Laserfiche WebLink
(a) Personal information as defined in RCW 42.56.590 and RCW 19.255.10; <br />(b) Information about public employees as defined in RCW 42.56.250; <br />(c) Lists of individuals for commercial purposes as defined in RCW 42.56.070(9); and <br />(d) Information about the infrastructure and security of computer and telecommunication <br />networks as defined in RCW 42.56.420. <br />(4) Category 4 — Confidential Information Requiring Special Handling <br />Confidential information requiring special handling is information that is specifically protected <br />from disclosure by law and for which: <br />(a) Especially strict handling requirements are dictated, such as by statutes, regulations, or <br />agreements; and <br />(b) Serious consequences could arise from unauthorized disclosure, such as threats to health <br />and safety, or legal sanctions. <br />5. Compliance with Laws, Rules, Regulations, and Policies <br />Confidential Information and Data that is delivered, received, used, shared, acquired, created, <br />developed, revised, modified, or amended in connection with this Contract the parties shall comply <br />with the following: <br />(1) All federal and state laws and regulations, as currently enacted or revised, regarding the <br />protection, security, and electronic interchange of Confidential Information and Data; and <br />(2) All federal and state laws and regulations, as currently enacted or revised, regarding the use, <br />disclosure, modification or loss of Confidential Information and Data. <br />6. Administrative Controls. <br />a. The Contractor must have the following controls in place: <br />(1) A documented security policy governing the secure use of its computer network, mobile <br />devices, portable devices, as well as, any form of paper/hard copy documents. <br />(2) Security awareness training for all staff, presented and documented annually, as follows: <br />(a) Contractor staff responsibilities under the Contractor's security policy; <br />(b) Contactor staff responsibilities as outlined under contract Exhibit A; and <br />(c) Must successfully complete the DCYF Information Security Awareness Training, which can <br />betaken on this web page: htt[2s://www.dcvf.wa. qov/sites/default/fileslpdf(Security n- <br />Contracts pdf <br />(3) Contractor may replace the DCYF Information Security Awareness training listed above with <br />their own equivalent Information Awareness Training. <br />Department of Children, Youth & Families <br />2017CF County Program Agreement 6-24-20 Page 18 <br />