My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
04/22/2025
CBCC
>
Meetings
>
2020's
>
2025
>
04/22/2025
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
6/10/2025 10:25:59 AM
Creation date
6/10/2025 9:06:39 AM
Metadata
Fields
Template:
Meetings
Meeting Type
BCC Regular Meeting
Document Type
Agenda Packet
Meeting Date
04/22/2025
Meeting Body
Board of County Commissioners
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
469
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Workstations shall be left in a powered -on state so that administration tasks <br />may be performed on the workstation. <br />Personnel shall log off or lock their workstations and laptops when their workspace is <br />unattended. <br />c. Confidential or internal information shall be removed or placed in a locked drawer or <br />file cabinet when the workstation is unattended and at the end of the workday if <br />physical access to the workspace cannot be secured by other means. <br />d. File cabinets containing confidential information shall be locked when not in use or <br />when unattended. <br />e. Physical and/or electronic keys used to access confidential information shall not be left <br />on an unattended desk or in an unattended workspace if the workspace itself is not <br />physically secured. <br />f. Laptops shall not be left unattended when in use away from the office. Laptops shall <br />remain in the possession of the person that they are issued to or stored in a locked <br />drawer or cabinet when not in use (e.g. end of the workday). <br />g. Passwords must not be stored on or under a computer or in any other physically <br />accessible location. <br />h. Copies of documents containing confidential information should be immediately <br />removed from printers and fax machines. <br />5. Data Security <br />a. Personnel shall use approved encrypted communication methods when sending <br />confidential information over public computer networks (Internet). <br />b. Only authorized cloud computing applications maybe used for sharing, storing, and <br />transferring confidential or internal information. <br />c. Information must be appropriately shared, handled, transferred, saved, and destroyed, <br />based on the information sensitivity and consistent with Public Records Law and <br />retention requirements. <br />d. All electronic media containing confidential information must be disposed of securely <br />and consistent with Public Records Law and retention requirements. Please contact the <br />Information Technology Department for guidance or assistance. <br />Page 16 <br />69 <br />SECTION <br />NUMBER <br />EFFECTIVE DATE <br />Information <br />ADMINISTRATIVE <br />Technology <br />AM -1200.21 <br />4/22/2025 <br />POLICY MANUAL <br />SUBJECT <br />PAGE <br />Acceptable Use <br />Page 6 of 18 <br />Workstations shall be left in a powered -on state so that administration tasks <br />may be performed on the workstation. <br />Personnel shall log off or lock their workstations and laptops when their workspace is <br />unattended. <br />c. Confidential or internal information shall be removed or placed in a locked drawer or <br />file cabinet when the workstation is unattended and at the end of the workday if <br />physical access to the workspace cannot be secured by other means. <br />d. File cabinets containing confidential information shall be locked when not in use or <br />when unattended. <br />e. Physical and/or electronic keys used to access confidential information shall not be left <br />on an unattended desk or in an unattended workspace if the workspace itself is not <br />physically secured. <br />f. Laptops shall not be left unattended when in use away from the office. Laptops shall <br />remain in the possession of the person that they are issued to or stored in a locked <br />drawer or cabinet when not in use (e.g. end of the workday). <br />g. Passwords must not be stored on or under a computer or in any other physically <br />accessible location. <br />h. Copies of documents containing confidential information should be immediately <br />removed from printers and fax machines. <br />5. Data Security <br />a. Personnel shall use approved encrypted communication methods when sending <br />confidential information over public computer networks (Internet). <br />b. Only authorized cloud computing applications maybe used for sharing, storing, and <br />transferring confidential or internal information. <br />c. Information must be appropriately shared, handled, transferred, saved, and destroyed, <br />based on the information sensitivity and consistent with Public Records Law and <br />retention requirements. <br />d. All electronic media containing confidential information must be disposed of securely <br />and consistent with Public Records Law and retention requirements. Please contact the <br />Information Technology Department for guidance or assistance. <br />Page 16 <br />69 <br />
The URL can be used to link to this page
Your browser does not support the video tag.