STANDARDS BIT has established standard practices for development, processing and services
  • Rules and regulations are essential to any well managed organization. Standards are valuable to our clients because of the cost savings, faster support and reliable technology infrastructure. They serve to establish uniform practices and common techniques used as guidelines to measure performance.

    For example, with one standard email system, a small number of administrators can maintain a system supporting all of state government. If the state had two email systems, the number of administrators and support staff would double with no corresponding benefit in functionality. The same principle applies to system designs, writing programs and setting up operations in a data processing center. All of which require certain individual skills, standard policies, procedures and equipment.

    More information >
  • Vendors who are actively pursuing IT business opportunities with the State of South Dakota must also comply with the Information Technology Security Policy. For security purposes, this content is not for public consumption, however a modified version is available for you here.
FINANCE BIT Finance Office
BIT Rates and Information
  • Development >
    Analysis, design, programming, implementation and maintenance of the state’s information systems.
  • Data Center >
    Provides enterprise computer processing services for state government agencies, higher education, constitutional offices and the Unified Judicial System (UJS)..
  • Telecommunications >
    Provides all support for hardware/software, Active Directory accounts required for access to network, telephone access, videoconferencing, and more.


Information and technology security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

The demand in today's business environment towards our clients having access to all systems, from anywhere, creates significant risks towards the protection of data. There is not a single piece of hardware or software that will solve all problems and alleviate all concerns.

BIT Security is broken down into key areas:

Cyber Security

Learn about security guidelines for general computer safety tips, training requirements, laws, security alerts and more by visiting cybersecurity.sd.gov. Also available on this site is a monthly newsletter on topical items like safeguarding personal data, cyber ethics, emerging trends and threats for cyber security, protecting children online, cloud computing and much more. Our BIT Blog also contains a section of articles related to cyber security and emerging threats as they occur. Check it out when you have time!