Laserfiche WebLink
Special Terms and Conditions <br />are not limited to, mobile phones, tablets, and laptops. Motile Device is a subset of Portable <br />Device. <br />j, "Portable Media" means any machine readable media that may routinely be stored or moved <br />independently of computing devices. Examples include magnetic tapes, optical discs (CDs or <br />DV€]s), flash memory (thumb drive) devices, external ha-d crives, and internal hard drives that have <br />been removed from a computing device. <br />"Secure Area" means an area to which only authorized representatives of the entity possessing the <br />Confidential Information have access, and access is con -rolled through use of a key, card key, <br />combination look, or comparable mechanism. Secure Areas may include buildings, rooms or <br />locked storage containers (such as a filing cabinet or desk drawer) within a room, as long as access <br />to the Confidential Irformation is not available to unauthorized personnel. In otherwise Secure <br />Areas, such as an office with restricted access, the Data must be secured in such a way as to <br />prevent access by non -authorized staff such a.�; janitorial or facility security staff, when authorized <br />Contractor staff are not present to ensure that non-autho ized staff cannot access it. <br />I. "Trusted Network" means a network operated and maintained by the Contractor, which includes <br />security controls sufficient to protect DSHS Data on that network. Controls would include a firewall <br />between any other networks, access control lists on network ng devices such as routers and <br />switches, and other such mechanisms which protect the con1dentiality, integrity, and availability of <br />the Data. <br />m. "Unique User ID" means a string of characters that identifies a specific user and which, in <br />conjunction with a password, passphrase or other mecha-iism, authenticates a user to an <br />information system. <br />2. Authority. The security requirements described in this documen- reflent the applicable requirements of <br />Standard 141.10 (.httos:/10cio.wp.govloolicies) of the Office of the Chief Information Officer for the state <br />of Washington, and of the DSHS Information Security Policy and Standards Manual. Reference <br />material related to these -equirements can be found here: https:hwww.dshs.wa.ciov/ffa/keei)ing-dshs-_ <br />cllent-itiformati n- rivate-and-secure, which is a site developed t-y the DSHS Information Security <br />Office and hosted by DSHS Central Caniracts and Legal Services. <br />3. Administrative Controls. The Contractor must have the following controls in place; <br />a. A documented security policy governing the secure use of its computer network and systems, and <br />which defines sanctiois that may be applied to Contractor staff for violating that policy. <br />b. If the Data shared under this agreement is classified as Category 4 data, the Contractor must be <br />aware of and compliant with the applicable legal or regulatory requi-ements for that Category 4 <br />Data. <br />c. If Confidential Information shared under this agreement is classified as Category 4 data, the <br />Contractor must have a documented risk assessment for the system(s) housing the Category 4 <br />Data. <br />4. Authorization, Authentication, and Access. In order to ensure that access to the Data is limited to <br />authorized staff, the Contractor must: <br />DSHS Central Contract Services <br />Page 20 <br />1769CS County Agreement 05-16-2023 <br />