Laserfiche WebLink
Special Terms and Conditions <br />(5) Ensuring that the remote access system prompts for re-2uthentication or performs automated <br />session termina-ion after no more than 30 minutes o- inactivity. <br />(6) Ensuring use of Multi -factor Authentication to connect from the external end point to the internal <br />end point. <br />i. Passwords or PIN codes may meet a lesser standard if used in conjunction with another <br />authentication mechanism, such as a biometric (fingerpr nt, face recognition, iris scan) or token <br />(software, hardware, smart card, etc.) in that case: <br />(1) The PIN or password must be at least 5 letters or numbers when used in conjunction with at <br />least one other authentication factor <br />(2) Must not be comprised of all The same IEtter or number (11111, 22222, aaaaa, would not be <br />acceptable) <br />(3) Must not contain a "run" of three or more consecutive numbers (12398, 98743 would not be <br />acceptable) <br />If the contract specifically allows for the storage of Confidential Information on a Mobile Device, <br />passcodes used on the device must: <br />(1) Be a minimum of six alphanumeric characters <br />(2) Contain at least tree unique character c asses (upper case, Icwer case, letter, number). <br />(3) Not contain more than a three consecutive character run. Passcodes consisting of 12345, or <br />abcd12 would no- be acceptable. <br />k. Render the device urusable after a maximum of 10 failed logion attempts. <br />5. Protection of Data. The Contractor agrees to s4ore Data on one or more of the following media and <br />protect the Data as described: <br />a_ Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be <br />restricted to Authorized User(s) by requiring logon to the loca workstation using a Unique User ID <br />and Hardened Password or other authentication mechanisms, which provide equal or greater <br />security, such as biometrics or smart cards. <br />b. Network server disks. For Data stored on hard disks mcunted on network servers and made <br />available through sha-ed folders, access to the Data will be restricted to Authorized Users through <br />the use of access control lists which will grant access only after the Authorized User has <br />authenticated to the network using a Unique User ID and Hardenec Password or other <br />authentication mechanisms which 3rovide equal or greater security such as biometrics or smart <br />cards, Data on disks mounted to such servers must be located in an area, which is accessible only <br />to authorized personnel, with access controlled through use o-a kel, card key, combination lock, or <br />comparable mechanism. <br />For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as <br />long as the disks remain in a Secure Area anc otherwise mee- the requirements listed in the above <br />paragraph. Destructicn of the Data, as outlined below in Section 8 Data Disposition, may be <br />deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. <br />DSHS Central Contract Services <br />Page 22 <br />1769CS County Agreement 05-16-2023 <br />