Laserfiche WebLink
5. <br />Special Terms and Conditions <br />(5) Ensuring that the remote access system prompts for re-authentication or performs automaledsession termination after no more ihan 30 minutes of inactivity. <br />(6) Ensuring use of Multi-factor Authentication to connect from the external end point to the internalend point. <br />i' Passwords or PIN codes may meet a lesser standard if used in conjunction with anotherauthentication mechanism, such as a biometric (fingerprint, face recognition, iris scan) or token(software, hardware, smart card, etc.) in that case:" <br />(1) The PIN or password must be at least 5 letters or numbers when used in conjunction with atleast one other authentication factor <br />(2) Must not be comprised of all the same letter or number (11111,22222, aaaaa,would not beacceptable) <br />(3) Must not contain a "run" of three or more consecutive numbers (123gg, glT43would not beacceptable) <br />j lf the contract specifically allows for the storage of Confidential lnformation on a Mobile Device,passcodes used on the device must: <br />(1) Be a minimum of six alphanumeric characters. <br />(2) Contain at least three unique character classes (upper case, lower case, letter, number). <br />(3) Not contain more than a three consecutive character run. passcodes consisting of 12345, orabcd12 would not be acceptable. <br />k. Render the device unusable after a maximum of 10 failed logon attempts. <br />Protection of Data. The.contractor agrees to store Data on one or more of the following media andprotect the Data as described: <br />a' Hard disk drives. For Data stored on local workstation hard disks, access to the Data will berestricted to Authorized User(s) by requiring logon to the localworkstation ,;ing ; Unique User lDand Hardened Password or other authenticltio-n mechanisms, which provide "iu"r ot. greatersecurity, such as biometrics or smart cards. <br />b' Network server disks. For Data stored on hard disks mounted on network servers and madeavailable through shared folders, access to the Data will be restricted to Authorized Users throughthe use of access control lists which will grant access only after the Authorized User hasauthenticated to the network using a Unique User ID and Hardened password or otherauthentication mechanisms which provide equal or greater security, such as biometrics or smartcards' Data on disks mounted to such servers musi be located in'jn area, *niin is <br />"""essible <br />onlyto authorized personnel, with access controlled through use of a key, card key, comoination lock, orcomparable mechanism. <br />For DSHS Confidential lnformation stored on these disks, deleting unneeded Data is sufficient aslong as the disks remain in a Secure Area and otherwise'meet th6 requirements ifiieo in the aboveparagraph' Destruction of the Data, as outlined below in Section a oaU oisposition, may bedeferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. <br />DSHS Central Contract Seruices <br />1 76gCS County Agreement 05-1 6-2023 <br />Page 22