My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Kittitas County.2163-24529.i-ACT Program with Judicial Signature (2)
>
Meetings
>
2021
>
07. July
>
2021-07-06 10:00 AM - Commissioners' Agenda
>
Kittitas County.2163-24529.i-ACT Program with Judicial Signature (2)
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/1/2021 1:09:18 PM
Creation date
7/1/2021 1:08:52 PM
Metadata
Fields
Template:
Meeting
Date
7/6/2021
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
p
Item
Request to Approve a County Program Agreement - i-ACT Program Development
Order
16
Placement
Consent Agenda
Row ID
78209
Type
Grant
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
21
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
j. If the Contract specifically allows for the storage of Confidential Information on a Mobile Device, <br />passcodes used on the device must: <br />(1). Be a minimum of six (6) alphanumeric characters; <br />(2). Contain at least three unique character classes (upper case, lower case, letter, number); and <br />(3). Not contain more than a three consecutive character run. Passcodes consisting of (12345, or <br />abcd12 would not be acceptable). <br />k. Render the device unusable after a maximum of five (5) failed logon attempts. <br />7. Protection of Data. The Contractor agrees to store Data on one or more of the following media and <br />protect the Data as described: <br />a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be <br />restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID <br />and Hardened Password or other authentication mechanisms which provide equal or greater <br />security, such as biometrics or smart cards. <br />b. Network server disks. For Data stored on hard disks mounted on network servers and made <br />available through shared folders, access to the Data will be restricted to Authorized Users through <br />the use of access control lists which will grant access only after the Authorized User has <br />authenticated to the network using a Unique User ID and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as biometrics or smart <br />cards. Data on disks mounted to such servers must be located in an area which is accessible only <br />to authorized personnel, with access controlled through use of a key, card key, combination lock, or <br />comparable mechanism. <br />c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DCYF <br />on optical discs which will be used in local workstation optical disc drives and which will not be <br />transported out of a Secure Area. When not in use for the contracted purpose, such discs must be <br />Stored in a Secure Area. Workstations which access Data on optical discs must be located in an <br />area which is accessible only to authorized personnel, with access controlled through use of a key, <br />card key, combination lock, or comparable mechanism. <br />d. Optical discs (CDs or DVDs) in drives orjukeboxes attached to servers. Data provided by <br />DCYF on optical discs which will be attached to network servers and which will not be transported <br />out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through <br />the use of access control lists which will grant access only after the Authorized User has <br />authenticated to the network using a Unique User ID and Hardened Password or other <br />authentication mechanisms which provide equal or greater security, such as biometrics or smart <br />cards. Data on discs attached to such servers must be located in an area which is accessible only <br />to authorized personnel, with access controlled through use of a key, card key, combination lock, or <br />comparable mechanism. <br />e. Paper documents. <br />(1). All paper documents must be protected by storing the records in a Secure Area, with access <br />controlled through use of a key, card key, combination lock, or comparable mechanism, and which <br />is only accessible to authorized personnel. <br />(2). When being transported outside of a Secure Area, paper documents must be under the physical <br />control of Contractor staff with authorization to access the Data. <br />Department of Children, Youth 8 Families <br />2017CF County Program Agreement 6-24-20 Page 13 <br />
The URL can be used to link to this page
Your browser does not support the video tag.