Laserfiche WebLink
Technology Policy 8 -Email <br />8.Email <br />8.1 Summary <br />1.Email conducting eeënty-County business must be sent and received via the eeënty- <br />County email server or a County provided service. <br />2.Personal email may not be sent and received via the eeënty-County email server or a <br />County provided service. <br />3.Email is a document and is subject to public disclosure laws,documents retention <br />schedules,investigations,and auditing. <br />4.All confidential information must be encrypted to be transported outside the eewaty- <br />County Exchanqe email system. <br />8.2 References <br />1.CAMAS -Large File Transfer <br />2.CAMAS -Notification of Separation from Service <br />3.CAMAS -Request for Access to Network Records <br />4.KGIT User Wiki -Encrypting a Document <br />5.KGIT User Wiki -Large File Transfer (Over 10MB) <br />6.Records Management Policy and Procedures <br />7.Technology Policy 7 -Data Management,Access,and Protection <br />8.3 Definitions <br />8.3.1 County email <br />Email message including attachments that meet any of the following criteria: <br />1.Sent or received through the eeuntyCounty email system. <br />2.Conducting eeunty-County business. <br />3.Sent or received by an employee acting on behalf of the eeuntyCounty,regardless of <br />the email system used. <br />8.3.2 County email system <br />A system provided by the County for sendinq County business email that is controlled and <br />accessible by the County.These include Exchanqe,G-Suite,and some software-as-a- <br />service (e.q.,Tyler Supervision). <br />8.3.3 Exchange <br />The Microsoft Exchanqe Server that sends and receives co.kittitas.wa.us email (accessed <br />via Outlook or Outlook Web Access). <br />8.3.4 Phishing <br />The criminally fraudulent process of attempting to acquire sensitive information such as user- <br />nameusernames,passwords,or credit card details by masquerading as a trustworthyentity <br />37