Article 49 – Special Security Considerations
49060.5 Special Equipment Security Considerations
-
To ensure the security of SCOState Controller’s Office equipment and information, all department’s personnel employees shall adhere to the following equipment security guidelines:
-
Equipment shall be located in restricted areas that are monitored during working hours and locked during any unattended periods.
-
Only authorized employees shall have access to terminals, printers, control units and modems.
-
System access shall be completely signed off when not in use.
-
Terminals shall be locked, keys removed, and screen intensity turned completely down when the terminals are unattended.
-
-
The following shall be stored in a vault or locked cabinet when not in use:
-
Keys to terminals.
-
Manuals for system software and hardware.
-
Other instructional and operational manuals.
-
-
No equipment shall be attached to any authorized configuration of decentralized equipment, except for testing and installation tools used by the vendor or telephone company.
-
Deviations from the requirements listed above shall have prior written approval from the department Authorizing Official.
-
Equipment Changes
-
The following types of changes to the SCOState Controller’s Office decentralized system require prior, written approval from the department Authorizing Official:
-
Changes of any kind to the location of decentralized equipment.
-
Switching of terminals from one control unit to another.
-
Any additions or removals of decentralized equipment.
-
-