Вы находитесь на странице: 1из 59

State Of Florida

Department of Environmental Protection


Administrative Directive

DEP 390
Effective: March 13,2012
Approved by Secretary

Information Technology Security Policies and Standards


1.

Introduction
Information is an asset that, like other important assets, is essential to an agencys
mission and consequently needs to be protected. Information can exist in many
forms. It can be printed, written on paper, stored and transmitted electronically
through interconnected business environments. As a result of increasing
interconnectivity to share information, information is now exposed to a growing
number and a wider variety of threats and vulnerabilities. Information security is
the protection of information from a wide range of threats in order to ensure
agency continuity, minimize risk to an acceptable level to management, and
maximize agencys opportunities. Information security is achieved by implementing
a suitable set of controls, both physical and technical, and through policies.

2.

Purpose
The purpose of the Information Security Policy is to ensure that the security of
DEPs information resources is sufficient to reduce the risk of loss, modification or
disclosure of those assets to a level acceptable to DEP management. The agencys
adherence to these policies ensures compliance with the States information
security rules and offers DEP a set of best practices that assures the security of
information under the agencys responsibility to protect.

3.

Authority
Authority is derived from Florida Statute 282.318: Communications and Data
Processing and from Agency for Enterprise Information Technology (AEIT), Office
of Information Security (OIS) Rule 71A-1: Information Technology Resource
Security Policies and Standards.

4.

Scope
Information security policies and standards apply to all agency employees. They
also apply to contractors, vendors, private organizations and citizens that are
provided account access to the agency network and computer systems regardless
of how or where they connect to information technology. They also apply to agency
computing devices when connected to non-agency networks. They apply to DEP
automated information systems which access, process, or have custody of data.

DEP 390
Page 2 of 59
March 13, 2012

They apply to mainframe, minicomputer, microcomputer, distributed processing,


and networking environments of the Department.
Organization of Information Security
Objective:
Within the agency, a management framework needs to be established to develop
and guide the implementation of information security. Management needs to
approve the information security policies, assign security roles and coordinate and
review the implementation of security across the agency.
Control:
Management should actively support security within the agency through clear
direction, demonstrated commitment, and acknowledgement of information security
responsibilities.
Scope:
DEP has developed, documented, and implemented an agency-wide information
security program. The goal of the information security program is to ensure
administrative, operational and technical controls are sufficient to reduce, to an
acceptable level, risks to the confidentiality, availability, and integrity of agency
information and information technology resources. An Information Security
Manager (ISM) will be appointed to administer the agency information security
program and the agency head shall send notification of the Information Security
Manager appointment to the State Chief Information Security Officer. The agency
Information Security Manager, in fulfilling these responsibilities below, shall follow
the policies published by the Agency for Enterprise Information Technology Office
of Information Security.
Policy:
5.0
5.1.1

Responsibilities of the Information Security Manager (ISM)


Development of a strategic information security plan and associated
operational information security plan.

DEP 390
Page 3 of 59
March 13, 2012

5.1.2

Development, implementation, and update of agency security policy,


procedure, standards, and guidelines.

5.1.3

Development and implementation of the agency security awareness


program.

5.1.4

Coordination of the agency information security risk management process.

5.1.5

Coordination of or assisting the Inspector General in the coordination of


the agency Computer Security Incident Response Team.

5.1.6

Coordination of Information Technology Disaster Recovery efforts in


support of the agency Continuity of Operations Plan.

5.1.7

Taking an active role in the agency information technology monitoring and


reporting activities.

5.1.8

Maintain information security program documents: The Strategic


Information Security Plan, the Operational Information Security Plan, and
Security Policies and Procedures.

5.1.9

Review and update the agency Strategic Information Security Plan (SSP)
and the Information Security Operational Plan (OSP) annually and will
submit an approved SSP and OSP to the State Chief Information Security
Officer.

5.1.10 With approval of the Secretary, the ISM may choose to appoint individuals
from agency offices, divisions and regional offices to be Information
Security Representatives (ISR) for their respective business units. To
ensure information systems under their respective divisions, offices, and
districts meet minimum security requirements, the ISR duties will include,
but are not limited to the following:
(a)

Supporting implementation,
requirements of approved
procedures, and practices.

enforcement, and reporting


computer security directives,

(b)

Ensuring user access is correct, current and reflects appropriate


security levels.

(c)

Ensuring the proper implementation of security controls and


safeguards in the development of information systems.

DEP 390
Page 4 of 59
March 13, 2012

5.2

(d)

Ensuring information security incidents are reported to the


Information Security Manager, through established notification
procedures.

(e)

Ensuring risk assessments are performed on new or major


systems.

(f)

Ensuring users obtain required security awareness training.

(g)

Ensuring third parties comply with agency security standards.

Owner, Custodian and User Identification

5.2.1

Owners, custodians, and users of all information resources will be


identified and the designation will be documented.

5.2.3

All information resources will be assigned a data owner.

5.2.4

The owner of information resource is the designated individual responsible


for implementing the program that uses the resource. The owner is
responsible for:

5.2.5

(a)

Approving access and formally assigning custody of the asset.

(b)

Judging the asset's value.

(c)

Specifying data control requirements and conveying them to


users and custodians.

(d)

Ensuring compliance with applicable controls.

(e)

Ensuring integrity and availability of data.

The custodian of an information resource is responsible for:


(a)

Implementing the controls specified by the owner.

(b)

Providing physical and procedural safeguards for the information


resources in their possession or in their facility.

(c)

Administering access to the information resources.

DEP 390
Page 5 of 59
March 13, 2012

5.2.6

5.3

(d)

Providing for timely detection, reporting, and analysis of


unauthorized attempts to gain access to information resources.

(e)

Assisting owners in evaluating the cost-effectiveness of controls.

The users of information resources are responsible for:


(a)

Complying with controls established by the custodian.

(b)

Preventing disclosure of confidential information.

External Parties Contracts (Contractors, Vendors, and Partners)

5.3.1

Contracts and agreements involving the use of agencys information


technology resources will require compliance with the agency information
technology security policies and procedures.

5.3.2

Before any 3rd party device is connected to the agency network, nonagency entities must execute a network connection agreement stating
that the device has been recently scanned for viruses, malware and
spyware, has current anti-virus protection, and the operating system is at
appropriate patch level.

5.3.3

The agency Chief Information Officer (CIO) or designee is responsible for


maintaining network connection agreements.

DEP 390
Page 6 of 59
March 13, 2012

Human Resources Security Policy


Objective:
The Human Resources
measures for the use of
contractors, vendors,
responsibilities, and that
considered.

Security Policy is a policy that establishes protective


DEP IT resources. This policy is to ensure the employees,
and business partners understand their roles and
they are suitable for the positions for which they are being

During employment, to ensure that employees, contractors and third party users
are aware of information security threats and concerns and their responsibilities
and liabilities, an adequate level of awareness, education and training will be
provided to all users of DEP IT resources to help minimize possible security risks.
Upon termination, this policy is in place to ensure the employees, contractors, and
third party users exit from the agency or change in responsibilities is managed and
that return of all equipment and the removal of all access rights are completed.
Control:
Human Resources are responsible for providing accurate job descriptions and
security responsibilities shall be addressed in the terms and conditions of
employment. All candidates for employment will be adequately screened, especially
for positions of trust. Furthermore, management will require employees,
contractors and other users, to apply security in accordance with established
policies and procedures of the agency.
Scope:
This Human Resource Security Policy applies to all employees, contractors and
anyone using agency IT resources.
Policy:
6.0

Prior to Employment

DEP 390
Page 7 of 59
March 13, 2012

6.1.1

All information technology positions will be classified as positions of


special trust requiring background checks and level 2 screening in
accordance with DEP 422, Background Investigations. Positions of special
trust are set forth in Section 110.1127, and Chapter 435, Florida Statutes.

6.1.2

Contractors hired as information technology workers are subject to the


same background investigation requirements as agency information
technology workers.

6.1.3

Upon employment, employees and contracted staff shall acknowledge


having read and understood their responsibilities as provided under this
directive by signing a statement of understanding (SOU) electronically or
on paper. The Bureau of Personnel Services will maintain the SOU until
the individual agency employee terminates employment. The division
obtaining the contracted services will keep the SOU with the work
contract, and maintain a record of these documents.

6.2

During Employment

6.2.1

Human Resources will identify special trust positions annually. Employees


in these positions will receive additional training related to their level of
security access.

6.2.2

Contractors, vendors, and partners employed by agencies or acting on


behalf of agencies shall comply with agency security policies and employ
adequate security measures to protect agency information, applications,
data, resources, and/or services.

6.3

Security Awareness and Training

6.3.1

Workers shall receive initial security awareness training within 30 days of


employment start date.

6.3.2

Records of individuals who have completed security awareness training


will be maintained.

6.3.4

Agency workers at a minimum shall receive security awareness training


annually and include on-going education and reinforcement of security
practices.

DEP 390
Page 8 of 59
March 13, 2012

6.3.5

Special Trust Positions will be adequately trained to carry out their


assigned information security-related duties and responsibilities.

6.3.6

Initial training shall include acceptable use restrictions, procedures for


handling confidential information and computer security incident reporting
procedures.

6.3.7

Security training specific to an application is the responsibility of the


application owner or appropriate Information Security Representative.

6.3.8

Designated individuals will be trained to maintain computer environmental


controls systems and properly respond in case these systems fail.

6.3.9

The ISM will ensure an ongoing information resource security awareness


program is available to keep all users accessing computers systems up-todate regarding new or changing security policies and responsibilities
relating to their use of state information resources. ISRs will ensure an
ongoing awareness program for their systems/applications specific to their
employees.

6.4

Acceptable Use of IT Resources and the Internet

6.4.1

DEP shall have sole discretion to determine whether an information


technology resource use is personal or business.

6.4.2

Personal use shall not interfere with the normal performance of a workers
duties.

6.4.3

Employees will access only information technology resources and


information to which they have authorization or explicit consent.

6.4.4

Employees will refer to DEP Ethics Directive 202 regarding the use of IT
resources for profit or political activities.

6.4.5

Detailed information about security configuration will only be released to


authorized individuals and\or groups.

6.4.6

Computer users shall have no expectation of privacy with respect to the


contents of agency-owned or agency-managed information technology
resources.

DEP 390
Page 9 of 59
March 13, 2012

6.4.7

Unencrypted and sensitive information placed on IT resources will have


appropriate security access controls in place to make sure only authorized
users have access.

6.4.8

Computer users will adhere to agency computer security measures or


other security controls, and will maintain the availability, integrity of
information technology resources.

6.4.9

All users are expected to conduct themselves with the highest integrity in
Internet communications. Use of the Internet is subject to monitoring by
security and upper management. Use of the Internet is permitted as long
as:
(a)

Personal use of the internet will be limited to scheduled breaks


and lunch hour.

(b)

Employees are responsible for exercising good judgment


regarding the web sites they visit.

(c)

Personal use does not interfere with normal business activities.

(d)

The user performs no activity that violates federal, state, or local


laws or would otherwise be prohibited under rules in the Florida
Administrative Code (F.A.C).

(e)

6.5

The user does not deliberately use peer-to-peer file sharing,


hacker web-site/software, or access web sites or chat rooms
containing, material relating to gambling, weapons, illegal drugs,
illegal drug paraphernalia, hate-speech, or violence; and
pornography and sites containing obscene materials.

Termination of Employment

6.5.1

Access authorization shall be removed when the users employment is


terminated or access to the information resource is no longer required.

6.5.2

Upon the voluntary or involuntary termination of an employee, or upon


notification to the employee of impending termination, the owner will
ensure all access authorizations are revoked and will take custody of, or
ensure the safe return, modification, or destruction of all of the following
items assigned, or relating, to the terminating or notified person:

DEP 390
Page 10 of 59
March 13, 2012

(a) Keys, change lock combinations, and identification badges.


(b) Change system passwords.
(c)

Collect confidential data and documentation, along with operator


procedures, and other program documentation and manuals.

(d) State owned computers, software, and any state issued


assets\property.

DEP 390
Page 11 of 59
March 13, 2012

IT Asset Management Security Policy


Objective:
To ensure accountability and maintain appropriate protection of the organizations
assets, all DEP IT assets will be accounted for and have a nominated owner. The
implementation of specific controls for IT assets may be delegated by the owner as
needed, but the owner remains responsible for the proper protection of the assets.
Control:
All agency IT assets will be identified, classified, and inventoried for accountability
and control of assets to catalog and track assets within the agency.
Scope:
The scope of the IT Asset Management Security Policy applies to all employees and
anyone responsible for agency IT resources and this policy includes the sections of:
IT Asset Management, and Information Classification and Confidentiality.
Policy:
7.0

Information Technology Asset Management

7.1.1

To ensure information technology resources are properly maintained and


accounted for, hardware and software inventories must be maintained by
each division, district and office to allow ready access to the data by the
respective technicians and managers. Mobile computing devices identified
by the ISM must be tracked and users assigned these resources must sign
a responsibility statement as established by the ISM.

7.1.2

All hardware owned or managed is considered the property of the agency.

7.1.3

All data and information generated by employees for agency use is


considered agency intellectual property legally owned by the agency.

DEP 390
Page 12 of 59
March 13, 2012

7.1.4

Only agency-owned/licensed and approved free-for-use software may be


loaded on agency computers. Supervisors are responsible for justifying
the need for standard and non-standard software requirements to their
respective IT Coordinator for approval. The Service Desk must be
contacted as well, to ensure the software can be supported. Software
installations should only be performed by Service Desk personnel or a
designee approved by the Service Desk. Trial, demo, or evaluation
software temporarily installed by computer support personnel must be
permanently removed within the time period specified by the vendor
unless it is purchased.

7.1.5

Software, licenses, proofs of purchase, and media should be controlled by


the designated software asset custodian within the respective owner of
the software, in accordance with established software asset management
policies. For software programs requiring the media to reside at the users
desktop computer, the user is accountable for ensuring the media is not
illegally copied and is readily available if needed by the Service Desk.

7.1.6

Copies of state-owned, leased, or licensed software should not be


created, kept, or installed on any DEP computer system if such copying
violates the copyright or the license agreement with the software vendor.

7.1.7

Non-agency managed and personally owned hardware or software is


prohibited from being connected to or installed on agency computers
unless approved by the CIO after consultation with the ISM. At no time
shall confidential information be allowed to be transported or stored on a
personally owned asset.

7.1.8

Unauthorized access, disclosure, duplication, modification, diversion,


destruction, loss, misuse, or theft of IT resources is prohibited.

7.1.9

All IT assets will be sanitized (Department of Defense DoD level wiping)


to remove data before release for maintenance, reuse, or disposal. If for
any reason, DoD level wiping cannot be performed, other forms of
acceptable methods of sanitization include using software to overwrite
data on computer media (1 pass 0s: Kill Disk), degaussing, or physically
destroying media.

DEP 390
Page 13 of 59
March 13, 2012

7.1.10 Procedures for sanitization of agency-owned computer equipment will be


created and adhered to at all time.
7.1.11 File deletion and media re-formatting are not acceptable methods of
sanitization.
7.1.12 Users shall take reasonable precautions to protect mobile computing
devices in their possession from loss, theft, tampering, unauthorized
access, and damage.
7.1.13 Employees will report loss of any IT assets immediately to the appropriate
agency personnel.
7.1.14 Employees will immediately report lost security tokens, smart cards,
identification badges, or other devices used for identification and
authentication purposes.

7.2

Information Classification and Confidentiality

7.2.1

Information classification will categorize information technology resources


according to the Federal Information Processing Standards (FIPS)
Publication 199. This process estimates the magnitude of harm that would
result from unauthorized access, unauthorized modification or destruction,
or loss of availability of a resource -- low-impact, moderate-impact, or
high-impact relative to the security objectives of confidentiality, integrity,
and availability.

7.2.2

Information and software that is deemed confidential or exempt from


disclosure will be identified under provisions of applicable state and
federal laws.

7.2.3

Confidential and exempt information will be protected using appropriate


administrative, technical, and physical controls (e.g., passwords, user IDs,
firewalls, and encryption).

7.2.4

Data owners are responsible for identifying and classifying information.

7.2.5

Procedures for handling and protecting confidential and exempt


information will be referenced in the Information Security Plan.

DEP 390
Page 14 of 59
March 13, 2012

7.2.6

Agreements and procedures must be in place before sharing, handling or


storing confidential data with entities outside DEP.

7.2.7

Timely destruction of confidential information must be achieved when


authorized by the applicable retention schedule, regardless of media type,
to reduce the risk of unnecessary compromise.

7.2.8

Employees attending a meeting in a conference room should be cognizant


of others who may overhear statements, which may be sensitive in
nature, and should take appropriate action to prevent accidental
disclosure.

DEP 390
Page 15 of 59
March 13, 2012

Physical and Environmental Security Policy


Objective:
DEP has invested a considerable amount of budget and human capital in
information technology. With this in mind, the physical and environmental
conditions and work areas that may affect these resources are also important to
protect and safeguard against risks and threats. Employees access to DEP facilities,
data and phone wiring, electrical, heat, air conditioning and ventilation
requirements must also be managed in a way to prevent loss, damage, or
compromise to IT resources. This policy section establishes the rules and
procedures that are implemented to secure physical and environmental factors
around IT resources.
Control:
This policy exists to prevent unauthorized access, damage, compromise and
interference to agency premises and information, assets, agency activities, and
facilities.
Scope:
The Physical and Environmental Security Policy applies to all employees and anyone
accessing agency IT resources, facilities, administrative equipment and
infrastructure.

Policy:
8.0
8.1.1

Secure Areas (Work, Production and Lab, and Off-Premises)


All personnel admitted into agency work areas must have an access
control key badge (card) or be signed in by a person authorized to admit
visitors. Personnel may not by-pass sign-in procedures to admit anyone to
DEP facilities. Control of physical access to the work place provides
protection for IT resources.

DEP 390
Page 16 of 59
March 13, 2012

8.1.2

During non-working hours, employees in control of sensitive information


should lock up all information when not in use, keep desks clear and
secure when possible.

8.1.3

Physical controls shall be appropriate for the size and criticality of the
information technology resources.

8.1.4

Access to System Administrator staff offices, telephone wiring closets, IT


resources machine rooms, network switching rooms, as well as areas
containing sensitive and confidential information must be physically
restricted.

8.1.5

Access to the computer data centers, server rooms, and closets housing
network infrastructure equipment will be restricted to those responsible
for maintaining these operations or related equipment. Visitors shall be
recorded and supervised where appropriate. The System Administrator is
responsible for determining which vendor maintenance/service personnel
may be allowed to work without staff escort.

8.1.6

Access to back up data tape storage areas will be restricted to back up


data tape librarians and authorized operating personnel.

8.1.7

Management responsible for the staff working in restricted areas must


ensure an appropriate access control method (receptionist, metal key and
combo locks, magnetic card readers and door locks) is employed.

8.1.8

The security policies outlined in this document are also applicable at


remote locations and facilities, even though the appropriate method
implemented to control these areas may vary based on location or facility.

8.1.9

Sensitive information should not leave DEP premises. However, if it is


necessary to remove sensitive information, in electronic format, from DEP
premises, this information must be encrypted. Please see encryption
standards in the Information Development and Maintenance Policy.

8.2
8.2.1

Equipment Security
Hardware and peripheral devices must be kept safe from physical harm
including accidental damage, theft, abuse, or loss. The facility and
physical location of DEP IT resources (hardware and other physical

DEP 390
Page 17 of 59
March 13, 2012

assets) must provide adequate protection from unauthorized access and


use (theft, vandalism and sabotage, etc.), prevent damage due to
environment factors (excessive amounts of heat, moisture or electrical
charge), and avoid accidental physical damage. Similarly, backup tapes
must be stored away from magnetic fields or electrical pulses, in addition
to preventing physical damage or loss.
8.2.2

IT resources must be placed in locked cabinets, locked closets, or locked


computer rooms.

8.2.3

Employees must obtain authorization before taking information technology


equipment, software, or information away from the agency facility.

8.2.4

Electrical, data, and voice network wiring must be planned and installed
under the supervision of authorizes individuals. Other personnel may not
alter, move or remove existing wiring.

8.2.5

The temperature and humidity within a central computer room will be


monitored and controlled to ensure that the operational environment
conforms to the manufacturer's specifications.

8.2.6

Heating, ventilation and air conditioning facilities must be coordinated by


authorized personnel. Non authorized personnel may not modify controls,
settings, or implement HVAC equipment.

DEP 390
Page 18 of 59
March 13, 2012

Access Control Policy


Objective:
Only authorized individuals will gain access to agency information resources to
perform approved official business, while minimizing the risk and subsequent
impacts of unauthorized access or effect of such. This will be achieved by restricted
access privileges of all users, systems, and automated processes based upon the
least privilege concept, in which a legitimate business requirement for access is
granted and authorized by the appropriate management personnel.
Control:
These policies lay out the requirements for access to information and prevent
unauthorized access to information systems to ensure protection of networked
services; to prevent unauthorized computer access and activities; and to ensure
information security when using remote access.
Scope:
The Access Control Policy applies to all employees and anyone accessing agency IT
resources. This policy is broken up into the following sections: Business
Requirements for Access; User Access Management and Responsibility; Network
Access; Passwords; Services Account and Mobile Computing and Telecomputing.
Policy:
9.0

Business Requirements for Access Control

9.1.1

Procedures will be established to ensure administrative rights for


information technology resources are restricted to information technology
workers who have received appropriate technical training and who are
authorized based on job duties and responsibilities.

9.1.2

Identify users, processes acting on behalf of users, or devices and


authenticate (or verify) the identities of those users, processes, or

DEP 390
Page 19 of 59
March 13, 2012

devices, as a prerequisite to allowing access to agency information and


information technology resources.
9.1.3

Administrative account activities shall be traceable to an individual. Each


user of an information resource accessible by multiple-users will be
assigned a unique user identification and password.

9.1.4

Workstations and mobile computing devices shall have enabled a


screensaver secured with a complex password and with the automatic
activation feature set at no more than 10 minutes unless there is a
business justification for exemption and if an exemption is given the
requester must provide an alternative method of securing the devices.

9.1.5

Non-DEP individuals must first be authorized by an appropriate DEP


representative, within established procedures, before access is given.

9.1.6

Before non-DEP individual(s) is granted access to an IT resource, the


appropriate Systems Administrator will review the request and grant
access, and will notify Information Security when the access request
seems inappropriate.

9.1.7

Upon the decision to terminate an employee or an employee resignation,


Human Resources will follow established process and procedures to make
sure that the employees access to facilities and IT resources is revoked in
a timely manner. (See Network Access Procedures)

9.1.8

Access accounts assigned to an individual will not be used in automated


production programs, queries, scripts, or other automated system or
operational processes. Instead request a service account for automated
access to IT resources.

9.1.9

Modifying, changing, or updating access privileges to DEP IT resource via


shared passwords or group accounts is prohibited.

9.1.10 Only Administrators will have authority to change permission levels on


servers, network devices, server directories or folders, databases, or other
IT resource.
9.1.11 Access privileges for accounts that have been found to be inactive for
more that 60 days will be disabled.

DEP 390
Page 20 of 59
March 13, 2012

9.1.12 Access privileges will be set according to a minimum security principle in


which the level of access provided syncs up with the job functionality.
System administrators are required to deploy technologies and procedures
to enforce access restriction outlined in this policy.
9.1.13 Security requirements for network connection resources must include
consideration for the interaction resources have with other systems on the
network and internet.

9.2

User Access Management and Responsibility

9.2.1

Employees may not hack, capture, or otherwise obtain passwords,


encryption keys or any other access control mechanism without approval
from Information Security. Employees found to have violated this directive
will be subject to immediate disciplinary action, including termination of
employment.

9.2.2

Employees will not attempt to access data or programs housed on IT


resources that are not part of their job function, and where authorization
or explicit consent has not been granted.

9.2.3

Users will be held accountable and responsible for activities that occur
under their assigned user ID.

9.2.4

Employees shall not share their agency accounts, passwords, personal


identification numbers, security tokens, smart cards, identification badges,
or other devices used for identification and authentication purposes.

9.2.5

Workers shall be authorized access to IT resources based on the


principles of least privilege and need to know.

9.2.6

Data Owner will review access rights every 6 months based on risk,
access account change activity, and error rate.

9.2.7

Accounts with administrative rights must be created, maintained,


monitored and removed in a manner that protects information technology
resources.

DEP 390
Page 21 of 59
March 13, 2012

9.2.8
9.3

Data Owners are responsible for authorizing access to information.


Network Access Control (Login\Logout)

9.3.1

A computer user access to the network will have a unique user account ID
and password.

9.3.2

System Administrators need to ensure accounts with administrative rights


are created, maintained, monitored and removed in a manner that
protects information technology resources. (See Network Access

Procedures)
9.3.3

To ensure compliance with agency security policies prior to allowing


access to the network, a network connection agreement must be
executed between DEP and non agency entities.

9.3.4

Network Administrators will maintain a centralized file of network


connection agreements.

9.3.5

Wireless access into the agency network shall require user-authentication.

9.3.6

Scripts implementing automated access that attempts to bypass


subsequent authentication or apply blanket authentication to multiple
machines that are attached to the network are not permitted.

9.3.7

Where systems have the capability, IT resources will record all login and
logout attempts.

9.3.8

Personnel must logout, sign out, or lock out access to their workstations
for all IT resources when leaving there work area or going off shift.

9.4

Passwords

9.4.1

All IT resources connected to the network, either permanently or


intermittently must have password access controls.

9.4.2

Passwords assigned to individuals must not be shared or revealed to


anyone including a supervisor, upper management, or technical support
personnel unless the employee consents to the request.

DEP 390
Page 22 of 59
March 13, 2012

9.4.3

Passwords must be changed immediately after a security breach has been


detected to the affected systems.

9.4.4

If there is any reason to believe that a password has been disclosed to


anyone other than the authorized user or compromised in any way, the
appropriate administrator(s) will immediately change the password.

9.4.5

Default, initial, or reset passwords will not use or contain simple


passwords like newuser1, or password1 in any form or order and must
be changed after first login.

9.4.6

As the system software permits, an initial or reset password issued to a


user will be valid only for the users next log in. After that, the user must
be prompted to change their password.

9.4.7

Passwords will not be stored in readable form (clear text) in batch files,
automatic login scripts, software macros, or terminal function keys, nor
sent unencrypted in email messages.

9.4.8

Passwords must never be written down.

9.4.9

Passwords must be strong and complex in design and will have these
minimum characteristics:
(a)

A length of 8 characters for operating systems and 10 characters


for servers.

(b)

Contain both upper and lower case letters and include numbers
and\or special characters (e.g., 0-9!@#$%^&*(){}[] :;<>?,./).

(c)

Will not consist of dictionary words in any language, slang,


dialect, or jargon.

9.4.10 Passwords for IT resources will be set to expire every 90 days. However,
Administrators and Information Security may schedule password changes
more frequently.
9.4.11 Passwords will not be reused within a two year period.
9.4.12 Privileged user IDs and passwords are not to be hard coded or saved in
scripts, login procedures or databases. These login procedures must

DEP 390
Page 23 of 59
March 13, 2012

require an individual to authenticate before a script or login procedure can


be run.
9.4.13 User accounts will be suspended after three unsuccessful attempts to
enter a password, within a 15 minute time period, and will require the
password to be reset by the appropriate administrator.
9.4.14 After three failed attempts to access a resource by a service account, an
alert email will be sent to the System Administrator. Furthermore, an alert
should also be sent to Information Security when a service account has
attempted to login to a computer or domain.
9.4.15 Information Security will review failed attempts to determine if there is a
malicious user behind it and will pursue Office of Inspector General (OIG)
and Office of General Counsel involvement if required.

9.5

Service Accounts

9.5.1

Service accounts must be maintained in a manner that protects


information technology resources.

9.5.2

Service accounts may be exempted from agency password expiration


requirements.

9.5.3

Service accounts shall not be used for interactive sessions.

9.5.4

Service accounts will be established for all production processes that


require access to system resources that are account and password
protected.

9.5.5

For automated access to IT resources, System Administrators must


request and use service accounts.

9.6
9.6.1

Mobile Computing and Remote Access Control


Employees must take reasonable precautions to protect mobile computing
devices in their possession from loss, theft, tampering, unauthorized
access, and damage.

DEP 390
Page 24 of 59
March 13, 2012

9.6.2

Mobile computing devices shall require user authentication before access


is allowed on the device when used in a mobile, non-DEP network
environment.

9.6.3

Mobile computing devices containing confidential information shall be


encrypted using agency-approved encryption software or methods.

9.6.4

Mobile computing devices must be firewall protected when connected to a


non-agency network.

9.6.5

Mobile computing devices shall be issued to and used only by agencyauthorized users.

9.6.6

Users may remotely connect computing devices to the agency network


only through agency-approved, secured remote access methods.

9.6.7

Remote access to IT resources will be granted only to personnel who have


a justified business need. Remote access that is granted will be reviewed
annually.

9.6.8

Remote access client connections shall not be shared.

9.6.9

Only authorized IT personnel may provide VPN addresses.

9.6.10 All remote access connection will pass though a firewall or Remote Access
Server (RAS) and require user authentication before reaching a login
prompt or banner.
9.6.11 Confidential information transmitted over the Internet must be encrypted.

DEP 390
Page 25 of 59
March 13, 2012

Network and Operations Management Policy


Objective:
The Network and Operation Management Policy is designed to protect the
operating environment and network in real-time. These policies are developed to
also promote a stable and consistent service for all IT resources. The guidelines to
this policy are to maintain the integrity and availability of information; ensure the
protection of information in networks, including those networks that may span
agency boundaries; maintain the security of information and software exchange
within the agency; and make sure that systems are audited and monitored for
unauthorized information processing activities.
This policy for securing IT resources is intended to be a reference to which
Administrators must adhere but is not indented to circumvent Administrators use of
sound judgment and creativity in matters of security.
Control:
DEP will monitor, control, and protect agency information when transmitted across
the agencys network infrastructure.
Scope:
The Network and Operations Management policy applies to all personnel and
anyone using agency IT resources. This policy is broken up into the following
sections: Operational Management and Responsibilities; Network Security
Management; Backup and Recovery; Exchange of Information; and Audit and
Monitoring
Policy:
10.0

Operational Management and Responsibilities

10.1.1 Virus checking software must be approved by the Office of Technology


and Information Services (OTIS) and will be deployed on all systems
susceptible to virus, and on all servers. These programs must be
continuously enabled, updated and configured so non-Administrators

DEP 390
Page 26 of 59
March 13, 2012

cannot disable them. Externally supplied software media may not be used
on any computer running a Windows or Linux\Unix operating system
unless it has been virus scanned. Furthermore, personnel may not
intentionally write, generate, compile, copy, collect, propagate, execute,
or attempt to introduce computer code designed to self-replicate, damage,
or otherwise hinder the performance of or access any IT resource. (Please
see Virus Protection Services documentation for more information)
10.1.2 Installed computer operating system and application hot fixes, service
releases, and patches shall be installed on applicable computer systems in
a timely manner in accordance with agency patch management
guidelines. The status of these maintenance updates shall be maintained
to facilitate the task of ensuring required updates are completed for all
applicable systems within the designated timeframe. The National
Institute of Standards and Technology (NIST) procedures for Handling
Security Patches, Special Publication 800-40, shall be used as a guide.
10.1.3 The login prompt for IT resources must not reveal specific information
about the agency, the network configuration, or other internal information
until the user has successfully logged in.
10.1.4 In the case of login failure, the user must not be given any specific
feedback indicating the source or type of failure, but instead just be
informed that the process has failed.
10.1.5 Except in designated test environments, Tier 2 Service Desk support is
responsible for the installation, download, or upgrade of all operating
systems and application software on DEP IT resources.
10.1.6 The application development, test, and production infrastructure must be
physically or logically separated.
10.1.7 Information technology resources shall be validated as conforming to
agency standard configurations prior to production implementation.
10.1.8 Production confidential data shall not be used for testing or development.
Copies of production data will not be used for testing unless the data has
been desensitized or unless all personnel involved in testing are otherwise
authorized access to the data.

DEP 390
Page 27 of 59
March 13, 2012

10.1.9 All program changes will go through change control management


procedures and be approved before implementation to determine whether
they have been authorized, tested, and documented.
10.1.10 Development and test environments will not be permitted to establish
connection with any production resource except under tight change
control procedures. Any ongoing access between these environments and
production must be documented and presented to the ISM for approval
for continued use.
10.1.11 System Administrators should meet regularly to develop policies, discuss
problems, and share information that may concern administrators for
differing operating systems, platforms, or locations.
10.1.12 System Administrators who are asked to coordinate building or moving IT
resources for which another administrative group has some responsibility
to that resource must notify the other group and cooperate with that
group for a successful implementation.
10.1.13 Desktop support will design minimum configuration images for desktop
and laptops for each business unit so that all implementations of the
operating system and application suite for a particular job function are
identical.
10.1.14 System Administrators will devise a standard build process and minimum
security configuration, and ensure implementation is identical for servers
sharing the same process and functionality.
10.1.15 OTIS will develop and publish a list of approved and supported
applications for agency desktop, laptop and server computers sorted by
business units.
10.1.16 Job functions susceptible to fraudulent or other unauthorized activities
must have separation of duties so that no individual has the ability to
control the entire process of those functions.

10.2

Network Security Management

10.2.1 Computer users will not disable, alter, or circumvent agency workstation
security measures.

DEP 390
Page 28 of 59
March 13, 2012

10.2.2 No privately-owned devices (e.g., MP3 players, USB storage device of any
size, printers) shall be connected to state-owned information technology
resources without documented agency authorization.
10.2.3 Firewall and router configuration standards must be established and
include a current and complete network diagram with IP addresses and
subnet masks.
10.2.4 Where possible, hardware firewalls will be preferred to software firewalls
for connections. If a software firewall must be used, the host on which it
runs must be hardened.
10.2.5 All connections of the internal network to external networks must be
under the protection of a firewall. Demilitarized Zone (DMZ) networks
require firewalls to protect their hosts from outside attacks, and their
connections to other internal networks must have firewall protection.
10.2.6 Firewalls will be configured based on the level of risk imposed by the
established connection.
10.2.7 Users must not extend or re-transmit network services in any way. This
means no router, switch, hub, or wireless access point may be connected
to the agency network without OTIS approval.
10.2.8 Clients connected to the agency network shall not be simultaneously
connected to any other network.
10.2.9 Only agency-owned or agency-managed information technology resources
may connect to the agency network; and only agency-owned or agencymanaged mobile storage devices are authorized to store agency data.
10.2.10 Whenever resources are available, a risk assessment will be performed
prior to introducing a new technology or application to the network.
10.2.11 Network access to an application containing critical or confidential data,
and data sharing between applications, will be as authorized by the
application owners and will require user authentication validation.
10.2.12 Owners of information resources served by networks will prescribe
sufficient controls to ensure access to network services, host services, and
their subsystems are restricted to authorized users and uses only. These
controls will selectively limit services based upon: (1) User identification

DEP 390
Page 29 of 59
March 13, 2012

and authentication (e.g., password) or (2) Designation of other users,


including the public where authorized, as a class (e.g., public access
through dial-up or public switched networks), for the duration of a
session.
10.2.13 Authorization at network entry on the basis of valid user identification
code and authentication (e.g., password) will be provided under the
framework of network services and controlled by the network
management program.
10.2.14 Network folders must be established with the basic level of Read
permission for everyone not authorized with other folder level permissions
for that folder, unless the folder has established Access Control Lists.
10.2.15 Only folder administrators can change folder access privileges.
10.2.16 Wireless access into the agency network shall require user-authentication.
10.2.17 Only agency approved wireless devices, services, and technologies may be
connected to the agency network.
10.2.18 Network Administrators of wireless environments will change wireless
vendor defaults, including default encryption keys, passwords, and SNMP
community strings, and ensure wireless device security settings are
enabled for strong encryption technology for authentication and
transmission.
10.2.19 Wireless transmission of agency data shall be encrypted using industry
best practices to implement strong encryption for authentication and
transmission.

10.3

Exchange of Information

10.3.1 Confidential information sent by a messaging functionality will be


encrypted.
10.3.2 Electronic transmission of confidential information will be encrypted when
the transport medium is not owned or managed by the agency.
10.3.3 Passwords must be encrypted when transmitted across or stored on IT
assets to prevent compromise.

DEP 390
Page 30 of 59
March 13, 2012

10.3.4 Agreements and procedures must be in place for sharing, handling or


storing confidential data with entities outside the agency.
10.3.5 While in transit, information which is confidential or information which in
and of itself is sufficient to authorize disbursement of state funds will be
encrypted if pending stations, receiving station, terminals, and relay points
are not all under positive state control, or if any are operated by or
accessible to personnel who have not been authorized access to the
information, except under the following conditions:
(a)

The requirement to transfer such information has been validated


and cannot be satisfied with information which has been
desensitized.

(b)

The Secretary has documented the acceptance of the risks of not


encrypting the information based on evaluation of a risk analysis,
which evaluates the costs of encryption against exposures.

10.3.6 Under no circumstance shall two networks be connected (this includes


peer to peer traffic). A simultaneous connection between DEP network
and a non-DEP network connection (e.g., Comcast or other cable modem
is considered a network connection) poses a security risk to the agency
network from hackers and computer virus attacks.
10.3.7 Internal-to-Internal VPNs are not allowed under any circumstances.
10.3.8 The establishment of any VPN allowing access to DEPs internal network
requires written approval by the ISM and Network Administrator.
10.3.9 Employees will follow established guidelines for acceptable use of email
and other messaging resources.
10.3.10 It is inappropriate to use email or other messaging functions for the
distribution of malware, forging headers, propagate chain letters, and
auto-forwarding agency messages to a non-agency address.
10.3.11 Employees shall use only approved electronic mail services. Approved email services may not be used for unlawful activities, commercial purposes
not under the auspices of the agency, personal financial gain or uses that
violate other agency policies or guidelines.

DEP 390
Page 31 of 59
March 13, 2012

10.3.12 Employees shall not use e-mail services to represent, express opinions, or
otherwise make statements on behalf of the Department or any unit of
the agency unless authorized to do so.
10.3.13 Employees shall not use e-mail services for purposes that could
reasonably be expected to cause, directly or indirectly, excessive strain on
any computing resources, or unwarranted or unsolicited interference with
the use of e-mail or e-mail systems by others (e.g., animated email
signatures).
10.3.14 Both the law and DEP policy prohibit the theft or abuse of computing
resources. These prohibitions apply to electronic mail services and include
unauthorized entry, use, transfer, or tampering with the accounts and files
of others, interference with the work of others and with other computing
resources or facilities.
10.3.15 Employees shall not use e-mail services to access, send, store, create or
display inappropriate or illegal content, including sexually suggestive or
explicit material, gambling, profanity, political activities, obscenity,
harassment or discrimination regarding age, race, color, sex, religious
belief, national origin, political opinion or disability.
10.3.16 Employees shall not send mass e-mails unless authorized. This restriction
does not preclude an employee from sending multiple e-mails to a finite
group for official business. Large attachments with graphics, streaming
video, or sound effects are discouraged.
10.3.17 Employees will delete unsolicited e-mails.
10.3.18 Electronic mail is subject to the full range of laws applying to other
communications, including copyright, breach of confidence, defamation,
privacy, contempt of court, harassment, anti-discrimination legislation, the
creation of contractual obligations, and criminal laws.

DEP 390
Page 32 of 59
March 13, 2012

10.4

Audit and Monitoring

10.4.1 The minimum requirements for audit logging of all IT resources are:
(a) Login and Logout
(b) Source IP\Workstation Name
(c) Time stamp
10.4.2 OITS will implement procedures to protect the integrity and confidentiality
of audit logs.
10.4.3 OTIS will create, protect, and retain audit records to the extent needed to
enable the monitoring, analysis, investigation, and reporting of unlawful,
unauthorized, or inappropriate information and information technology
resource activity.
10.4.4 The agency ISM, Inspector General (IG), Information Security Specialist or
other specifically authorized personnel shall be granted access to review
audit logs containing accountability details.
10.4.5 OTIS and Information Security reserve the right to audit the use of all IT
resources to ensure compliance with this Security Policy. Auditing of IT
resources may include, but not limited to, inspection of users access
rights, examination of users access logs and electronic monitoring of users
access by approved software tools.
10.4.6 All employee accounts, workspaces and storage areas are subject to
periodic security audits. OTIS and Information Security may review
archived electronic mail, private file directories, hard disk drives, and other
information stored on agency information systems.
10.4.7 Audit activity will be periodic and\or event driven to assure compliance
with internal policies, support the performance of internal investigations,
and assist the management of information systems.
10.4.8 Employees suspected of misuse or violation may have their computer
activity logged for further action.

DEP 390
Page 33 of 59
March 13, 2012

10.4.9 All monitoring will be logged and available to management upon request.
10.4.10 To the extent that systems and software permit, all significant security
related events will be logged. Examples of security related events may
include: User-ID switching during an on-line session, attempts to guess
passwords, privilege escalation, and modification to production application
software, system software or user privileges.
10.4.11 System and security logs containing production IT resource security
events will be retained for at least 3 months on a specified server and
have limited access by only authorized personnel.
10.4.12 A sufficiently complete history of transactions shall be maintained for each
session involving access to critical information to permit an audit of the
system by tracing the activities of individuals through the system.
10.4.13 OTIS and Information Security will establish procedures to ensure regular
review of system activity logs.
10.4.14 ISM or designee shall be provided access to monitor any agency
information technology resources.
10.4.15 Use of information technology resources constitutes consent to monitoring
activities whether or not a warning banner is displayed.
10.4.16 Monitoring, sniffing, and related security activities shall be performed only
by Information Security or designee based on job duties and
responsibilities.
10.4.17 Technology managers shall monitor technology resources to ensure
desired performance and facilitate future capacity-based planning.
10.4.18 OTIS will monitor for unauthorized information technology resources
connected to the agency network. Unauthorized access points connected
to the agency network shall be removed immediately.

DEP 390
Page 34 of 59
March 13, 2012

Application Security Policy


Objective:
Computer security needs must be addressed as part of the Information Systems
Development Methodology (ISDM) when developing new or making modifications
to existing applications if the system or data affected by these applications must be
protected from accidental or malicious access, use, modification, destruction or
disclosure. Furthermore, to adequately protect DEP information systems, OTIS will
employ system development life cycle processes that incorporate information
security considerations; employ software usage and installation restrictions; and
ensure that third-party providers employ adequate security measures to protect
information, applications, and/or services outsourced from the organization.
Control:
Appropriate security controls will be designed into applications, including user
developed application to ensure correct processing of data. These controls will
include validation of input data, internal processing and output of data, and
adherence to strict coding guidelines.
Scope:
The Application Security Policy applies to all employees and anyone using agency
IT resources. This policy has two sections: Application Security and Coding and
Code Review.
Policy:
11.0

Application Security

11.1.1 Application developers will develop procedures to ensure application


security is addressed throughout the application procurement process
and/or application development lifecycle.
11.1.2 Application owners are responsible for defining application security-related
business requirements.

DEP 390
Page 35 of 59
March 13, 2012

11.1.3 The application development team shall implement appropriate security


controls to achieve the security requirements of the application owner and
implement appropriate security measures to minimize risks to agency
information technology resources.
11.1.4 OTIS will implement procedures to establish accountability for accessing
and modifying mission critical applications.
11.1.5 A final application security review must be approved by the application
owner, ISM and the CIO, or their respective designees, before an
application is placed into production.
11.1.6 The application maintenance process shall include reviews of application
security requirements and controls to ascertain effectiveness and
appropriateness relative to new technologies and applicable state and
federal regulations.
11.1.7 Application security documentation shall be maintained by the application
owner and be available to the ISM.
11.1.8 For applications and technologies housed in a primary data center, an
application security review shall be approved by the data center ISM (or
their respective designees) before the new or modified application or
technology is placed into production.
11.1.9 All software applications obtained, purchased, leased, or developed
provide appropriate security controls to minimize risks to the
confidentiality, integrity, and availability of the application, its data, or
other information technology resources.
11.1.10 Before new in house or 3rd party vendor applications are implemented in
production, they must undergo a security risk assessment. OTIS and
Information Security can make arrangements for the assessment and
should require documentation of the new applications interface with the
existing production environment. The assessment team will need
information about which IT resources are involved, data flows, and
Transmission Control Protocol\User Datagram Protocol (TCP\UDP) ports
employed and data flows across the Internet. Software applications like
Office, Adobe Acrobat, QuickTime, etc, do not have to undergo the risk
assessment.

DEP 390
Page 36 of 59
March 13, 2012

11.1.11 Technology managers shall restrict and tightly control the use of utility
programs that may be capable of overriding system and application
controls.
11.2

Coding, Code Review and Classification (Protection from Malicious Code)

11.2.1 Developers should follow the approved coding standards, which provide
for a consistent code base for developed applications:
(a)

Open Web Application


applications.

Security

Project

for

web

based

(b)

CERT Secure Coding Standards from Carnegie Mellon for C,


C++, and Java.

11.2.2 Application developers must incorporate validation checks into applications


to detect data corruption that may occur through processing errors or
deliberate actions.
11.2.3 All application will adhere to the Federal Information Processing Standards
(FIPS) 199 categorization based on the criticalness to the agencys mission
and service deliveries.
11.2.4 Source code is to be reviewed throughout the application development, on
regular bases as defined by the application owner, for deficiencies in the
areas
of
security,
reliability
and
operations.

DEP 390
Page 37 of 59
March 13, 2012

Information Development and Maintenance Policy


Objective:
Information Development and Maintenance is the policy section that provides the
framework for configuration management and will ultimately limit the exposure of
production systems and other environments to vulnerabilities or inaccurate
deployments. Information Security will periodically assess security controls to
determine their effectiveness and appropriateness. Based on these assessments,
Information Security will develop and implement plans of action designed to correct
deficiencies and reduce or eliminate vulnerabilities in information and information
technology resources. It is not the intent of this policy to limit the creativity or
productivity that application developers and system administrators have
traditionally enjoyed, only to provide some context for engineering a more secure
production environment.
Control:
Information systems include operating systems, infrastructure, applications, off-theshelf products, services and user developed applications. The design and
implementation of information systems supporting the agency can be critical for
security. Security requirements, risk analysis and maintenance will be identified
prior to the development and implementation of information systems
Scope:
The Information Development and Maintenance Policy extend to all employees and
anyone using agency IT resources. This policy is broken up into the following
sections: Security Requirements, Encryption, Risk and Vulnerability Management
and Maintenance.
Policy:
12.0

Security Requirements for Information Systems

12.1.1 OTIS will develop, document, periodically update, and implement system
security plans for information and information technology resources.

DEP 390
Page 38 of 59
March 13, 2012

System security plans describe the security controls in place or planned


for information technology resources and the rules of behavior for
individuals accessing the information and information technology
resources.
12.1.2 System Security Plans shall document controls necessary to protect
production data in the production infrastructure and copies of production
data used in non-production infrastructures.
12.1.3 Implement service level agreements for technology services within the
agency and with 3rd party vendors when appropriate to ensure
appropriate security controls are established and maintained.
12.1.4 Establish and maintain baseline configurations and inventories of
information technology resources (including hardware, software,
firmware, and documentation) throughout the respective system
development life cycles.
12.1.5 Identify and document information technology resources and associated
owners and custodians.
12.1.6 Standard hardware and software configurations should be used to address
vulnerabilities and must be consistent with industry best practices when
appropriate.
12.1.7 At a minimum, mobile computing devices and mobile storage devices shall
conform to the following configurations:
(a)

Mobile computing and storage devices used with confidential


information require encryption.

(b)

Mobile computing devices connecting to the agency network


shall use current and up-to-date anti-virus software (where
technology permits).

(c)

Agency mobile computing devices shall activate an agencyapproved personal firewall (where technology permits) when
connected to a non-agency network.

(d)

Only agency-approved software shall be installed on state mobile


computing devices.

DEP 390
Page 39 of 59
March 13, 2012

12.1.8 Databases containing mission critical or confidential data shall be placed in


an internal network zone, segregated from the DMZ.
12.1.9 A change management process for modifications to production
information technology resources will be created and maintained.
12.1.10 Access to production IT resources for the purpose of troubleshooting,
deploying code, or running ad hoc queries must be coordinated and
scheduled to undergo the change management process.
12.1.11 Changes to production server applications must follow established change
control procedures and must be completed by the appropriate personnel.
12.1.12 Design of ad hoc database queries that modify data in a production
database must be approved and certified by a Database Administrator
before they can be used by any production IT resource. Controls shall be
established to ensure the accuracy and completeness of data.
12.1.13 Changes to DEPs internal, business partner gateway, and Internet
gateway networks, such as loading of a new router or switch, changing of
network addresses, configuring routers or switches, or installing new
network hardware or connectivity must follow establish change
management process.

12.2

Encryption

12.2.1 Data that is considered sensitive, business critical or vulnerable to


unauthorized disclosure of modification during transmission or while in
storage should be encrypted. Owners of sensitive information must
analyze the risk and determine whether to use cryptographic protection
following these guidelines.
12.2.2 Standard algorithms such as RSA (algorithm by Ron Rivest, Adi Shamir
and Leonard Adleman) Advance Encryption Standard (AES), National
Institute of Standards and Technology (Sha-2), Blowfish, Elliptic Curve
Cryptography (ECC), and ElGamal and International Data Encryption
Algorithm (IDEA) will be used as the basis for approved encryption
technologies.
12.2.3 Encryption key lengths must be at least 128 bits or stronger.

DEP 390
Page 40 of 59
March 13, 2012

12.2.4 The use of proprietary encryption algorithms are not allowed for any
purpose, unless reviewed by qualified experts outside of the proprietary
vendor and approved by Information Security.
12.2.5 OTIS will establish procedures to ensure agency cryptographic
implementations are developed and maintained according to federal
guidelines.
12.2.6 Key management processes and procedures for cryptographic keys used
for encryption of confidential data will be fully documented and will cover
key generation, distribution, storage, periodic changes, compromised key
processes, prevention of unauthorized substitution.
12.2.7 Key management processes must be in place and verified prior to
encrypting data at rest (including email messages, data files, hard drives,
data backups).

12.3

Risk and Vulnerability Management

12.3.1 Information Security will periodically assess the risk to agency operations
(including mission, functions, image, or reputation), agency assets, and
individuals, resulting from the operation of agency information and
information technology resources and the associated processing, storage,
or transmission of agency information.
12.3.2 Information Security shall implement a documented risk management
program, including risk and vulnerability assessments on information
resources including, but not limited to, applications, operating systems,
and processes and procedures.
12.3.3 OTIS will comply with AEITs Office of Information Security and will
coordinate a comprehensive Security Program assessment to be
conducted every three years.
12.3.4 The ISM shall monitor and document risk mitigation implementation and
submit risk assessment findings to the AEIT Office of Information Security
(OIS).

DEP 390
Page 41 of 59
March 13, 2012

12.3.5 The ISM will ensure that risk mitigation plans to reduce identified risks to
agency information technology resources and data are properly
implemented.
12.3.6 Documentation of the information security risk analysis and risk mitigation
plans is confidential pursuant to Section 282.318, Florida Statutes, except
that such information shall be available to the agency Inspector General,
the Auditor General, and the Agency for Enterprise Information
Technology.
12.3.7 System Administrators, Application Owners and Database Administrators
are responsible for the implementation of security procedures within their
processes to protect agency information from loss, destruction, and
unauthorized or improper modification.
12.3.8 Information Security should ensure that a risk analysis is performed prior
to introducing a new technology and a risk analysis prior to modifying
current technology, systems, or applications.
12.3.9 Information Security will identify and correct gaps in processes and
procedures and information technology resource related to this security
policy and the vulnerabilities created in a timely manner.

12.4

Maintenance

12.4.1 System Administrators will perform periodic and timely maintenance on


agency information and information technology resources and shall
provide effective controls on the tools, techniques, mechanisms, and
personnel used to conduct information and information technology
resource maintenance.
12.4.2 Information technology resources are to be correctly maintained to ensure
continued availability and integrity.
12.4.3 Administration of hardware, software, or applications performed over a
network shall be encrypted where technology permits.

DEP 390
Page 42 of 59
March 13, 2012

12.4.4 The application maintenance process shall include reviews of application


security requirements and controls to ascertain effectiveness and
appropriateness relative to new technologies and applicable state and
federal regulations.
12.4.5 Service level agreements for technology services will be implemented to
ensure appropriate security controls are established and maintained.

DEP 390
Page 43 of 59
March 13, 2012

Information Security Incident Management Policy


Objective:
Formal event reporting and escalation procedures must be in place and all
employees and contractors will be aware of these procedures for reporting the
events and weaknesses that might have an impact on the security of DEP IT assets.
All employees and contractors will be required to report any actual or suspected
information security events (however minor in nature) and as quickly as possible to
the Service Desk.
Control:
Information Security Incident Management Policy is established to ensure
information security events and weakness associated with information systems are
communicated in a manner allowing timely corrective action to be taken by the
appropriate computer response personnel.
Scope:
Information Security Incident Management Policy applies to all employees and
anyone using agency IT resources. This policy is broken into the following section:
Management of Information Security Incident and Reporting. For further
information regarding information security incident please see: Computer Security
Incident Response Team Guidelines.
Policy:
13.0

Management of Information Security Incidents and Reporting

13.1.1 OTIS will establish an operational Computer Security Incident Response


Team (CSIRT) and document associated procedures to ensure adequate
preparation, detection, analysis, containment, recovery, and response
activities. The Computer Security Incident Response Team (CSIRT) will
respond to suspected computer security incidents by identifying and
controlling the incidents, notifying designated CSIRT responders, and
reporting findings to agency management.

DEP 390
Page 44 of 59
March 13, 2012

13.1.2 The CSIRT Team will track, document, and report incidents to appropriate
agency officials, and other State and/or law enforcement authorities
according to AEIT OIS guidelines.
13.1.3 The CSIRT membership shall include at least one individual from the
agencys legal, human resources, inspector general, and information
technology areas, as well as the Chief Information Officer and Information
Security Manager.
13.1.4 The CSIRT under the direction of the Chief Information Officer, Inspector
General or Information Security Manager, shall determine the appropriate
response required for each suspected computer security incident.
13.1.5 Information Security must be notified of any suspected or confirmed
computer security incidents, including suspected or confirmed breaches,
within 24 hours of discovery.
13.1.6 Computer security incident documentation is exempt from public
disclosure, pursuant to Section 282.318, Florida Statutes.
13.1.7 The CSIRT shall convene at least once a quarter.
13.1.8 The CSIRT shall provide regular reports to the agency Chief Information
Officer.
13.1.9 Each suspected computer security incident, including findings and
corrective actions, shall be documented and maintained as specified in the
agency computer security incident procedures. The computer security
incident response process will include notification procedures to be
followed for incidents where investigation determines non-encrypted
personal information was, or is reasonably believed to have been,
accessed by an unauthorized person, pursuant to Section 817.5681,
Florida Statutes.
13.1.10 Suspected computer security incidents shall be reported according to the
Employee Computer Incident Reporting procedure.
13.1.11 Agency workers shall report loss of mobile devices immediately to the
appropriate agency personnel.

DEP 390
Page 45 of 59
March 13, 2012

Business Continuity Management Policy


Objective:
The Business Continuity Management Policy is the policy that establishes the
standards for the protection of enterprise resources should a disaster strike and to
help minimize the impact on DEP and recover from a loss of information assets
(which may be the result of, for example, natural disasters, accidents, equipment
failures, and malicious actions) to an acceptable level through the combination of
preventive and recovery controls. This policy will aide DEP to identify the critical
agency business process and integrate the information security management
requirements of business continuity with other continuity requirements relating to
such aspects as operations, staffing, materials, transportation and facilities.
Control:
To counteract interruption to DEPs activities and to critical DEP process from the
effect of major failures and\or disasters, OTIS will establish, maintain, implement,
and test plans for backup/standby/redundant operations and disaster recovery of
DEP information and information technology resources to ensure the availability of
critical information technology resources and continuity of operations in emergency
situations.
Scope:
Understanding the risks DEP is facing in terms of probability and impact in time,
including an identification and prioritization of critical processes, a managed level of
service will be developed and maintained for business continuity throughout the
agency and will apply to all employees and anyone using agency IT resources. This
policy is broken up into the following sections: Business Continuity Management
and Backup and Recovery.
Policy:
14.0

Business Continuity Management

DEP 390
Page 46 of 59
March 13, 2012

14.1.1 Information technology resources identified as critical to the continuity of


governmental operations shall have documented disaster recovery plans
to provide for the continuation of critical agency functions in the event of
a disaster.
14.1.2 Information Technology Disaster Recovery Plans (ITDRP) shall be tested
at least annually; results of the annual exercise shall document those plan
procedures that were successful and what work is required to correct the
plan.
14.1.3 All OTIS IT resources will be subject to a business impact analysis based
on the consequences of disasters, security failures, loss of service and
service availability.

14.2

Back Up and Recovery

14.2.1 Data and software essential to the continued operation of critical agency
functions shall be mirrored to an off-site location or backed up regularly
with a current copy stored at an off-site location.
14.2.2 To prevent loss of data, agency users shall ensure agency data stored on
workstations or mobile devices is backed up.
14.2.3 The agency shall ensure security controls over backup resources are
appropriate to the criticality and confidentiality of the primary resources.
14.2.4 All sensitive, valuable, or critical information that is resident on DEP
computer systems and networks must be periodically backed up. System
Administrators working with application owners must define which
information should be backed up, the frequency of backups and the
method of backups.
14.2.5 Backup and archival media must be stored on a separate location from
the system being backed up.

DEP 390
Page 47 of 59
March 13, 2012

Compliance Policy
Objective:
Compliance is the policy section that provides the context for the implementation
and adherence of security policies. These policies set the framework and standards
at DEP, and allows for these policies to be monitored by Information Security. If
employees do not follow these policies and do not obtain an authorized exception,
then violations and disciplinary action will occur.
Control:
The Compliance Policy was created to avoid breaches of any criminal or civil law,
statutory, contractual obligation and security requirements; to ensure compliance of
the security policies and standards; and to maximize the effectiveness of these
policies in regards to agency IT resources.
Scope:
The Compliance Policy applies to all employees and contractors and to anyone
using agency IT resources. This policy contains two sections: Compliance and
Exceptions to Security Policy.
Policy:
15.0

Compliance

15.1.1 All employees and contractors must read, understand and comply with
this Information Security Policy.
15.1.2 Employees and contractors failing to comply with agency security policies
and procedures are subject to disciplinary action appropriate to the
violation up to and including termination and/or criminal prosecution.
15.1.3 Employees and contractors are responsible for complying with applicable
State and Federal security rules and laws.

DEP 390
Page 48 of 59
March 13, 2012

15.1.4 Employees and contractors will agree in writing, to comply with agency
acceptable use policies prior to using agency information technology
resources.
15.1.5 Non-compliant employees, discovered in a routine Security Audit, or in the
course of work, may have their access privileges temporarily revoked.

15.2

Exceptions to the Security Policies

15.2.1 Limitations in resources and technical capabilities may prevent full


compliance with some of the security requirements without introducing
unacceptable business delays or work stoppage. When such cases arise,
an Information Security Exception Request form must be submitted to the
appropriate ISR for eventual ISM or Information Security approval.
Approved exceptions shall be maintained by the ISM and regularly
reviewed. When an exception is no longer valid, the ISM shall revoke the
exception and the requester must come into full compliance in a timely
manner. If the agency cannot comply with a state information security
policy, the ISM will coordinate with the agency head to obtain the states
approval for an exception
15.2.2 Personnel may not proceed with the exception until the ISM or
Information Security has confirmed in writing that the exception has been
approved,
and
has
outlined
any
attached
conditions.

DEP 390
Page 49 of 59
March 13, 2012

Glossary
Access the ability to acquire, read, write, or delete data or information; make use of
an information technology resource; enter a room or facility.
Access Control the enforcement of specified authorization rules based on user or
system authentication.
Access Point is a station that transmits and receives data (for example, a wireless
access point).
Accountability the principle stating that a specific action is traceable to a unique
individual.
Agency worker see Worker.
Agency-approved software is software that has been reviewed and deemed
acceptable by the agency for use with agency information technology resources.
Agency-managed device a device that is not owned by the agency, but that is
declared by the device owner and accepted by the agency to be compliant with agency
standard configurations.
Anti-malware software is software that detects and removes malicious software from
a computer or network stream.
Application information resources designed to satisfy a specific set of user
requirements.
Application development life cycle (ADLC) is a set of procedures to guide the
development and modification of production application software and data items. A
typical ADLC includes design, development, quality assurance, acceptance testing,
maintenance, and disposal (also known as System Development Life Cycle SDLC).
Application development team is the entire set of people responsible for planning,
designing, developing, installing, and maintaining applications. The roles represented
include project managers, analysts, computer programmers, database administrators,
data administrators, system administrators, network administrators, etc.

DEP 390
Page 50 of 59
March 13, 2012

Application owner the business unit that requested the application be developed
and/or purchased; the individual (usually a manager) from the business unit(s) for
which an application is acquired who has responsibility and authority to make decisions
related to the application, such as requirements, deliverable approvals, access, etc.
Application security review an evaluation of an applications security requirements and
associated controls (planned or implemented) with the goal of determining if controls
are sufficient to minimize risks to the confidentiality, integrity, and availability of the
application, its data, or other information technology resources.
Audit logs documentation of activity within a system incorporating, at a minimum,
date, time, action, and user account associated with the action.
Authentication the process of verifying that a user, process, or device is who or what
it purports to be. Techniques for authentication fall into categories as follows:
(a) Something the user knows, such as a password or PIN;
(b) Something the user has, such as a smartcard or ATM card; and
(c) Something that is part of the user, such as a fingerprint, voice pattern or retinal
scan.
Authorization official or legal permission or approval.
Availability the principle that authorized users have timely and reliable access to
information and information technology resources.
Breach unlawful and/or unauthorized access of computerized data that materially
compromises the security, confidentiality, or integrity of personal information.
Chief Information Officer (CIO) the person appointed by the agency head that
coordinates and manages the agency information technology functions and
responsibilities.
Compensating Control a management, operational, or technical control (i.e.,
safeguard or countermeasure) employed by an organization in lieu of a recommended
security control that provides an equivalent or greater level of protection for an

DEP 390
Page 51 of 59
March 13, 2012

information system and the information processed, stored, or transmitted by that


system.
Complex password a password that is at least eight characters and is comprised of at
least three of the following categories: uppercase English letters; lowercase English
letters, numbers 0-9, and non-alphanumeric characters.
Comprehensive risk assessment the risk analysis required to be conducted by
agencies every three years, in accordance with Section 282.318, F.S.
Computer user any authorized entity that uses information technology resources
(interchangeable with User).
Confidential information and/or confidential data information not subject to inspection
by the public that may be released only to those persons and entities designated in
Florida statute; information designated as confidential under provisions of federal law or
rule.
Confidentiality the principle that information is accessible only to those authorized.
Continuity of Operations Plan (COOP) the documented plan detailing how the agency
will respond to incidents that could jeopardize the organizations core mission pursuant
to Section 252.365, F.S.
Critical information resources the resources determined by agency management to be
essential to the agencys critical mission and functions, the loss of which would have
severe or catastrophic adverse effect.
Cryptography the discipline that embodies the principles and methods for the
transformation of data in order to hide semantic content, prevent unauthorized use, or
prevent undetected modification. Cryptography is a method to protect data and includes
both encryption (which is reversible) and hashing (which is not reversible, or one
way).
Data store a collection of information organized so it can be accessed, managed, and
updated.
Degaussing a method of bulk erasing data from magnetic media. Degaussing
demagnetizes the disk such that all data stored on the disk is permanently destroyed.
Demilitarized Zone (DMZ) physical or logical sub-network or computer host that
provides an additional layer between the Internet and an organizations internal

DEP 390
Page 52 of 59
March 13, 2012

network so that external parties only have access to devices in the DMZ rather than the
internal network.
Development infrastructure a technical environment that is used for design,
development, and/or piloting of new technical capabilities or applications. The
development infrastructure is separated logically or physically from the production and
test infrastructures.
Directly connect [to the agency internal network] a device that is joined to and
becomes an extension of the agencys internal network. Dial-up and Virtual Private
Network (VPN) connections to the agency are considered to be directly connected.
Disaster recovery plan see Information Technology Disaster Recovery Plan.
Encryption the reversible process of transforming readable text into unreadable text
(cipher text).
Exempt Information information an agency is not required to disclose under Section
119.07(1), F.S., but which the agency is not necessarily prohibited from disclosing in all
circumstances.
Information owner the manager of the business unit ultimately responsible for the
collection, maintenance, and dissemination of a specific collection of information.
Information security protecting information and information technology resources
from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security Manager (ISM) the person designated to administer the agencys
information security program in accordance with Section 282.318, F.S.
Information security program a coherent assembly of plans, project activities, and
supporting resources contained within an administrative framework, to assure adequate
security for agency information and information technology resources.
Information Technology Disaster Recovery Plan (ITDRP) information technology
resources and procedures to ensure the availability of critical resources needed to
support the agency mission in the event of a disaster and to return to normal
operations within an accepted timeframe. The ITDRP takes into account availability
requirements, recovery time frames, recovery procedures, back-up/mirroring details,
systematic and regular testing and training.

DEP 390
Page 53 of 59
March 13, 2012

Information technology infrastructure network devices, server hardware, and host


operating systems, database management systems, utilities, and other assets required
to deliver or support IT services.
Information technology resources a broad term that describes a set of technology
related assets. While in some cases the term includes items such as people and
maintenance, as used in this rule, this term means computer hardware, software,
networks, devices, connections, applications, and data.
Information technology worker an agency user whose job duties and responsibilities
specify development, maintenance, or support of information technology resources (see
User; Worker; Workforce).
Integrity the principle that assures information remains intact, correct, authentic,
accurate and complete. Integrity involves preventing unauthorized and improper
creation, modification, or destruction of information.
Interactive session a work session where there is an exchange of communication
between a user and a computer.
Least privilege the principle that grants the minimum possible privileges to permit a
legitimate action in order to enhance protection of data and functionality from faults
and malicious behavior.
Malware malicious software; a general term used by computer professionals to mean
a variety of forms of hostile, intrusive, or annoying software or program code.
Management Controls the security controls (i.e., safeguards or countermeasures) for
an information system that focus on the management of risk and the management of
information system security.
Media physical devices or writing surfaces including but not limited to magnetic tapes,
optical disks, magnetic disks, memory chips, printouts (but not including display media)
onto which information is recorded, stored, or printed within an information system.
Mobile computing device a portable device that can process data (e.g., laptop,
personal digital assistant, certain media players and cell phones).
Mobile device a general term describing both mobile computing and mobile storage
devices.

DEP 390
Page 54 of 59
March 13, 2012

Mobile storage device portable data storage media including external hard drives,
thumb drives, floppy disks, recordable compact discs (CD-R/RW), recordable digital
videodiscs (DVD-R/RW), or tape drives that may be easily attached to and detached
from computing devices.
National Institute of Standards and Technology (NIST) a non-regulatory Federal
agency within the U.S. Commerce Departments Technology Administration.
Need to know the principle that individuals are authorized to access only specific
information needed to accomplish their individual job duties.
Network an interconnected group of information technology devices; a system that
transmits any combination of voice, video and/or data between devices.
Network perimeter the boundary of an agencys information technology infrastructure.
Operational Controls security controls (i.e., safeguards or countermeasures) for an
information system that primarily are implemented and executed by people (as opposed
to systems).
Operational information security plan the agency plan governing the information
security program. In addition to detailing the activities, timelines and deliverables for
the security objectives that, subject to current resources, the agency will implement
during the current fiscal year, the plan includes a progress report for the prior fiscal
year, related costs that cannot be funded from current resources, and a summary of
agency compensating controls.
Owner the manager of the business unit ultimately responsible for an information
technology resource.
Patch management the process for identifying, acquiring, testing, installing, and
verifying software updates, also known as patches.
Peer to peer a communications model that allows the direct sharing of files (audio,
video, data, and software) among computers.
Personal firewall software installed on a computer or device which helps protect that
system against unauthorized incoming or outgoing network traffic.

DEP 390
Page 55 of 59
March 13, 2012

Personal information an individuals first name, first initial and last name, or any
middle name and last name, in combination with any one or more of the following data
elements:
(a) Social Security Number.
(b) Drivers license number or Florida Identification Card number.
(c) Account number, credit card number, or debit card number, in combination
with any required security code, access code, or password that would permit
access to an individuals financial account. Note: as provided in Section
817.5681, F.S., the term personal information does not include publicly
available information that is lawfully made available to the general public from
federal, state, or local government records or widely distributed media.
Privately-owned device a device not purchased with agency funds; a device owned by
a person or other non-agency entity and not configured, maintained, or tracked by the
agency.
Production infrastructure network devices, server hardware, and host operating
systems that comprise an agencys operational or real-time environment.
Public records act refers to Chapter 119, F.S.
Remote access any access to an agencys internal network through a network, device,
or medium that is not controlled by the agency (such as the Internet, public phone line,
wireless carriers, or other external connectivity). A virtual private network client
connection is an example of remote access.
Review a formal or official examination of system records and activities that may be a
separate agency prerogative or a part of a security audit.
Risk the likelihood that a threat will occur and the potential impact of the threat.
Risk analysis a process that systematically identifies valuable data, information, and
information technology system resources and threats to those resources, quantifies loss
exposures (i.e., loss potential) based on estimated frequencies and costs of occurrence,
and recommends how to allocate resources to countermeasures so as to minimize total
exposure. The analysis lists risks in order of cost and criticality, thereby determining

DEP 390
Page 56 of 59
March 13, 2012

where countermeasures should be applied first. (To be used interchangeably with risk

assessment.)

Risk management the ongoing process of risk analysis and subsequent decisions and
actions to accept risk or to reduce vulnerabilities by either mitigating the risks or
applying cost effective controls.
Security controls the management, operational, and technical controls (i.e.,
safeguards or countermeasures) prescribed to protect the confidentiality, integrity, and
availability of information technology resources.
Security incident any action or activity, whether accidental or deliberate, that
compromises the confidentiality, integrity, or availability of agency data or information
technology resources.
Security review an examination of system records and activities to determine the
adequacy of system controls to ensure compliance with established security policy and
operational procedures, detect breaches in security, and recommend any indicated
changes in any of the foregoing.
Separation of duties the concept of having more than one person required to
complete a task. This is a way to ensure that no one individual has the ability to control
all critical stages of a process.
Service account an account used by a computer process and not by a human (e.g., an
account used by the backup process for file access). Normally service accounts may not
log on to a system.
Session the time during which two devices maintain a connection and are usually
engaged in transferring data or information.
Smart card a pocket-sized card with embedded circuits that can process data. Often
smart cards are used as a form of authentication for single sign-on systems (also known
as integrated circuit card).
Sniffing capturing network data.
Special trust or position of trust positions that, because of the special trust or
responsibility or sensitive location of those positions, require that persons occupying
those positions be subject to a security background check, including fingerprinting, as a
condition of employment, pursuant to Section 110.1127, F.S.

DEP 390
Page 57 of 59
March 13, 2012

Standards a specific set of practices or procedures to regulate how a system or


organization provides services; required practices, controls, components, or
configurations established by a recognized authority.
Standard configuration the documentation of the specific rules or settings used in
setting up agency hardware, software, and operating systems.
Standard hardware an agency-approved hardware.
Standard software agency-approved software.
State Chief Information Security Officer the State of Florida executive responsible for
the state government information security posture and direction. This position is
appointed by the state Chief Information Officer and oversees the state Office of
Information Security.
State Office of Information Security (OIS) the State of Florida information security
office, which guides, coordinates and assists state agencies in identifying threats to
their information assets and mitigating their risks so effective security controls can be
implemented. The OIS is part of the Agency for Enterprise Information Technology,
pursuant to Section 282.318(3), F.S.
Strategic information security plan the agency three-year plan that defines security
goals, intermediate objectives, and projected agency costs for the strategic issues of
information security policy, risk management, security training, security incident
response, and survivability.
Strong cryptography cryptography based on industry-tested and accepted algorithms,
along with strong key lengths and proper key-management practices. Secure Hash
Algorithm revision 1 (SHA-1) is an example of an industry-tested and accepted hashing
algorithm. Examples of industry-tested and accepted standards and algorithms for
encryption include Advanced Encryption Standard (AES) 128 bits, Triple Data Encryption
Standard (TDES), minimum double-length keys, Rivest, Shamir and Adleman (RSA),
1024 bits and higher, Elliptic Curve Cryptography (ECC), 160 bits and higher, and
ElGamal (1024 bits and higher).
Survivability the capability of an organization to maintain or quickly recover critical
business functions after a disaster or adverse event, minimize the effect of an event,
reduce financial loss, and expedite the return to normalcy.

DEP 390
Page 58 of 59
March 13, 2012

System a discrete set of information resources organized for the collection,


processing, maintenance, use, sharing, storing, reporting, printing, dissemination, or
disposition of information.
System administrator a person in charge of managing and maintaining computer or
telecommunication systems.
System hardening the process of securing a system. Hardening typically includes
ensuring proper configurations based on intended function, removing non-essential
programs and utilities, disabling certain accounts, and installing patches.
System security plan the plan for an application or information technology resource
that describes the security requirements, the controls in place or planned, and
roles/responsibilities of all authorized individuals who use the system. A system security
plan may also contain critical data policies, backup, disaster recovery, and user policies.
Technical controls security controls (i.e., safeguards or countermeasures) for an
information system that are primarily implemented and executed by the information
system through mechanisms contained in the hardware, software, or firmware
components of the system.
Test infrastructure a technical environment that mirrors part or the entire production
environment and is used for final testing of a technology or an application prior to
production implementation. The test infrastructure is separated logically or physically
from the production and development infrastructure.
Track the documented assignment of an asset to a user and/or location.
User any authorized entity that uses information technology resources (see Worker;
Workforce; Information Technology Worker).
Virtual Private Network (VPN) a communications network tunneled through another
communications network.
Warning banner a message displayed prior to or upon connection to a resource
informing the user that activities may be monitored or access is restricted.
Worker a member of the workforce; a worker may or may not use information
technology resources (see User; Workforce; Information Technology Worker).
Workforce employees, contractors, volunteers, trainees, and other persons whose
conduct, in the performance of work for the agency, is under the direct control of the

DEP 390
Page 59 of 59
March 13, 2012

agency, whether or not they are paid by the agency (see User; Worker; Information
Technology Worker). Rulemaking Authority 14.204(7), 282.318(3), 282.318(6) FS. Law

Implemented s. 12, Ch. 2009-80, L.O.F. HistoryNew 11-15-10.