California Code of Regulations
Title 15 - Crime Prevention and Corrections
Division 3 - Adult Institutions, Programs and Parole
Chapter 1 - Rules and Regulations of Adult Operations and Programs
Article 3 - Work and Education
Section 3041.3 - Incarcerated/Supervised Person Access to Computers

Universal Citation: 15 CA Code of Regs 3041.3

Current through Register 2024 Notice Reg. No. 38, September 20, 2024

(a) Incarcerated persons shall not access any computer outside of their authorized work, Rehabilitative Programs managed by the Division of Rehabilitative Programs (DRP), as defined in section 3000, or as needed for legal research on the Law Library Electronic Delivery System, except as authorized by the department's Information Security Officer (ISO).

(b) Incarcerated persons shall not access any computer connected to a local area network (LAN), or which has any type of direct, outside communication capability, except as approved by the ISO or provided in section 3370(c).

(c) Only those computer programs developed by incarcerated persons that are written in a programming language approved by the ISO shall be authorized for use.

(1) The use of incarcerated persons as programmers and system experts shall be prohibited where there is a risk to the information assets of the department or the public, as determined by the institution head or the ISO. Incarcerated persons shall not be used as programmers or system experts for departmental business applications, systems, and data.

(2) Incarcerated persons assigned to one computer for work, or a Rehabilitative Program managed by DRP shall not be assigned to, or permitted to use, any other computer, except as approved by the ISO.

(d) Areas where incarcerated persons are authorized to work on computers shall be posted as such. Each computer in a facility shall be labeled to indicate whether or not incarcerated persons are authorized access to that computer.

(e) Incarcerated persons shall not access any computer that contains or is capable of accessing sensitive or confidential information or is connected to, other computers containing sensitive or confidential information, except as provided in section 3370(b).

(f) Incarcerated persons shall not use or be informed of any computer password, except when issued by the supervising staff. The supervising staff and not the incarcerated person must always retain the ability to change the password.

(g) Incarcerated persons shall not have access to diskettes or any other electronic storage media, except within an area approved by the institution head.

(h) Incarcerated persons shall not possess a computer as part of their personal property.

(i) Incarcerated persons shall not access or use any computer-based tool or program that is capable of destroying or corrupting stored data, except as provided in sections 3041.3(m) and 3370(c).

(j) Incarcerated persons who have a record of computer fraud or abuse shall not be placed in any work assignment which provides access to a computer and shall be restricted from computer based rehabilitative programs which provide Internet access.

(k) No external communication capabilities; e.g., telephone lines with connectivity outside the facility, data lines, data punch panels, or telephone access punch panels, shall be permitted in any area where incarcerated persons are allowed to access computers, except as approved in writing by the ISO. The local Information Security Coordinator must keep a copy of the written exception on file for post audit.

(l) Incarcerated persons shall not directly access or alter any computer's operating system, except as provided in sections 3041.3(m) and 3370(b), or authorized by the ISO.

(m) Incarcerated person refurbishing of computers shall be permitted only as part of a program that has been approved, and subject to all requirements established, by the institution head and ISO. An unclothed body search shall be conducted on each incarcerated person prior to their exiting any area where a computer refurbishing program exists.

(n) Each parole office shall ensure the security of computers, LANs, and modems or other communication devices used in that office from unauthorized access by supervised persons. The unit supervisor of each parole office shall be responsible for enforcement of this subsection.

Note: Authority cited: Section 5058, Penal Code. Reference: Sections 502 and 502.7, Penal Code.

Note: Authority cited: Section 5058, Penal Code. Reference: Sections 502 and 502.7, Penal Code.

Disclaimer: These regulations may not be the most recent version. California may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.