N.J. Admin. Code § 15:3-4.8

Current through Register Vol. 56, No. 24, December 18, 2024
Section 15:3-4.8 - Security
(a) A security subsystem and procedures for system administration and file access that cannot be disabled or circumvented, except for properly authorized functions of a systems manager, shall be provided for all image processing systems used for keeping public records.
(b) Imaging systems shall not be capable of altering the as-scanned version of a record as per N.J.A.C. 15:3-4.6(a), except for standard computer-enhancement routines used to improve the legibility of scanned documents.
(c) Means of control shall be established and maintained to prevent unauthorized creation, addition, alteration, deletion, or deterioration of any imaged record.
(d) Corrections or additions to records shall be recorded as new documents and maintained in the recordkeeping system along with the original record.
(e) Court-ordered expungement of information recorded on a Write-Once-Read-Many (WORM) optical disk system shall be implemented according to recommendations provided in Technical Report for Information and Image Management--The Expungement of Information Recorded on Optical Write-Once-Read-Many (WORM) Systems (AIIM TR28-1991, as amended and supplemented, incorporated herein by reference).
(f) Security subsystems and procedures for system administration and file access shall be documented and auditable.
1. To ensure the integrity, accuracy, and reliability of the public records contained in image processing systems, such systems shall create and retain a record of the location, date, operator and equipment involved in the production of all images it copies or produces.
2. Imaging systems shall create and maintain logs of all system and file access and activities.
3. Only authorized persons shall have access to logs and other documentation of security subsystems and procedures.

N.J. Admin. Code § 15:3-4.8

Amended by47 N.J.R. 1345(b), Effective 6/15/2015