Article 45 – Information Security
49020.18.3 Inmate Access to Computers and Telecommunications Devices
-
Inmates may access workstations for the purpose of completing specific tasks or assignments while under direct and constant supervision. The approved uses of workstations by inmates shall be carried out only under very tightly controlled circumstances:
-
Each computer shall be labeled to indicate whether inmate access is authorized.
-
Computers used by inmates shall not be used concurrently for any other purpose.
-
The local ISCInformation Security Coordinators shall approve or disapprove the movement of computers from an “inmate use” status to other work and vice versa.
-
Any computer that is being repurposed from employee use to inmate use shall have the hard drive erased of all data prior to the redeployment using the methods in the department’s data wiping standards.
-
Inmates with a work assignment involving a particular computer shall not be assigned to work on other computers.
-
Areas where inmates are authorized to work on computers shall be posted as such.
-
All inmates shall be under the supervision of a knowledgeable employee within a controlled, designated area when using computers.
-
There shall be no communications capabilities in the designated area, such as a telephone line, computer network line, telephone punch panel, cell phones, wireless communication devices such as pagers or handheld computers or radio communication devices without approval of the AISO.
-
Inmates shall not have access to computer utility programs used to modify the functionality of the computer or to view system configuration information, except in an approved Computer Refurbishment Program.
-
Inmates shall not have electronic storage media in their possession except within an approved area.
-
Inmates may not have access to computer application development tools.
-
An inventory and appropriate controls shall be maintained on all portable storage mediadiskettes. Diskettes Portable storage media for inmate use shall be labeled “For Inmate Use.” Reports and other printed output from inmate-utilized computers shall be reviewed closely by staff, and appropriate distribution of such output shall be monitored.
-
Inmates shall not have access to the operating system of any computer. Inmates shall not have access to any interface that allows access to the system configuration of any computer including, but not limited to, dialogue boxes, setup, and configuration screens. Additionally, inmates shall not have access to operating system commands that allow viewing or modification of any aspect of a computer operating system or the configuration of a computer, except in an approved Computer Refurbishment Program.
-
Inmates shall not be allowed to load software onto hard disks, except in an approved Computer Refurbishment Program.
-
No inmate shall have access to, or possession of, any telecommunication capability, including Internet accessible computers, wireless devices such as pagers or handheld computing devices or cell phones without approval from the Agency Information Security Officer.
-
There shall be no inmate access to a computer outside the inmate’s authorized work, vocational, or educational areas, unless approved by the AISOISO.
-