An Official Website of the Commonwealth of Kentucky
Voice-over-IP ServiceVC60$20 / Per handset / Month
Voice-over-IP Service Description Here.
Long Distance MinutesVC50$0.10 / Per Minute
Long Distance Minutes Description Here
Telephone Equipment MaintenanceVC40$85 / Hour
Telephone Equipment Maintenance Description Here
Local Telephone LineVC10$37 / Per Centrex Line / Month
Local Telephone Line Description Here
Application Development and SupportCS10$110 / Hour
COT provides a wide array of application services and supports a variety of platforms including application design, programming, analysis, support and maintenance, developing customized solutions, supporting and maintaining Commercial Off The Shelf (COTS) applications, application modernization services, integration with existing systems, data conversions, data warehousing, report and dashboard development, web services, batch job scheduling, testing, and training.
Disaster Recovery ServicesNot Rated
Disaster Recovery Services provides restoration of Agency mission-critical applications in the event of a declared disaster.
Project ManagementCS20$100 / Hour
COT provides project management consulting services to match your business needs. Our services include new project startup, program/project assistance, independent assessment, and providing project management personnel to Commonwealth cabinets and agencies. Our project management professionals are well-versed in multiple methodologies and will help to minimize cost and risks in executing strategic plans and roadmaps. We keep project information organized and secure by leveraging enterprise portfolio program management tools and platform to store the required project documentation and for everyday management of the project, while ensuring that project deliverables are risk managed, effectively budgeted, and delivered in a timely manner. In addition to this, we offer business case analysis, project portfolio assessment, project tracking and oversight, project debrief, and application portfolio assessment for Capital IT Projects and IT Projects involving multiple cabinets and agencies. No project is too big or too small.
Messaging Support ServicesMB10$5 / Per Mailbox / Month
COT provides comprehensive administration, management, security, and support for a variety of messaging-related applications, services, and infrastructure. MB10 includes administration and support for all enterprise mailboxes (user, resource, and shared mailboxes), Exchange on-premise, SMTP relay, Exchange Online, Microsoft Teams, OneDrive, Office 365 web applications, email encryption, Multi-factor Authentication (MFA), Office 365 tenant administration, email distribution lists, mail-enabled security groups, Proofpoint, and Lyris.
Office 365 G3 and Enterprise Mobility + Security (EMS) LicensingMB20$34 / Per Licensed Mailbox / Month
COT provides Office 365 G3 and EMS licensing for the Commonwealth’s Microsoft 365 Government (GCC) tenant. Office 365 G3 subscribers are provided access to all Microsoft online applications, features and services hosted in the Commonwealth’s Office 365 tenant as well as entitlements to other Microsoft applications such as the latest desktop version of the Microsoft’s Office Suite. The Commonwealth’s Office 365 tenant is hosted in Microsoft’s Government environment and complies with US government requirements for cloud services, including FedRAMP Moderate, and requirements for criminal justice and federal tax information systems (CJI and FTI data types).
Client Computing - Standard DesktopCC10$60 / Month
This rated service is applicable to agencies that participate in the Commonwealth Office of Technology's managed client support services. The CC10 service model is tailored toward standard desktop computers. This rated service applies to hardware standards for desktops as defined in the rated service description. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - CARES Laptop (Limited Quantity and Time)CC19$60 / Month
This rated service is applicable to agencies that particpate in the Commonwealth Office of Technology's managed client support services. CC19 is tailored toward a standard laptop bundle.(Limited quantity and Time) . This rated service applies to hardware standards for laptops as defined in the rated service description. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - Standard LaptopCC20$63 / Month
This rated service is applicable to agencies that particpate in the Commonwealth Office of Technology's managed client support services. CC20 is tailored toward a standard laptop. This rated service applies to hardware standards for laptops as defined in the rated service description. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - Standard Laptop BundleCC30$70 / Month
This rated service is applicable to agencies that participate in the Commonwealth Office of Technology's managed client support services. CC30 is tailored towards a standard laptop bundle. This rated service applies to hardware standards for laptop bundles as defined in the rated service description. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - Developer DesktopCC40$65 / Month
This rated service is applicable to agencies that participate in the Commonwealth Office of Technology's managed client support services. CC40 is tailored toward a developer desktop. COT offers a managed developer desktop service for agencies to help meet their software development needs for their agency. This rated service applies to hardware standards for Developer desktops as defined in the rated service description. Agencies enrolling in this rated service are bound to the full term commitment of the hardware or may be subject to early termination\restocking fees. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - Developer Laptop BundleCC45$95 / Month
This rated service is applicable to agencies that participate in the Commonwealth Office of Technology's managed client support services. The CC45 service model is tailored toward a developer laptop bundle. COT offers a managed developer laptop service for agencies to help meet their software development needs for their agency. This rated service applies to hardware standards for Developer laptops as defined in the rated service description. If agencies elect to upgrade hardware beyond the standard CC45 service, they will be moved into the appropriate rated service tier that meets the hardware requirements. Agencies enrolling in this rated service are bound to the full term commitment of the hardware or may be subject to early termination\restocking fees. *All current hardware inventory must be depleted before new hardware is ordered.
Client Computing - Tablets and Non-Standard Enhanced DevicesCC80$80 / Month
This rated service is applicable to agencies that participate in the Commonwealth Office of Technology's managed client support services. The CC80 service model is tailored toward Windows based tablets but will also include devices that are non-standard and go above the cost of the other rated services. The customer will incur a pass-through charge for the different between the rate and the cost of the device. Agencies enrolling in this rated service are bound to the full term commitment of the hardware or may be subject to early termination\restocking fees. Non-standard enhanced devices will be approved on a case by case basis. *All current hardware inventory must be depleted before new hardware is ordered.
20" MonitorCM10$1 / Month
The CM10 service model accommodates a standard desktop 20" monitor.
24" MonitorCM20$3 / Month
The CM20 service model accommodates a standard desktop 24" monitor.
Virtual Application ServicesCX10$30 / Per User / Month
Placeholder for Virtual Application Services rate description here
Virtual Desktop (VD)VD10$48 / Per VD / Month
Place holder for Virtual Desktop rate description
Virtual Desktop (VD) Additional CPUVD20$5 / Per VD / Month
Place holder for VD Addl CPU rate description
Virtual Desktop (VD) Additional 2GB RAMVD30$3 / Per 1GB RAM / Month
Placeholder for VD Addl 1GB RAM rate description
Printed PagesCP10$4 / 100 Pages
The CP10 Rated Service provides a Mainframe and Distributed Systems output print solution for all Commonwealth agencies. The CP10 rate is six cents per page or $6.00 per 100 pages. A page is understood to be a single printed side of one document sheet. Included stock sizes are standard letter, three hole punch letter, and standard legal. Limited color print is also included in the rate. Any questions should be directed to the Branch at COTBatchFormsSupport@ky.gov.
Database AdministrationCS30$90 / Hour
Consulting services, including, but not limited to, database support, network support, consultative support, and other hourly support needed that is not covered under a rated service
Out-of-Scope Client Computing SupportCS40$50 / Hour
Out-of-Scope Desktop Support provides agencies with access to COT Field Services support staff on an hourly billable basis. This rate can be applied to a large number of IT field support services that are not already included in another COT rated service.
Security ConsultingCS50$70 / Hour
Placeholder for Security Consulting rate description
Network Connectivity 0-25 Mb/sDC10$275 / Per Circuit / Month
Placeholder for Network Connectivity 0-25 Mb/s rate description
Network Connectivity >25 Mb/sDC30$725 / Per Circuit / Month
Placeholder for Network Connectivity >25 Mb/s rate description
Network Connectivity - < 5 staff (non-state NW)DC20$100 / DC- Kiosk / Month
Placeholder for Network Connectivity - < 5 staff (non-state NW) rate description
Network Connectivity - Non-TraditionalDC40$420 / Per Line / Month
Placeholder for Network Connectivity - Non-Traditional rate description
Application FirewallFW20$7,500 / Per Firewall / Month
Placeholder for Application Firewall rate description
Wireless Access Point (WAP)DW10$55 / Per WAP / Month
Placeholder for for Wireless Access Point rate description
Network SwitchLN10$65 / Per 24 Ports / Month
Placeholder for Network Switch rate description
External Secure ConnectionVP10$3 / Per Account / Month
Placeholder for External Secure Connection rate description
Dedicated Network VPN Tunnel Site-to-SiteVP50$500 / Per Account / Month
Placeholder for Dedicated Network VPN Tunnel Site-to-Site rate description
Linux Virtual Machine (VM) Server LX10$500 / Per Oracle VM / Month
Rate description for Linux Virtual Machine (VM) Server includes DBAs rate description
Linux Additional CPU (1)LX20$300 / Per VM CPU / Month
Placeholder for Extra Linux CPU (1) rate description
Linux Additional RAM (1 GB)LX30$40 / Per 1 GB RAM / Month
Placeholder for Linux Additional RAM (1) rate desription
Mainframe CPU Cycles (1st and 2nd Shift)MN10$2,000 / Per CPU / Hour
Placeholder for Mainframe CPU Cycles (1st and 2nd Shift) rate description
Mainframe Online Transactions (non-CICS)MN20$42 / Per CPU / Minute
Placeholder for Mainframe Online Transactions (non-CICS) rate description
Mainframe Online Transactions (CICS)MN40$48 / Per CPU / Minute
Placeholder for Mainframe Online Transactions (CICS) rate description
Wintel SQL Virtual Machine (VM) ServerSQ10$200 / Per Server / Month
Placeholder for Wintel SQL Server includes DBAs
Wintel SQL VM Additional CPU (1)SQ20$20 / Per CPU / Month
Placeholder for VM Server Add On rate description
Wintel SQL VM Additinal RAM (2 GB)SQ30$6 / Per 2GB RAM / Month
Placeholder for Wintel SQL VM Additinal RAM (2 GB) rate description
Unix ServerUX10$550 / Per LPAR / Month
Placeholder for Unix Server rate description
Unix Server Additional RAM (2 GB)UX30$30 / Per 2GB RAM / Month
Placeholder for Unix Server Additional RAM (2 GB) per month
Unix Server Additional CPU (1)UX40$45 / Per CPU / Month
Unix Server Additional CPU (1) Rate Description
Wintel Server - PhysicalWN10$400 / Per Server / Month
Placeholder for Wintel Server - Physical rate description
Wintel Server - Domain ControllerWN40$240 / Per Server / Month
Placeholder for Wintel Server - Domain Controller rate description
Wintel Server - Virtual (VM)WN50$100 / Per Server / Month
Placeholder for Wintel Server -Virtual
Wintel Server VM Additional RAM (2 GB)WN60$6 / Per 2GB RAM / Month
Placeholder for Wintel Server VM Additional RAM (2 GB) rate description here
Wintel Server VM Additional CPU (1)WN70$11 / Per CPU / Month
Placeholder for Wintel Server VM Additional CPU (1) rate description
Disaster Recovery (DR) Linux VM ServerLX15$500 / Per Server / Month
Rate description for Disaster Recovery (DR) Linux VM Server
Disaster Recovery (DR) Linux VM Additional CPU (1)LX25$300 / Per CPU / Month
Disaster Recovery (DR) Linux VM Additional CPU (1) Rate Description
Disaster Recovery (DR) LinuxOne VM Additional RAM (1 GB)LX35$40 / Per 1 GB RAM / Month
Disaster Recovery (DR) LinuxOne VM Additional RAM (1 GB) Rate Description
Disaster Recovery (DR) Wintel SQL ServerSQ15$200 / Per Server / Month
Disaster Recovery (DR) Wintel SQL Server (+DBA) Rate Description
Disaster Recovery (DR) Wintel SQL Server Additional CPU (1)SQ25$20 / Per CPU / Month
Disaster Recovery (DR) Wintel SQL Server Additional CPU (1) Rate Description
Disaster Recovery (DR) Wintel SQL Server Additional RAM (2 GB)SQ35$6 / Per 2GB RAM / Month
Disaster Recovery (DR) Wintel SQL Server Additional RAM (2 GB) Rate Description
Disaster Recovery (DR) Unix ServerUX15$550 / Per Server / Month
Disaster Recovery (DR) Unix Server Rate Description
Disaster Recovery (DR) Unix LPAR Additional RAM (2 GB)UX35$30 / Per 2GB RAM / Month
Disaster Recovery (DR) Unix LPAR Additional RAM (2 GB) Rate Description
Disaster Recovery (DR) Unix LPAR Additional CPU (1)UX45$45 / Per CPU / Month
Disaster Recovery (DR) Unix LPAR Additional CPU (1) Rate Description
Disaster Recovery (DR) Wintel - Virtual (VM) ServerWN55$100 / Per Server / Month
Disaster Recovery (DR) Wintel - Virtual (VM) Server
Disaster Recovery (DR) Wintel VM Additional RAM (2 GB)WN65$6 / Per 2GB RAM / Month
Disaster Recovery (DR) Wintel VM Additional RAM (2 GB)
Disaster Recovery (DR) Wintel VM Additional CPU (1)WN75$11 / Per CPU / Month
Disaster Recovery (DR) Wintel VM Additional CPU (1)
Mainframe StorageST10$0.0080 / Per MB / Month
Mainframe Storage (ST10) Rate Description
Mainframe Tape StorageST30$0.0006 / Per GB / Month
Mainframe Tape Storage (ST30) Rate Description
Mainframe Report StorageST40$2.50 / Per LPAR / Month
Mainframe Report Storage ST40 Rate Description
Open Systems Solid State Storage (Block Storage)ST60$0.15 / Per GB / Month
Open Systems Solid State Storage (Block Storage) Rate Description
Open Systems Storage (File Storage)ST80$0.12 / Per GB / Month
Open Systems Storage (File Storage) Rate Description
Open Systems BackupsST90$0.07 / Per GB / Month
Open Systems Backups Rate Description
Archive StorageST85$0.05 / Per GB / Month
Storage Archive Rate
Forensic StorageFS10$1 / Per GB / Month
Forensic Storage (FS10) Rate Description
27" MonitorCM27$5 / Month
The CM27 service model accommodates a standard desktop 27" monitor.
Describes responsibilities and processes regarding the procurement, ownership and tracking of information technology (IT) assets.
Policy
Prepare for and react to threats to the Commonwealth’s network and information systems at the agency level.
Standards
Establishes the standards for the development and maintenance of Kentucky Information Technology Standards (KITS). This policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Describes the responsibilities and procedures to be followed when requesting access to IT equipment room areas at the Commonwealth Data Center.
Outlines the responsibilities and procedures to be followed when equipment is installed in or removed from the Commonwealth Data Centers.
Defines and outlines acceptable use of Commonwealth enterprise IT resources.
Defines and outlines acceptable use of social media.
Defines deployment and acceptable use of wireless devices within the Executive Branch of state government.
Provides guidance in decision-making and practices to mitigate risk, protect the privacy, security, confidentiality, and integrity of the Commonwealth of Kentucky resources and data, and prevent unauthorized access to such resources.
Helps protect computing devices (servers, desktops, laptops and tablets) from malware (viruses, Trojans, worms, hoaxes, etc.).
In order to better protect and secure the resources of the state computing environment, it is necessary to enhance the Enterprise Network Security Architecture and segregate resources and types of activities.
The administration of firewalls and virtual private networks (VPN) is a primary component in securing the infrastructure and must conform to this policy.
Outlines security and data integrity measures required for secure wireless LAN installations within the state's intranet zone.
Provides procedures for cabinets/agencies to follow when requesting e-mail review documentation.
Ensure the establishment of a formal communications link between COT and the organizational entities that use COT services.
Identifies the necessity and procedures for agencies and COT to identify and notify appropriate personnel when a security incident occurs.
This policy has been created to align the Commonwealth's Enterprise Information Security Program with the security framework of the current National Institute of Security Standards (NIST) Special Publication 800-53.
Ensures proper provisions are in place to protect information stored on media, both digital and non-digital, throughout the media's useful life until its sanitization or destruction.
Ensures proper application of risk management principles through proactive risk identification, management and acceptance pertaining to information technology activities. It also identifies the family of controls for Risk Assessment as defined in NIST Special Publication 800-53.
Establishes controls for the effective management of changes to IT systems.
Establishes the responsibilities for addressing technology in sunset status. Due to high support costs and increased security risks incurred through continuing use of out-of-support or "sunset" software that is non-compliant with the Commonwealth's Information Technology Standards, this policy is to establish appropriate cost recovery charges, in addition to normal services charges, when agencies continue to employ such software.
Establishes controls related to the management of information technology (IT) projects within the executive branch of the Commonwealth. The controls provides guidance in decision-making and practices that optimize resources, mitigate project risk, and maximize return on investments.
Provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment while also addressing purpose, scope, and compliance.
Establishes a COT Enterprise System and Information Integrity for managing risks from system flaws, vulnerabilities, malicious code, unauthorized code changes, and inadequate error handling through the implementation of an effective system and information integrity program.
Provides a structured set of principles for protecting privacy and serves as a roadmap for agencies to use in identifying and implementing privacy principles for the entire life cycle of Personal Information (PI), whether in paper or electronic form.
Provides a structured set of principles for Enterprise Managed Print Services (MPS). The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investments.
Establishes controls related to Commonwealth Office of Technology (COT) Enterprise requirements for Proof of Concept (POC) and Pilot Projects.
Establishes controls related to Enterprise Data Management. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls addressing the approach to software development. The controls provide guidance in decision-making and practices that optimize resources, mitigate risk and maximize return on investments.
Establishes controls related to security planning. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to Contingency Planning. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to maintenance of the Commonwealth of Kentucky’s information systems. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to Physical and Environmental Protection. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to Personnel Security. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to System and Services Acquisition. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to system and communications protection. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to audit and accountability. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to security assessment and authorization. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to security awareness and training. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to enterprise document management, including associated standards and supporting guidelines. The policy's chief focus is the creation of executive branch agency-specific Document Management Plans.
Establishes controls related to identification and authentication. The policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment.
Establishes controls related to physical access to the Commonwealth Asset Warehouse. This policy provides guidance in decision-making and practices that optimize resources, mitigate risk, and maximize return on investment. Specifically, the policy ensures physical access is reviewed and implemented in a rational and predictable manner to increase efficiency and minimize the impact of change-related incidents upon service quality.
Defines the classification scheme for public records and outlines data handling requirements throughout the lifecycle of data. It also provides recommended sample disclaimers for use when storing and transferring data of various classifications.
Defines how data is identified, classified, labeled, and properly handled and protected in accordance with its importance and potential impact to the Commonwealth.
These standards apply to all executive branch agency digitization (scanning) efforts; i.e., converting physical documents into a digital format.
Details the security controls that COT’s Office of the CISO requires for information systems and activities for the Commonwealth of Kentucky. COT established this security framework using the moderate-level controls outlined in NIST Special Publication 800-53 Rev 5.
Supports the CIO-060 Acceptable Use Policy and the CIO-061 Social Media Policy, and requires the same compliance as the policies.
These guidelines and best practices provide specific guidance regarding agency digitization (scanning) efforts, addressing each element of an agency's Digitization Plan.
These guidelines and best practices provide guidance regarding appropriate use of storage platforms, as part of proper document handling on the Commonwealth’s IT systems.
Describes how EIM operates, as well as how it affects Agency request procedures for creating, modifying, and removing basic user identities.
Whether you are seeking more information or need help with this service, we are here to answer all your questions.
Chief Information OfficerCommonwealth Office of Technology
Deputy Chief Information OfficerCommonwealth Office of Technology
Special Assistant-FinancialCommonwealth Office of Technology
Chief Compliance OfficerCommonwealth Office of Technology
Contracting OfficerCommonwealth Office of Technology
Budgeting & Financial Branch
Privacy & Audit Support Branch
Executive Directornone
Directornone
ManagerEdge Network Management Branch
ManagerCore Network Operations Branch
ManagerVoIP & Facilities Engineering Branch
VoIP & Facilities Engineering Branch
none
Disaster Recovery CoordinatorOffice of Infrastructure Services
Edge Network Management Branch
Core Network Operations Branch
ManagerDatabase Administration Branch
Database Administration Branch
Chief Information Security Officernone
Deputy Information Security Officernone
ManagerSecurity Administration Branch
(TL)Security Administration Branch
Security Administration Branch
ManagerEnterprise Field Services Branch
(TL)Enterprise Field Services Branch
Enterprise Field Services Branch
(SV)Enterprise Field Services Branch
ManagerEnterprise Operations & Monitoring Branch
Geographic Information Officernone
Division of Geographic Information Systems
ManagerUI Systems Branch
UI Systems Branch
ManagerStorage/UNIX/Linux Branch
Storage/UNIX/Linux Branch
Production Services Branch
ManagerWintel Services Branch
Wintel Services Branch
ManagerPrinting Services Branch
Printing Services Branch
ManagerRisk Management Branch
Risk Management Branch
ManagerForensics Investigations Branch
Forensics Investigations Branch
ManagerDirectory Services Branch
Directory Services Branch
ManagerSecurity Monitoring & Response Branch
Security Monitoring & Response Branch
ManagerField Services East Branch
(SV)Field Services East Branch
Field Services East Branch
(TL)Field Services East Branch
ManagerField Services North Branch
(SV)Field Services North Branch
(TL)Field Services North Branch
Field Services North Branch
ManagerField Services South Branch
(SV)Field Services South Branch
Field Services South Branch
Field Services West Branch
ManagerField Services West Branch
(SV)Field Services West Branch
ManagerAsset Management Branch
Asset Management Branch
ManagerCommonwealth Service Desk Branch
(SV)Commonwealth Service Desk Branch
Commonwealth Service Desk Branch
(SV)Enterprise Operations & Monitoring Branch
Enterprise Operations & Monitoring Branch
ManagerFinance Cabinet Systems Branch
Finance Cabinet Systems Branch
Acting ManagerKYTC Systems Branch
(TL)KYTC Systems Branch
KYTC Systems Branch
ManagerProduction Services Branch
(TL)Production Services Branch
ManagerMessaging Platforms Branch
Messaging Platforms Branch
Branch ManagerCollaboration & Document Mgmt Branch
Collaboration & Document Mgmt Branch
ManagerData & Business Intelligence Branch
Data & Business Intelligence Branch
ManagerApplication Development & Integration Branch
Application Development & Integration Branch
(TL)Application Development & Integration Branch
Project Management Branch
ManagerProject Management Branch
ManagerEnterprise Standards Branch
Enterprise Standards Branch
ManagerChange Management Branch
Change Management Branch
Special AssistantOffice of the Chief Information Security Officer
Reports directly to Kalem Juettnone
Assistant DirectorDivision of Field Services
(SV)Asset Management Branch
Assistant DirectorDivision of Support Services
Executive Staff AdvisorOffice of Architecture & Governance
Special AdvisorCommonwealth Office of Technology
Other Messaging Services All Services