Laserfiche WebLink
(a) SFT service provided Washington Technology Solutions (WaTech); or <br />(b) The DCYF instance of Box.com. <br />b. Any information containing sensitive data elements must be encrypted and password protected <br />using a tool such as WinZip, 7zip, or something similar. <br />c. An account is required to access either of the above solutions, you will need to make a request by <br />contacting the contract contact listed on the cover page of this Agreement. <br />d. Any other solution must be approved by the DCYF Information Security Office. To obtain approval, <br />contact the contract contact listed on the cover page of this Agreement. Request must include the <br />name of the solution, as well as, any information to help in the approval process. <br />e. The Contractor must use a secure solution for electronic mail submissions which contain <br />Confidential information, and Personal Information, as defined in the General Terms and <br />Conditions. <br />f. Information regarding receiving encrypted email from DCYF can be obtained at DCYF's website, <br />located at: httos://www dcvf wa aov/services/child-welfare-providers/encrypted-email <br />10. System Protection. <br />To prevent compromise of systems that contain DCYF Data or systems that Data passes through, <br />the Contractor must: <br />(1) Ensure all security patches or hotfixes applied Wthin three (3) months of being made available; <br />(2) Have a method of ensuring that the requisite patches and hotfixes have been applied within the <br />required timeframes; <br />(3) Ensure systems containing Data shall have an Anti-Malware application installed, if available; <br />and <br />(4) Ensure that Anti-Malware software is kept up to date. The product, its anti -virus engine, and <br />any malware database the system uses, will be no more than one update behind current. <br />11. Data Segregation. <br />Data must be segregated or otherWse distinguishable from non-DCYF data. This is to ensure that <br />when no longer needed by the Contractor, all Data can be identified for return or destruction. It <br />also aids in determining whether Data has or may have been compromised in the event of a <br />security breach. <br />b. The Contractor must use one or more of the following methods to segregate Data: <br />(1) Data will be kept on media (e.g. hard disk, optical disc, tape, etc.) which will contain no non- <br />DCYF Data; and/or <br />(2) Data will be stored in a logical container on electronic media, such as a partition or folder <br />dedicated to Data; and/or <br />(3) Data will be stored in a database which will contain no non-DCYF data; and/or <br />Department of Children, Youth & Families <br />2017CF County Program Agreement 6-24-20 <br />Page 24 <br />