Laserfiche WebLink
Attachment A - Joint Agreement for 800 MHz CCCS <br />Page 77 of 83 <br />The System's network is protected from other data networks by isolation or by using System <br />manufacturer specified and configured firewall with the approval of the Lead Agency. <br />All remote access points to the System are kept secure and are coordinated with the Lead <br />Agency. <br />Passwords protect the System and subsystem equipment for the purpose of preventing <br />unauthorized access to equipment. The Lead Agency issues and manages the passwords. <br />User login accounts are protected with passwords providing an appropriate level of protection. <br />If a password is suspected of being compromised, it must be Immediately updated or the user <br />account will be disabled pending resolution. <br />External devices (computers, modems, routers, data storage, etc.) shall not be connected to the <br />System network, computers, or consoles without the approval of the Lead Agency Director. Any <br />such device must also be supplied, supported, and maintained by the user Agency's Information <br />Technology department or service provider to ensure the most current device security software <br />and virus protection is in place. <br />At no time will any personally owned device be connected to any port or connector on the <br />System. Any such action may result in the immediate revocation of access privileges for the <br />offender and/or agency. <br />It is recommended that computers used for programming or maintenance not be connected to <br />the internet to help reduce possibility of virus infection. <br />A `Group Policy' shall be implemented on the System to prevent the use of external USB ports <br />on all dispatch consoles. <br />Procedure <br />All agencies, contractors, and personnel that require access to Lead Agency controlled sites, <br />equipment or networks must pass a comprehensive background check before access is allowed <br />and must be accompanied by Lead Agency staff while on site. <br />Violations of System security policy or procedures may jeopardize the System and result in the <br />loss of a technician's, agency's or vendor's privileges to access the System. <br />System documentation is classified as 'Restricted Information'. <br />Management <br />The Lead Agency Director is responsible for the network, equipment, and site security of the <br />System. <br />8.3 Software, Firmware and Document Security <br />Purpose or Objective <br />Establishes the minimum security measures and procedures to protect the integrity of the <br />System software and programming. <br />