Laserfiche WebLink
Policy: <br /> • Each EIV user is required to have their own User ID and Password. <br /> • Only authorized persons will access the EIV data system. <br /> • All EIV information will be documented on an EIV third party verification form. <br /> • All EIV information is not to be printed or saved to a hard drive, unless <br /> authorized by the HCV Program Security Coordinator. <br /> • If approved; EIV information that is printed or saved to a hard drive, must be <br /> locked and monitored in a metal file cabinet or stored in a designated secure area. <br /> • If stored in a restricted area, it must be prominently posted with signs or entry <br /> indicators identifying them as such and with limited points of entry. <br /> • All EIV information, if printed or saved to a hard drive, must be destroyed as <br /> soon as it has served its purpose. <br /> • All UIV originals and copies must be shredded. <br /> • A copy of Forms HUD-9886 or HUD 9887 must be signed by each adult member <br /> of the household and is kept in the household file. <br /> • All users must have signed a current User Agreement and have it on file. <br /> • Must maintain a key control log to track the inventory of keys available for secure <br /> buildings, rooms, or file cabinets, the number of keys issued and to whom the <br /> keys are issued. <br /> • Ensure that combination locks are reset regularly and all keys are returned, <br /> including whenever an employee leaves the program administrator's staff or <br /> office. <br /> • Ensure that UIV information is disposed of in an appropriate manner. <br /> • Must maintain a log of all documents that have been shredded including the name <br /> of the employee who conducted the disposal, a description of the documents. the <br /> method of disposal, and the date of the disposal. <br /> • All users of UIV will have security awareness training as deemed necessary by <br /> the Program Administrator. <br /> • Maintain a record of all personnel who have attended training sessions. <br /> • Section 8 Program Director will immediately report any evidence of unauthorized <br /> access or known security breaches to the HUD Field Office of Public Housing. <br /> All evidence will be provided to the HUD Field office in writing and all security <br /> violations regardless of whether the security violations were intentional or <br /> unintentional. <br /> • Users are given access to the system based on a need to perform specific work <br /> and shall only access the information for which they are specifically authorized. <br /> • Users shall be held accountable for their actions while accessing the system. Be <br /> aware that all computer resources are monitored and audited by HUD. <br /> 154 <br />