Strategies

Information Privacy

  •  

Information Security

  •  

Information Technology

Policies

Information Privacy

Information Security

Information Technology

  • In accordance with the FY 2018-19 Appropriations Act, Proviso 117.148. (GP: Mobile Device Protection Plan), the Mobile Device Protection Policy describes the assignment, use and management of state issued mobile communication devices.

Procedures

Information Security

  • The following procedures establish minimum baseline processes to be followed by state agencies to comply with the policies above.

Information Technology

  •  

Standards

Information Security

Information Technology

  • The state of South Carolina has established a series of statewide information technology (IT) standards as part of the development and implementation of the IT shared services model. These standards are helping redefine how agencies approach the design, procurement, implementation and use of technology.

    Statewide IT standards approved for agency consumption include those listed below. To view the standard, click on the corresponding link.

  • Each of the standards developed for this initiative originate, progress and are ultimately recommended through the defined governance structure. This structure – comprised of members representing a wide variety of agencies diverse in both size and scope – helps to provide a solid collaborative approach while ensuring agencies have a constant voice and input in such key decisions.

Exception Process

  • An exception process has been established for instances when an agency feels that circumstances necessitate the need to depart from a given standard. Please note, exception requests are not guaranteed to be approved, and are considered and processed through the governance process.

Questions or Concerns

If you have any questions regarding the development of IT standards or the IT shared services governance process, please contact Admin’s Program Management Office (pmo@admin.sc.gov).

Guidance and Guidelines

Information Privacy

Information Security

Information Technology

Other Resources

Information Privacy

Information Security

Information Technology

  •