Laserfiche WebLink
2. The data are located in a secured computer area, which is accessible only by authorized <br />personnel with access controlled through use of a key, card key, or comparable <br />mechanism. <br />a. If the servers or storage area networks are not located in a secured computer area or <br />if the data is classified as Confidential or Restricted it must be encrypted as <br />described under F, data storage on portable devices or media. <br />D. Optical discs (CDs or DVDs) <br />1. Optical discs containing the data must be encrypted as described under F. data storage on <br />portable devices or media. <br />2. When not in use for the purpose of this Agreement, such discs must be locked in a <br />drawer, cabinet or other physically secured container to which only authorized users have <br />the key, combination or mechanism required to access the contents of the container. <br />E. Access over the Internet or the State Governmental Network (SGN). <br />1. When the data is transmitted between DOH and the Information Recipient, access is <br />controlled by the DOH, who will issue authentication credentials. <br />2. Information Recipient will notify DOH immediately whenever: <br />• An authorized person in possession of such credentials is terminated or otherwise <br />leaves the employ of the Information Recipient <br />• Whenever a person's duties change such that the person no longer requires access to <br />perform work for this Contract. <br />3. The data must not be transferred or accessed over the Internet by the Information <br />Recipient in any other manner unless specifically authorized within the terms of the <br />Agreement. <br />a) If so authorized the data must be encrypted during transmissions using a key length of <br />at least 128 bits. Industry standard mechanisms and algorithms, such as those <br />validated by the National Institute of Standards and Technology (NIST) are required. <br />b) Authentication must occur using a unique user ID and Complex Password (of at least <br />10 characters). When the data is classified as Confidential or Restricted, <br />authentication requires secure encryption protocols and multi -factor authentication <br />mechanisms, such as hardware or software tokens, smart cards, digital certificates or <br />biometrics. <br />• Accounts must lock after 5 unsuccessful access attempts, and remain locked for at <br />least 15 minutes, or require administrator reset. <br />F. Data storage on mobile devices or portable storage media - <br />1. Examples of mobile devices are: smart phones, tablets, laptops, notebook or netbook <br />computers, and personal media players. <br />2. Examples of portable storage media are: flash memory devices (e.g. USB flash drives), <br />and portable hard disks. <br />Page 13 of 16 <br />rev 07/02/2013 <br />