Laserfiche WebLink
2. <br />Special Terms and Gonditions <br />are not limited to, mobile phones, tablets, and laptops. Mobile Device is a subset of portable <br />Device. <br />j' "Portable Media'means any machine readable media that may routinely be stored or movedindependently of computing devices. Examples.i;il" ;inetic tapes, opticat discs (cDs orDVDs), flash memory (thumb drive) devices, external hard irives, and internal hard drives that havebeen removed from a computing device. <br />k' "Secure Area" means an area to which only authorized representatives of the entity possessing theConfidential lnformation have access, and access is contiolled through ,." ot" L"y, card key,combination lock, or comparable meihanism. secure ereas may include buildings, rooms orlocked storage containers (such as a filing caninet or oest< Jrawe4 within a room, as long as accessto the confidential lnformation is not available to unautnorizlo personne[. ln othenrvise secureAreas, such as an office with restricted access, the Dad ;ust be secureo in such a way as toprevent access by non-authorized staff such as janitorial or facility <br />"".uiiiv "trtrlwhen authorizedcontractor staff are not present to ensure that non-authorized staff cannot access it. <br />l' "Trusted Nelwork" T9?ns. a network operated and maintained by the contractor, which includessecurity controls sufficient to protect osHs Data on tnai networr<. controls would include a firewallbetween any other networks, access control lists on networking devices such as routers and <br />,"#t;i?j. <br />and other such mechanisms which protect il]e conrio"entiiiitv, irLgl'itv, rio avaitabitity of <br />m' "Unique User lD" means a string of characters that identifies a specific user and which, inconjunction with a password, palsphrase or other mechanism, authenticates a user to aninformation system. <br />Authority' The security requirements described in this document reflect the applicable requirements ofsj?$"P 141'10(lrttps/ocjo'wq.go.v/policies)of theorn".otlrl"Chief tnformationofficerforthestateof washington, and ortne DSt-t5lnrormition'securityiorirv mJ standards Manual. Referencematerialrelatedtotheserequirementscan.be'o,l.dh.",6'. <br />client-information-orivatg.-alrd-secure, which.is a site oeuelffin securityoffice and hosted uy osHs ce contracts and Legar seruices. <br />Administrative controls' The contractor must have the following controls in place: <br />a' A documented secu.rity policy governing the secure use of its computer network and systems, andwhich defines sanctions that may be aiplied to contractor *Ln toi uiorating ihai ioii"v. <br />b' lf the Data shared under this agreement is classified as category 4 data, the Contractor must be <br />3:ff: of and compliant with the applicable legal or regul;i;t requiremenrs for tharcaregory 4 <br />c' lf confidential lnformation shared under.this agreement is ctassified as Category 4 data, the <br />$:#oo"t must have a documented risk assuiumJni iorln".vrt.mts) rrouiing'the category a <br />Authorization, Authentication, and Access. ln order to ensure that access to the Data is limited toauthorized staff, the Contractor must: <br />3. <br />4 <br />DSHS Central Contract $ervices <br />1 769CS County Agreement 05-1 6-2023 <br />Page 20