New Jersey Administrative Code
Title 13 - LAW AND PUBLIC SAFETY
Chapter 69D - GAMING OPERATION ACCOUNTING CONTROLS AND STANDARDS
Subchapter 2 - CASINO COMPUTER SYSTEMS
Section 13:69D-2.2 - Use of controlled computer systems
Current through Register Vol. 56, No. 18, September 16, 2024
(a) Prior to implementing a controlled computer system, each IT department shall employ internal controls which ensure the accuracy, reliability, and system integrity of their controlled computer systems and controlled data.
(b) Nothing in the Division's rules shall preclude a casino licensee, qualified affiliate or licensed affiliate from contracting the services of a third party for the operation of a controlled computer system, provided such third party is appropriately qualified, licensed or registered.
(c) Each casino licensee shall ensure its internal controls are current and adequately safeguard its controlled computer systems and controlled data.
(d) All critical software shall be approved by the Division prior to implementation and shall require the filing of Release Notes prior to installation. Additionally, critical software shall be designed with an approved method for software version verification.
(e) The initial installation and all material modifications to critical hardware shall be approved by the Division and shall require the filing of Release Notes prior to installation.
(f) Each casino licensee shall maintain documentation for all critical hardware and software. The documentation shall include, at a minimum, the make and model of hardware, the software version, and a copy of the Release Notes.
(g) Each critical location shall be approved by the Division and be designed to prevent unauthorized access. Each casino licensee shall ensure that:
(h) Each controlled computer system shall be capable of recovering from an outage or loss of service and shall utilize, at a minimum, the following:
(i) Each casino licensee shall ensure it is capable of recovering controlled systems after a disaster and have a current disaster recovery plan.
(j) Controlled computer systems shall be designed to protect the security, confidentiality, and unauthorized release of personal patron data. The casino licensee shall provide written notice to the Division within 72 hours of becoming aware that personal patron data may have been compromised or has been otherwise released without proper authorization. The casino licensee shall notify the patron(s) affected in a timely manner, if the compromise has been confirmed via the conclusion of internal investigation and if law enforcement permits.
(k) Logical access to a controlled computer system shall be governed by the internal controls of the casino licensee's IT department that shall ensure:
(l) A casino licensee may issue an account not associated with a specific person provided that:
(m) Critical software shall not permit critical data to be altered unless the critical software provides a record of the modification. The record shall include, at a minimum:
(n) Controlled software shall not permit controlled data that is associated with a serially numbered document to be altered once the serially numbered document has been generated. Serially numbered documents may be voided using controlled software provided the controlled computer system maintains the original record and identifies the user that voided the record.
(o) Casino licensees shall ensure the security and integrity of access codes associated with player accounts. Division best practice is to encrypt such data where it is stored and during transmission.
(p) Critical computer systems shall monitor and report to the casino licensee any malfunction or security incident that adversely affects the integrity of critical data or system functionality. The casino licensee shall provide notice to the Division within 24 hours of becoming aware of the malfunction or security event.
(q) The casino licensee shall monitor and control access to operating systems used in conjunction with controlled computer systems. Division best practice is to utilize a method to electronically monitor and record the actions of users that can bypass application controls to adjust, add or delete controlled data.
(r) User accounts that can bypass application controls to adjust, add or delete controlled data shall:
(s) The casino licensee shall ensure the completion of the documentation required by (r) above. Division best practice is to utilize an electronic log that automatically records the account and date and time of access.
(t) The IT department shall be exclusively capable of booting critical hardware from more than one logical device.
(u) The casino licensee shall ensure that controlled data cannot be retrieved from decommissioned hardware.
(v) A casino licensee may provide remote access to its controlled computer system by an authorized user or computer system provided that: