FMX Home
Glenn Hegar  ·  Texas Comptroller of Public Accounts

Fiscal Management Agency Contacts Update Process

FPP C.021

How to Appoint a Security Coordinator

The chief fiscal officer or next highest appropriate person of each agency or institution must email the Comptroller’s Access Management team at security.requests@cpa.texas.gov to appoint a security coordinator and backups.

Requirements

The appointed security coordinators must:

  • Be directly employed by the agency or institution as a full-time equivalent (FTE)
  • Have a good understanding of segregation of duties
  • Have access to your agency subject matter experts/managers for access questions and approvals
  • Attend the Security Coordinator Administration webinar within the first 90 days of being appointed

The following information must be included for the appointee(s):

  • Employee’s name
  • Comptroller-assigned user ID (or submit a request to create the new user ID)
  • Telephone number
  • Email address
  • Name of the security coordinator being replaced, if applicable
  • A complete list of all active security coordinators for the agency or institution reflecting the change(s)

Security Coordinator Duties

Security coordinators need to:

  • Become familiar with the data privacy and safeguard rules and security coordinator responsibilities contained in the Texas Administrative Code
  • Obtain a signed Confidential Treatment of Information Acknowledgement (CTIA) form before requesting user access to the statewide systems (Copies must be kept on file for five years after the user’s termination date)
  • Submit requests to the Comptroller’s office to authorize or change access
  • Submit requests for removal/inactivation of access for a user ID when the user terminates employment, transfers to another state agency or no longer requires access — such requests must be made in a timely manner (preferably no later than the user’s last day of performing their duties)
  • Reactivate user IDs and passwords for users within the security coordinator’s scope of authority
  • Revoke user IDs and passwords as necessary
  • Certify that the agency records are up to date through a semiannual security verification process
  • Serve as the point of contact when a security incident occurs
  • Keep the security coordinator’s own user ID active
Glenn Hegar
Texas Comptroller of Public Accounts
Questions? Contact statewide.accounting@cpa.texas.gov
Comptroller.Texas.Gov | FMX
FMX Sitemap | Contact FM
Accessibility Policy | Privacy and Security Policy