Laserfiche WebLink
10 <br />11. <br />(a) SFT service provided Washington Technology Solutions (WaTech); or <br />(b) The DCYF instance of Box.com. <br />b. Any information containing sensitive data elements must be encrypted and password protected <br />using a toolsuch as WinZip, 7zip, or something similar. <br />c. An account is required to access either of the above solutions, you will need to make a request by <br />contacting the contract contact listed on the cover page of this Agreement. <br />d. Any other solution must be approved by the DCYF lnformation Security Office. To obtain approval, <br />contact the contract contact listed on the cover page of this Agreement. Request must include the <br />name of the solution, as well as, any information to help in the approval process. <br />e. The Contractor must use a secure solution for electronic mail submissions wlrich contain <br />Confidential information, and Personal lnformation, as defined in the GeneralTerms and <br />Conditions. <br />f. lnformation regarding receiving encrypted emailfrom DCYF can be obtained at DCYF's website, <br />located at: hJlBs-{wrmru.gJcylsa..S*v/sqr:vieeschil#-Wl{Arp-pl"oviejqtsleneryptccj:g*ai.l. <br />System Protection. <br />a. To prevent compromise of systems that contain DCYF Data or systems that Data passes through, <br />the Contractor must: <br />(1) Ensure all security patches or hotfixes applied within three (3)months of being made available; <br />(2) Have a method of ensuring that the requisite patches and hotfixes have been applied within the <br />required timeframes; <br />(3) Ensure systems containing Data shallhave an Anti-Malware application installed, if available; <br />and <br />(4) Ensure that Anti-Malware software is kept up to date. The product, its anti-virus engine, and <br />any malware database the system uses, will be no more than one update behind current. <br />Data Segregation. <br />a- Data must be segregated or otherwise distinguishable from non-DCYF data. This is to ensure that <br />when no longer needed by the Contractor, all Data can be identified for retum or destruction. lt <br />also aids in determining whether Data has or may have been compromised in the event of a <br />security breach. <br />b. The Contractor must use one or more of the following methods to segregate Data: <br />(1) Data will be kept on media (e.g. hard disk, optical disc, tape, etc.) which will contain no non - <br />DCYF Data;and/or <br />(2) Data will be stored in a logical container on electronic media, such as a partition or folder <br />dedicated to Data; and/or <br />(3) Data will be stored in a database which will contain no non-DCyF data; and/or <br />Department of Children, Youth & Families <br />2017CF County Program Agreement 6-24-20 Page 24