We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.
Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.
Codes The Developer agrees to abide by all ordinances, regulations, and codes of Teton County and those of the special purpose districts providing service to the Development.
Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.
Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer customer number and password. No one at MIT Federal Credit Union has access to your Accounts passwords or user ID’s. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at MIT Federal Credit Union will know or need to know your password, and MIT Federal Credit Union employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the “Shared Secret”) that is known only to you and to the person to whom you are transferring the funds (the “Recipient”). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, call: 000-000-0000 or fax: 000-000-0000 , or e-mail: xxxxxx@xxx.xxx, or write: Funds Transfer Administrator, MIT Federal Credit Union 000 Xxxxxxxxxx Xxxxxx, Xxxxxxxxx, XX 00000-0000. You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum non-sufficient funds/overdraft (NSF/OD) line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.
User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)
CODES AND REGULATIONS The Contractor shall strictly comply with all Federal, State and local codes and regulations.
Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
CLEARANCE PATTERNS 7.1 The State shall develop separate clearance patterns for each of the following: The State shall develop separate clearance patterns for the Statewide Payroll and each program and independent functions within specific programs listed in sections 4.2 and 4.3 (any interest exempted program) of this Agreement. 7.2 The following shall develop the State's clearance patterns: The Department of Administration shall develop the State's clearance patterns. 7.3 The sources of data the State shall use when developing its clearance patterns are as follows: The data utilized in the development of clearance patterns comes from SABHRS (Statewide Accounting, Budget, and Human Resource System). The System is administered by the SABHRS Financial Services Technology Bureau of the State Financial Services Division within the Department of Administration. 7.4 The State shall use the following methodology when developing its clearance patterns: When developing each clearance pattern, the State shall track at least 99% of the funds disbursed, from issuance to clearance, for a period of at least three months. 7.5 The State shall identify for each check or warrant (hereafter, check) in the population: (1) the date the check was released for payment; (2) the date the check was debited from the State's account, and, (3) the amount of the check. 7.6 The State shall use the following method to calculate the dollar-weighted average day of clearance: To determine the number of days each check was outstanding (clearance time), the issue date shall be subtracted from the date the check cleared the State's account. To determine the percentage of the disbursement paid out each day following issuance, the amount of the checks that clear the State's account each day shall be summed and then divided by the amount of the total disbursement. For each day following issuance, the clearance time of the checks paid out that day shall be multiplied by the percentage of the total disbursement those checks represent. This product is the clearance factor. The dollar-weighted average day of clearance for the disbursement shall be determined by summing the clearance factor of each day following the disbursement. 7.7 The State shall adjust each clearance pattern to reflect the dollar-weighted proportion of funds paid out by EFT/Direct payroll, with the following exceptions: No exceptions. The State shall also adjust each clearance pattern to reflect: No exceptions. 7.8 Each of the State's clearance patterns is calculated in Business days. 7.9 An authorized State official shall certify that each clearance pattern developed by the State accurately corresponds to the clearance activity of the programs to which it is applied. This certification shall be provided to the Fiscal Service prior to the effective date of the Agreement. The State shall recertify its clearance patterns at least every five years. 7.10 The State shall follow the procedures of 31 CFR 205 if it has actual or constructive knowledge, at any time, that a clearance pattern does not correspond to a program's clearance activity.