laptop and phone

The DFPS Office of Information Security (OIS) takes defending our organization, its data, system, and reputation from cyber criminals seriously as part of the DFPS mission to protect the unprotected. The duty of the DFPS Office of Information Security, as required by state law, is to protect the confidentiality, integrity, availability, and accountability of the Agency’s information technology resources for a safe and secure computing environment.

Working with DFPS

Contractors and partners who work with the Department of Family and Protective Services must adhere to the following cybersecurity requirements:

Reporting Security Incidents to DFPS

The DFPS Office of Information Security provides secure means for our partners to report incidents, phishing attempts, malware, and vulnerabilities directly to the Security Team.

What is a Security Incident?

A security incident is any attempted or actual unauthorized access, use, disclosure, modification, or destruction of information. This includes interference with information technology operation and violation of DFPS policy, state laws or regulations.

Examples of security incidents include:

  • Computer or information technology (IT) system breach
  • Unauthorized access to, or use of, systems, software, or data
  • Unauthorized changes to systems, software, or data
  • Loss or theft of equipment storing DFPS data
  • Denial of service attacks
  • Interference with the intended use of IT resources
  • Compromised user accounts

What Do We Need from You?

Report actual or suspected security incidents as early as possible so that DFPS can limit the damage and cost of recovery.

Some incidents must be reported to DFPS Office of Information Security within 24-hours of discovery, like incidents that include social security administration data or criminal history data supplied by DFPS.

Include specific details regarding the system breach, vulnerability, or compromise of your information system, and we will respond with a plan for further containment and mitigation.

How Do You Report a Security Incident?

You may report an incident online, by email, or by telephone.

Cybersecurity incident notifications will be treated as confidential under Texas Government Code 552.139, Confidentiality of Government Information Related to Security or Infrastructure Issues for Computers.

Cybersecurity Training for DFPS System Access

To mitigate cybersecurity threats and risks in state government contracting, the 86th Legislature passed House Bill 3834, which requires contractors and their subcontractors, officers, or employees who have access to state computer systems or databases to complete cybersecurity training through Department of Information Resources (DIR). Contractors are required to adhere to cybersecurity training requirements for the term of their contract, including any renewal periods, and certify that required personnel and subcontractors have completed the training.

DIR certified cybersecurity training is required when the contractor's personnel and subcontractors have access to any DFPS information systems, networks, or resources.

To obtain a list of DIR certified trainings, visit the DIR Website.

Note: DFPS contracted employees who augment fulltime staff will satisfy cybersecurity training requirements through training with the DFPS Office of Information Security.

Certification of Cybersecurity Training

Contractors must complete and submit DFPS Cybersecurity Training Certification (form 4530) to attest that identified personnel and subcontractors who have access to the DFPS systems receive required cybersecurity training within the certification period.

Contractors must maintain documentation that includes:

  • Individuals who are required to take the training
  • Documentation of the completed training
  • Name of the entity who performed the training
  • Title of the cybersecurity course

All personnel who access the Vendor's Information Resources must complete cybersecurity awareness training prior to accessing Criminal Justice Information (CJI) within the first week of hire and before accessing DFPS information systems, and thereafter on an annual basis by June 30th of each calendar year. Contractors must submit the DFPS Cybersecurity Training Certification to the contract manager. The certification must be signed by your:

  • Contract signatory (or designee) or
  • Human resources director

After the DFPS Cybersecurity Training Certification is submitted, contract staff must upload the certification within 30 days of receipt into SCOR using the Cybersecurity Training dropdown option in the document library module.

Cybersecurity training documentation, as listed above, must be reviewed during scheduled administrative contract monitoring activities.

Texas Government Code §2054.5192 (b) and (c)

DFPS Cybersecurity Requirements & Resources

Data & System Security Requirements

All DFPS contracts have the following standard data and system security requirements throughout the duration of the contract:

DFPS Contractor Data and System Security Requirements

Contractors must:

  • Comply with the requirements as outlined in the document.
  • Periodically check for any updates made to the requirements and comply with any updates.
  • Periodically provide evidence of meeting the requirements.

Information Security and Privacy Controls Catalog

The DFPS Information Security and Privacy Controls Catalog provides guidance for implementing best practices in security controls. The Catalog includes requirements derived from state authority, including the Texas Department of Information Resources and state legislation, as well as Agency-specific requirements as determined by the Chief Information Security Officer in consideration of the Agency’s environment and security posture.

Center for Internet Security (CIS) Security Controls

The Center for Internet Security (CIS) is one of the top leaders in developing guidelines for protecting people, organizations, and governments from cyber threats in our continually evolving digital environment.

The CIS Controls operate as an overarching framework for individuals, corporations, and governments alike, and are comprised of 18 Critical Security Controls. Much like the NIST Cybersecurity Framework, CIS critical security controls are based on risk assessment best practices and contain guidelines to provide the appropriate maintenance, monitoring, and analysis required to secure an organization. Having its roots in risk management, the implementation of these controls is scalable for any size organization, by utilizing the respective implementation levels.

For information on CIS Controls and how to easily incorporate them into your business, refer to the DFPS External Partners CIS Security Controls document.

Secure Email and File Sharing with DFPS

Secure Email

Our job is to protect the unprotected. We use email encryption to protect your personal information and to protect our clients' well-being, safety, and privacy. Secure email is encrypted with the equivalence of an AES-256 key. Each message is signed by the sender to ensure authenticity and data security of the message.

Visit the DFPS Email Encryption page for information on how to read secure messages.

Need help? Contact DFPS Encryption Support.

File sharing

DFPS Box.com Instance

Do you need to send or receive large files in a secure manner or is your attachment too large for email? Request access to DFPS Box.com to quickly securely share and receive data.

Get Started

  1. Request access by filling out a SPARC
  2. Navigate to https://txdfpsworkspace.box.com
    1. Click ‘Continue’  
  3. Enter your organizational Single Sign-On credentials when prompted 

Attend a training session to learn more about Box features and functionality:  

Box Benefits 

With Box, you will enjoy many of the features you are used to accessing in Moveit, plus a range of additional functionality designed to protect our content and help you streamline the way you work.  

  • Upload, create, edit and save large files  
  • Share content securely with external parties, even if they don't have a Box account - eliminating the need for email attachments 
  • Manage permission settings for your content   
  • Track who has viewed your content and when, with access stats for all content 

Note: While Box.com has a full range of capabilities. DFPS will utilize this application exclusively as a secure File Transfer Protocol (FTP). Data uploaded will only be retained for 7 days and external users will have 7 days to retrieve uploaded data.

External User Information

Sending Files to DFPS

You can now submit files to our team via Box.com File Requests, which provide a secure and user-friendly upload experience. We will provide you with a unique link whenever a file request is needed. Click the link and follow the on-screen instructions. No Box account is required to upload files. However, creating a free Box account is entirely up to you and will not be managed by DFPS.

Receiving Files From DFPS

When we share files with you, you’ll receive a secure link via email from Box.com. You can preview or download the files directly from your browser. In most cases, you will not need a Box account to access the shared content.

Training & Support

To help you get started with Box.com, we recommend reviewing the following resources:

How to Upload Files via File Request

To upload files to Box via File Request as an external user, you'll need a “File Request” link from the Box owner. This link will allow you to upload files to a specific folder without requiring a Box account or login. 

Note: You may need to send an email to the DFPS recipient requesting that they send you the “File Request” link

Here's how it works: 

  1. Receive the File Request Link: The Box user who created the File Request will provide you with a unique link.
  2. Open the Link: Click the link to access the File Request form.
  3. Upload Files: You'll see a drag-and-drop area or a button to select files from your computer.
  4. Submit: Once you've uploaded the files, you'll click a submit button to finalize the upload.

Important Considerations

No Box Account Required

If you have any questions or require personalized support, please don't hesitate to contact us at the Office of Information Security (OIS) at itsecur@dfps.texas.gov. Include “Box” in the subject line.

FAQ

What is Box?

Box is the enterprise-approved cloud content management and file-sharing platform used to securely store, share, and collaborate on documents and other files.

Who is eligible for a Box account?

Box accounts are available to authorized employees based on business need and role requirements.

How do I access Box?

Step 1: Navigate to https://txdfpsworkspace.app.box.com/
Step 2: Log in using your DFPS email address and password

How often do I need to log in to keep my Box account active?

Users must log in to Box at least once per month to maintain an active account.
Accounts that are inactive for more than 30 days will be automatically deactivated.

What happens if my Box account becomes inactive?

If an account is inactive and deactivated:

  • The user will lose access to Box content.
  • Shared folders and permissions may be removed.
  • A SPARC request for restated access will be required

How do I request access to Box?

If you need access to Box, you must fill out a SPARC and request Box.

How do I regain access if I previously lost my Box account?

If you previously had Box access and lost it due to inactivity or another reason, you must submit a new access request through SPARC to have your account restored.

Can my Box access be revoked?

Yes. Box access may be revoked due to:

  • Extended inactivity
  • Role or employment status changes
  • Policy or compliance requirements
  • Security or risk concerns

Is Box monitored or audited?

Yes. Box usage may be monitored and audited to ensure compliance with enterprise security, legal, and data governance requirements.

What types of data can I store in Box?

Box may only be used to share data approved under enterprise data classification and security policies. Refer to the Accept Use Agreement (AUA) policy OP-2132 DFPS Acceptable Use Agreement (AUA) for guidance. DFPS instance of Box is for the sharing and transferring of data.

What is the retention policy of data hosted on Box?

Data will only be retained for 7 days. After the 7 day period all uploaded data will be automatically deleted. We cannot extend this retention period. Data may be reuploaded and reshared at any time.

Where can I get help with Box issues?

For training on how to utilize Box:

Step 1: Watch the user guide video
Step 2:  Navigate to Box University

  • Log in
  • Select “Getting Started with Box”

For technical issues, access problems, or questions:

Step 1: Review training resources related to Box
Step 2: Email infosec@dfps.texas.gov

Questions? 
For questions about Box, please contact the Office of Information Security (OIS) itsecur@dfps.texas.gov. Include the word “Box” in the subject field of your email, or reference support.box.com.  

Resources