Laserfiche WebLink
Exhibit A -Data Security Requirements <br />1 . Definitions. The words and phrases listed below, as used in this Exhibit, shall each have the following <br />definitions: <br />a. "AES" means the Advanced Encryption Standard, a specification of Federal Information Processing <br />Standards Publications for the encryption of electronic data issued by the National Institute of <br />Standards and Technology (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf). <br />b. "Authorized Users(s)" means an individual or individuals with a business need to access DSHS <br />Confidential Information, and who has or have been authorized to do so. <br />c. "Category 4 Data" is data that is confidential and requires special handling due to statutes or <br />regulations that require especially strict protection of the data and from which especially serious <br />consequences may arise in the event of any compromise of such data. For purposes of this <br />contract, data classified as Category 4 refers to data protected by: the Health Insurance Portability <br />and Accountability Act (HIPAA). <br />d. "Cloud" means data storage on servers hosted by an entity other than the Contractor and on a <br />network outside the control of the Contractor. Physical storage of data in the cloud typically spans <br />multiple servers and often multiple locations. Cloud storage can be divided between consumer <br />grade storage for personal files and enterprise grade for companies and governmental entities. <br />Examples of consumer grade storage would include iCloud, Dropbox, Box.com, and many other <br />entities. Enterprise cloud vendors include Microsoft Azure, Amazon Web Services, 0365, and <br />Rackspace. <br />e. "Encrypt" means to encode Confidential Information into a format that can only be read by those <br />possessing a "key"; a password, digital certificate or other mechanism available only to authorized <br />users. Encryption must use a key length of at least 128 bits (256 preferred and required to be <br />implemented by 6/30/2020) for symmetric keys, or 2048 bits for asymmetric keys. When a <br />symmetric key is used, the Advanced Encryption Standard (AES) must be used if available. <br />f. "Hardened Password" means a string of at least eight characters containing at least three of the <br />following four character classes: Uppercase alphabetic, lowercase alphabetic, numeral, and special <br />characters such as an asterisk, ampersand, or exclamation point. <br />g. "Mobile Device" means a computing device, typically smaller than a notebook, which runs a mobile <br />operating system, such as iOS, Android, or Windows Phone. Mobile Devices include smart phones, <br />most tablets, and other form factors. <br />h. "Multi-factor Authentication" means controlling access to computers and other IT resources by <br />requiring two or more pieces of evidence that the user is who they claim to be. These pieces of <br />evidence consist of something the user knows, such as a password or PIN; something the user has <br />such as a key card, smart card, or physical token; and something the user is, a biometric identifier <br />such as a fingerprint, facial scan, or retinal scan. "PIN" means a personal identification number, a <br />series of numbers which act as a password for a device. Since PINs are typically only four to six <br />characters, PINs are usually used in conjunction with another factor of authentication, such as a <br />fingerprint. <br />i. "Portable Device" means any computing device with a small form factor, designed to be transported <br />from place to place. Portable devices are primarily battery powered devices with base computing <br />resources in the form of a processor, memory, storage, and network access. Examples include, but <br />DSHS Central Contract Services <br />1769CS County Agreement 5-1-2019 <br />Page 16