Listing policies

Name File Division Last Revision Date Summary
Service and Support for Cell Phones, Blackberries and Mobile Broadband Devices DOIT_09-01_Mobile_Devices_Service_and_Support_Policy_4-13-11.pdf DoIT 2011-04-13 The purpose of the policy is to identify the process and procedures, to be followed by state agencies and departments in the executive branch, for proicurement and support of cellular telephones, Blackberry devices, and moibile broadband devices (aircards).
Social Networking Policy IT-10-09_Policy_on_Social_Networking.pdf DoIT 2018-02-28 This policy is aimed at allowing state agencies and departments the benefit of using social networking for the performance of state business, to communicate with the public, protect the infrastructure and legal interests of the State of Rhode Island and assure that adequate bandwidth is available to conduct State business without interruption
Supply Chain Risk Management Policy ETSS_Policy_10-30_Supply_Chain_Risk_Management__SR_.pdf DoIT 2022-11-08 Establish policy for the identification, assessment, selection, and implementation of risk management processes and mitigating controls to help manage commercially available information and communications technology supply chain risks.
System and Information Integrity Policy ETSS_Policy_10-29_System_and_Information_Integrity__SI_.pdf DoIT 2022-11-08 To establish policy for effective system and information integrity security controls to safeguard State of Rhode Island information system resources, infrastructure, and data.
System Maintenance Policy ETSS_Policy_10-24_System_Maintenance__MA_.pdf DoIT 2022-11-08 To establish policy for effective and secure maintenance, repair, and diagnostic requirements of information systems and system components, both on-site or off-site, to ensure the confidentiality, integrity, and availability of data.
Systems and Communications Protection Policy ETSS_Policy_10-15_System_and_Communications_Protection_Policy__SC_.pdf DoIT 2022-11-08 To establish policy for effective information system, network, and communications security and ensure the confidentiality, integrity, and availability of information resources.
Technology Acceptable Use Policy Policy_00-02_Technology_Acceptable_Use_Policy_2022.pdf DoIT 2022-07-13 To establish policy for the acceptable use of State network resources. Protect employees and the workplace environment through reducing the risk of compromising State data, disruption of network resources, and legal related issues.