Laserfiche WebLink
  <br />Kittitas County Information Technology | 205 W 5th AVE STE 13 | Ellensburg WA 98926 | 509‐962‐7510 | http://www.co.kittitas.wa.us  <br />If authorized by your DH/EO, you may use text messaging for communications of minimal <br />retention value on personally-owned cell phones and county-owned cell phones; however, you <br />must delete the transitory communication text when it is no longer needed, and you will be <br />responsible for contacting your service provider to obtain copies of any records responsive to <br />public records requests. <br />Text message primary records that conduct county business (those you send, and those you <br />receive from non-county employees) must be memorialized as they are sent or received. <br /> <br />13.4.6 Security <br />KCIT will install Mobile Device Management software on every county-owned mobile device to <br />enforce county policies.KCIT will register all devices connecting to the KC network or to <br />Exchange ActiveSync (EAS) for KC email. <br />You must immediately report virus or malicious software detection, or possible security <br />violations to IT. <br />KCIT may monitor your activity on any KC-owned device. <br />As the custodian of the device, you must regularly check for and install security updates as they <br />are made available by the manufacturer. <br />KCounty-owned mobile devices must have a County asset tag in an easy to see location. <br />13.4.6.1 Passwords <br />Best Practice Tip  <br />Change the security password on <br />your mobile device when you <br />change your network password. <br />Password protection must be enabled and required after 15 minutes of inactivity. Whenever <br />possible the password must meet the requirements in Technology Policy 4 - Account <br />Management. You must change your device password every 90 days. <br />13.4.6.2 Lost or stolen devices <br />You are responsible for protecting county-owned mobile devices provided to you from theft, loss <br />or damage. You must immediately report lost or stolen devices—as soon as the loss is noticed—