Section 100.00 | Purpose
Section: Summary
100.00 | Purpose
Effective Date: 04/15/2014
Revised Date: 04/15/2014
Approved Date: 01/31/2014
Overview
The purpose of the Missouri Judiciary Electronic Information Security Policies is to reduce the potential for threats and to eliminate as much as possible vulnerabilities to our systems. Security policies are designed to protect things that are irreplaceable — reputation and dignity of the courts, human life and safety of persons engaged in the adjudicative processes, and the historical value of court records.
There are three primary areas to address. The first is to protect the data, information and technology assets of the judiciary. The second is to reduce potential liability of judicial officers and court staff associated with the information stored within judiciary systems. The third is to protect the privacy and safety of persons who might be at risk if personal case information was made available inappropriately.
Scope
There are three primary areas to address. The first is to protect the data, information and technology assets of the judiciary. The second is to reduce potential liability of judicial officers and court staff associated with the information stored within judiciary systems. The third is to protect the privacy and safety of persons who might be at risk if personal case information was made available inappropriately.
Scope
These policies apply to all information assets that are electronically generated, received, stored, printed and displayed within the judiciary. These policies also apply to all applications, databases and systems managed and monitored by the judiciary, as well as all hardware and software developed, operated, controlled and owned by the judiciary. It includes the security of information technology facilities, the official court records and official backups, judiciary applications, and network connectivity.
This policy is intended for the use of all state employees, county employees, judicial officers, interns, contractors and volunteers with access to information and systems of the judiciary.
Court administrative records are outside the scope of this policy. (Please refer to Court Operating Rule 8.)
Discussion
This policy is intended for the use of all state employees, county employees, judicial officers, interns, contractors and volunteers with access to information and systems of the judiciary.
Court administrative records are outside the scope of this policy. (Please refer to Court Operating Rule 8.)
Discussion
Computer systems are essential assets of the judiciary. The judiciary collects and processes a variety of information, including confidential information, in the course of its activities. All employees, judges, interns, volunteers and contractors of the judiciary, herein known as users, are responsible for protecting judiciary information assets.
Security policies serve to protect information while relieving the end user from cumbersome activities that provide appropriate protections by automating them. The implementation of automated security protocols, such as access controls, minimizes the need for users to actively protect information and systems. Any authorized disabling of these automated controls transfers the sole responsibility to protect assets to the individual user who then must consciously protect information and technologies.
Security policies serve to protect information while relieving the end user from cumbersome activities that provide appropriate protections by automating them. The implementation of automated security protocols, such as access controls, minimizes the need for users to actively protect information and systems. Any authorized disabling of these automated controls transfers the sole responsibility to protect assets to the individual user who then must consciously protect information and technologies.
Dissemination
This policy is made available to all users. Additional guidance for implementing this policy is available from the Office of State Courts Administrator’s Systems Security unit.
***
This policy is made available to all users. Additional guidance for implementing this policy is available from the Office of State Courts Administrator’s Systems Security unit.
***