My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Security Policies and Procedures <br />Configuration changes are made to critical applications <br />Changes are made to encryption scheme(s) <br />D. Wireless access testing <br />E. Password testing <br />XXIL Use of Email. Internet, Messaging, Public Sites, Blogs, Social Media <br />Policy <br />Sexually explicit material <br />Confidential. Private or Protected Information or Internal Use material, except as <br />meets the Handling Rules section <br />Viruses <br />Threats <br />Inappropriate or unlawful language, including_ <br />Offensive language <br />Language inappropriate for the Company environment <br />Discriminatory or harassing language <br />Tools usable for hacking, password cracking, vulnerability scanning or penetration <br />testing <br />XXIII. Hardware <br />Definitions <br />B. Policy <br />C. Asset management <br />D. Enforcement <br />XXIV. Networks <br />Overview <br />Denial of service attacks <br />Improper access <br />Virus infections <br />Unauthorized software installations, email. FTP or other improper usage <br />Administration of network and communications connections <br />Operations of all devices <br />Monitoring <br />Timely review of audit logs and response to alerts or alarms <br />Review of unusual patterns of usage or activity <br />Monitoring <br />Access control and physical security <br />Access limited to authorized personnel only <br />Phvsical securitv. includine RFID or Dasscode controlled locks. are in place <br />Modifications. updates <br />Documentation <br />Network design <br />Segmentation <br />Rev.2015.8.6 <br />
The URL can be used to link to this page
Your browser does not support the video tag.