Laserfiche WebLink
  <br />Kittitas County Information Technology | 205 W 5th AVE STE 13 | Ellensburg WA 98926 | 509‐962‐7510 | http://www.co.kittitas.wa.us  <br /> USB devices (excluding flash drives)  <br /> Smartphones  <br />Exceptions of department purchased equipment that you are strongly encouraged to have <br />reviewed by IT before purchasing (if the equipment will be connected to a computer or the <br />network): <br /> Digital cameras  <br /> Smartphones – see Technology Policy 13 ‐ Mobile Devices  <br /> Copiers  <br /> Surveillance video cameras  <br /> Vendor supplied or required hardware  <br /> Capital computer software (GL 56404, >=$5000)  <br /> Computer software subscriptions (GL 54915)  <br /> Audio/video equipment  <br />See the KCIT User Wiki – Technology Recommendations knowledgebase for pre-approved <br />technology. <br />Examples of non- inventoried technology purchases made by departments are: <br /> Flash drives, device memory cards  <br /> CDs/DVDs  <br /> Keyboards and mice  <br /> Toner and printer supplies  <br /> Surge protectors  <br />3.4.2 Standardized Computer Software and Hardware <br />IT designates standard computer software and hardware in order to ensure compatibility between <br />computer systems and manage the provisioning of user support. If non-standard software or <br />hardware is needed, IT will work with the department to select an appropriate solution. <br />You may not use non-standard software or hardware on county computer systems without IT <br />pre-approval. If IT approves installation of non-standard software or hardware, IT shall not be <br />responsible for its operation and/or maintenance. You may not install personally owned software <br />on county owned equipment (see Technology Policy 6 – Personal Equipment). IT may remove <br />any non-standard software or hardware that might compromise the operation of the county <br />network or any county-owned computer, or any unauthorized software or hardware discovered <br />during routine maintenance operations or monitoring. IT will notify the DH/EO prior to software <br />removal unless there is an immediate threat to the computer or network in which case the DH/EO <br />will be notified after the removal. <br />3.4.3 Funding Source