Loading...
HomeMy WebLinkAboutComputing Devices, Electronic Mail, and Internet UseIdaho Department of Correction Standard Operating Procedure Title: Computing Devices, Electronic Mail, and Internet Use 1 of 9 141.00.06.008 Version: 5.0 Adopted: 02/02/2001 Whitney Ascuena-Bolt, Chief of Staff, approved this document on 09/22/2025. plan. SCOPE This standard operating procedure (SOP) pertains to all Idaho Department of Correction (IDOC) employees. Section 5 pertains to residents housed in IDOC facilities. Version Summary was a revision within the last six months, then you may combine both summaries.] TABLE OF CONTENTS Scope ........................................................................................................................................ 1 Table of Contents ....................................................................................................................... 1 A. Statutory Authority ............................................................................................................ 2 B. Board of Correction IDAPA Rule ...................................................................................... 2 C. Governing Policy .............................................................................................................. 2 D. Purpose ........................................................................................................................... 2 E. Responsibility ................................................................................................................... 2 F. Definitions ........................................................................................................................ 3 G. Standard Procedures ....................................................................................................... 4 1. Introduction .................................................................................................................. 4 2. Use of Computing Devices ........................................................................................... 4 3. Artificial Intelligence ..................................................................................................... 4 4. Inappropriate Use of Computing Devices ..................................................................... 5 5. Prohibited Computing/Electronic Device Usage by Residents ...................................... 5 6. Authorized Software and Hardware .............................................................................. 5 7. Inappropriate Information and Images .......................................................................... 6 8. Internet ......................................................................................................................... 6 9. Electronic Mail .............................................................................................................. 6 10. Training .................................................................................................................... 7 Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 2 of 9 Idaho Department of Correction 11. Confidentiality........................................................................................................... 7 12. IT Security and Operations Access ........................................................................... 7 13. Access for Inquiry or Investigation ............................................................................ 7 14. Violation of Policy ..................................................................................................... 9 H. References ...................................................................................................................... 9 A. STATUTORY AUTHORITY 1. Idaho Code § 20-217A, Appointment of Director – Salary – Powers and Duties 2. Idaho Code § 20-219, Probation and Parole Supervision and Training – Limited Supervision - Rulemaking 3. Idaho Code § 20-244, Government and Discipline of the Correctional Facility – Rules and Regulations B. BOARD OF CORRECTION IDAPA RULE None C. GOVERNING POLICY Policy 141, Computing Devices, Electronic Mail, and Internet Use D. PURPOSE 1. The purpose of this SOP is to establish standards for the use of computing devices, electronic mail, and internet for IDOC employees using department computing devices and software. 2. The purpose of section 5 is to establish guidelines restricting resident use of computing and other electronic communication devices. E. RESPONSIBILITY 1. Director or designee The director or designee is responsible for approving this SOP and ensuring its use and implementation. 2. Chief of the Management Services Division The chief of management services or designee is responsible for overseeing and monitoring the provisions herein. 3. IT Management The IT managers are responsible for implementing this SOP and for ensuring compliance. 4. SIU Chief Investigator The head of the special investigations unit or designee is responsible for conducting administrative investigations regarding compliance with this policy. 5. Deputy Attorneys General Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 3 of 9 Idaho Department of Correction The deputy attorney general (DAG) are responsible, if authorized by the director or deputy director, to review information as described in this policy in connection with legal actions or external requests for information. F. DEFINITIONS 1. Artificial Intelligence: Artificial intelligence (AI) refers to computer systems that can work on their own to some degree. They can learn and improve after they are made. Based on the information they receive, they can make guesses, create content, give suggestions, or make decisions that can affect real-world or digital situations. 2. Client: A person who has been convicted of a crime against the laws of the state and ordered into the care and custody of the Board of Correction. The term client includes any use in Idaho law, Board of Correction rule, or IDOC policy or procedure of the terms “offender(s),” or any other term referring to a person on probation or parole supervision under the custody of the Board of Correction. 3. Computing Devices: Electronic devices controlled by a central processing unit (CPU) that can accept software, such as a computer, laptop, tablet, mobile phone, etc. 4. Correctional Management System (CMS): a digital platform used by correctional agencies to store, manage, and analyze comprehensive data about individuals throughout their entire criminal justice process, including intake, sentencing, incarceration, parole, and probation, allowing for informed decision-making regarding their supervision and rehabilitation. This includes systems such as Reflections, CIS, and Atlas. 5. Idaho Public Safety and Security Information System (ILETS): A dedicated data communications network that links local, state, and federal criminal justice agencies to state records and files and to the National Crime Information Center (NCIC) system. (The Idaho Public Safety and Security Information System was previously known as the Idaho Law Enforcement Teletypewriter/Telecommunication System.) 6. Local Area Network (LAN): A network of personal computers in a small area (such as an office) that are linked by cable, can communicate directly with other devices in the network, and can share resources. 7. Peripheral: An input device that sends data or instructions to the computer, such as a mouse, keyboard, printer, etc. 8. Personal Identifiable Information (PII): Information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual. 9. Resident: A person who has been convicted of a crime against the laws of the state and ordered into the care and custody of the Board of Correction. Resident includes any use in Idaho law, Board of Correction rule, or IDOC policy or procedure of the terms “offender(s),” “prisoner(s)”, “inmate(s)”, “incarcerated person(s)”, or any other term referring to a person residing in a correctional facility in the care and custody of the Board of Correction. Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 4 of 9 Idaho Department of Correction 10. Wide Area Network (WAN): A network of personal computing devices in a large area (such as statewide) that are linked by cable, can communicate directly with other devices in the network, and can share resources. 11. Wireless Local Area Network (WLAN): A network of personal computing devices in a larger area (such as statewide) that are linked wirelessly, can communicate directly with other devices in the network, and can share resources. G. STANDARD PROCEDURES 1. Introduction a. Technology and its applications, including the internet, continue to expand and to become more accessible. This expansion increases the opportunity for state employees to improve their productivity, effectiveness, and efficiency. However, as the use and accessibility of technology increases, so does the risk that the technology might be used inappropriately or inefficiently. b. These policies apply to the usage of all computing devices, peripherals, mobile devices, and software that are connected to or can be connected to the department Local Area Network (LAN), Wireless Area Network (WLAN), and/or the Wide Area Network (WAN). c. The management team has adopted these guidelines to govern information technology, which includes the LAN, WLAN, and WAN, to protect and prevent the abuse of state property, to ensure the continued and effective operation of the department, to promote increased employee productivity, to prevent software viruses, and to maximize the efficient use of IT staff time. 2. Use of Computing Devices a. IDOC staff members are encouraged to use the internet and electronic mail (e-mail) to further the mission of the department, to provide service to customers, and to promote professional development as referenced in Idaho Technology Authority (ITA) Policy P1060 – State Issued IT Devices b. Computing devices are for IDOC business use only, and staff should not expect their e- mail communications, documents, or other information to be private and should not use the e-mail system for matters that are not intended for public disclosure. Only the occasional personal use of e-mail in lieu of telecommunication is acceptable. c. Every employee is responsible for monitoring and prohibiting the misuse of department property. It is each employee’s responsibility to inform senders of inappropriate e-mails of the department's e-mail policy. Inappropriate use must be reported to management. 3. Artificial Intelligence a. Staff are prohibited from using criminal justice information, otherwise known as CJIS data, in any artificial intelligence (AI) application. b. Non-publicly available information contained in IDOC’s correctional management system, all information derived from Idaho Public Safety and Security Information System (ILETS), or any personally identifiable information (PII) is prohibited from all AI use. Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 5 of 9 Idaho Department of Correction c. Any photographs, video, audio, or other digital content, to include those of staff, clients, or residents, is prohibited from AI use. 4. Inappropriate Use of Computing Devices It is unacceptable for department employees to use the facilities and capabilities of the computing devices and/or systems to: a. Conduct any non-approved business b. Solicit the performance of any activity that is prohibited by law c. Transmit materials, information, images, or software in violation of any local, state, or federal law d. Conduct any political activity e. Conduct any non-department supported fund raising or public relation activity f. Engage in any activity for personal gain or personal business transactions g. Make any unauthorized purchases h. Use any games on state government-provided computing devices and/or equipment i. Place advertisements or commercial enterprises including but not limited to: goods, services, or property j. Abuse electronic mail privileges k. Download attachments from unknown and/or unauthorized sources l. Share IDOC accounts and passwords. Do not allow someone to use your login and password and/or use someone else’s logon session m. Utilize network bandwidth for non-department activities that cause slowness or disruption such as, but not limited to, streaming non-work related media, downloading music, gaming, etc. 5. Prohibited Computing/Electronic Device Usage by Residents a. Residents may not use any computer or other electronic devices meant for staff use. Any such use may result in disciplinary action. b. The only exception is resident use of computers or other electronic communication devices for class or school in which case the resident must adhere to all school and facility rules regarding their use. 6. Authorized Software and Hardware a. Authorized software/hardware is that which is approved/purchased by the IDOC information technology (IT) staff. b. Unauthorized software/hardware is that which is installed without information technology’s approval or knowledge. c. End users are only allowed to install authorized software from the IDOC self-service repository. Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 6 of 9 Idaho Department of Correction d. Only IT staff members are authorized to: i. Approve new hardware or software ii. Install or remove software applications iii. Install, remove, or change the configuration of hardware 7. Inappropriate Information and Images It is unacceptable to knowingly or intentionally submit, publish, display, transmit, retrieve, or store, on the department's network or on any department computing device and/or system, any information or image which is for non-IDOC business and: a. Violates or infringes on the rights of any other person, including the right to privacy b. Contains defamatory, false, inaccurate, abusive, obscene pornographic, profane, sexually oriented, threatening, racially offensive or other biases, discriminatory, or illegal materials c. Violates any law, regulation, or department policy d. Restricts or inhibits other users from using the system, or the efficiency of the computing device and/or systems e. Encourages the use of controlled substances or uses the system for criminal or any illegal purpose f. Contains statements, which might incite violence or which describe or promote the use of weapons or devices associated with terrorist activities purposes. 8. Internet Uses of the internet must comply with appropriate laws and regulations reflective of the department’s values and integrity. Users should identify themselves properly when using the internet and conduct themselves as professional representatives of Idaho state government. Each user is individually responsible for the content of any communication sent over or placed on the internet. 9. Electronic Mail a. Employees are reminded that electronic mail (e-mail): i. Can and probably will, be copied, saved, or seen by third parties, both internal and external to state government, so care should be given regarding content of the communication ii. May be monitored iii. Is subject to disclosure under the Idaho Public Records Act and any other department policies pertaining to records as described in the Idaho Technology Authority (ITA) Policy P1040 – Email and Electronic Messaging b. Agency-Wide Distribution List Criteria and Process: Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 7 of 9 Idaho Department of Correction i. E-mails sent to agency-wide distribution lists are moderated to prevent misuse, ensure relevant use for agency business, and for disk space considerations. A group of moderators are assigned the task of approving e-mails to be sent to agency-wide distribution lists. ii. Approved e-mails sent to distribution lists are defined as agency-wide communications for business and safety concerns. E-mail sent to distribution lists that do not meet these criteria will be denied. 10. Training a. There will be mandatory IT training and education for all employees working at an IDOC facility. Trainings will consist of, but are not limited to: i. Computer basics ii. Acceptable use policy iii. Cybersecurity awareness training as outlined by the Idaho Technology Authority (ITA) Policy P4505 – Cybersecurity Awareness Training and Executive Order 2017- 02 – Findings of the Idaho Cybersecurity Cabinet Task Force. b. Employees should expect training when hired and on an annual basis, randomly throughout the year, and if necessary, outside training to cover security basics. 11. Confidentiality Employees who send e-mail messages containing confidential and/or privileged information must include the following statement in the body of the message: privileged and confidential. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that any review, dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify the sender immediately by replying to this e-mail and delete this message and any attachments from your computing device.” 12. IT Security and Operations Access IT team members have the right and responsibility (as it relates to their role/job function) to access/inspect any file stored on any electronic device that has the ability to be connected to the IDOC network (directly or indirectly) or connected to IDOC equipment. This access is required to preserve and address any immediate danger/impact to IDOC. 13. Access for Inquiry or Investigation a. Use of computing devices must comply with all executive orders, department policies, standard operating procedures, and state, federal, and local laws. Inappropriate use may be investigated in accordance with this SOP. The department has the right to inspect any and all files stored in secured areas of state networks, on any computing devices, or on any other storage medium that has the ability to connect to the State network (such as flash drives or external hard drives, CDs, DVDs, and other social media) in order to monitor compliance with this SOP. Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 8 of 9 Idaho Department of Correction b. Inappropriate content (as described in section 7 of this SOP) used for investigation purposes must be saved on a site-specific “Investigations” directory located on the network or an external hard drive rather than the investigator’s own C or H drive. Consult your information technology department or your local investigations supervisor to find the proper location to store such content. c. Authorization No IDOC staff member or other individual is authorized to access files or otherwise inspect or investigate IDOC computing devices and/or storage mediums without proper authorization. Authorization to access IDOC computing devices, computing device files, storage medium, etc. must be obtained from the director or deputy director. d. Investigation i. With approval from the director or deputy director, SIU may search or review contents of state authorized electronic devices. ii. Advanced technical computing device forensic previews, computing device, cellular telephone examinations, and real-time information are available, in conjunction with an approved investigation for the following: 1) Presence of inappropriate information and images (as defined in section 7) on a department computing device 2) Detailed methodical examination of the hard drive or media upon submittal of a department computing device to a certified computing device forensics laboratory. This also includes extremely comprehensive forensic examinations when looking for difficult-to-find evidence or for specific exculpatory or incriminating evidence. 3) Access to an employee’s e-mail account activity through the e-mail archive server e. Inquiries Based on Legal Actions and External Requests The lead deputy attorney general (DAG) assigned to the department may approve searches for litigation needs. The lead DAG will act as approver for requests submitted by his/her legal team to review information obtained from computing devices, storage medium, e-mail, computing device files, text messages, and cellular telephone data in connection with legal actions or other external requests for information. f. HR Inquiries The director or deputy director may authorize the HR manager or designee to review information obtained from computing devices, storage medium, e-mail, computing device files, text messages, and cellular telephone data in connection with performance, disciplinary, or legal actions or other external requests for information. g. Information Technology Before providing any information or assistance to the SIU, or any other person, IT staff must confirm that the director or deputy director has approved the investigation, inquiry, or access. Evidence of this approval is provided through the Investigation and Information Request electronic form process. Document Number: 141.00.06.008 5.0 Title: Computing Devices, Electronic Mail, and Internet Use Page Number: 9 of 9 Idaho Department of Correction 14. Violation of Policy Employees violating this policy are subject to disciplinary action up to and including dismissal in accordance with SOP 205.07.01.001, Corrective and Disciplinary Action and/or investigation referral to law enforcement. H. REFERENCES 1. Policy 141, Computing Devices, Electronic Mail, and Internet Use 2. SOP 205.07.01.001, Corrective and Disciplinary Action 3. Executive Order No. 2017-02 – Findings of the Idaho Cybersecurity Cabinet Task Force [https://adminrules.idaho.gov/rules/2017%20Archive/ExOs/2017-02_ExOr_17-2.pdf] 4. Idaho Information Technology Services – Artificial Intelligence (AI) Governance Policy, Standard, and Guideline [https://its.idaho.gov/wp-content/uploads/2024/09/AI-PSG_FINALAug2025.pdf] 5. Idaho Technology Authority (ITA) Policy P1040 – Email and Electronic Messaging [https://ita.idaho.gov/wp-content/uploads/2025/07/p1040.pdf] 6. Idaho Technology Authority (ITA) Policy P1050 - Employee Internet Use [https://ita.idaho.gov/wp-content/uploads/2025/07/p1050.pdf] 7. Idaho Technology Authority (ITA) Policy P1060 – State Issued IT Devices [https://ita.idaho.gov/wp-content/uploads/2025/07/p1060.pdf] 8. Idaho Technology Authority (ITA) Policy P4505 – Cybersecurity Awareness Training [https://ita.idaho.gov/wp-content/uploads/2025/07/p1060.pdf] – End of Document –