Ill. Admin. Code tit. 59, § 109.30 - Procedures
a) General
Provisions
1) The facility director shall be
responsible for implementing this Part. He or she may restrict the possession
or use of computers, peripherals, modems, CDs, disks, software, or other
equipment used with the computer for all individuals in a facility, when
necessary to protect an individual or others from harm, provided that notice of
such restriction shall be given to all individuals upon admission. If it
becomes necessary to restrict individuals who did not receive notice of the
restriction upon admission, the professional responsible for overseeing
implementation of an individual's services plan may, with the approval of the
facility director, restrict the right to property when necessary to protect the
individual or others from harm.
2)
Due to safety concerns raised by metal in the CPU or glass in the CRT monitors,
the facility director may choose to limit the approved computers to laptop
computers with LCD displays. If the facility director limits the type of
equipment to be used, he or she will ensure that information concerning these
limitations is included in notices to employees and individuals.
3) Except as provided in this Section, e-mail
and internet use on State-owned computers by individuals is prohibited.
Facilities are not required to provide individuals with e-mail or internet
access on State-owned computers. Individuals may request to have e-mail and
internet access for educational purposes only. No other e-mail and internet
related uses of State-owned computers by individuals are permitted. The
treatment or interdisciplinary team may deny the request if it determines that
e-mail or internet access would be clinically inappropriate or that a
restriction on e-mail or internet use is necessary to protect the individual or
others from harm. Behaviors such as issuing written and verbal threats,
obtaining personal information about other persons in order to intimidate or
harass them, obtaining information about making bombs and other weapons,
cyberstalking, and planning escapes from facilities will result in denial of
e-mail and internet access.
4) If a
facility prohibits possession of CDs by individuals while in the facility and
an individual has an approved program on CD, the individual, under employee
supervision, may load the program onto the computer after which the CD will be
placed in personal storage until the individual is discharged. The facility
shall not provide any equipment to convert any program from one format (CD) to
another (disk) (see subsection (a)(1)).
5) The treatment or interdisciplinary team,
with the approval of the facility director, may restrict an individual's
possession of computers, modems, or computer peripherals when necessary to
protect the individual or others from harm. Individuals wishing to purchase or
obtain computers, modems, or computer peripherals for personal use must have
prior approval from their case managers and the treatment team at a mental
health facility or the interdisciplinary team and the EDP liaison at a
developmental disabilities facility. Individuals will be asked to sign the
"Agreement for Use of Computers" form (IL 462-0190) documenting their
understanding of the terms of use and their agreement to those terms. Those
terms may include restricting the use of the computer and any peripheral to
non-treatment or habilitation time periods. Any computer or computer peripheral
received by an individual that has not been approved shall either be returned
to the sender or placed in the individual's personal property storage, at the
individual's choice. The individual may elect to seek approval for the computer
or peripheral.
6) The treatment or
interdisciplinary team, with the approval of the facility director, may
restrict an individual's possession or use of computer software when necessary
to protect the individual or others from harm. Individuals wishing to purchase
or obtain computer software for personal use must have prior approval from
their case managers and the treatment team at a mental health facility or the
interdisciplinary team and the EDP liaison at a developmental disabilities
facility. Individuals will be asked to sign the "Agreement for Use of
Computers" form (IL 462-0190) documenting their understanding of the terms of
use and their agreement to those terms. Any computer software received by an
individual that has not been approved shall either be returned to the sender or
placed in the individual's personal property storage, at the individual's
choice. The individual may elect to seek approval for the computer
software.
b) Individual
Use
1) If an individual wishes to use a
computer and software, employees will inform the individual concerning the
stipulations/terms under which a computer and software may be used. The
individual must sign the form attesting that he or she understands the terms of
use and agrees to those terms. If an individual has a guardian, the treatment
or interdisciplinary team shall review the form with the individual and his or
her guardian. The guardian will also be asked to sign the agreement. The
treatment or interdisciplinary team may specify additional terms and conditions
for use of a computer in the individual's treatment or habilitation
plan.
2) If an individual is
approved to use a computer, software that is approved includes the following:
A) Operating system (i.e., DOS, Windows,
OS2);
B) Utility programs (virus
checkers, file managers, defragmenters, scan disk);
C) Word processing;
D) Accessories (calculators, paintbrush,
print programs);
E) Games that the
individual would be authorized to play on the unit, such as solitaire, card
games, chess, checkers, various board games, or skills development games;
and
F) The treatment or
interdisciplinary team must approve any additional programs that the individual
wishes to use. Any software in a factory-sealed container may be presumed to
contain only the software that it indicates is included.
3) The individual's use of the computer will
be determined based on clinical review and assessment, as well as the
availability of space, the number of electrical outlets, and electrical
devices. No extension cords or devices that multiply the number of outlets,
such as outlet strips, etc., are permitted.
4) If an individual at a mental health
facility uses a computer, any peripheral, power cord and/or other associated
part in an attack or assault on another individual, employee, or visitor, the
computer and all accompanying devices and equipment shall be confiscated and
placed in personal property storage. The "Notice Regarding Restricted Rights of
Individuals" form (IL 462-2004M) will be completed according to facility
procedure. If an individual at a developmental disabilities facility uses a
computer related item to harm or attempt to harm another person, the computer
will be removed from the individual until the interdisciplinary team meets
(within 3 working days) to determine the programmatic action warranted. The
"Notice Regarding Restriction of Rights of an Individual" form (IL 462-2004D)
and SODC Operations "Supplemental Report On the Use of Restraints and/or
Emergency Behavior Intervention Procedures" are to be completed if an
individual's computer is restricted and the forms processed in accordance with
the developmental disabilities facility's procedures for processing
documents.
5) If an individual
inappropriately uses a computer, the treatment or interdisciplinary team may
restrict his or her use of the computer until the treatment or
interdisciplinary team meets to determine the programmatic action
warranted.
6) The treatment or
interdisciplinary team shall keep a record of the equipment and software that
each individual is authorized to use. At least annually, there shall be an
inventory of all individuals' rooms to ensure compliance. There may be random
checks of what software is loaded onto each individual's computer. Any
unauthorized software programs shall be deleted. The continued presence of
unauthorized software or providing software to other persons may result in the
restriction of the use of the computer.
7) Computers are approved for the
individual's personal use. Allowing another individual to use a computer or
using the computer to obtain personal gain from other individuals is a
violation that can result in restrictions on the use of the computer.
c) Use of Disks
1) Individuals may purchase blank disks or
software approved in accordance with subsections (b)(1) and (2) through a
facility commissary or through the facility at a local store. If individuals
are sent blank disks or software approved in accordance with subsections (b)(1)
and (2), they must be in a factory sealed container. If they are not in a
factory sealed container, they are to be treated as "computer disks from
others" (see subsection (c)(3)).
2)
When an individual has been approved to use a computer, he or she may wish to
send and receive correspondence from his or her attorney on computer disk. The
facility shall send a letter to the individual's attorney explaining that
correspondence may be sent to the individual on computer disk, provided the
attorney certifies, with each computer disk, that it only contains documents
relating to that legal representation.
3) Computer disks coming to the individual
shall be examined (except for disks sent to or from the individual's attorneys)
and the documents on some or all of the disks will be reviewed. If unauthorized
contraband material is present, those disks (and all other disks from that same
person) could be restricted with the appropriate restriction of rights.
Outgoing computer disks shall not be examined, impeded or censored unless the
facility director makes an individual determination that it is necessary to
protect the individual or others from harm, harassment or
intimidation.
4) For security
reasons, the facility director may restrict all disks coming to or from persons
or organizations outside the facility, except for those disks coming to or from
attorneys corresponding with individuals. The treatment or interdisciplinary
team, with the facility director's approval, may restrict disks coming to or
from an individual when necessary to protect the individual or others from
harm, except for those disks coming to or from the individual's
attorney.
Notes
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.