Department of Corrections and Rehabilitation - Operations Manual

Chapter 4 – Information Technology

Article 69 – System and Services Acquisition Policy

View All Articles >

49260.1 Introduction and Overview

  • The California State Administrative Manual (SAMState Administrative Manual), Section 5200 governs the acquisitions of Information Technology (ITInformation Technology) goods or services regardless of dollar amount, or the type of ITInformation Technology goods or services procured. The California Department of Corrections and Rehabilitation (CDCRCalifornia Department of Corrections and Rehabilitation), California Correctional Healthcare Services (CCHCS), and California Prison Industry Authority (CALPIACalifornia Prison Industry Authority (formerly PIA)), hereinafter referred to as department, procurement processes are governed by the SAMState Administrative Manual, Section 5200, and consist of three phases: Acquisition Planning, Acquisition, and Post-award Activity.

  • Department acquisition processes and procedures shall comply with purchasing authority requirements, including laws, regulations, policies, and statutes applicable to the acquisition of ITInformation Technology goods and services.

49260.2 Objectives

  • Objectives for this policy are to guide department ITInformation Technology goods and services acquisition processes to:

    • Comply with all federal and state laws and regulations.

    • Incorporate security requirements and security specifications, either explicitly or by reference, in information system acquisition contracts based on an assessment of risk and the results of the classification and categorization for the intended information asset.

    • Ensure agreements with state and non-state entities include provisions which protect and minimize risk to the State.

    • Address the entire systems lifecycle in acquisitions, development and maintenance and operations of ITInformation Technology systems.

49260.3 Scope and Applicability

  • The scope of this policy extends to all State and entity information assets owned or operated by the department.

  • This policy applies to department Owners of Information Assets and program management.

49260.4 Policy Directives

  • The department shall:

    • Ensure that department information assets are managed using a documented System Development Life Cycle methodology during acquisitions, development, and systems operations.

    • Ensure that prior to acquiring ITInformation Technology goods and services that assessments are performed to ensure that the goods and services meet any applicable security and privacy laws, regulations, policies, standards, procedures, and other requirements.

    • Allocate appropriate funding resources to adequately protect information assets throughout their entire life cycle.

    • Ensure system documentation describes security controls and methods in sufficient detail to permit correct functioning, analysis, and testing.

    • Require system design, development, functional and security testing, implementation, maintenance, and operations processes to follow security engineering principles.

    • Ensure that development environments follow rigorous configuration management control.

    • Ensure that services provided by third parties include department requirements and expectations for the protection of department information assets.

49260.5 Roles and Responsibilities

  • The Department Chief Information Officer (CIO) or designee

    • The CIO or designee owns this policy and is responsible for ensuring that all users of department information assets are aware of this policy and acknowledge their individual responsibilities.

    • The CIO or designee is responsible for ensuring that this policy is reviewed annually and updated accordingly.

    • The CIO or designee is required to audit and assess compliance with this policy at least once every two (2) years.

  • Department Owners Information Assets and Program Management

    • Owners of Information Assets shall abide by department ITInformation Technology acquisition policies and processes.

  • Department Information Asset Custodians

    • Information Asset Custodians in collaboration with Owners of Information Assets shall ensure that protection controls are identified and implemented for information assets under their purview and in all ITInformation Technology acquisitions.

49260.6 Compliance

  • Non-compliance with this policy may result in disciplinary or adverse action as set forth in DOMDepartment Operations Manual Chapter 3, Article 22, Section 33030.8.

  • The department shall comply with the information security and privacy policies, standards and procedures issued by the California Department of Technology (CDT), Office of Information Security (OIS). In addition to compliance with the information security and privacy policies, standards, procedures, and filing requirements issued by the OIS, the department shall ensure compliance with all security and privacy laws, regulations, rules, and standards specific to and governing the administration of their programs. Program administrators shall work with their legal counsel, ISOInformation Security Officer, and Privacy Program Officer or Coordinator to identify all security and privacy requirements applicable to their programs and ensure implementation of the requisite controls.

  • The consequences of negligence and non-compliance with State laws and policies may include department and personal:

    • Loss of delegated authorities.

    • Negative audit findings.

    • Monetary penalties.

    • Legal actions.

49260.7 Auditing

  • The department has the right to audit any activities related to the use of State information assets.

  • CDT OIS and the department have the statutory right to audit department readiness to respond and recover from an incident.

49260.8 Reporting

  • Violations of this policy shall be reported to the department ISOInformation Security Officer.

49260.9 Security Variance Process

  • If compliance is not feasible, or if deviation from this policy is necessary to support a business function, the respective manager shall formally request a security variance as defined by the ISOInformation Security Officer.

49260.10 Authority

  • This policy complies with State of California Government Code Section 11549.3

49260.11 Revisions

  • The CIO or designee shall ensure that the contents of this article are current and accurate.

References

  • SIMM, Section 19C, Project Approval Lifecycle Stage 3 – Solution Development.

  • SIMM, Sections 58C, 58D, 66B, 5305-A, 5310-A and B, 5325-A and B, 5330-A, B, and C, 5340-A, B, and C, and 5360-B.

  • SAMState Administrative Manual, Section 5230, General Procurement Procedures: Procurement of Goods and Services – Uniform Standards.

  • SAMState Administrative Manual, Section 5305.5, Information Asset Management.

  • SAMState Administrative Manual, Section 5305.7, Risk Assessment.

  • SAMState Administrative Manual, Section 5305.8, Provisions for Agreements With State And Non-State Entities.

  • SAMState Administrative Manual, Section 5315.1, System and Services Acquisition.

  • SAMState Administrative Manual, Section 5335.2, Auditable Events.

  • SAMState Administrative Manual, Section 5315.9, Security Authorization.

  • SAMState Administrative Manual, Section 4983, Cloud Computing Policy.

  • SAMState Administrative Manual, Section 4800 – 5399, CDT Procurement: Sections 4819.2, 4981, 4983, and Chapters 5100 and 5300.

  • NIST SP 800-53, System and Services Acquisition, SA-1, SA-2, SA-3, SA-4, SA-5, SA‑8, SA-9, SA-10, SA-11.

  • NIST SP 800-53, Configuration Management, CM-3, CM-4, CM-5.

  • Public Contract Code, Section 12100, Chapter 3. Acquisition of Information Technology Goods and Services [12100 – 12113].

  • State Contracting Manual (SCM), Volume 3.

  • ITInformation Technology General Provisions (GSPD 401-ITInformation Technology).

  • Personal Services Contracts, Article 4. Personal Services Contracts [19130 – 19135].

  • DGSDepartment of General Services Bulletin #P-20-14.

  • DOMDepartment Operations Manual Chapter 3, Article 22, Section 33030.8.

  • DOMDepartment Operations Manual Chapter 4, Articles 14, 15, 16, 17, 18, 19, 20, 21.

  • California Government Code Section 11545, 11546, 11549.3.

Revision History

  • Effective: March 18, 2024.