You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy - Section X: Operations Management Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
Section X: Operations Management Policy
Read next: Section XI: Physical and Environmental Security Policy
X. Operations Management Policy
This Policy establishes information security requirements for operations management.
- Operating Procedures
- All Local Information Service Providers must have documented operating procedures related to information security including but not limited to:
- Processing and handling information;
- Securely, handling and transporting storage media;
- Handling unexpected outages or technical difficulties; and
- Restart and recovery procedures.
- Procedures must be verified by the Local Information Service Provider’s Information Security Representative to ensure they implement the desired Policy or Standard.
- Procedures must be kept up to date by authorized staff and stored in a secure location.
- All Local Information Service Providers must have documented operating procedures related to information security including but not limited to:
- Separation of Duties
- To reduce the risk of accidental or deliberate system misuse, separation of duties must be implemented where practical.
- Whenever separation of duties cannot be implemented, other compensating controls such as monitoring of activities, audit trails and management supervision must be implemented. At a minimum, the audit of security must remain separate and independent from the security function (i.e., security administration and security audits must be performed by different persons).
- Protection from Malicious Code
Software and associated controls must be implemented across Local Agency networks to prevent and detect the introduction of malicious code. The type of controls and frequency of updating signature files must be commensurate with the value and sensitivity of the information at risk. - Back-Up, Storage, Restoration
Local Information Service Providers must develop and maintain plans to meet the IT backup and recovery requirements of the Local Agency they support.
Procedures and requirements of the plan include:- Ensuring backups are protected from being destroyed or read by unauthorized personnel;
- Storing a full backup copy in an environmentally protected, access-controlled, off-site storage location;
- Ensuring backup procedures and implementing activities (recording, retaining, and purging) comply with the California Public Records Act and County/Local Agency retention schedules; and
- Performing and documenting regularly scheduled restoration tests to ensure backup data can be recovered.
- IT Resource Monitoring
Administrative Policy 9-2: Information Technology Use and Security Policy manual Section IV.B. Use of Local Agency IT resources and Data establish the Local Information Service Provider’s right to monitor and log all activities on the IT resources they own, control or manage for security, network maintenance and/or policy compliance.- Where technically feasible, audit logs recording policy exceptions and other security related events must be produced and kept to assist in future investigations and access control monitoring.
- All logged events must reflect accurate date and time stamps.
- All audit logs must be retained in accordance with Local Information Service Provider standards.
- All audit logs must be classified as restricted data and protected accordingly.
- Review of audit logs must be commensurate with the nature and degree of criticality of the Local Agency IT resources and data involved.