Section 68IAC2-6.5-6. Verification  


Latest version.
  •    (a) Each SSEGS or SHEGS must employ a verification mechanism that automatically, on a time interval approved by the commission and on demand, authenticates with a server all critical files including, but not limited to, the following:

    (1) Control programs residing on a player terminal connected to the system.

    (2) Data libraries residing on a player terminal connected to the system.

    (3) Any other file residing on the server or player terminals that, as determined by the commission, may influence the operation and calculation of:

    (A) game play;

    (B) game display;

    (C) game result determination;

    (D) game accounting;

    (E) revenue; or

    (F) security.

      (b) A report shall be available that details the verification results for each control program component on both the server and the player terminals. (Indiana Gaming Commission; 68 IAC 2-6.5-6; filed Aug 18, 2011, 11:38 a.m.: 20110914-IR-068100675FRA; readopted filed Nov 26, 2013, 3:58 p.m.: 20131225-IR-068130354RFA)