You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy - Section VII: Information Systems Acquisition, Development and Maintenance Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
Section VII: Information Systems Acquisition, Development and Maintenance Policy
Read next: Section VIII: Information Technology (IT) Resource Management Policy
VII. Information Systems Acquisition, Development and Maintenance Policy
This Policy provides direction for the integration of information security into the lifecycle of information systems that hold and process Local Agency data.
- Security Requirements of Information Systems
- To ensure security is built into all Local Agency information systems, all security requirements must be identified and documented at the design stage for new information systems or enhancements to existing systems.
- Security controls must be commensurate with the risks and the relative sensitivity of the system and the information it stores and/or processes.
- Separation of Development, Test and Production Environments
- Development and test environments must be logically or physically separated from production environments.
- Media used for development and test activities must be clearly labeled as such and must not be used on production systems unless all test data has been removed.
- Local Agency data that is used for development and test activities must be protected and controlled.
- If production data is used in a test environment, the following must be adhered to:
- Production data used in a test environment must be protected as if it is still production data.
- A copy of the production data must be made so that live data cannot be altered.
- The physical or electronic output of tests using the production data must be strictly controlled and promptly destroyed when no longer needed.
- System Planning and Acceptance
- Advance planning and preparation must be performed to ensure the availability of adequate capacity and resources. The security requirements of new systems must be established, documented, and tested prior to their acceptance and use.
- The capacity demands of Local Agency IT resources must be monitored and projections made of future capacity requirements to ensure adequate power and data storage requirements can be filled.
- Acceptance criteria must be developed and documented for new information systems or enhancements to existing systems.
- Acceptance testing must be performed to ensure security requirements are met prior to the system being migrated to the production environment.
- Correct Processing in Applications
To prevent errors, loss and unauthorized modification or misuse of information in application systems; processes must be established and maintained for:- Input data validation - Data input to an information system must be validated to ensure it is correct and appropriate.
- Internal processing - Internal processing checks must be performed to minimize the risk of processing failures or deliberate acts leading to a loss of integrity.
- Output data validation – Data output from an information system must be validated to ensure the processing of stored information is correct and appropriate.
- Message integrity - Message integrity controls must be used for information systems where there is a security requirement to protect the authenticity of the message content.
- Error response – Responsibilities and procedures must be defined for responding to detected errors.
- Software Maintenance
- When technically feasible, all system software must be maintained at a vendor-supported level to ensure software accuracy and integrity.
- Modification of commercial-off-the-shelf software security controls is limited to essential changes that are strictly controlled and documented.
- All known security patches must be reviewed, evaluated, and appropriately applied in a timely manner. See also Section XII. Technical Vulnerability Management Policy.
- Change Control
Changes to software must be controlled by the use a formal change control procedure as specified in Section V. Change Management Policy.