Laserfiche WebLink
Chapter 2 — Networking, Security, and Support Connectivity <br />5. For customers not utilizing aprecision time source device TriTech recommends the use of Windows Time <br />Synchronization. However, some customers may choose to disable the Microsoft Time Synchronization <br />feature and use the TriTech component commonftmtion.exe instead. Please see Inform CAD Technical <br />Advisory TA15-009 regarding disabling Windows Time Synchronization. <br />Remote connectivity to the customer system is essential for the research, diagnosis and resolution of issues in a <br />timely and efficient manner. This connectivity is also utilized during the implementation of new <br />systems/components and during the upgrade process for new TriTech software versions and service packs. <br />TriTech recommends both a primary and a secondary method of connectivity to ensure the ability of TriTech to <br />connect to the customer system to provide critical support services. Connectivity options approved by TriTech <br />are described in this section. <br />7.1 TRITECH SECURITY PROGRAM FOR REMOTE CONNECTIVITY <br />TriTech operates a CJIS—level security program for its personnel, facilities and infrastructure consistent with <br />Federal Standards for "Criminal Justice Information"" and "Protected Health Information"" provisions for remote <br />connectivity in order to provide data security. <br />TriTech infrastructure security for Security Authorized personnel includes personal passwords and Advanced <br />Authentication to gain access to the TriTech network. Personnel must first successfully login to their computer <br />with Advanced Authentication before they can connect to a customer site with secure access login to the <br />customer system and/or to remotely access the secure servers/storage where customer data/information is stored. <br />TriTech domain passwords meet or exceed CJIS standards including rules for length, complexity, reuse, <br />expiration and exclusions. <br />Advanced Authentication, as deployed at TriTech, utilizes a variety of techniques including an issued building <br />access card (HID), the employee's fingerprint, or an issued YUBIKEY device (depending on implementation <br />site). Remote access to TriTech's network and secure servers requires an additional level of Advanced <br />Authentication through a DUO/Cisco validation. Other methods of approved Advanced Authentication may be <br />used at the discretion of the TriTech Director of hnformation Services and in accordance with the FBI CJIS <br />Security Policy. <br />7.2 TRITECH APPROVED METHODS OF CONNECTIVITY <br />TriTech has approved VPN (virtual private network) connectivity as the sole primary form of support <br />connectivity for Inform CAD aid Inform CAD Subsystems (Inform Mobile and the like) deployed by TriTech. <br />Each customer under a Software Maintenance and Support Agreement shall establish a dependable VPN form of <br />access for TriTech use in order to be supported. VPN access must allow for multiple simultaneous connections <br />from'friTech. <br />r Including Criminal Justice Information (CJI), National Crime Information Center (NCIC) data, and State specific <br />CJI as described in the U. S. Department of Justice - Federal Bureau of Investigation - Criminal Justice Information <br />Services Division's Criminal Justice Information Services (CJIS) Security Policy. <br />" Federal Health Information Portability and Accountability of Act (HIPAA) of 1996. <br />3 <br />The contents of this material are confidential and proprietary to TriTech Software Systems, Inc. and may not be reproduced, <br />published or disclosed to others without the prior written consent of TriTech Software Systems, Inc. <br />92015 TriTech Software Systems <br />