My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2021-04-26-minutes-it-study-session
>
Meetings
>
2021
>
05. May
>
2021-05-04 10:00 AM - Commissioners' Agenda
>
2021-04-26-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/29/2021 12:56:13 PM
Creation date
4/29/2021 12:54:27 PM
Metadata
Fields
Template:
Meeting
Date
5/4/2021
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
a
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
75943
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
74
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
As the custodian of the device,you must regularly check for and install security updates as <br />they are made available by the manufacturer.County-owned mobile devices must have a <br />County asset tag in an easy to see location. <br />13.4.6.1 Mobile Device Management <br />KGIT will install Mobile Device Management (MDM)software on every eeuntyCounty-owned <br />mobile device to enforce eeunty-security policies.- <br />MDM will be confiqured and implemented to perform at least the followinq controls: <br />1.Remote lockinq of device <br />2.Remote wipinq of device <br />3.Settinq and lockinq device confiquration;device passwords must meet requirements <br />of section 4.4.1 <br />4.Detection of "rooted"and "|ailbroken"devices <br />5.Enforcement of folder or disk level encryption <br />6.Application of mandatory policy settinqs on the device <br />7.Detection of unauthorized confiqurations <br />8.Detection of unauthorized software or applications <br />9.Ability to determine the location of devices <br />10.Automatic device wipinq after a specified number of failed access attempts <br />(CJIS 5.9 §13.2) <br />13.4.6.1--2 Lost or stolen devices <br />Best Practice <br />You are responsible for protecting eeuntyCounty-owned mobile <br />devices provided to you from theft,lessloss,or damage.You must Change the security password <br />immediately report lost or stolen devices--as soon as the loss is on your mobile device when <br />noticed--to your DHIEO regardless of time,day or night.DHIEOs you change your network <br />must notify IT staff-or the IT Director as soon as notified by their password. <br />employee.KGIT will immediately remote wipe lost or stolen devices. <br />(CJIS 5.9 §5.13.5) <br />13.4.6.3 Authentication <br />Finqerprint recoqnition is allowed for local device authentication. <br />Facial recognition is prohibited for local device authentication. <br />60
The URL can be used to link to this page
Your browser does not support the video tag.