Laserfiche WebLink
Special Terms and Conditions <br />(1) Ensuring mitigations applied to the system don't allow end-user modification. <br />(2) Not allowing the use of dial-up connections. <br />(3) Using industry standard protocols and solutions for remote access. Examples would include <br />RADIUS and Citrix. <br />(4) Encrypting all remote access traffic from the external workstation to Trusted Network or to a <br />component within the Trusted Network. The traffic must be encrypted at all times while <br />traversing any network, including the Internet, which is not a Trusted Network. <br />(5) Ensu ring that th e re m ote access system prompts for re-authentication or performs automated <br />sessi on termina tion after no more t hem 30 minutes of inactivity. <br />(6) Ensuring use of Multi-factor Authentication to connect from the external end point to the internal <br />end point. <br />i. Passwords or PIN codes may meet a lesser standard if used in conjunction with another <br />authentication mechanism, such as a biometric (fingerprint, face recognition, iris scan) or token <br />(software, hardware, smart card, etc.) in that case: <br />{1) The PIN or password must be at least 5 letters or numbers when used in conjunction with at <br />least one other authentication factor <br />(2) Must not be comprised of all the same letter or number (11111, 22222, aaaaa, would not be <br />acceptable) <br />(3) Must not contain a "run" of three or more consecutive numbers (12398, 98743 would not be <br />acceptable) <br />j. If t he contract specifically all ows for the storage of Confidential Information on a Mobile Device, <br />passcod es used on the device m ust: <br />{1) Be a minimum of six alphanumeric characters. <br />(2) Contain at least three unique character classes (upper case, lower case, letter, number). <br />(3) Not contain more than a three consecutive character run. Passcodes consisting of 12345, or <br />abed 12 would not be acceptable. <br />k. Render the device unusable after a maximum of 10 failed logon attempts. <br />5. Protection of Data. The Contractor agrees to store Data on one or more of the following media and <br />protect the Data as described: <br />a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be <br />restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID <br />and Hardened Password or other authentication mechanisms which provide equal or greater <br />security, such as biometrics or smart cards. <br />b. Network server disks. For Data stored on hard disks mounted on network servers and made <br />available through s hared fo lders·, acc~s s to the Data w ill be restricted to Au thorized Users through <br />the use of access co ntrol lists w hich will g ra nt access o nly after t he Autho rized User has <br />aL1thenticc:1ted to the network us.In g a Unique Use r ID and Hardened Password or other <br />DSHS Central Contract Services <br />5048CF County Program Agreement (11-22-2011) Page 9