Laserfiche WebLink
containing Confidential lnformation, Data, Category 4 Dala, Sensitive Personal lnformation, or <br />Materials, <br />g. When accessing the Data from within the Contractor's network (the Data stays within the <br />Contractor's network at all times), enforce password and logon requirements for users within the <br />Contractor's network, including: <br />(1).A minimum length of eight (B) characters, and containing at least three of the following character <br />classes: uppercase letters, lowercase letters, numerals, and special characters such as an asterisk, <br />ampersand, or exclamation point; <br />(2).That a password does not contain a user's name, logon lD, or any form of their full name; <br />(3).That a password does not consist of a single dictionary word. A password may be formed as a <br />passphrase which consists of multiple dictionary words; and <br />(4) That passwords are significantly different from the previous four (4) passwords. Passwords that <br />increment by simply adding a number are not considered significantly different. <br />h. When accessing Confidential lnformation, Data, Category 4Dala, Sensitive Personal lnformation, <br />and Materials from an external location (the Data will traverse the lnternet or othenvise travel <br />outside the Contractor's network), mitigate risk and enforce password and logon requirements for <br />users by employing measures that include: <br />(1). Ensuring mitigations applied to the system don't allow end-user modification; <br />(2). Not allowing the use of dial-up connections; <br />(3). Using industry standard protocols and solutions for remote access. Examples would include <br />RADIUS and Citrix, <br />(4). Encrypting all remote access traffic from the external workstation to Trusted Network or to a <br />component within the Trusted Network. The traffic must be encrypted at all times while <br />traversing any network, including the lnternet, which is not a Trusted Network; <br />(5). Ensuring that the remote access system prompts for re-authentication or performs automated <br />session termination after no more than fifteen (15) minutes of inactivity; and <br />(6)' Ensuring use of Multi-Factor Authentication to connect from the external end point to the internal <br />end point. <br />i' Passwords or PIN codes may meet a lesser standard if used in conjunction with another <br />authentication mechanism, such as a biometric (fingerprint, face reiognition, iris scan) or token(software, hardware, smart card, etc.) in that case: <br />(1)'The PIN or password must be at least five (5) letters or numbers when used in conjunction withat least one other authentication factor; <br />(2).Mustnotbecomprisedof allthesameletterornumber (11111,22222,aaaaa,wouldnotbe <br />acceptable); and <br />(3)'Must not contain a "run" of three or more consecutive numbers (1z3g8, 98743 would not beacceptable). <br />Department of Children, youth & Families <br />2017CF County Program Agreement 6-24-20 <br />Page 12