Laserfiche WebLink
Llo*t-r$ign Envclcpe lfir ?43301 1 1-53A7-4837-t4A$-41 2t3DAZF,CCOA <br />$peeial Terms and Conditians <br />containing Confidential lnformaiion, Data, Gategory 4 Data, Sensitive Personal lnformation, or <br />Materials; <br />g^ When accessing the Data from wilhin the Contractar's nstwork {the Data stays within th* <br />Contractor's netwnrk al all tinres), enforce password and logon requirements for users within the <br />Contraetor's network, including: <br />(1). A minirnum lenglh of eight (B) characters, and containing at least tlrr"ee of the following character <br />classes: *ppercase letters, lowercase letters, numeral$, and special characters such as an asterisk, <br />ampersand, or exclamation point; <br />{2}. That a password does not contain a user's name, logon lD, or any fom of their full name; <br />(3). That a password does not eonsist of a single dictianary word, A password may be formed as a <br />passphrase which consists of multiple dictionary words; ancl <br />(4). That passwords are significantly clifferent frorn the previolrs four (4) passwcrds. passwords that <br />increment by simply adding a number are not consiclered significatrtly different. <br />h. When accessing Confidenlial lnforfiation, Dala, Caiegory 4 Data, Sensitive Personal lnfornration, <br />and Malerials from an exiernal location (the Data willtraverse the lnternet or otherwise travel <br />outside the Contrastor's nelr,vork), nritigate risk ancl enforce password and lagon requirements for <br />users by employing measures that include: <br />('l), Ensuring mitigations applied to the sysienr don't allow end-user modification; <br />(2). Not allowing the use of diat-up connections; <br />(3), Using industry standard protocols and solulions for remoie acce$s. Hxamples would inelude <br />RADIUS ancJ Citrix; <br />(4), Encrypting all remote acce$s lralfic fronr the exlernslworkstation to Trusted Neiwork orto a <br />component within the Trusted Network. The traffic must hre encrypted at all tirnes while <br />lraversing any neiwork, including the f nternet, which is not a Trustecl Network; <br />{5). Ensuring that the remote access system prompls for re-aulheniication cr performs automated <br />sessiort termination afte r no more ihan fifteen (15J minutee of inactivity: and <br />{6). Ensuring use of Mr"rtti*Factorltuthentication to ccnnect from the external end poinl to the internal <br />end point. <br />. Fassworde or PIN codec nray meet a lesser standard if used in conjunction with another <br />authentication mechanisrt't, snclt as a biometric{fingerprinl, face recognition. iris scan)ortoken <br />(software, hardware, $mart card, *tc.) in lhat case: <br />{1}. The PIN or password musl be at least five (5) lelters or nunrbers when useci in conjunction with <br />at leasl one other authentication factor; <br />{?). itlust not be comprised of all the same letter or rrumber (11 1'1 I ,22222, aaaaa, wsuld not be <br />acceptable); and <br />{3). MLtst nct contain a "tltn" of three or mors consecutir,,e numbers (12398, 98743 woulcl noi be <br />acceptable). <br />Dep;lrtlront.Jf Childten, Yculh & Familiec <br />:01 7CF County Progrsnt Agrers!'nel'lt (8-'l -2014]Fage 10