Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy. 10.2.5.2 Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County network security, or the site primarily includes content that is prohibited under this Policy. 10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action. 10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance. 10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk. 10.2.5.6 Only authorized staff should maintain, move or modify County network systems and components. 10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network. 10.2.5.8 Licensing requirements and copyright laws must be adhered to. 10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates. 10.2.5.10 Security lifecycle practices must be practiced in all development cycles. 10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored. 10.2.5.12 Applications should employ Single Sign On technology. 10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 21 contracts
Samples: Contract for Services, Contract for Services, Contract for Services
Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 Only authorized staff should maintain, move or modify County COUNTY network systems and components.
10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 4 contracts
Samples: Contract for Services, Contract for Services, Contract for Services
Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 Access to any internet-internet based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 Only authorized staff should maintain, move or modify County network systems and components.
10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 4 contracts
Samples: Consulting Services Agreement, Contract for Services, Contract for Services
Authorized Access. 10.2.5.1 10.2.5.1. Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 10.2.5.2. Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 10.2.5.3. Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 10.2.5.4. Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 10.2.5.5. Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 10.2.5.6. Only authorized staff should maintain, move or modify County COUNTY network systems and components.
10.2.5.7 10.2.5.7. If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 10.2.5.8. Licensing requirements and copyright laws must be adhered to.
10.2.5.9 10.2.5.9. All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security 00.0.0.00. Xxxxxxxx lifecycle practices must be practiced in all development cycles.
10.2.5.11 10.2.5.11. Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 10.2.5.12. Applications should employ Single Sign On technology.
10.2.5.13 Business 00.0.0.00. Xxxxxxxx critical systems and data must be backed up with periodically validated processes.
Appears in 2 contracts
Samples: Contract for Services, Contract for Services
Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 Only authorized staff should maintain, move or modify County network systems and components.
10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.. DRAFT
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services
Authorized Access. 10.2.5.1 9.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 9.2.5.2 Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 9.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 9.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 9.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 9.2.5.6 Only authorized staff should maintain, move or modify County network systems and components.
10.2.5.7 9.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 9.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 9.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 9.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 9.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 9.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 9.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services
Authorized Access. 10.2.5.1 Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 Access to any internet-internet based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 Only authorized staff should maintain, move or modify County network systems and components.
10.2.5.7 If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 Licensing requirements and copyright laws must be adhered to.
10.2.5.9 All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services
Authorized Access. 10.2.5.1 10.2.5.1. Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 10.2.5.2. Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 10.2.5.3. Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 10.2.5.4. Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 10.2.5.5. Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 10.2.5.6. Only authorized staff should maintain, move or modify County COUNTY network systems and components.
10.2.5.7 10.2.5.7. If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 10.2.5.8. Licensing requirements and copyright laws must be adhered to.
10.2.5.9 10.2.5.9. All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security 00.0.0.00. Xxxxxxxx lifecycle practices must be practiced in all development cycles.
10.2.5.11 Per . 10.2.5.11.Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services
Authorized Access. 10.2.5.1 10.2.5.1. Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.
10.2.5.2 10.2.5.2. Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 10.2.5.3. Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 10.2.5.4. Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 10.2.5.5. Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 10.2.5.6. Only authorized staff should maintain, move or modify County COUNTY network systems and components.
10.2.5.7 10.2.5.7. If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 10.2.5.8. Licensing requirements and copyright laws must be adhered to.
10.2.5.9 10.2.5.9. All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security 00.0.0.00. Xxxxxxxx lifecycle practices must be practiced in all development cycles. 10.
10.2.5.11 Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 Applications should employ Single Sign On technology.
10.2.5.13 Business critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services
Authorized Access. 10.2.5.1 10.2.5.1. Users may access only the messages, files, or programs that they have authorization to use and where that use, or access is actually needed to perform their work duties. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of Placer County, or improper use of information obtained by authorized means is a violation of this Policy.. DRAFT
10.2.5.2 10.2.5.2. Access to any internet-based site, including Cloud or social media site, is limited to Placer County IT approved sites and access or use may be prohibited by Placer County IT on the ground that the access poses an unreasonable risk to County COUNTY network security, or the site primarily includes content that is prohibited under this Policy.
10.2.5.3 10.2.5.3. Attempts to circumvent protection mechanisms and standards to gain unauthorized access will be subject to disciplinary action.
10.2.5.4 10.2.5.4. Vendors must comply with Placer County security standards and it is the responsibility of the department involved to monitor this compliance.
10.2.5.5 10.2.5.5. Security vulnerabilities and suspicious or illicit use of information technologies should be reported to your immediate supervisor or the Information Technology Service Desk.
10.2.5.6 10.2.5.6. Only authorized staff should maintain, move or modify County COUNTY network systems and components.
10.2.5.7 10.2.5.7. If removable media devices are used, they must be scanned with an antivirus solution when plugged into the Placer County network.
10.2.5.8 10.2.5.8. Licensing requirements and copyright laws must be adhered to.
10.2.5.9 10.2.5.9. All department supported systems and devices must be maintained with the current security patches and updates.
10.2.5.10 Security 00.0.0.00. Xxxxxxxx lifecycle practices must be practiced in all development cycles.
10.2.5.11 10.2.5.11. Per the Placer County Information Security Program Charter, data sensitivity is established by the department owning the information. All sensitive or confidential data must be protected in transit and when stored.
10.2.5.12 10.2.5.12. Applications should employ Single Sign On technology.
10.2.5.13 Business . 00.0.0.00.Xxxxxxxx critical systems and data must be backed up with periodically validated processes.
Appears in 1 contract
Samples: Contract for Services