Nevada Administrative Code Chapter 242 - Information Services

Background

NAC Chapter 242 governs:

Management of state information technology systems

Security and confidentiality of data

Access to and use of information services

Responsibilities of state agencies and personnel

Enforcement and penalties for violations

The Nevada Department of Administration – Information Technology Services Division (ITSD) enforces these rules.

Case 1: Unauthorized Access to State Data

Issue

An employee accessed confidential state records without authorization.

Facts

Employee in a government agency viewed social security numbers and financial records beyond their work duties.

Logs showed repeated access over several weeks.

Rules Applied

NAC 242.200 – Authorized use of information systems

NAC 242.210 – Unauthorized access prohibited

Board’s Analysis

Employees are granted access strictly according to job duties.

Unauthorized access is a breach of trust and state security policies.

Outcome

Employee suspended and later terminated

Mandatory security training required for all department staff

Internal audit initiated to check for similar breaches

Key Lesson

Access is role-specific; exceeding it can result in serious disciplinary action.

Case 2: Data Breach Due to Poor Security Practices

Issue

A state agency suffered a data breach because of inadequate cybersecurity controls.

Facts

Sensitive citizen information was exposed via unencrypted databases.

No multi-factor authentication (MFA) was implemented.

Rules Applied

NAC 242.150 – Security standards for state information systems

NAC 242.160 – Protection of sensitive data

Board’s Analysis

Agencies are required to implement safeguards to prevent unauthorized access.

Failure to follow minimum security standards constitutes a violation of NAC 242.

Outcome

Agency fined

Required to implement encryption, MFA, and staff cybersecurity training

Periodic security audits mandated

Key Lesson

Data security standards must be actively maintained to avoid breaches and penalties.

Case 3: Misuse of State Information Systems for Personal Gain

Issue

An employee used state IT resources to conduct private business.

Facts

Employee ran a side business using state computers and network.

Monitored logs revealed off-hours activity unrelated to work duties.

Rules Applied

NAC 242.220 – Prohibition on personal use of state information services

NAC 242.200 – Authorized use limitations

Board’s Analysis

Use of state resources for personal benefit violates trust and administrative rules.

Even if personal use did not cause direct financial harm, it constitutes misuse.

Outcome

Employee reprimanded

Required to reimburse costs related to resource use

Access privileges restricted pending compliance review

Key Lesson

State IT resources are for official purposes only; misuse is subject to discipline.

Case 4: Failure to Report Security Incidents

Issue

An agency employee did not report a ransomware attempt affecting state servers.

Facts

Suspicious activity detected by colleagues but not escalated.

Delay in reporting allowed partial system encryption and service disruption.

Rules Applied

NAC 242.170 – Incident reporting requirements

NAC 242.160 – Safeguarding data

Board’s Analysis

Prompt reporting is required to mitigate damage.

Failure to report a security incident is treated as negligence under NAC 242.

Outcome

Employee received formal reprimand

Agency required to revise incident response procedures

Mandatory cybersecurity awareness training for all staff

Key Lesson

Incident reporting is critical; delays exacerbate risks and liability.

Case 5: Unauthorized Software Installation

Issue

Employee installed unauthorized software on state servers.

Facts

Software contained vulnerabilities and was not approved by ITSD.

Installation created security gaps that could have exposed sensitive information.

Rules Applied

NAC 242.210 – Prohibition of unapproved software

NAC 242.150 – Security and system integrity standards

Board’s Analysis

Agencies must control software installations to prevent malware or system compromise.

Unauthorized installations violate both security and operational rules.

Outcome

Employee suspended

Unapproved software removed

Agency instructed to enforce stricter change management controls

Key Lesson

All software installations on state systems require formal approval to maintain security.

Case 6: Sharing State Data with External Parties Without Authorization

Issue

Agency staff shared confidential citizen data with contractors without proper authorization.

Facts

Personal data, including addresses and social security numbers, was transmitted to a private vendor.

No data sharing agreement or approval from ITSD was obtained.

Rules Applied

NAC 242.160 – Confidentiality and protection of information

NAC 242.230 – Third-party data sharing controls

Board’s Analysis

Unauthorized data sharing exposes citizens to identity theft and breaches trust.

Any external sharing requires proper contracts and approvals.

Outcome

Staff reprimanded

Vendor required to return or securely destroy data

Policy review and mandatory compliance training

Key Lesson

External data sharing requires authorization and protective measures.

Case 7: Negligent Handling of Access Credentials

Issue

Employee lost login credentials, allowing potential unauthorized access.

Facts

Login credentials written on a sticky note left at workstation.

Could have been used to access sensitive state databases.

Rules Applied

NAC 242.150 – Security and password management

NAC 242.200 – Authorized access rules

Board’s Analysis

Negligent handling of credentials violates minimum security standards.

Preventive measures, such as secure password storage, are required by NAC 242.

Outcome

Employee retrained on credential security

Agency implemented stricter password and access policies

Incident logged for monitoring

Key Lesson

Credential security is essential; negligence can have serious consequences.

Overall Themes from NAC 242 Cases

Authorized use only: Employees must only access systems and data needed for their role.

Data security and confidentiality: Protecting sensitive information is mandatory.

Incident reporting and mitigation: Prompt reporting prevents escalated damage.

System integrity: Unauthorized software and credential mismanagement are violations.

Personal use restrictions: State IT resources are strictly for official purposes.

LEAVE A COMMENT