X
STANDARDS BIT has established standard practices for development, processing and services
why?
  • Rules and regulations are essential to any well managed organization. Standards are valuable to our clients because of the cost savings, faster support and reliable technology infrastructure. They serve to establish uniform practices and common techniques used as guidelines to measure performance.

    For example, with one standard email system, a small number of administrators can maintain a system supporting all of state government. If the state had two email systems, the number of administrators and support staff would double with no corresponding benefit in functionality. The same principle applies to system designs, writing programs and setting up operations in a data processing center. All of which require certain individual skills, standard policies, procedures and equipment.

    More information >
important!
  • Vendors who are actively pursuing IT business opportunities with the State of South Dakota must also comply with the Information Technology Security Policy. For security purposes, this content is not for public consumption, however a modified version is available for you here.
X
FINANCE BIT Finance Office
BIT Rates and Information
  • Development >
    Analysis, design, programming, implementation and maintenance of the state’s information systems.
  • Data Center >
    Provides enterprise computer processing services for state government agencies, higher education, constitutional offices and the Unified Judicial System (UJS)..
  • Telecommunications >
    Provides all support for hardware/software, Active Directory accounts required for access to network, telephone access, videoconferencing, and more.

Security

Policy, Education and Audits

Maintaining the security infrastructure for the State of South Dakota goes beyond hardware and software technology. It includes rules and regulations, education of those rules with expected behaviors and the independent review of those rules.

  • The technology policies of the state define the guidelines of implementing technology, acceptable behaviors and consequences when not followed.
  • Education is necessary to ensure BIT informs clients of the policies and information regarding security behavior.
    • cybersecurity.sd.gov - includes security guidelines for computer safety tips, training requirements, laws, security alerts; plus a monthly newsletter on topics like safeguarding personal data, cyber ethics, protecting children online, cloud computing and more.
    • blog.bit.sd.gov - contains a section of articles related to cyber security education and awareness along with emerging threats as they occur.
  • State agencies are frequently called upon to provide security-related information regarding the technical infrastructure of supporting sensitive applications. Outside entities with legal justification frequently demand adherence to security regulations. BIT actively participates in those audits to ensure a complete understanding of the security infrastructure.

Clients Served
  • Executive and Judicial Branches
  • Constitutional and Elected Offices

What We Provide
  • Documentation of Policies.
  • Newsletters and articles describing policies, risks and threats.
  • Online classes.
  • Participation in meetings.
  • Responding to findings.
  • Change in infrastructure/policies.

Client Responsibility
  • Sign up to receive BIT Blog updates by email.
  • Take online security classes.
  • Report unusual behavior or information requests.

Major Investment Costs
  • Client Collaboration (understanding legal and business requirements, remediation).

Cost-Saving Tips
  • Following the policies will go a long ways towards preventing outbreaks.
  • Federal requirements need to be forwarded to BIT to ensure we can meet those requirements. This can avoid costly federal fines or withholding of funding.

Rates
  • No specific charges or rates are defined for this service. The costs for this service are absorbed by BIT. The Administrative, Data Center, Development and Telecommunications divisions of BIT all play significant roles in the establishment of an effective security infrastructure.

Maintenance Agreements

There are constantly evolving security threats to the state's technology infrastructure as well as required technology upgrades and patching.  These threats and changes require that technology products effected by them have on-going support to assure they function in a way that is safe and reliable.   

The technology services and products you use to carry out your mission require maintenance agreements.  These agreements include maintaining your application's technology in the midst of industry-wide and local threats and changes and providing you and your technical staff at BIT expert assistance when problems arise.   It is expected that agencies will subscribe to the maintenance agreements for 3rd party products to keep them in a current and supported state throughout the life of the product or service..  If a maintenance agreement is not going to be maintained, it must be approved as such by BIT.