Current through Register Vol. 64, No. 1, January 1, 2025
Section 291-086-0030 - General(1) Adult in Custody Access to Approved Information Technology: (a) Adults in custody may only be granted access to approved information technology and only for purposes approved by the functional unit manager or designee and Information Technology Services in accordance with these rules.(b) Approved purposes may include but are not limited to education programs, Career and Technical Education programs, re-entry programs, work and program assignments, food services, law library services, general library services, recreation programs, and other approved programs.(2) IT Security Measures: The Department of Corrections shall employ IT security measures to ensure adults in custody only have access to approved information technology, systems, applications, or websites. These measures may include but not be limited to operating system usage restrictions, firewalls, log aggregation, keystroke logging, or session mirroring.(3) Requests for Purchase, Acquisition, or Implementation of Adult in Custody Information Technology: All proposed requests for the purchase, acquisition, or implementation of adult in custody information technology shall be reviewed by the Information Security Officer, Information Technology Services Technical Services Manager, and the Assistant Director of Operations to ensure all adult in custody accessible devices and systems are researched and approved as meeting any security protocols established by the Department of Corrections Information Security Officer and Department of Administrative Services (DAS) Cyber Security Services.(4) Donations: No Department of Corrections facility or office shall accept any donated information technology from any individual or organization without the prior written approval of the Assistant Director of Administrative Services and the Assistant Director of Operations.(5) All employees responsible for acquiring information technology for adults in custody shall follow Department of Corrections policies on procurement and contracting. Employees who are requesting new acquisition of, or upgrades to, information technology should familiarize themselves with the aforementioned policies.(6) Employees shall observe all state and federal requirements regarding the handling and sharing of confidential legal work and education records.(7) Employees shall be responsible for the control and security of any media, Wi-Fi, wired connectivity or telephone line used within an area where adults in custody are allowed to access information technology.Or. Admin. Code § 291-086-0030
DOC 17-1999, f. 9-24-99, cert. ef. 10-1-99; DOC 15-2000, f. & cert. ef. 6-19-00; DOC 10-2004(Temp), f. & cert. ef. 9-28-04 thru 3-27-05; DOC 4-2005, f. 3-18-05, cert. ef. 3-21-05; DOC 23-2024, amend filed 10/14/2024, effective 10/14/2024Statutory/Other Authority: ORS 179.040, 423.020, 423.030 & 423.075
Statutes/Other Implemented: ORS 179.040, 423.020, 423.030 & 423.075