Laserfiche WebLink
a. "Authorized User(s)" means an individual or individuals with an authorized <br />business requirement to access DSHS Confidential Information. <br />b. "Hardened Password" means a string of at least eight characters containing <br />at least one alphabetic character, at least one number and at least one <br />special character such as an asterisk, ampersand or exclamation point. <br />c. "Unique User ID" means a string of characters that identifies a specific user <br />and which, in conjunction with a password, passphrase or other mechanism, <br />authenticates a user to an information system. <br />2. Data Transport. When transporting DSHS Confidential Information <br />electronically, including via email, the Data will be protected by: <br />a. Transporting the Data within the (State Governmental Network) SGN or <br />Contractor's internal network, or; <br />b. Encrypting any Data that will be in transit outside the SGN or Contractor's <br />internal network. This includes transit over the public Internet. <br />3. Protection of Data. The Contractor agrees to store Data on one or more of the <br />following media and protect the Data as described: <br />a. Hard disk drives. Data stored on local workstation hard disks. Access to <br />the Data will be restricted to Authorized User(s) by requiring logon to the local <br />workstation using a Unique User ID and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as <br />biometrics or smart cards. <br />b. Network server disks. Data stored on hard disks mounted on network <br />servers and made available through shared folders. Access to the Data will <br />be restricted to Authorized Users through the use of access control lists which <br />will grant access only after the Authorized User has authenticated to the <br />network using a Unique User ID and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as <br />biometrics or smart cards. Data on disks mounted to such servers must be <br />located in an area which is accessible only to authorized personnel, with <br />access controlled through use of a key, card key, combination lock, or <br />comparable mechanism. <br />For DSHS Confidential Information stored on these disks, deleting unneeded <br />Data is sufficient as long as the disks remain in a Secured Area and <br />otherwise meet the requirements listed in the above paragraph. Destruction <br />of the Data as outlined in Section 5. Data Disposition may be deferred until <br />the disks are retired, replaced, or otherwise taken out of the Secured Area. <br />Professional Services Agreement <br />Page 30 <br />