Illinois Department of Human Services
Michelle R.B. Saddler, Secretary
This document serves as an Attachment to the Illinois Department of Human Services (DHS) Community Services Agreement (Agreement) and is incorporated therein. This Attachment applies to the programmatic areas of Program Planning and Evaluation.
II. Cornerstone Acceptable Use Agreement
The purpose of this policy is to present the responsibilities of DHS-funded agencies for using Cornerstone. Cornerstone is required for delivering services of the Supplemental Nutrition Program for Women, Infants and Children program, Family Case Management program, Better Birth Outcomes, Early Intervention and Healthy Families Illinois. DHS agencies providing these services must use Cornerstone to conduct the services and provide the data outlined in the Exhibits.
- The agency must purchase and maintain a business class contract with an Internet Provider Service (ISP).
- Interruption of communication and/or connectivity must be reported within 24 hours to the agency's ISP and the Cornerstone Service Desk.
- Cornerstone User access must be approved and terminated by an appropriate section manager responsible for Cornerstone security management with the Cornerstone agency.
- Security training is required before Cornerstone users are allowed access to the system and annually thereafter.
- Reasonable action, due care, and due diligence must be taken to prevent inappropriate use, disclosure, destruction or theft of Cornerstone-designated IT resources. Reasonable actions include but are not limited to prevention, detective and corrective measures such as up to date encryption, anti-viral software and application of security patches
- Disclosure of Cornerstone information is restricted only to authorized parties and in a manner consistent with the form of data classification.
- Cornerstone-designated IT resources are for approved use only. Approved use is limited to authorized users, sanctioned Cornerstone business and job responsibility.
- Cornerstone-designated IT resources must use software and hardware authorized by the DHS-funded agency to which this agreement applies.
- Users are not authorized to run software that has not been approved by the DHS-funded agency to which this agreement applies.