|
Docr,.Sign Envelope I D: 2rr3301 -l
<br />1 -lilA7..ri81J7'g4i\9"41 !6UA'jAOCD4
<br />Special Terms and Conditions
<br />e. "Cloud" mesn$ data storage on seruers hostecl by an *ntity other than the Coniractor and on a
<br />network outside the controlof tlte Contractor. Physical storage of data in the clsud typically $pans
<br />multiple servers and olten multiple locations. Cloud storage can be divided betweeri consumer
<br />grade storage for personal files and enterprise grac{e for companies and governmental eniities.
<br />Examples of consumer grade storage r,vould include iTunes. Droplrox, Box.com. and rnany other
<br />entities. Enterprise cloud vendors inelude Microsoft Azure, Amazon Web $ervices, and Rackspace.
<br />f. "Confidential lnforntation" means to encode Confidential lrifornralion into a format that csn only be
<br />read by lhose possessing a "key"; a password, digital certificate or other mechanisnr availalrle onty
<br />to authorized users, Encryption must use a key length of at least 256 bits for synrnretric keys, or
<br />2048 bits for asymmetric key$, When a symnretric key is used, the Advanced Hncryption Standarcl
<br />(AES) must be used if available.
<br />g. "Data" rYleans DCYF's records, files, fornrs, inlormalion and otlrer dccunrents in eiectronic or hard
<br />copy nrediurrl. "Data" includes, bul is not lirniteel to, Conficlential lnformation, Category 4 Data,
<br />Sensitive Personal lnformation, or Materials.
<br />h. "Encrypt. ffieans to encode Confidential lnformation into a format that can only be read by those
<br />possessing a "key"; a password, digital certificate or other rnechanism available only to authorized
<br />users. Encryption nrust use a key length of ai least 25$ biis for symmetric keys, or2048 bits for
<br />asymrretric keys. Wherr a synrrnetric key is used, lhe Advanced Hncryplion $tandard (Ae$) must
<br />be used if available.
<br />"FedRAMF" means the Federal Risk ancl Authorization lvlanagenrent Progranr (see
<br />$ilA{*gptlqS{Iqlllt",{lg}1}, which is an a$sessment and authorization proce$s that federal
<br />government agencies have been directed to use io ensure securiiy is in place when accessing
<br />Cloud corrputing products and senrices,
<br />j. "Hartlened Password" means a string of at least eighl characters containing at least lhree of the
<br />following four character classes: Upp*rcase alphab*tic, lowercase alphai:etic, nurneral, and special
<br />characiers such as an ast*risk, aRrpersand, or excla.mation point.
<br />k. "fi{obile Device' means a compuiing device, typically smaller than a notebook, which runs a mobile
<br />operaiing system, such as i0$, AncJroid, or Windows Phone. Mobile Devices include smart phones,
<br />most tablets, and other fonn factors"
<br />"Multi-factorAuthentication" nreans controlling access to conrputers and other lT resources by
<br />requiring two or nrore pieces of evidence that the user is who they claim to be. These pieces of
<br />evidence consisl of sonrething the r:ser knol.vs, sr-rclr as a password or PIN; sometlring the user has
<br />such as a key catd, smarl card, or physicaltcken; and something the u$er is, a biometric iderrtifier
<br />such as a fing*rprint, fscial $can, orretinal gcan. "PlN" means a personal identificalinn number, a
<br />series of numbers which acl as a password for a device, $ince PlNs are typically only four to six
<br />characle rs, PlNs are usually used in conjunction with another faclor of authenticetiorr, $ueh as a
<br />fingerprint.
<br />m. "Psrtable Device" means any compuiing devica with a small form factor, designed to be lransportec!
<br />front place to place. Po$able clevices are Brimarily lratlery powered devices with base cornputing
<br />re$ources in the fornr of a proces:or, menory, storage, and netu,lork accesc. Examples include, bllt
<br />are nct limite d to, nrobile phon€s, iablets, and lapiops. fVlobile Device is a subset af Porlable
<br />Oevice.
<br />Dcparinrcnl o{ Childrcn, Y,;uth & Fantiliel
<br />201 7,:F County Program Agreer")lsr'1i (8-1 -201 9)Pa{s 7
|