Laserfiche WebLink
As the custodian of the device,you must regularly check for and install security updates as <br />they are made available by the manufacturer.County-owned mobile devices must have a <br />County asset tag in an easy to see location. <br />13.4.6.1 Mobile Device Management <br />KGIT will install Mobile Device Management (MDM)software on every eeuntyCounty-owned <br />mobile device to enforce eeunty-security policies.- <br />MDM will be confiqured and implemented to perform at least the followinq controls: <br />1.Remote lockinq of device <br />2.Remote wipinq of device <br />3.Settinq and lockinq device confiquration;device passwords must meet requirements <br />of section 4.4.1 <br />4.Detection of "rooted"and "|ailbroken"devices <br />5.Enforcement of folder or disk level encryption <br />6.Application of mandatory policy settinqs on the device <br />7.Detection of unauthorized confiqurations <br />8.Detection of unauthorized software or applications <br />9.Ability to determine the location of devices <br />10.Automatic device wipinq after a specified number of failed access attempts <br />(CJIS 5.9 §13.2) <br />13.4.6.1--2 Lost or stolen devices <br />Best Practice <br />You are responsible for protecting eeuntyCounty-owned mobile <br />devices provided to you from theft,lessloss,or damage.You must Change the security password <br />immediately report lost or stolen devices--as soon as the loss is on your mobile device when <br />noticed--to your DHIEO regardless of time,day or night.DHIEOs you change your network <br />must notify IT staff-or the IT Director as soon as notified by their password. <br />employee.KGIT will immediately remote wipe lost or stolen devices. <br />(CJIS 5.9 §5.13.5) <br />13.4.6.3 Authentication <br />Finqerprint recoqnition is allowed for local device authentication. <br />Facial recognition is prohibited for local device authentication. <br />60