My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
06/23/2015 (4)
CBCC
>
Meetings
>
2010's
>
2015
>
06/23/2015 (4)
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/2/2021 10:52:27 AM
Creation date
9/2/2015 12:02:44 PM
Metadata
Fields
Template:
Meetings
Meeting Type
Regular Meeting
Document Type
Agenda Packet
Meeting Date
06/23/2015
Meeting Body
Board of County Commissioners
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
260
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Policy: <br /> • Each EIV user is required to have their own User ID and Password. <br /> • Only authorized persons will access the EIV data system. <br /> • All EIV information will be documented on an EIV third party verification form. <br /> • All EIV information is not to be printed or saved to a hard drive, unless <br /> authorized by the HCV Program Security Coordinator. <br /> • If approved; EIV information that is printed or saved to a hard drive, must be <br /> locked and monitored in a metal file cabinet or stored in a designated secure area. <br /> • If stored in a restricted area, it must be prominently posted with signs or entry <br /> indicators identifying them as such and with limited points of entry. <br /> • All EIV information, if printed or saved to a hard drive, must be destroyed as <br /> soon as it has served its purpose. <br /> • All UIV originals and copies must be shredded. <br /> • A copy of Forms HUD-9886 or HUD 9887 must be signed by each adult member <br /> of the household and is kept in the household file. <br /> • All users must have signed a current User Agreement and have it on file. <br /> • Must maintain a key control log to track the inventory of keys available for secure <br /> buildings, rooms, or file cabinets, the number of keys issued and to whom the <br /> keys are issued. <br /> • Ensure that combination locks are reset regularly and all keys are returned, <br /> including whenever an employee leaves the program administrator's staff or <br /> office. <br /> • Ensure that UIV information is disposed of in an appropriate manner. <br /> • Must maintain a log of all documents that have been shredded including the name <br /> of the employee who conducted the disposal, a description of the documents. the <br /> method of disposal, and the date of the disposal. <br /> • All users of UIV will have security awareness training as deemed necessary by <br /> the Program Administrator. <br /> • Maintain a record of all personnel who have attended training sessions. <br /> • Section 8 Program Director will immediately report any evidence of unauthorized <br /> access or known security breaches to the HUD Field Office of Public Housing. <br /> All evidence will be provided to the HUD Field office in writing and all security <br /> violations regardless of whether the security violations were intentional or <br /> unintentional. <br /> • Users are given access to the system based on a need to perform specific work <br /> and shall only access the information for which they are specifically authorized. <br /> • Users shall be held accountable for their actions while accessing the system. Be <br /> aware that all computer resources are monitored and audited by HUD. <br /> 154 <br />
The URL can be used to link to this page
Your browser does not support the video tag.