Laserfiche WebLink
TABLE OF CONTENTS <br />PREFACE <br />I <br />SUMMARY OF THE INFORMATION SYSTEMS SECURITY POLICY <br />2 <br />SECURITY POLICY FOR ALL COMPUTERS, COMPUTER EQUIPMENT AND. <br />2 <br />RELATED COMPUTER ITEMS THROUGHOUT THE CITY <br />Policy Objectives <br />3 <br />DEFINITIONS OF RESOURCE RESPONSIBILITY AND AUTHORITY <br />4 <br />Resource Responsibility and Authority <br />4 <br />Authorization Levels <br />4 <br />ASSIGNMENT OF RESOURCE RESPONSIBILITY <br />5 <br />Security Administration <br />5 <br />Technical Support <br />5 <br />Systems & Programming <br />5 <br />Internal Production Audit <br />5 <br />USER IDENTIFICATION AND VERIFICATION <br />6 <br />RESOURCE AUTHORIZATION CHECKING <br />6 <br />LOGGING AND REPORTING OF VARIATIONS <br />6 <br />COMPUTER AUDIT TRAIL <br />6 <br />SOFTWARE LICENSING GUIDELINES <br />6 <br />HARDWARE, SOFTWARE AND CABLES OWNERSHIP <br />7 <br />MAINTENANCE AND REPAIR <br />7 <br />EMPLOYEE RESIGNATION, TERMINATION OR REASSIGNMENT <br />g <br />COMPUTER GUIDELINES <br />g <br />OFF SITE USE OF CITY OWNED COMPUTER EQUIPMENT <br />10 <br />NON -CITY OWNED COMPUTER EQUIPMENT ON CITY'S PREMISES <br />10 <br />FAILURE TO ABIDE <br />10 <br />EMPLOYEE ACKNOWLEDGEMENT <br />11 <br />