Laserfiche WebLink
Special Terms and Conditions <br />a. Have documented policies and procedures governing access to systems with the shared Data <br />b, Restrict access thro igh administ-ative, physical, and technical coitrols to authorized staff. <br />c. Ensure that user accounts are urique and that any given usar account logon ID and password <br />combination is known only to the one employee to whom that account is assigned. For purposes of <br />non -repudiation, it rrust always be possible -o determine which employee performed a given action <br />on a system housing the Data based solely on the logon ID used ro perform the action <br />d. Ensure that only authorized users are capat:le of accessing the Data. <br />e. Ensure that an emplcyee's access to the Data is removed immediately: <br />(1) Upon suspected compromise of the user credentials. <br />(2) When their employment, or the contract under which 'he Data is made available to them, is <br />terminated. <br />(3) When they no longer need access to the Data to fulfill the requdrements of the contract. <br />f. Have a process to periodically ref, iew and verify that only authorized users have access to systems <br />containing DSHS Co-ifidential Information <br />g. When accessing the Data from within the Co-itractor's network (the Data stays within the <br />Contractor's network at all times), enforce password and logon requirements for users within the <br />Contractor's network, including: <br />(1) A minimum length of 8 characters, and containing at leas"' three of the following character <br />classes: uppercase letters, lowercase letters, numerals, and special characters such as an <br />asterisk, ampersand, or exclamation poin-. <br />(2) That a password does not con-ain a user's name, logcn ID, or any form of their full name. <br />(3) That a password does not consist of a single dictionary word. A password may be formed as a <br />passphrase which consists of multiple dictionary words. <br />(4) That passwords a-e significant y different `rom the previous four passwords. Passwords that <br />increment by simply adding a rumber are not considered significantly different. <br />h. When accessing Confidential Information from an external location (the Data will traverse the <br />Internet or otherwise travel outside the Contractor's network), mitigate risk and enforce password <br />and logon requirements for users by employing measures including-- <br />(1) Ensuring mitigations applied to the system don't allow end -user modification <br />(2) Not allowing the use of dial -up ;onnections. <br />(3) Using industry standard protocols and solutions for remote access. Examples would include <br />RADIUS and Citrix. <br />(4) Encrypting all remote access traffic from tl-e external workstation to Trusted Network or to a <br />component within the Trusted Network. The traffic must be encrypted at all times while <br />traversing any network, including the Internet, which is not a Trusted Network. <br />DSHS Central Contract Services Page 21 <br />1769CS County Agreement 05-15-2023 <br />