My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2021-04-26-minutes-it-study-session
>
Meetings
>
2021
>
05. May
>
2021-05-04 10:00 AM - Commissioners' Agenda
>
2021-04-26-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/29/2021 12:56:13 PM
Creation date
4/29/2021 12:54:27 PM
Metadata
Fields
Template:
Meeting
Date
5/4/2021
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
a
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
75943
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
74
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
signed agreement is received,IT will create a vendor account.Vendor accounts will remain <br />disabled by default.Upon request by a DHIEOldesignee through a service request,IT will <br />enable the vendor account for a temporary session until 11:59 pm the next business day <br />unless a longer peried--ef timeperiod is requested and required to resolve the issue.A <br />session may not exceed 3 calendar days unless IT is an active participant in the <br />pFejeetproiect,or the project is large in scope and approved by the IT Director or designee.If <br />longer time is needed an additional request must be made by a eeënty-County employee <br />through a service request. <br />Vendors may have unattended access only to their software server.If the vendor needs to <br />access a computer with a user loqqed in,the user must observe all work performed by the <br />vendor and be able to disconnect the vendor at any time.(CJIS 5.9 §5.5.6.2) <br />5.4.3.3 Publicly Accessible Computers <br />Publicly accessible computers (whether owned by the eewatyCounty or not)may not be used <br />to access,process,store or transmit Cateqory [link 7.4.10]3 or 4 eenfidential--information. <br />Publicly accessible computers include but are not limited to÷ hotel business center <br />computers,convention center computers,public library computers,public kiosk computers, <br />etc.(CJIS 5.9 §5.5.6.2) <br />5.4.4 Physical access <br />5.4.4.1 _IT_o_Office area <br />1.Access to the IT office will have the following restrictions: <br />1.Unrestricted access:IT staffemployees <br />2.When IT staff-isemployees are not present:Maintenance Director,Assistant <br />Maintenance Supervisor,and Maintenance Technician II who have passed a <br />background check <br />3.When accompanied by IT staffemployees:all other employees and non- <br />employees <br />4.For emergency purposes only:Commissioners,Sheriff,Undersheriffand the <br />Sheriffs command staff <br />2.The--exterier-IT entry doors will always remain locked or <br />attended and "Secure Area"will be prominently posted. <br />3.After-hours access must be scheduled with,or reported to,the IT Director or <br />designee.(CJIS 5.9 §§5.9.1.1-5.9.1.8) <br />5.4.4.2 Server Room <br />1.The server room will always be locked. <br />2.The entrance will be posted "Secure Area Authorized Personnel Only". <br />3.Authorized personnel are limited to IT staffemployees,Maintenance Director, <br />Assistant Maintenance Supervisor,and Maintenance Technician II who have passed <br />a background check. <br />4.Non-authorized persons who enter the server room must: <br />1.Be accompanied by an_lT staffemployee <br />2.Provide identification and credentials <br />3.Record their visit on the KGIT Server Room Secure Access Sign-In log (CJIS <br />5.9 §5.9.1.7) <br />21
The URL can be used to link to this page
Your browser does not support the video tag.