Laserfiche WebLink
Special Terms and Conditions <br />Exhibit A — Data Security RequirementE <br />Definitions The words and phrases listed belcw, as used in this Exhibit, shall each have the following <br />definitions: <br />a. "AES" means the Acvanced Encryption Standard, a specification of Federal Information Processing <br />Standards Publications for the ercryption of electronic data ssued by the National Institute of <br />Standards and Technology (http:.'/nvlpubs.nist.gov/nistPLbsJFIPS/NIST.FIPS.197.pdf). <br />b. "Authorized Users(s;" means an individual o- individuals with a business need to access DSHS <br />Confidential Information, and who has or have been authorized to do so. <br />c. "Category 4 Data" is data that is confidential and requires special -iandling due to statutes or <br />regulations that require especially- strict protection of the data and from which especially serious <br />consequences may arise in the event of any compromise of such Jata. For purposes of this <br />contract, data classified as Category 4 refers to data protected by: the Health Insurance Portability <br />and Accountability Apt (HIPAA). <br />d. "Cloud" means data storage on servers hosted by an entity ether t-ran the Contractor and on a <br />network outside the control of the Contractor. Physical storage of data in the cloud typically spans <br />muitlple servers and often multiple locations. Cloud storage ,an be divided between consumer <br />grade storage for personal files and enterprise grade for companies and governmental entities. <br />Examples of Consumer grade storage would include iClotd. Dropbox. Box.com, and many other <br />entities. Enterprise cloud vendorE include Microsoft Azure, Amazcn Web Services, 0365, and <br />Rackspace. <br />e. "Encrypt" means to eicode Confidential Information into s format tnat can only be read by those <br />possessing a "key", a password, aigital certificate or other mechan sm available only to authorized <br />users. Encryption must use a key length of at least 128 b is (256 preferred) for symmetric keys, or <br />2048 bits for asymmetric keys, Wren a symmetric key is used, the Advanced Encryption Standard <br />(AES) must be used if available. <br />f. "Hardened Password' means a sbing of at least eight charac,,ers containing at least three of the <br />following four charactE�T classes: Uppercase alphabetic, lowercase alphabetic, numeral, and special <br />characters such as an asterisk, ampersand, cr exclamatio-i point. <br />g. "Mobile Device" mears a computirg device, typically smaller than s notebook, which runs a mobile <br />operating system, such as iOS, Ar-droid, or "indows Phone. Mobile Devices include smart phones, <br />most tablets, and other form factor. <br />h. "Multi -factor Authentication" means controlling access to computers and other IT resources by <br />requiring two or more pieces of evidence that the user is who they claim to be. These pieces of <br />evidence consist of scmething the user knows, such as a password or PIN; something the user has <br />such as a key card, smart card, or physical token; and something tVe user is, a biometric identifier <br />such as a fingerprint, facial scan, or retinal scan. "PIN" means a personal identification number, a <br />series of numbers which act as a pessword fo- a device. Since PINS are typically only four to six <br />characters, PINs are usually used in conjunctiDn with another factor of authentication, such as a <br />fingerprint. <br />i. "Portable Device" means any computing device with a small form factor, designed to be transported <br />from place to place. Fortable devices are primarily battery powered devices with base computing <br />resources in the form of a processor, memory, storage, and network access. Examples include, but <br />DSHS Central Contract Services Page 19 <br />1769CS County Agreement 05-16-2023 <br />