article 4, Section 79757

    • California Health and Safety Code, Division 2, Chapter 2, Article 10.6, Section 1339.44

  • Revision History

    • Effective: 06/24/2024

Article 8 – Nursing Services

5.8.1 Seniority Watch Preference for Supervising Registered Nurse II

  • Policy

    • California Correctional Health Care Services (CCHCS) and the California Department of Corrections and Rehabilitation (CDCR) shall provide a Seniority Watch Preference (SWP) process to Supervising Registered Nurse (SRN) IIs. This policy provides a method to allow employees to secure a watch based on seniority in classification. Management shall make 70 percent of the watches available to SRN IIs for the SWP.  The remaining 30 percent of watches will be assigned at management’s discretion.

  • Procedure

    • SWP Assignment Process

      • The SWP assignment process consists of two components:

        • Thirty-six month SWP process.

        • Interim SWP process.

      • Limits on Requests

        • SRN IIs are allowed two successful SWP assignments in a 12-month period. Exceptions to this limitation may be granted on a case-by-case basis.

    • Assignment

      • SRN IIs shall remain in their assigned watch unless there is a substantiated operational need to reassign.  Management shall endeavor to provide 14 calendar days written advance notice to the impacted SRN IIs prior to the reassignment.

    • Eligibility

      • Participation in the SWP process is limited to eligible employees.  An eligible employee:

        • Must be a permanent, full-time SRN II OR limited-term SRN II with at least one year of experience in the classification.  Probationary employees may not participate.

        • Must be permanently assigned to and work at the institution; eligible employees may participate only in their institution’s SWP process.
          Note:  There shall be no inter-institution requests for SWP assignments.  Eligible supervisors who laterally transfer shall be permitted to participate in the interim SWP process.

      • Denial of Request:

        • Supervisors who have received an adverse action shall lose their right to hold an SWP assignment and/or request any preferences for a period of up to 12 months if the assignment is meaningfully related to the cause of action.

        • A supervisor may be temporarily removed from the SWP assignment pending an investigation (adverse action/personnel/Equal Employment Opportunity) and shall be assigned to a substantially similar start/stop time, if possible.  Once the investigation has been concluded, the employee shall be returned to their SWP assignment.

        • Employees who receive yearly evaluations with an overall “below standard” may lose their right to request an SWP for up to 12 months; this is subject to review in six months.  If the evaluation is overturned by a reviewing officer or as a result of a grievance decision, the employee shall have his/her right to request and/or hold an SWP restored.  The reason for denial to request an SWP shall be in writing and given to the employee.

        • Employees losing their right to request an SWP assignment as outlined above may be administratively redirected to an assignment without regard to watch. Employees who have been absolved of wrongdoing as stated above shall be accorded one successful request, so long as the request is exercised within 30 calendar days of the decision absolving the employee.

      • It may become necessary to change an employee’s SWP for reasons such as operational changes, emergencies, or unforeseen circumstances.  SRN IIs shall not have their SWP changed without documented justification.   A 14-day notice to the impacted SRN II prior to the re-assignment shall be provided with the exception of an emergency. The least senior SRN II assigned to the shift through the SWP procedure shall be moved first.

      • In the event the supervisor is unable to assume the duties of the assigned SWP within 30 calendar days, the supervisor will be placed in an assignment at management’s discretion.

    • Implementation

      • Thirty-Six Month SWP Process

      • Participation in the 36 month SWP process is voluntary.  The choice not to participate shall result in management assigning the individual to an assignment that remains unfilled after the SWP process is completed.

      • Pre-Bid Meet and Discuss: Prior to each SWP process, a local meet and discuss at each institution will occur to discuss the 70/30 pattern and the implementation of this procedure.  Upon request, prior to the meet and discuss, each facility shall provide lists of established SRN II positions, seniority list, and watch assignment.

      • Timeframes:

        • The initial implementation of this procedure will take effect three months after the adoption of this procedure by CCHCS.  Timelines will follow those outlined below for determination of seniority, statement of preferences, and effective dates.

        • The 36 month SWP cycle begins in April 2019 for those supervisors who wish to participate.  An updated seniority roster and a listing of all available assignments open for request shall be posted no later than April 1, every third year thereafter.

        • Unless otherwise contested by April 15, a supervisor’s seniority as posted on April 1 shall determine the employee’s placement on the seniority list.

        • Letters of Interest shall include priority ranking of desired watches and must be submitted in accordance with the request provision below, no later than 4:00 p.m. on May 1 or 4:00 p.m. on the following Monday if May 1 falls on the weekend.

        • A supervisor may voluntarily withdraw from participation in the 36 month SWP process by submitting a written request to the Chief Nursing Executive (CNE) or designee.  Supervisors who withdraw will be assigned at management’s discretion.

        • Failure to submit a request form by 4:00 p.m. on May 1 shall result in a “no preference indicated” for the employee.  The employee shall then be assigned at management’s discretion.

        • At the end of the request period, management shall make assignments based on the highest seniority in classification of the employees.

        • Any watch preference that does not receive a request shall be filled at management’s discretion.

        • The new assignments shall begin the second Monday in July, First Watch.

    • Interim Request Process

      • Should management determine a need to fill a vacant assignment, the following interim request process shall be used:

      • CCHCS shall post a notice which shall remain posted for no less than 15 calendar days.  SRN IIs may request these assignments using the Letter of Interest process described below.  All Letters of Interest must be submitted no later than 4:00 p.m. on the 15th calendar day after the notice is posted.

      • At the end of the 15 calendar day period, the eligible employee with the highest seniority score shall be awarded the SWP assignment.  The SRN II will assume the SWP assignment within 30 calendar days or sooner with mutual agreement.

      • In the event that there are no Letters of Interest, management may temporarily assign an SRN II due to staffing requirements and/or operational necessity.  Temporary assignment will be made based on reverse Departmental Seniority.  Management will endeavor to provide 14 calendar days written advance notice to impacted SRN IIs.

    • Notice Process

      • Those watches which are determined to be available shall be posted in a prominent place where such notices are customarily posted.  The notice shall be dated and shall include the following criteria:

      • Watch

      • Deadline and location for submission of Letter of Interest

    • Letter of Interest Process

      • SRN IIs may request available watch preferences by providing a Letter of Interest to the CNE or designee at the location designated in the notice.  The Letter of Interest must be dated and signed by the employee.

      • An otherwise eligible supervisor absent from the work site during the request process for such reasons, including but not limited to: Enhanced Industrial Disability Leave; Non-Industrial Disability Insurance Workers’ Compensation; leave of absence; annual military leave; illness, etc., may participate in the SWP process. Employees must assume the SWP assignment within 30 calendar days from receiving the SWP assignment. After 30 days, management shall decide whether or not to fill the assignment at its discretion.

      • In the event the employee is unable to assume the SWP within the 30 calendar days, the employee may be placed in another assignment at management’s discretion.

  • Revision History

    • Effective: 10/2016

5.8.2 Supervising Registered Nurse II Vacation or Annual Leave Requests

  • Policy

    • California Correctional Health Care Services and the California Department of Corrections and Rehabilitation shall provide a statewide process for Supervising Registered Nurse (SRN) IIs vacation or annual leave requests and determination based upon departmental seniority in classification SRN II.  Institutional leadership shall determine the minimum staffing requirements as identified by vacation relief allocation.

  • Procedure

    • Vacation or Annual Leave Request Process

      • The request process consists of two components:

        • Two annual bidding vacation rounds.

        • Monthly continuous vacation or annual leave request process.

      • Number of Requests

        • Each SRN II is allowed two successful vacation or annual leave requests. A successful request is one that has been granted in full.

    • Eligibility

      • SRN IIs shall have sufficient vacation or annual leave, holiday credit, compensating time off, Personal Leave Program, or furlough credit to cover the vacation request.

      • Sufficient leave must be accrued at the time of the scheduled leave.

      • Accrued sick leave will not be authorized to cover a vacation request.

    • Timing

      • The vacation or annual leave request process shall commence the first Monday in January each year.

      • The Chief Nurse Executive, or designee, shall post timelines for submitting written vacation or annual leave requests.

      • SRN IIs shall submit written requests for vacation or annual leave within 21 days of timeline posting.

      • SRN IIs shall be awarded vacation or annual leave for the upcoming year by seniority.

    • Annual Bidding Process

      • Two rounds of vacation or annual leave bidding shall occur as follows:

        • SRN IIs bidding in round one shall be awarded three weeks of time which can be taken as a three-week block of time, a two-week block, and a one-week block, or three one-week blocks.

        • Round two shall offer SRN IIs additional opportunities for one-week blocks.

      • The SRN III, or designee, shall review the vacation or annual leave requests submitted during bidding rounds and award based on seniority. SRN IIs shall be notified of the approved vacation or annual leave schedule by February 20 of each year.

      • Approval shall also be granted based upon operational needs and required staffing levels.

    • Monthly Continuous Request Process

      • SRN IIs may also submit additional vacation or annual leave requests throughout the year through the monthly continuous vacation scheduling process.

      • Any SRN II who does not participate in the annual vacation scheduling process shall have the option of participating in the monthly continuous vacation scheduling process.

  • Revision History

    • Effective: 12/2020
      Revised: 06/16/2025

5.8.3 Supervising Registered Nurse II Overtime

  • Policy

    • California Correctional Health Care Services (CCHCS) and the California Department of Corrections and Rehabilitation (CDCR) shall provide a statewide policy for Supervising Registered Nurse (SRN) IIs overtime.

  • Purpose

    • To provide a process to manage voluntary and involuntary overtime based on seniority in classification.

  • Procedure

    • Voluntary Overtime

      • Each Hiring Authority (HA), or designee, shall establish a means by which SRN IIs may sign up for voluntary overtime (VOT).  SRN II overtime assignments made in advance (vacancies) shall be posted.  The HA, or designee, shall maintain an SRN II Overtime Log which shall track the number of overtime shifts that each SRN II has worked each month and be available to all SRN IIs in case of a dispute.

      • Management shall determine if the VOT shall be filled according to licensure standards, coverage relief factors, or operational need.  If filling the VOT, management shall:

        • Make every effort to fill the vacancy two hours before the next shift.

        • Follow the seniority rotational VOT list.

      • Once management determines that a foreseen SRN II vacancy shall be filled, the following shall occur:

        • Management shall make every effort to fill the positions as authorized by the Department Operations Manual, Section 33010.20. The determined positions available for VOT shall be posted by the fifth of the preceding month.

        • The SRN IIs are asked to submit voluntary availability by the tenth of the preceding month.

        • The VOT list shall be available by the 15th day of the preceding month.

        • VOT shall be granted by seniority in the classification on a one for one rotational basis.  The order of call for VOT shall be from the VOT roster unless the overtime assignment becomes available two hours or less prior to the start time, in which case VOT shall be offered to the most senior employee on duty whose name appears on the VOT roster.  Overtime shall consist of six or more hours in order to be tracked and counted as VOT worked in the SRN II Overtime Log.

    • Involuntary Overtime:

      • SRN IIs shall be assigned involuntary overtime by inverse seniority in classification on a one for one rotational basis, except where precluded by emergencies or operational needs.

      • An SRN II shall not work more than two involuntary overtime shifts within the same work week.

      • Involuntary overtime of two hours or more shall be counted as an order-over worked.

      • For tracking purposes, involuntary overtime of less than one hour shall not count as an inverse seniority order-over, unless it occurs for two days in any given work week.  At that point, an order-over credit shall be given for the second day.

      • Reasonable efforts to canvas on-duty and off-duty supervisors to volunteer shall be made prior to implementation of the involuntary overtime process.  Supervisors ordered-over may split shifts with other supervisors.  If the shift is split, only the mandated supervisor shall receive credit for the involuntary overtime.

      • Supervisors shall not be held over on their Friday; before assigned regular day off; or the day before an approved swap, holiday, or scheduled vacation, unless all other options have been exhausted.

  • References

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 2, Article 4, Section 19844.1

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 8, Leave Credit and Overtime Management

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Section 33010.20

  • Revision History

    • Effective: 06/16/2023

Article 9 – Training

5.9.1 General Training Requirements

  • Policy

    • California Correctional Health Care Services (CCHCS) employees shall complete all job-required training outlined in this policy, as mandated by the state, and identified by their immediate supervisor, manager, or Hiring Authority (HA) to accomplish the mission, goals, and objectives of the department.  Employee training shall be in accordance with policies, regulations,  and budgetary constraints. Training shall be on state time to the greatest extent possible.  Compensation for any overtime worked to meet required training shall comply with the Fair Labor Standards Act.  When provisions of this section are in conflict with the provisions of a Memorandum of Understanding (MOU), the MOU shall be controlling.

  • Responsibility

    • Policy and Administration

      • The Deputy Director (DD), Labor Relations, Performance Management, and Staff Development Units, is responsible for the oversight, development, and implementation of CCHCS Staff Development Unit (SDU) training programs and shall oversee and monitor general training matters.

    • Staff Development Unit

      • The SDU is responsible for developing and delivering effective eLearning to CCHCS staff statewide and ensuring all CCHCS headquarters (HQ) staff receive quality training based on policies, regulations, budgetary constraints, and established guidelines identified in the California Department of Corrections and Rehabilitation (CDCR) Department Operations Manual (DOM).  The SDU provides instructor-led training, develops eLearning, and maintains the Learning Management System (LMS).  The SDU shall:

      • Coordinate with the CDCR Office of Training and Professional Development (OTPD) to ensure departmental training requirements are identified.

      • Manage HQ training programs, ensuring training goals and objectives are met.

      • Plan, implement, and publish the annual HQ training schedule.

      • Develop and implement relevant and up-to-date training courses, programs, and materials for CCHCS.

      • Analyze, design, develop, implement, and evaluate course content to meet CCHCS operational needs, legal requirements, and individual staff job performance needs.

      • Ensure eLearning courses developed and released in LMS for CCHCS staff contain relevant content and measurable learning objectives, promote learner participation and engagement, and measure learner performance.

      • Ensure all HQ training for employees and instructors is recorded in the departmentally approved electronic tracking system.

      • Manage users, courses, and roles, and develop LMS report structures.

      • Maintain required training records and files for HQ staff in accordance with the departmental records retention schedule.

      • Ensure all HQ instructors complete the departmentally required Training-for-Trainers (T4T) course prior to delivering instructor-led training.  

      • Conduct periodic CCHCS training assessments to ensure course content is current and relevant.

      • Review training policies and procedures annually, revising as necessary.

    • Supervisors and Managers

      • All supervisors and managers, regardless of work location, shall:

      • Assess training needs and requirements of their staff and provide them with training that is structured for improvement in areas where job performance deficiencies exist and to provide the acquisition of new knowledge or skills.

      • Evaluate the effectiveness of the training after the training has been provided to staff.

      • Schedule employees’ work to allow for mandatory, job-required, performance improvement, and upward mobility training during work time, to the greatest extent possible.

      • Prepare probationary and annual performance evaluations which include a report of the employee’s training record, achievements, efforts, and needs.  This is covered in the CCHCS Progressive Discipline Overview training administered by PMU.

      • Ensure their supervised employees complete all job-required training and have opportunities for professional development through job-related training.

      • Keep a record in each employee’s supervisory file of all training assigned and completed.  Refer to the Training and Development Checklist sample which can be found on Lifeline under the SDU webpage.

    • HQ and Institution Employees

      • Employees shall treat training as a work assignment and be accountable for the learning outcome.

    • CCHCS Non-Custody Institution Staff

      • In addition to complying with Section (b)(4) above, CCHCS non-custody institution staff shall coordinate with their institution’s In-Service Training (IST) Office to complete CDCR, CCHCS mandated training requirements, including courses in the annual training schedule.

    • HQ Training Coordinators

      • Each CCHCS HQ program and Regional HQ shall identify a Training Coordinator to serve as a liaison between SDU and the staff assigned within their unit or program areas.

      • The staff eligible to perform the HQ Training Coordinator tasks shall be in the following classifications:

        • Administrative Assistant

        • Associate Governmental Program Analyst

        • Health Program Specialist

        • Health Record Technician I

        • Health Record Technician II (Specialist)

        • Office Assistant

        • Office Technician

        • Staff Services Analyst

      • HQ Training Coordinators shall not be in supervisory, managerial, or health care provider classifications.

      • HQ Training Coordinators shall:

        • Coordinate and enroll staff into the courses required per the annual training schedule.

        • Process Employee Training Requests (CDCR 854, Employee Training Request).

        • Assist staff with training registration and confirmation for IST and Out-Service Training (OST) courses.

        • Track completed training for their unit in order to process payment requests.

        • Research and provide training information to HQ-based supervisors and employees.

        • For training that is not delivered or organized by the SDU, provide the SDU with copies of completion certificates or a completed CDCR 844, Training Participation Sign-In Sheet, for employee training records within five business days of course completion.

        • Access and generate LMS reports that provide course completion information to ensure all staff have completed all required training at the request of the HA and program supervisors or managers.

        • Provide the LMS reports to management to ensure staff compliance with required trainings by established deadlines.

          • Directions for accessing CCHCS LMS Reports can be found on Lifeline under the SDU webpage.

    • Institution Training Coordinators

      • Each Institution shall identify a Training Coordinator to serve as a liaison between SDU, their local institution’s IST office, and the health care staff assigned within their institution.

      • The staff eligible to perform the institution Training Coordinator tasks shall be in the following classifications:

        • Administrative Assistant

        • Associate Governmental Program Analyst

        • Health Program Specialist

        • Health Record Technician I

        • Health Record Technician II (Specialist)

        • Nurse Instructor

        • Office Assistant

        • Office Technician

        • Staff Services Analyst

        • Training Officer I

        • Training Officer II

      • Institution Training Coordinators shall not be in supervisory, managerial, or health care provider classifications, with the exception of Training Officers II.

      • Institution Training Coordinators shall:

        • Assist staff with training registration, including processing CDCR 854 forms, and confirmation for IST and OST courses.

        • Track completed training for their unit in order to process payment requests.

        • For training that is not delivered or organized by their IST office, provide their institution’s IST office with copies of completion certificates or completed CDCR 844 forms for recording in the employee training records within ten business days of course completion.

        • Access and generate LMS reports that provide course completion information to ensure all staff have completed all required training at the request of the HA or institution supervisors or managers.

        • Provide the LMS reports to management to ensure staff compliance with required trainings by established deadlines.

          • Directions for accessing CCHCS LMS Reports can be found on Lifeline under the SDU webpage.

    • Institution’s IST Offices

      • Each institution IST office staff shall:

      • Coordinate and enroll custody and non-custody staff into the courses required per the annual training schedule.

      • Ensure all training for employees and instructors is recorded in the departmentally approved electronic tracking system.

      • Maintain required training records and files in accordance with departmental retention schedule.

    • Non-IST Office Training

      • Staff responsible for facilitating and providing training to staff within the institution that is not coordinated through the IST office shall provide their IST office copies of completion certificates or completed CDCR 844 forms for recording in the employee training records within ten business days of course completion.

  • Training and Documentation

    • Record Keeping Forms

      • The following forms shall be used to record training requests and participation:

      • CDCR 844.

        • No more than one course of instruction shall be recorded by the instructor on a CDCR 844.  Any CDCR 844 with more than one subject shall not be accepted by the division or unit training office.

        • The CDCR 844 shall not be required if training attendance is directly recorded utilizing the departmentally approved electronic tracking system.

      • CDCR 854.

        • The CDCR 854 is only required if the requested training falls outside the approved annual training plan or annual training requirements.  This form shall be completed by CDCR, CCHCS staff requesting to attend training and forwarded to the Training Coordinator for each division.

    • Record of Training

      • For each training activity conducted, the following records shall be maintained by the training office who recorded the information in the departmentally approved electronic tracking system:

        • CDCR 844 or electronic training attendance shall be used for all IST.

        • CDCR 844 or electronic training attendance, or the unit approved training documentation for On-the-Job Training (OJT).

        • A record of score achieved through a written test or performance demonstration of the learned skill.

      • All training is recorded in LMS, which is the departmentally approved electronic tracking system.

    • Definition and Criteria

      • The process whereby CCHCS staff, either individually or in groups, participate in a formalized, structured course of instruction to acquire knowledge, skills, and abilities relevant for their current or future job performance.  Formalized, structured training shall contain measurable learning objectives that can be evaluated in a classroom setting or when completing other sources of training (e.g., eLearning, OJT).

      • Measurable learning objectives shall identify and describe the knowledge, skills, and abilities that staff will be expected to understand and demonstrate upon completion of the training and how they will apply the newly acquired information in the performance of their job duties.

      • Learning objectives shall follow course development and design standards as described below:

        • Support the overall expected outcome of the training.

        • Be specific, measurable, achievable, relevant, and time-based.

        • Focus on one expectation or aspect of learning or understanding at a time.

        • Be realistic in terms of what learners can be expected to accomplish in performing their job.

        • Use an action verb to specify the desired performance.

        • Include the task or performance that staff will be expected to understand and demonstrate upon completion of the training.

        • Include a task-based method for learners to demonstrate proficiency or attain a desired outcome.

        • Contain at least one to two knowledge check questions that align with a learning objective to measure learners’ understanding of the subject matter, concepts, or a specific skill.

  • Training Sources

    • In-Service Training

      • IST may be designed specifically to meet the needs of a particular group, facility, or office and presented directly to local employees.  When control of course content, learning processes, instructor standards, evaluation methods, and adherence to legal or other mandates is required, IST is used to ensure accountability.

      • A departmentally approved course outline or lesson plan shall be used to conduct training.  All lesson plans shall be forwarded to OTPD for review and approval.  The DD of Peace Officer Selection and Employee Development (POSED), or designee, may authorize a departmental program or unit to approve training on a case-by-case basis.

    • On-the-Job Training

      • Training is provided to employees in either a classroom or work setting to ensure acceptable levels of performance, knowledge, and understanding, or to correct deficiencies.

      • When appropriate, IST Managers and Training Coordinators are encouraged to fully utilize this type of training as opposed to onsite or offsite training that does not fall within the trainee’s regular work hours.

    • eLearning

      • Training may be conducted onsite or offsite but shall be completed within the trainee’s regular work hours.  eLearning shall be considered a form of OJT.

      • eLearning courses released in LMS shall:

        • Contain at least two measurable learning objectives that identify and describe the knowledge, skills, and abilities staff will be expected to understand and demonstrate upon completion of the training and how they will apply the newly acquired information in the performance of their job duties.

        • Contain at least one knowledge check question for each learning objective to measure staff’s understanding of the subject matter, concepts, or a specific skill, or a task-based measurement for staff to receive training completion credit.

      • When an eLearning course is required for all CCHCS HQ or institution staff to complete, it shall:

        • Include relevant and necessary knowledge, skills, and abilities that staff must know, understand, or demonstrate to be able to perform the essential functions of their job duties and responsibilities.

        • Be approved by the appropriate CCHCS Directors as follows:

          • Director, Health Care Policy and Administration, for courses that are required for all CCHCS HQ staff.

          • Director, Health Care Services, for courses that are required for all CCHCS institution staff.

            • SDU shall request the approval from the appropriate Director(s) prior to the development of the course.

        • Only be released in LMS during the first two weeks of the calendar year, if it is a course that is required annually for all CCHCS HQ or institution staff to take.

      • Course development requests shall be submitted to SDU no later than July 31st in the year prior to the intended release.  The course development request process can be found on the SDU Course Development webpage on Lifeline.

    • Onsite Formal Training

      • Any locally presented training activity, onsite formal instruction, seminars, and workshops, for which training credit is to be given, shall be recorded on a CDCR 844.  Employees shall complete the required information and the instructor shall ensure that the completed forms are received by the IST Manager or Training Coordinator.  The IST Manager or Training Coordinator shall ensure credit is provided to each attending employee’s training record utilizing the CDCR 844 or electronic training attendance as recorded directly in the departmentally approved electronic tracking system and retain the CDCR 844 according to the departmental retention schedule requirements.

    • Offsite Training

      • Employees shall arrange with the Training Coordinator for appropriate certification of any instruction, seminar, or workshop presented away from the employee’s place of work for which training credit is to be allowed.  Upon receipt of the arranged certification, the training manager shall credit the employee’s training record utilizing the CDCR 844 or electronic training attendance as recorded directly in the departmentally approved electronic tracking system.  A copy of the certificate of completion shall be placed in the employee’s training file.

    • Out-Service Training

      • OST training includes the following courses and activities:

        • Offered through accredited colleges or universities.

        • Conducted by private consultants, firms, or other non-state agencies, such as federal or local governments, special interest groups, associations, or professional groups.

      • OST training for the purpose of meeting departmental needs for scientific, technical, professional, and management skills shall be evaluated and processed as follows:

        • Training shall be necessary and of direct value to the department and relevant to the employee’s general field of work.

        • Training shall provide knowledge, skills, or abilities that cannot be cost-effectively acquired through departmental IST as defined in this chapter (exclusive of specialized training).

        • Training with the purpose of covering subject matter not sufficiently or recently encompassed in the employee’s previous education or experience or of which the employee would not normally be expected to know prior to their present position.

  • Training Requirements

    • General Requirements

      • Training compliance shall be based on the 12-month calendar year (January – December).

      • If annual training requirements are not attained before December 31 of the current calendar year, the employee shall be considered out of compliance with the annual training mandates and may be subject to progressive discipline.

      • Training shall be conducted during regular work hours when possible or during off-duty hours when necessary.

      • Compensation for training shall comply with existing policies, laws, and MOU in accordance with applicable collective bargaining agreements.

      • Within budgetary constraints, job-required training shall be provided by the department and completed by the employee within the mandated completion timeline.

      • It is a condition of employment that all employees complete all required training for their job classification or position, as identified by CCHCS, the HA, supervisor, or manager.

      • Employees who fail to meet these training requirements may have their merit salary award denied or be subject to progressive discipline, up to and including dismissal.

    • New Non-Custody Staff Onboarding

      • All non-custody civil service staff new to CCHCS, regardless of job classification, shall receive new staff onboarding. The goal of onboarding is to provide supervisors and their new staff dedicated time for engagement and proper integration to a new work assignment, to include a discussion of job duties, expectations, and goals, and introduction to their work areas, co-workers, and management teams.  

      • Supervisors shall enroll their new non-custody staff in the instructor-led portion of annual training on the next earliest date following their start date, but no later than 30 days from their start date.

      • New CCHCS staff shall complete the following required eLearning courses provided in LMS:

        • Equal Employment Opportunity (EEO) and Sexual Harassment Prevention (SHP) training within six months of hire.

          • Non-supervisors shall complete one hour of EEO and SHP training.

          • Supervisors and managers shall complete two hours of EEO and SHP training.

        • Privacy Awareness Training prior to being provisioned or granted access to health information, pursuant to the Statewide Health Information Policy Manual (SHIPM), Section 4.1.2, Privacy Training.

        • Information Security Awareness and Training prior to accessing departmental assets.  Departmental assets are classified as a data, physical, or service asset owned by CCHCS.

      • New CCHCS staff shall complete program or unit-specific training as determined by their HA, manager, or supervisor.

    • Probationary Employees

      • CCHCS probationary employees shall complete the job-required training for their job classification before the end of their probationary period, or earlier as specified.

      • An employee who provides acceptable certification of having previously completed a requirement shall receive credit and not be required to repeat the training.

      • Probationary employees shall receive onboarding in addition to the requirements for certain job classifications.

      • Probationary employees who fail to complete any portion of required training may be rejected on probation.

    • Annual Training

      • All CCHCS civil service staff shall complete the annual training requirements, which include legal mandates, training required by statute, regulations, or subjects deemed necessary by POSED and the HA or designee.

        • CCHCS contractors and registry are not required to complete annual training.  Refer to Section (e)(5)(A) and (e)(5)(B) for courses required for CCHCS contractors and registry.

      • Annually, the DD of POSED shall evaluate and determine the training requirements for all custody and non-custody staff.

      • SDU shall publish a complete list of Annual Training Requirements on Lifeline at the beginning of each calendar year with requirements for each group below.  Annual Training Requirements can be found on Lifeline under the SDU webpage.

        • HQ Non-Custody Staff

        • HQ Custody Staff

        • Institution Non-Custody Staff

      • CCHCS HQ custody staff shall contact the Correctional Training Center IST manager or designee to schedule their annual instructor-led training.  For general training guidance and questions, HQ custody staff shall contact their Training Coordinator.

      • CCHCS HQ non-custody staff shall complete their annual instructor-led training with SDU.

      • CCHCS institutional staff shall complete their annual instructor-led training at their institution.

    • Retired Annuitants, Student Assistants, Interns, Contractors, and Registry

      • All Retired Annuitants, Student Assistants, Interns, contractors, and registry shall complete training as indicated below and annually thereafter:

        • Information Security Awareness and Training prior to accessing departmental assets. Departmental assets are classified as a data, physical, or service asset owned by CCHCS.

        • Privacy Awareness Training prior to being provisioned or granted access to health information, pursuant to SHIPM, Section 4.1.2, Privacy Training.

        • EEO and SHP Training

          • One-hour course within 30 calendar days of hire.

          • Retired Annuitants in any supervisory or managerial classification shall complete at least two hours of classroom or other effective interactive training and education regarding sexual harassment prevention within six months of the assumption of a supervisory or managerial position, pursuant to
            Government Code (GC), Section 12950.1.

      • In addition to the courses listed in Section (e)(5)(A) above, contractors and registry assigned to work at an institution shall complete the courses as indicated below upon initial assignment.  Participation in departmentally-required training shall not be construed to create an employment relationship.

        • eLearning in LMS

          • Aerosol Transmissible Diseases

          • Developmental Disability Program

          • Disability Placement Program

          • Heat Related Pathologies

          • Injury and Illness Prevention Program

          • Prison Rape Elimination Act

        • Instructor-Led Training

          • Interacting with Incarcerated Persons with Disabilities-Refresher

          • Partnership in the Correctional Environment

            • This course shall only be required for the following mental health contractors and registry:

              • Psychiatrist

              • Psychologist

              • Clinical Social Worker

              • Marriage and Family Therapist

              • Professional Clinical Counselor

          • Suicide Prevention

        • Contractors and registry shall complete the above courses one time, except in the following circumstances:

          • Contractors and registry who have been working for 12 or more consecutive months with no break in assignment shall retake the courses.

          • Contractors and registry returning to work after a break in assignment of 12 or more consecutive months shall retake the courses.

        • Contractors and registry who have completed the courses one time and are reassigned to work at other institution(s) shall not retake the course, except as specified in Section (e)(5)(B)(3).

        • Training records for contractors and registry shall be obtained from the institution’s IST office.

      • Additional training for contractors and registry shall be provided in accordance with the applicable contract provisions.

      • Additional training requirements for Retired Annuitants, Student Assistants, and Interns shall be at the discretion of the local HA or designee.

    • Supervisory and Managerial Training

      • Pursuant to GC, Sections 11146-11146.4 and 12950.1, and the CDCR DOM, Article 18, General Training, Section 32010.16, all supervisors, managers, and Career Executive Assignments (CEA) shall complete:

        • At least two hours of classroom or other effective interactive training and education regarding sexual harassment prevention within six months of the assumption of a supervisory position and every two years thereafter, pursuant to GC, Section 12950.1.

        • Ethics for State Officials within six months of hire and at least once every two years thereafter.

      • Pursuant to GC, Section 19995.4(b) and (c) or 19995.4 (d), and the CDCR DOM, Article 18, General Training, Section 32010.16:

        • First-Line Supervisors

          • All first-line supervisors shall complete 80 hours of departmentally approved supervisory training within 6 months of appointment, but no later than the term of the probationary period (either 6 or 12 months).

          • All first-line supervisors who transfer to CCHCS from another state agency or department shall complete the departmentally approved 80-hour first-line supervisory training within six months of appointment.  If the transferred first-line supervisor completed these courses in another state agency or department, proof of completion is needed to waive this requirement.

        • All second-line managers shall complete 40 hours of departmentally approved training within 12 months of appointment. If this training was completed in another state agency or department, proof of completion is required to waive this requirement.

        • All CEAs shall complete 20 hours of leadership and development training within 12 months of appointment. If this training was completed in another state agency or department, proof of completion is required to waive this requirement.

        • Thereafter, all supervisors, managers, and CEAs shall complete 20 hours of leadership and development training every two years.

        • Information on supervisor and manager training can be found on Lifeline under the SDU webpage.

    • Electronic Health Records System (EHRS) Training

      • In addition to all other mandatory training, select staff who routinely use the EHRS shall take EHRS training courses on LMS or validate EHRS competency as determined by their program.

    • Additional Training Requirements

      • Staff who drive a vehicle on state business shall take the CDCR, CCHCS Defensive Driving Training course every four years. The eLearning course is offered in LMS.

  • Instructor Requirements

    • Certification

      • Departmental instructors shall complete an approved specialized training course for part-time trainers (e.g., T4T) approved by the DD, POSED, or designee, pursuant to the CDCR DOM, Chapter 3, Article 18, Section 32010.8.2.

      • Subject Matter Experts (SME) may be used to assist in the presentation of training under the direction of a training manager or training facilitator.  To be considered a SME, an individual shall meet one of the following criteria:

        • Minimum three-years full-time experience in subject matter.

        • Possesses a degree or certificate in a specific subject matter.

        • Previous experience as a trainer in the subject matter.

        • Recognition by the department as an expert in the subject matter.

      • Staff who attend a specialized course of instruction provided by an external vendor to CCHCS with the intent to provide instruction to departmental staff shall submit a copy of their certificate of completion to SDU that identifies the area of expertise and duration of certification. Obtaining an external certification does not automatically waive a departmental certification.

      • Instructors who teach courses that require additional certification beyond the general T4T must have current instructor certificates in the specified subjects in their training file (e.g., CPR, Staff Suicide Awareness, Wellness and Stress Resiliency, Implicit Bias), pursuant to the CDCR DOM, Chapter 3, Article 18, Section 32010.8.2.1.

      • HAs shall ensure a fair and impartial process is established pertaining to the selection of staff to be T4T certified to instruct approved departmental courses. Considerations may include, but are not limited to:

        • Evaluating staff for aptitude of subject matter.

        • Ensuring staff performance standards are in good standing.

        • Requiring staff to submit a CDCR 854 and memorandum expressing their interest, qualifications, skills, and experience in the subject matter, instructing history, and capabilities.

      • HAs shall ensure an instructor waitlist is generated for staff who display aptitude of the subject matter and meet adequate performance standards.

    • Recertification

      • For the T4T certification to remain valid, the instructor must teach a minimum of four hours per calendar year (January – December).

      • Review and reconciliation of instructor hours shall be performed annually to ensure instructors have maintained their certification pursuant to certification requirements.

    • Decertification

      • Decertification of instructors may be necessary to ensure departmental staff are provided effective and relevant training by certified instructors.  Decertification of staff may be necessary for substandard performance, which includes, but is not limited to:

        • Failure to teach the minimum number of hours pursuant to the CDCR DOM, Chapter 3, Article 18, Section 32010.8.2 or course material requirements.

        • Failure to deliver the learning objectives of approved curricula.

        • Lack of preparation to deliver training or not delivering training within approved course or section times.

        • Negligence or unsafe practices.

        • Consistent negative participant evaluations.

        • Low aptitude for the subject matter.

        • Progressive discipline history.

      • If decertification is required, the HA, or designee, shall complete the Instructor Decertification Request memorandum, which can be found on Lifeline under the SDU webpage.  The memorandum shall be submitted to the SDU LMS email inbox at CCHCSSDULMSTrainingHelp@cdcr.ca.gov for LMS reconciliation.  A copy of the decertification memorandum shall also be provided to the employee.

  • Links

  • References

    • California Government Code, Title 2, Division 5, Part 1, Chapter 1, Article 12, Sections 11146-11146.4, State Agency Ethics Training

    • California Government Code, Title 2, Division 5, Part 2.6, Chapter 6, Sections 19995-19995.4, Training

    • California Government Code, Title 2, Division 5, Part 2.8, Chapter 6, Article 1, Section 12940-12953, Unlawful Practices, Generally

    • Statewide Health Information Policy Manual, Chapter 4, Section 4.1.0, Administrative Requirements

    • Statewide Health Information Policy Manual, Chapter 4, Section 4.1.2, Privacy Training

    • Health Care Department Operations Manual, Chapter 5, Article 3, Section 5.3.25, Security and Privacy Awareness Training

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 1, Equal Employment Opportunity

    • California Department of Corrections and Rehabilitation, Department Operations Manual, Chapter 3, Article 18, General Training

      • Section 32010.1, Policy

      • Section 32010.4, California State Training Program

      • Section 32010.5, Goals and Objectives

      • Section 32010.6, Internal Administrative Responsibility

      • Section 32010.8, Use of Training Resources

      • Section 32010.8.1, Training Resources

      • Section 32010.8.2, Training Personnel

      • Section 32010.8.2.1, Courses Requiring Additional Instructor Certification

      • Section 32010.8.2.2, In-Service Training (IST) Course Content

      • Section 32010.8.2.3, Instructor Training Credit

      • Section 32010.8.3, Record Keeping Forms

      • Section 32010.8.4, Record of Training

      • Section 32010.10, Minimum Required Training

      • Section 32010.10.1, Training Requirements

      • Section 32010.10.2, Training Compliance

      • Section 32010.13, Probationary Employees

      • Section 32010.16, Supervisory and Managerial Training

  • Revision History

    • Effective: 05/2009
      Revised: 12/23/2025

5.9.2 Statewide Lean Six Sigma Program

  • Procedure Overview

    • This procedure establishes a Statewide Lean Six Sigma (L6S) program and describes the major structures, processes, resources, and requirements that support the Program.  The Statewide Quality Management (QM) Program shall maintain a QM Lean Office to provide oversight of the Statewide L6S Program. L6S merges two powerful improvement methodologies in an approach that combines Lean principles of identifying and removing waste with Six Sigma data-driven strategies to support continuous quality improvement to sustain a high-performing health care delivery system.

  • Responsibility

  • The Deputy Director, Quality Management, is the primary executive sponsor for this policy and procedure.

  • Procedure

    • Statewide L6S Program

      • The Statewide L6S Program shall promote continuous process improvement throughout the organization by:

      • Maintaining L6S certification programs for:

        • White and Yellow Belt, facilitated by certified Green, Black or Master Black Belts.

        • Green and Black Belt, facilitated by certified Master Black Belts.

      • Maintaining training and staff development programs to orient staff to the L6S approach, augmenting existing orientation and training programs with the L6S approach, and establishing a continuing education program for certified L6S staff.

      • Promoting continuous improvement by integrating L6S strategies.

      • Providing program and institution leadership teams with guidance on how to utilize local L6S expertise for improvement work.

      • Providing technical assistance to staff as they apply L6S strategies.

      • Identifying statewide improvement opportunities that can be addressed using L6S strategies and proposing recommendations to the Statewide Quality Management Committee (QMC).

      • Facilitating L6S improvement initiatives in alignment with the Statewide Performance Improvement Plan and in coordination with relevant committees and program areas at headquarters, regional, and institution levels.

      • Providing consultation to support the design and development of the statewide performance measurement system.

      • Identifying, adapting, and sharing best practices generated from L6S improvement projects.

      • Establishing forums and feedback systems for certified L6S staff to receive updates and provide input to the program.

      • Mentoring the impact of using L6S strategies for program development and improvement.

    • Utilizing L6S Expertise

      • Headquarters’ programs, regional offices, and institutions that have certified L6S staff shall leverage those resources and expertise for local improvement activities including, but not limited to:

      • Leading and facilitating improvement projects.

      • Consulting on improvement work and associated deliverables.

      • Conducting data and problem analysis.

      • Identifying and applying appropriate L6S strategies.

      • Educating local staff to L6S strategies.

      • Sharing best practices resulting from local L6S projects.

    • Program Reporting

    • The Statewide QM Lean Office shall report L6S Program activities to the Statewide QMC at least annually.

  • References

  • Revision History

    • Effective: 08/2019

    • Revised: 3/18/2026