My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Security Policies and Procedures <br />VII. Handling Rules for the Information Classifications <br />A. Overview <br />This section outlines the basic rules for handling information types according to the <br />classifications. More specific standards for platforms, processes and networks appear <br />in each topic section of this standards document. <br />B. Inventory of Information Assets and Electronic Asset Management Log <br />An inventory is maintained of all significant information assets belonging to, or used by <br />Virtru. This inventory includes: <br />1. Serial numbers/license numbers <br />2. MAC Addresses <br />3. Model <br />4. Device Type <br />5. Manufacturer <br />6. The information owner <br />7. Username <br />8. Location <br />9. OS Version <br />10. The custodian of the information and repository location (database, file <br />cabinet, etc.) <br />11. Purpose in our systems <br />12. Asset value in dollars or other suitable measurement <br />13. The sensitivity of the asset, due to regulations, laws, customer expectations <br />or other requirements <br />14. Requirements for the asset regarding availability, uptime, etc. <br />15. Contact information for one or more parties who can repair, restore, replace, <br />or recover this asset. Examples are hardware/software vendors, IT support <br />vendors, and/or staff members <br />This asset list contains information that is restricted to executives and super-admins, <br />and therefore is stored securely on the Synology NAS, which itself is backed up to AWS <br />Glacier. <br />This inventory will be reviewed and updated quarterly, or as new assets and devices <br />are added. Logs are maintained as the Inventory of Information Assets Log and the <br />Rev.2015.8.6 <br />18 <br />
The URL can be used to link to this page
Your browser does not support the video tag.