My WebLink
|
Help
|
About
|
Sign Out
Home
Agenda - Council - 10/28/2008
Ramsey
>
Public
>
Agendas
>
Council
>
2008
>
Agenda - Council - 10/28/2008
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/19/2025 9:37:00 AM
Creation date
10/24/2008 2:10:34 PM
Metadata
Fields
Template:
Meetings
Meeting Document Type
Agenda
Meeting Type
Council
Document Date
10/28/2008
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
275
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />38. Maintain central log files of security-related information to monitor activity on your <br />network. <br /> <br />39. Monitor incoming traffic for signs of a data breach. <br /> <br />40. Monitor outgoing traffic for signs of a data breach. <br /> <br />41. Implement a breach response plan. <br /> <br />42. Check references or do background checks before hiring employees who will have access <br />to sensitive data. <br /> <br />43. New employees sign an agreement to follow your company's confidentiality and security <br />standards for handling sensitive data. <br /> <br />44. Access to customer's personal identify information is limited to employees with a "need <br />to know." <br /> <br />45. Procedures exist for making sure that workers who leave your employ or transfer to <br />another part of the company no longer have access to sensitive information. <br /> <br />46. Implement a regular schedule of employee training. <br /> <br />47. Employees will be alert to attempts at phone phishing. <br /> <br />48. Employe~s are required to notify the general manager immediately if there is a potential <br />security breach, such as a lost or stolen laptop. <br /> <br />49. Employees who violate security policy are subjected to discipline, up to, and including, <br />dismissal. <br /> <br />50. Service providers notify you of any security incidents they experience, even if the <br />incidents may not have led to an actual compromise of our data. <br /> <br />51. Paper records will be shredded before being placed into the trash. <br /> <br />52. Paper shredders will be available at each desk in the office, next to the photocopier, and <br />at the home of any employee doing work at home. <br /> <br />53. Any data storage media will be disposed of by shredding, punching holes in, or <br />incineration. <br /> <br />City of Ramsey - Utility Billing <br /> <br />Page 7 of7 <br /> <br />-106- <br />
The URL can be used to link to this page
Your browser does not support the video tag.