You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy - Section VIII: Information Technology Resource Management Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
Section VIII: Information Technology Resource Management Policy
Read next: Section IX: Network Management Policy
VIII. Information Technology Resource Management Policy
This Policy establishes the appropriate protection of Local Agency Information Technology (IT) resources.
- Inventory of IT Resources
Local Information Service Providers must maintain an inventory listing of significant Local Agency IT resources. Listing should include:- Core attributes for each IT resource, including make/model/format, creation/manufacture date;
- IT resource unique identifier (e.g., serial number, asset number, service tag number, or Universal Product Code);
- Assigned owner; and
- Location.
- Responsibility of IT Resources
IT resources must have owners assigned from within the Local Agency who are responsible for ensuring appropriate protection from unauthorized use, access, disclosure, modification, loss or deletion. - Classification of IT Resources
IT resources must be classified and labeled based on the most restrictive classification of its individual data elements. For example, IT resources containing confidential data and restricted data must be classified as Confidential. IT resources containing Restricted data and Public data must be classified as Restricted. - Return of IT Resources
Procedures must be established to ensure Local Agency IT resources are returned upon a User’s separation from County employment or change of work assignment. - Secure Disposal or Re-Use of IT Resources
- To prevent the unauthorized disclosure of Local Agency data, Local Agency IT resources containing storage media must be checked to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal.
- All Local Agency IT resources must be sanitized according to classification of data, prior to sale, transfer or disposal.
- Local Agency IT resources containing confidential data must be obliterated and/or made indecipherable before disposal.
- If licensed software is present on any Local Agency IT resource being sold, transferred, or otherwise disposed of, the terms of any licensed software agreements must be followed.
- To verify Local Agency data is inaccessible, a sample of Local Agency IT resources must be tested.