Secure your public PCs against unauthorized access to court data

Securing PCs and networks is a complex and continually-evolving field.  There are specialists who focus solely on such issues.  The following advice is not guaranteed to be complete, current or accurate at all times.  Instead, it is intended as a checklist you can use to ensure that local IT staff have addressed the major issues as they secure your systems.  

Unless the court provides only green screen programs run on a dumb terminal, access to the court’s data will be via a PC.  This runs the risk of unauthorized access to the court’s data via malware such as a virus or a “keystroke sniffer”.  Therefore, such PCs should be “locked down” to make sure that nobody installs such malware.  This is the same problem faced by public libraries. 

     Securing Public Access Computers In a Library Setting, by Andrew Sipper (available here) [555] is a good whitepaper detailing some of the necessary steps:

Read the above-referenced whitepaper for details on these issues.

Ideally, the PC would be set up with nothing more than a browser that can only access judici.com.   This will prevent people from tying up the PC with tasks like getting their e-mail (which might very well contain viruses).  This can be done in the PC’s operating system and/or its browser, as well as in your network.  Contact local IT staff for guidance on doing this with your specific systems and network.

If you must use PC JIMS or a green screen for access, make sure to limit the capabilities of the associated iSeries400 user ID by configuring it to the public access, State’s Attorney or sheriff's menu. Contact GAL if you have questions on how to do this.