TITLE 59: MENTAL HEALTH
CHAPTER I: DEPARTMENT OF HUMAN SERVICES
PART 109 INDIVIDUALS ACCESS TO SERVICES
SECTION 109.30 PROCEDURES
Section 109.30 Procedures
a) General Provisions
1) The facility director shall be responsible for implementing this Part. He or she may restrict the possession or use of computers, peripherals, modems, CDs, disks, software, or other equipment used with the computer for all individuals in a facility, when necessary to protect an individual or others from harm, provided that notice of such restriction shall be given to all individuals upon admission. If it becomes necessary to restrict individuals who did not receive notice of the restriction upon admission, the professional responsible for overseeing implementation of an individual's services plan may, with the approval of the facility director, restrict the right to property when necessary to protect the individual or others from harm.
2) Due to safety concerns raised by metal in the CPU or glass in the CRT monitors, the facility director may choose to limit the approved computers to laptop computers with LCD displays. If the facility director limits the type of equipment to be used, he or she will ensure that information concerning these limitations is included in notices to employees and individuals.
3) Except as provided in this Section, e-mail and internet use on State-owned computers by individuals is prohibited. Facilities are not required to provide individuals with e-mail or internet access on State-owned computers. Individuals may request to have e-mail and internet access for educational purposes only. No other e-mail and internet related uses of State-owned computers by individuals are permitted. The treatment or interdisciplinary team may deny the request if it determines that e-mail or internet access would be clinically inappropriate or that a restriction on e-mail or internet use is necessary to protect the individual or others from harm. Behaviors such as issuing written and verbal threats, obtaining personal information about other persons in order to intimidate or harass them, obtaining information about making bombs and other weapons, cyberstalking, and planning escapes from facilities will result in denial of e-mail and internet access.
4) If a facility prohibits possession of CDs by individuals while in the facility and an individual has an approved program on CD, the individual, under employee supervision, may load the program onto the computer after which the CD will be placed in personal storage until the individual is discharged. The facility shall not provide any equipment to convert any program from one format (CD) to another (disk) (see subsection (a)(1)).
b) Individual Use
2) If an individual is approved to use a computer, software that is approved includes the following:
A) Operating system (i.e., DOS, Windows, OS2);
B) Utility programs (virus checkers, file managers, defragmenters, scan disk);
C) Word processing;
D) Accessories (calculators, paintbrush, print programs);
E) Games that the individual would be authorized to play on the unit, such as solitaire, card games, chess, checkers, various board games, or skills development games; and
F) The treatment or interdisciplinary team must approve any additional programs that the individual wishes to use. Any software in a factory-sealed container may be presumed to contain only the software that it indicates is included.
3) The individual’s use of the computer will be determined based on clinical review and assessment, as well as the availability of space, the number of electrical outlets, and electrical devices. No extension cords or devices that multiply the number of outlets, such as outlet strips, etc., are permitted.
4) If an individual at a mental health facility uses a computer, any peripheral, power cord and/or other associated part in an attack or assault on another individual, employee, or visitor, the computer and all accompanying devices and equipment shall be confiscated and placed in personal property storage. The “Notice Regarding Restricted Rights of Individuals” form (IL 462-2004M) will be completed according to facility procedure. If an individual at a developmental disabilities facility uses a computer related item to harm or attempt to harm another person, the computer will be removed from the individual until the interdisciplinary team meets (within 3 working days) to determine the programmatic action warranted. The “Notice Regarding Restriction of Rights of an Individual” form (IL 462-2004D) and SODC Operations “Supplemental Report On the Use of Restraints and/or Emergency Behavior Intervention Procedures” are to be completed if an individual’s computer is restricted and the forms processed in accordance with the developmental disabilities facility’s procedures for processing documents.
5) If an individual inappropriately uses a computer, the treatment or interdisciplinary team may restrict his or her use of the computer until the treatment or interdisciplinary team meets to determine the programmatic action warranted.
6) The treatment or interdisciplinary team shall keep a record of the equipment and software that each individual is authorized to use. At least annually, there shall be an inventory of all individuals’ rooms to ensure compliance. There may be random checks of what software is loaded onto each individual’s computer. Any unauthorized software programs shall be deleted. The continued presence of unauthorized software or providing software to other persons may result in the restriction of the use of the computer.
7) Computers are approved for the individual’s personal use. Allowing another individual to use a computer or using the computer to obtain personal gain from other individuals is a violation that can result in restrictions on the use of the computer.
c) Use of Disks
1) Individuals may purchase blank disks or software approved in accordance with subsections (b)(1) and (2) through a facility commissary or through the facility at a local store. If individuals are sent blank disks or software approved in accordance with subsections (b)(1) and (2), they must be in a factory sealed container. If they are not in a factory sealed container, they are to be treated as “computer disks from others” (see subsection (c)(3)).
2) When an individual has been approved to use a computer, he or she may wish to send and receive correspondence from his or her attorney on computer disk. The facility shall send a letter to the individual’s attorney explaining that correspondence may be sent to the individual on computer disk, provided the attorney certifies, with each computer disk, that it only contains documents relating to that legal representation.
3) Computer disks coming to the individual shall be examined (except for disks sent to or from the individual’s attorneys) and the documents on some or all of the disks will be reviewed. If unauthorized contraband material is present, those disks (and all other disks from that same person) could be restricted with the appropriate restriction of rights. Outgoing computer disks shall not be examined, impeded or censored unless the facility director makes an individual determination that it is necessary to protect the individual or others from harm, harassment or intimidation.
4) For security reasons, the facility director may restrict all disks coming to or from persons or organizations outside the facility, except for those disks coming to or from attorneys corresponding with individuals. The treatment or interdisciplinary team, with the facility director’s approval, may restrict disks coming to or from an individual when necessary to protect the individual or others from harm, except for those disks coming to or from the individual’s attorney.