My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
MOBILE ELECTRONIC DEVICE 5-2012
Clerk
>
Policies
>
MOBILE ELECTRONIC DEVICE 5-2012
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/15/2015 1:00:06 PM
Creation date
6/2/2015 8:24:52 PM
Metadata
Fields
Template:
City Clerk
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
7
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
F. Confidential Information: information that may be associated with an individual, <br />e.g. HIPPA, and /or privileged attorney /client information. <br />G. Sensitive Information: any information that could potentially be used maliciously to <br />compromise the security of COSA resources or customers, i.e. administrative <br />passwords connected to COSA server(s). <br />H. Malware: includes computer viruses, worms, Trojan horses, spyware, dishonest <br />adware, crime ware, and other malicious and unwanted software. <br />Mobile Electronic Device: any portable electronic device that can view, share, <br />access, and /or process digital information. Examples of a portable electronic <br />device may include: <br />• Laptops <br />• Blackberries <br />• Smartphones <br />• Tablets (iPad) <br />J. Personal Mobile Electronic Device: any mobile electronic device not owned by <br />COSA, but connected to City server or other COSA connectivity devices that are <br />subject to this Policy. <br />K. Third Parties: any entity that interacts with COSA, but is not directly affiliated, <br />including: clients, contractors, sub - contractors, government agencies, vendors, <br />community organizations, unions, etc. <br />L. Authorized user: refers to an employee, elected official, or contractor approved <br />for assignment of a device. Such a device, if public property, shall be used for <br />business purposes only. <br />PROCEDURES <br />A. COSA shall ensure that only authorized mobile electronic devices are allowed to <br />be used in the COSA computing environment: <br />1. Authorization must be received by Department Head prior to any device <br />be added to the COSA computing environment. <br />2. All authorized users shall protect all mobile electronic devices, as well as <br />the data they contain, with an appropriate level of security. <br />B. COSA shall ensure that all authorized mobile electronic devices are centrally <br />managed in order to ensure accurate inventory, minimize operational overhead, <br />2 1 P a g e <br />
The URL can be used to link to this page
Your browser does not support the video tag.