Department of Corrections and Rehabilitation - Operations Manual

Chapter 4 – Information Technology

Article 49 – Special Security Considerations

View All Sections >

49060.5 Special Equipment Security Considerations

  • To ensure the security of SCOState Controller’s Office equipment and information, all department’s personnel employees shall adhere to the following equipment security guidelines:

    • Equipment shall be located in restricted areas that are monitored during working hours and locked during any unattended periods.

    • Only authorized employees shall have access to terminals, printers, control units and modems.

    • System access shall be completely signed off when not in use.

    • Terminals shall be locked, keys removed, and screen intensity turned completely down when the terminals are unattended.

  • The following shall be stored in a vault or locked cabinet when not in use:

    • Keys to terminals.

    • Manuals for system software and hardware.

    • Other instructional and operational manuals.

  • No equipment shall be attached to any authorized configuration of decentralized equipment, except for testing and installation tools used by the vendor or telephone company.

  • Deviations from the requirements listed above shall have prior written approval from the department Authorizing Official.

  • Equipment Changes

    • The following types of changes to the SCOState Controller’s Office decentralized system require prior, written approval from the department Authorizing Official:

      • Changes of any kind to the location of decentralized equipment.

      • Switching of terminals from one control unit to another.

      • Any additions or removals of decentralized equipment.