You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy -Section II: Roles and Responsibilities
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
II. Roles and Responsibilities
Read next: Section III: Access Control Policy
II. Roles and Responsibilities
Information security extends well beyond Information Technology (IT). Information security is a critical business function that touches all aspects of an organization including, fiscal, legal, human resources and IT. The County of Sonoma (County) is fully committed to information security and asserts that every person employed by or on behalf of the County has important responsibilities to maintain the security of Local Agency IT resources and data.
- Chief Information Security Officer
The County Information Systems Director serves as the Chief Information Security Officer and is responsible for:- Overseeing and managing the County Information Technology and Security Program, which includes:
- Developing and maintaining the County information security strategy;
- Providing information security related technical, regulatory and policy leadership;
- Facilitating the implementation of County information technology and security policies; and
- Approving or denying policy waivers.
- Overseeing and managing the County Information Technology and Security Program, which includes:
- Information Security Steering Committee
The Information Security Steering Committee is the coordinating body for all County information security-related activities and is composed of the County Privacy Officer, Information Security Officer and individuals designated by the IT Governance Council. The Information Security Steering Committee is responsible for:- Developing and proposing County information technology and security policies, standards, and guidelines;
- Reviewing County information technology and security policies and policy waivers annually;
- Reviewing Local Agency policy exception requests and making recommendations for CISO approval or denial;
- Maintaining documentation of policy waivers;
- As requested, reviewing Local Agency information technology and security policies for compliance with County policies; and
- Identifying and recommending industry best practices for information security.
- Local Agency Department Head/General Manager
The Local Agency Department Head/General Manager and/or Designee are responsible for:- Periodically reviewing security processes to ensure compliance with relevant security policies and standards;
- Establishing supplemental information technology and security policies as needed for their business purposes, provided they are not less restrictive than County policies;
- Establishing procedures and guidelines as needed in support of this Policy manual; and
- Designation of an information security representative.
- Information Security Representative
The Information Security Representative is designated by the Local Agency Department Head/General Manager to coordinate information security within their Local Agency and is responsible for:- Assisting in the development of any Local Agency information technology and security policy;
- Reviewing Local Agency information technology and security policies for compliance with County policies; and
- Representing the Local Agency’s information security concerns countywide.
- Local Information Services Providers
The County Information Systems Department, the Human Services Department Information Integration Division, the Sonoma County Sheriff's Office Technical Services Bureau, and the County Water Agency Computer Application and Instrumentation Support Section serve as Local Information Service Providers and are responsible for:- Providing network infrastructure, network access, data storage and e-mail services to Local Agencies;
- Maintaining an inventory of Local Agency IT resources;
- Configuring Local Agency IT resources in accordance with County information technology and security standards;
- Implementing and maintaining technology-based services that adhere to the intent and purpose of applicable information technology and security policies, standards and guidelines;
- Investigation, remediation and documentation of information security incidents; and
- Establishing and implementing standards, procedures, and guidelines as needed for this Policy manual.
- Data Owner
The Data Owner is the Local Agency Department Head/General Manager or other individual authorized by law, regulation or policy to collect and manage the data that supports their business operations and is responsible for:- Identifying applicable law, regulations, or standards that contain information security requirements for the data they own;
- Classification of Local Agency data and IT resources based upon law, regulation, common business practice, liability or reputational factors;
- Establishing as needed, Local Agency policies and procedures for the data and IT resources they own; and
- Responsible for ensuring mitigation of known or suspected information security incidents, and notification to individuals or agencies in the event of a data breach involving unencrypted personal information.
- Data Steward
The Data Steward is designated by the Data Owner to protect the confidentiality, integrity, and availability of the data that supports their business operations and is responsible for:- Assisting the Data Owner in the classification of Local Agency data;
- Implementing protection requirements for the data and IT resources entrusted to their stewardship; and
- Authorizing access to Local Agency data in accordance with the classification of the data.
- Data Custodian
The Local Information Service Provider serves as the Data Custodian and is responsible for:- Implementing the necessary safeguards to protect Local Agency data and IT resources at the level classified by the Data Owner or the Data Steward;
- Granting access privileges as authorized by the Data Owner or Data Steward;
- Complying with any additional security policies and procedures established by the Data Owner and/or Data Steward;
- Advising the Data Owner and/or Data Steward of vulnerabilities that may present a threat to their Local Agency data and of specific means of protecting that data; and
- Notifying the Data Owner of any known or suspected information security incident.