Policy & Standards
- Standards
- Policies
- Statutes
- AI Usage Standard (PDF)
- API Management Standard (PDF)
- Automated Testing Standard (PDF)
- Batch File Transfer Standard (PDF)
- Branch Policy Standard (PDF)
- Caching Standard (PDF)
- Code Escrow Standard (PDF)
- Continuous Deployment Standard (PDF)
- Cross-channel Communications Marketing Solutions Standard (PDF)
- Custom Application Development for Agile Methodology (PDF)
- Custom Application Development for Waterfall Methodology (PDF)
- Data Archiving Standard (PDF)
- Data Ingestion-Data Quality Standard (PDF)
- Data Retention Standard (PDF)
- Data Storage Standard (PDF)
- Defects Tracking Standard (PDF)
- Development – Continuous Integration and Continuous Delivery Standard (PDF)
- DevOps Standard (PDF)
- Digital Public Facing Identity Standard (PDF)
- Electronic Signature Standard (PDF)
- Enterprise Reference Architecture
- Geographic Information System Standard (PDF)
- Graphic Design Software Standard (PDF)
- Human Capital Management Standard (PDF)
- Log Aggregation Standard (PDF)
- Oklahoma UI/UX Standard (PDF)
- Payment Processing Standard (PDF)
- Peer Code Review Standard (PDF)
- Records Management Imaging Standard (PDF)
- Reporting, Data Analytics and Business Intelligence Standard (PDF)
- Robotic Process Automation Standard (PDF)
- Salesforce Development and Administration Standard (PDF)
- SharePoint Standard (PDF)
- State Data Platform - Data Sharing Standard (PDF)
- Time Clock Standard (PDF)
- Version Control and Hosting Standard (PDF)
- Web Content Management System Standard (PDF)
- Website Development Lifecycle Standard (PDF)
- Application Delivery Controller Standard (PDF)
- Firewall Security Standard (PDF)
- Hypervisor Technology Standard (PDF)
- Internet Protocol Address Allocation Standard (PDF)
- Linux Server Standard (PDF)
- Network Routing and Switching Standard (PDF)
- Server Backup Standard (PDF)
- Site to Site VPN Encryption Standard (PDF)
- SSL Inspection Standard (PDF)
- Unused Firewall Rule Standard (PDF)
- VLAN Extension Standard (PDF)
- WiFi Standard (PDF)
- Administrator Account Standard (PDF)
- Chromebook Exception Standard (PDF)
- Confidential Technology Standard (PDF)
- Data Encryption Standard (PDF)
- Digital Forensics Standard (PDF)
- DoD Information Network Standard (PDF)
- Domain Name Standard (PDF)
- Election Technology Standard - CONFIDENTIAL (PDF)
- Email Acceptable Use Standard (PDF)
- Email Naming Convention Standard (PDF)
- Email Protection Standard (PDF)
- Endpoint Protection and Connectivity Standard (PDF)
- Human Resources Investigation Standard (PDF)
- Incident Response Standard (PDF)
- Information Systems Segregation Standard (PDF)
- Insider Threat Standard (PDF)
- Intelligent Transportation System Standard - CONFIDENTIAL (PDF)
- International Network Traffic Blocking Standard - CONFIDENTIAL (PDF)
- International Travel Standard (PDF)
- IT Contractor Requirements Standard (PDF)
- Kiosk Workstation Security Standard (PDF)
- Life Safety Systems Standard (PDF)
- Lottery Technology Standard - CONFIDENTIAL (PDF)
- Media Disposal Standard (PDF)
- Mobile Emergency Management Application Standar(PDF)
- Network Acceptable Use Standard (PDF)
- Network Protection Standard (PDF)
- Offshore Data Storage Standard (PDF)
- Password Requirements Standard (PDF)
- Personal Device Standard (PDF)
- Physical Access Control Standard (PDF)
- Physical Security Systems Standard (PDF)
- Physical Security Systems Technical Specifications - CONFIDENTIAL (PDF)
- Productivity Software Suite Standard (PDF)
- Remote Employee Standard (PDF)
- Removable Media Usage Standard (PDF)
- Reporting Lost or Stolen Digital Assets Standard (PDF)
- Service Account Standard (PDF)
- Security Awareness Training Standard (PDF)
- Security Exception Standard (PDF)
- Security Services Standard (PDF)
- Simulated Phishing Campaign Standard (PDF)
- Supply Chain Security Standard (PDF)
- System Acceptable Use Standard (PDF)
- System Information Integrity Standard (PDF)
- System Logging, Reviews and Privacy Standard (PDF)
- Third-Party Cybersecurity Management Standard (PDF)
- Threat Intelligence Standard
- Transport Layer Security Standard (PDF)
- Video Conferencing Standard (PDF)
- Vulnerability Disclosure Standard (PDF)
- Vulnerability Scanning Standard (PDF)
- Web Proxy for Business Needs Standard (PDF)
- Workstation Data Storage Standard (PDF)
The statutory duties, responsibilities and authority of the CIO and Information Services are set forth as follows:
- In a portion of the Oklahoma State Finance Act, located at 62 O.S. Sections 34.11.1 through 34.33.
- In the Information Technology Consolidation and Coordination Act located at 62 O.S. Sections 35.1 through 35.9.
- In the Oklahoma Administrative Code located at OAC Title 260, Chapter 115.
Progress Report on Unification
The State of Oklahoma's Chief Information Officer (CIO) is required to produce a quarterly report that provides an update as to the status of the unification of information technology (IT).