My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
TRITECH SOFTWARE SYSTEMS -2015
Clerk
>
Contracts / Agreements
>
T
>
TRITECH SOFTWARE SYSTEMS -2015
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/16/2025 3:14:32 PM
Creation date
12/22/2015 9:39:05 AM
Metadata
Fields
Template:
Contracts
Company Name
TRITECH SOFTWARE SYSTEMS
Contract #
A-2015-252
Agency
POLICE
Council Approval Date
11/17/2015
Expiration Date
1/1/1900
Insurance Exp Date
8/31/2026
Destruction Year
2028
Document Relationships
TRITECH SOFTWARE SYSTEMS
(Amended By)
Path:
\Contracts / Agreements\T
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
375
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Chapter 2 — Networking, Security, and Support Connectivity <br />5. For customers not utilizing aprecision time source device TriTech recommends the use of Windows Time <br />Synchronization. However, some customers may choose to disable the Microsoft Time Synchronization <br />feature and use the TriTech component commonftmtion.exe instead. Please see Inform CAD Technical <br />Advisory TA15-009 regarding disabling Windows Time Synchronization. <br />Remote connectivity to the customer system is essential for the research, diagnosis and resolution of issues in a <br />timely and efficient manner. This connectivity is also utilized during the implementation of new <br />systems/components and during the upgrade process for new TriTech software versions and service packs. <br />TriTech recommends both a primary and a secondary method of connectivity to ensure the ability of TriTech to <br />connect to the customer system to provide critical support services. Connectivity options approved by TriTech <br />are described in this section. <br />7.1 TRITECH SECURITY PROGRAM FOR REMOTE CONNECTIVITY <br />TriTech operates a CJIS—level security program for its personnel, facilities and infrastructure consistent with <br />Federal Standards for "Criminal Justice Information"" and "Protected Health Information"" provisions for remote <br />connectivity in order to provide data security. <br />TriTech infrastructure security for Security Authorized personnel includes personal passwords and Advanced <br />Authentication to gain access to the TriTech network. Personnel must first successfully login to their computer <br />with Advanced Authentication before they can connect to a customer site with secure access login to the <br />customer system and/or to remotely access the secure servers/storage where customer data/information is stored. <br />TriTech domain passwords meet or exceed CJIS standards including rules for length, complexity, reuse, <br />expiration and exclusions. <br />Advanced Authentication, as deployed at TriTech, utilizes a variety of techniques including an issued building <br />access card (HID), the employee's fingerprint, or an issued YUBIKEY device (depending on implementation <br />site). Remote access to TriTech's network and secure servers requires an additional level of Advanced <br />Authentication through a DUO/Cisco validation. Other methods of approved Advanced Authentication may be <br />used at the discretion of the TriTech Director of hnformation Services and in accordance with the FBI CJIS <br />Security Policy. <br />7.2 TRITECH APPROVED METHODS OF CONNECTIVITY <br />TriTech has approved VPN (virtual private network) connectivity as the sole primary form of support <br />connectivity for Inform CAD aid Inform CAD Subsystems (Inform Mobile and the like) deployed by TriTech. <br />Each customer under a Software Maintenance and Support Agreement shall establish a dependable VPN form of <br />access for TriTech use in order to be supported. VPN access must allow for multiple simultaneous connections <br />from'friTech. <br />r Including Criminal Justice Information (CJI), National Crime Information Center (NCIC) data, and State specific <br />CJI as described in the U. S. Department of Justice - Federal Bureau of Investigation - Criminal Justice Information <br />Services Division's Criminal Justice Information Services (CJIS) Security Policy. <br />" Federal Health Information Portability and Accountability of Act (HIPAA) of 1996. <br />3 <br />The contents of this material are confidential and proprietary to TriTech Software Systems, Inc. and may not be reproduced, <br />published or disclosed to others without the prior written consent of TriTech Software Systems, Inc. <br />92015 TriTech Software Systems <br />
The URL can be used to link to this page
Your browser does not support the video tag.