You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy -Section III: Access Control Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
III. Access Control Policy
Read next: Section IV: Business Continuity Management Policy
III. Access Control Policy
This Policy establishes logical access controls Local Information Service Providers must implement to secure Local Agency IT resources and data.
- Secure Log-On Procedures
Access to Local Agency IT resources and data must be controlled by secure log-on procedures.- Logon Banners
When technically feasible, logon warning banners must be displayed on any information system that hosts nonpublic services. Logon warning banner content must inform Users that Local Agency IT resources are for authorized County/Local Agency business only, User activities may be monitored, and Users have no expectation of privacy. - Unsuccessful Login Attempts
The number of consecutive attempts to enter an incorrect password must be limited. User IDs must be temporarily disabled (locked out) after a prescribed number of unsuccessful access attempts have been made as determined by Local Information Service Provider standards.
- Logon Banners
- Password Management
Password standards must be developed and implemented to ensure all Users follow proven password management practices. These password standards must be mandated by automated controls when technically feasible and include but are not limited to the following:- Prohibiting the storage and transmission of passwords in clear text;
- Prohibiting use of default vendor passwords;
- Changing temporary password at the first login and reset;
- Changing passwords at regular intervals;
- Development of procedures to verify a User’s identity prior to providing a replacement password (i.e., password reset); and
- Enforcing choice of strong passwords.
- Use of System Utilities
Use of system utilities that are capable of overriding other controls must be restricted.- Access to system utilities must be limited to Users and Administrators with an approved need to run or use those utilities.
- Temporary access may be granted only after a business requirement for access has been documented and approved.
- When technically feasible, unneeded system utilities, options, and/or services must be removed or disabled.
- Session Time-Out
As determined by Local Information Service provider standards, security measures must be implemented to require authentication or re-authentication after a prescribed period of inactivity for desktops, laptops, or any other Local Agency IT resources where authentication is required. - Connection Limitation
Restrictions on connections must be used to provide additional security for high-risk application or remote communication capabilities. As determined by Local Information Service Provider standards, the following controls must be applied and maintained:- Connection time (e.g., office hours);
- Connection location; and
- Requiring re-authentication at timed intervals.
- Application Access Control
To prevent unauthorized access to information stored in Local Agency application systems, access must be restricted to Users and support personnel whose work assignment requires access to those applications.