|Active Directory Standand
||To define an effective, scalable, secure and managable Active Directory forest design and to facilitate one standardized infrastucture for the States Active Directory which will reduce multiple signons and reduce total cost ownership for the States network operations. The Division of Information Technology/DoIT shall govern the inplementation and operation of Microsofts Active Directory on the States enterprise network.
|Administrative Procedures Act Regulatory Manual
||Provides executive branch agencies with guidance on how to comply with the Administrative Procedures Act as updated in 2016. The APA sets out the process for creating, amending and repealing state regulations.
||This policy provides guidance and procedures for the payment of goods and/or services procured by the State in advance of receiving such goods and/or services.
|Analyzing Regulatory Benefit and Costs
||Provides guidance on how to perform benefit cost analysis on policy and regulations. Analysis of societal benefit and costs is required by the Office of Regulatory Reform (ORR) for all new and amended regulations
|Annual Cybersecurity Awareness Training
||State employees must complete annual cybersecurity awareness training.
|Appointment of Authorized Agents
||To relieve directors of certain responsibilities, an authorized agent may act on behalf of the appointing director.
|Audit and Accountability Policy
||to provide the Agency with policy, standards and guidelines for establishing and effectively managing an Information Systens Audit and Accountability program at the Agency
|Bond Fund Expenditures
||Guidelines governing the expednitures of bond funds.
|Budget Adjustments to the Enacted Budget
||The purpose of this policy is to establish rules and guidelines for agencies requesting to spend above appropriations contained in the enacted budget.
|Budgetary Control Policy
||The purpose of this policy is to establish budgetary rules and guidelines for agencies in the
RIF ANS accounting and Ocean State Procures systems.
|Building Closure Policy
||To establish parameters and expectations for employees in the event of state building closure.
|Cabling Standards and Guildlines
||Provides guidelines to create a cabling system for IT managers.
|Cash Receipts Cut-Off and Revenue Recognition
||Polciy aimed at ensuriong that the state is consistent with its financial reporting with the modified accrual basis.
|Configuration Management Policy
||To establish a Configuration Management Policy for effectively managing risk associated with changes to and tha have an impact on system configurations, baseline configuration settings and overall information system security,
|Coronavirus Relief Fund Indirect and Administrative Costs
||This policy provides guidance for the application of indirect cost rates and administrative costs to Coronavirus Relief Fund (“CRF”) awards.
|COVID Direct Award Authorization to Spend Approval Process
||This COVID Direct Award Authorization to Spend Approval Process sets forth the review and approval process for state departments and quasi-public corporations seeking approval to spend direct awards from federal awarding agencies that are related to the coronavirus pandemic.
|COVID-19 Exempt Compensatory Time Policy
||The purpose of this policy is to provide for compensatory time for FLSA exempt employees' who preformed work well beyond regular work hours as result of the COVID-19 pandemic. This policy is separate from the Exempt Position Compensatory Time Policy issued in 2019.
||Information held by public organizations can include social security numbers, credit card numbers and home addresses of Rhode Island citizens. Government, in particular, is responsible for informatrion that protects public health and saftety. Individuals with malicious intent can easily acquire information being transmitted electronically unless appropriate security measures are applied, such as encryption. If detected, the credentials employees use to access daa and system can provide unauthorized access which can lead to critical data being modified, deleted and ultimately unavailable. For these reasons very sensitive information must be protected through encryption methods.
|Desktop Operating System Policy
||The Policy details how operating systemas on the State owned desktop and mobile computers are deployed and supported by the RI Division of Information Technology DoIT
|DNS Configuration Standards
||To define an effective, scalable, secure and manageable Domain Name Service DNS design and to facilitate one standardized infrasturcture for the States DNS. The Division of Information Technology DoIT shall govern the implementation and operation of Domain Name Service DNS design on the States enterprise network