My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Security Policies and Procedures <br />Mixpanel <br />Users who have access to Mixpanel have General Access. User sessions do not <br />automatically time out, the user is required to log out at the end of a session. <br />Kissmetrics <br />Users who have access to Kissmetrics have General Access. User sessions do not <br />automatically time out, the user is required to log out at the end of a session. <br />Salesforce <br />Users who have access to Salesforce have General Access. User sessions <br />automatically time out after twenty (20) minutes. <br />Segment.io <br />Users who have access to Segment.io have General Access. User sessions do not <br />automatically time out, the user is required to log out at the end of a session. <br />B. Access Rules <br />User IDs and accounts must be authorized to access only those elements needed for the <br />user's role, including: <br />1. Limiting access to datasets and types <br />2. Limiting access to operating systems <br />3. Limiting times of access <br />Access to operating systems, ad hoc transaction capabilities, software development <br />tools, and other system devices must be controlled and limited to only those User IDs <br />which require that access. <br />Segregation of duties shall be established for all information asset controls to minimize <br />the possibility that one person is responsible for an entire asset. <br />A user (and hence User ID) that changes role or job function must have access rights <br />updated to match the new job role or function. Any changes will be documented in the <br />Responsibility Change Log. <br />C. Temporary Privileged Users and Accounts <br />Temporary privileged users are defined as those who: <br />1. Have any control over security tools on an application, system or network <br />2. Can update operating systems or similar tools <br />3. Can directly modify data within a database or application <br />4. Have any special capabilities built in by the vendor of the application <br />software, operating system or platform <br />Rev.2015.8.6 <br />30 <br />
The URL can be used to link to this page
Your browser does not support the video tag.