Laserfiche WebLink
signed agreement is received,IT will create a vendor account.Vendor accounts will remain <br />disabled by default.Upon request by a DHIEOldesignee through a service request,IT will <br />enable the vendor account for a temporary session until 11:59 pm the next business day <br />unless a longer peried--ef timeperiod is requested and required to resolve the issue.A <br />session may not exceed 3 calendar days unless IT is an active participant in the <br />pFejeetproiect,or the project is large in scope and approved by the IT Director or designee.If <br />longer time is needed an additional request must be made by a eeënty-County employee <br />through a service request. <br />Vendors may have unattended access only to their software server.If the vendor needs to <br />access a computer with a user loqqed in,the user must observe all work performed by the <br />vendor and be able to disconnect the vendor at any time.(CJIS 5.9 §5.5.6.2) <br />5.4.3.3 Publicly Accessible Computers <br />Publicly accessible computers (whether owned by the eewatyCounty or not)may not be used <br />to access,process,store or transmit Cateqory [link 7.4.10]3 or 4 eenfidential--information. <br />Publicly accessible computers include but are not limited to÷ hotel business center <br />computers,convention center computers,public library computers,public kiosk computers, <br />etc.(CJIS 5.9 §5.5.6.2) <br />5.4.4 Physical access <br />5.4.4.1 _IT_o_Office area <br />1.Access to the IT office will have the following restrictions: <br />1.Unrestricted access:IT staffemployees <br />2.When IT staff-isemployees are not present:Maintenance Director,Assistant <br />Maintenance Supervisor,and Maintenance Technician II who have passed a <br />background check <br />3.When accompanied by IT staffemployees:all other employees and non- <br />employees <br />4.For emergency purposes only:Commissioners,Sheriff,Undersheriffand the <br />Sheriffs command staff <br />2.The--exterier-IT entry doors will always remain locked or <br />attended and "Secure Area"will be prominently posted. <br />3.After-hours access must be scheduled with,or reported to,the IT Director or <br />designee.(CJIS 5.9 §§5.9.1.1-5.9.1.8) <br />5.4.4.2 Server Room <br />1.The server room will always be locked. <br />2.The entrance will be posted "Secure Area Authorized Personnel Only". <br />3.Authorized personnel are limited to IT staffemployees,Maintenance Director, <br />Assistant Maintenance Supervisor,and Maintenance Technician II who have passed <br />a background check. <br />4.Non-authorized persons who enter the server room must: <br />1.Be accompanied by an_lT staffemployee <br />2.Provide identification and credentials <br />3.Record their visit on the KGIT Server Room Secure Access Sign-In log (CJIS <br />5.9 §5.9.1.7) <br />21