My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
i-ACT agreement
>
Meetings
>
2020
>
12. December
>
2020-12-15 10:00 AM - Commissioners' Agenda
>
i-ACT agreement
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/4/2021 1:38:05 PM
Creation date
1/4/2021 1:37:50 PM
Metadata
Fields
Template:
Meeting
Date
12/15/2020
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Fully Executed Version
Supplemental fields
Alpha Order
f
Item
Request to Approve County Program Agreement between the Department of Children, Youth and Families and Kittitas County for I-ACT Program Development
Order
6
Placement
Consent Agenda
Row ID
70274
Type
Grant
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
20
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
7 <br />Department of Children, Youth & Families <br />2017CF County Program Agreement G2+2O <br />Special Terms and Conditions <br />(1). Be a minimum of six (6) alphanumeric characters; <br />(2). Contain at least three unique character classes (upper case, lower case, letter, number); and <br />(3). Not eontain more than a three consecutive character run. Passcodes consisting of (12345, or <br />abcd12 would not be acceptable). <br />k. Render the device unusable after a maximum of five (5) failed logon attempts. <br />Protection of Data. The Contractor agrees to store Data on one or more of the following media and <br />protect the Data as described: <br />a Hard disk drives. For Data stored on localworkstation hard disks, access to the Data will be <br />restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User lD <br />and Hardened Password or other authentication mechanisms which provide equal or greater <br />security, such as biometrics or smart cards. <br />b. Network server disks. For Data stored on hard disks mounted on network servers and made <br />available through shared folders, access to the Data will be restricted to Authorized Users through <br />the use of access control lists wtrich will grant access only after the Authorized User has <br />authenticated to the network using a Unique User lD and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as biometrics or smart <br />cards. Data on disks mounted to such servers must be located in an area which is accessible only <br />to authorized personnel, with access controlled through use of a key, card key, combination lock, or <br />comparable mechanism. <br />c. Optical discs {CDs or DVDs) in localworkstation optical disc drives. Data provided by DCyF <br />on optical discs wttich will be used in local workstation optical disc drives and which will not be <br />transported out of a Secure Area. When not in use forthe contracted purpose, such discs must be <br />Stored in a Secure Area. Workstations wtrich access Data on optical discs must be located in an <br />area which is accessible only to authorized personnel, with access controlled through use of a key, <br />card key, combination lock, or comparable mechanism. <br />d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by <br />DCYF on optical discs which will be attached to network servers and which will not be transported <br />out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users ihrough <br />the use of access control lists which will granl access only after the Authorized User has <br />authenticated to the network using a Unique User lD and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as biometrics or smad <br />cards. Data on discs attached to such servers must be located in an area which is accessible only <br />to authorized personnel, with access controlled through use of a key, card key, combination lock, br <br />comparable mechanism. <br />e. Paper documents. <br />(1). All paper documents must be protected by storing the records in a Secure Area, with access <br />controlled through use of a key, card key, combination lock, or comparable mechanism, and which <br />is only accessible to authorized personnel. <br />(2). When being transported outside of a Secure Area, paper documents must be under the physical <br />control of Contractor staff with authorization to access the Data. <br />(3). Paper documents will not be secured or stored in a motor vehiele any time a staff member is <br />away from ihe motor vehicle. <br />Page 12
The URL can be used to link to this page
Your browser does not support the video tag.