Loading...
HomeMy WebLinkAbout20053432.tiff NOTICE OF FINAL READING OF ORDINANCE Pursuant to the Weld County Home Rule Charter,Ordinance Number2005-13 was introduced on first reading on October 24, 2005, and a public hearing and second reading was held on November 16,2005. A public hearing and final reading was completed on December 7,2005,with no change being made to the text of said Ordinance,and on motion duly made and seconded,was adopted. Effective date of said Ordinance is listed below. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners,located in the Weld County Centennial Center,91510th Street,Third Floor, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday,or may be accessed through the Weld County Web Page(www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. ORDINANCE NO. 2005-13 ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE EFFECTIVE DATE: December 19, 2005 BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: December 9, 2005 PUBLISHED: December 14, 2005, in the Fort Lupton Press GD5- 35/8„7 NOTICEOF FINAL READING OF PROOF OF PUBLICATION ORDINANCE FORT LUPTON Home the Weld County Homme Rule Charter, Ordinance Number 2005-13 was introduced STATE OF COLORADO on first reading on October 24, 2005, and a public hearing and COUNTY OF WELD SS. second reading was held on November 16, 2005. A public hearing and final reading was completed on December 7, 2005, with no change being made to the text of said Ordinance, and on I, Karen Lambert, do solemnly swear that I motion duly made and seconded, was adopted.Effective date of am the Publisher of the Fort Lupton Press; said Ordinance is listed below.Any backup material, exhibits or that the same is a weekly newspaper printed information previously submitted County the Board of County and published in the County of Weld, State Commissioners concerning this matter may be examined in the of Colorado, and has a general circulation office of the Clerk to the Board of County Commissioners,located in therein; that said newspaper has been the CenterrNeld 915 0th`yStr et, Thy d published continuously and uninterruptedly Floor,Greeley,Colorado,between the hours of 8:00 a.m. and 5:00 in said county of Adams for a period of more p.m., Monday thru Friday, or may be accessed through the Weld than fifty-two consecutive weeks prior to the Coun'co.weld.co s). E-Mail Web Page `ww first publication of the annexed legal notice messages sent to an individual Commissioner may not be or advertisement; that said newspaper has e. included in the case file. To naue inclusion of your e.Mail been admitted to the United States mails as correspondence into the case file, please send a copy to second-class matter under the provisions of ORDINANCENO. 2005-13 the act of March 3, 1879, or any ORDINATLE: IN THE MATTER R OF RCE IEPEALING AND amendments thereof, and that said REENACTING, WITH AMENDMENTS, CHAPTER 9 newspaper is a weekly newspaper duly INFORMATION SERVICES, OF THE WELD COUNTY CODE qualified for publishing legal notices and 9 2005 advertisements DATE: December 19, advertisements within the meaning of the BOARD OF COUNTY COMMISSIONERS laws of the State of Colorado. That the WELD COUNTY, 90 0DO DATED: December annexed legal notice or advertisement was PUBLISHED: December 14, 2005,in the Fort Lupton Press published in the regular and entire issue of every number of said weekly newspaper for the period of 1 consecutive insertion(s); and that the first publication of said notice was in the issue of newspaper, dated 14th day of December, 2005, and the last on the 14th day of December, 2005. vier u Gubscribed aid s rn before me, this the 9th day of December, 206 lO ' 61 td Notary Public. • R- 04 CASE NO.370207 key 22586 I NOTICE OF SECOND READING OF ORDINANCE Pursuant to the Weld County Home Rule Charter, Ordinance Number 2005-13 was introduced on first reading on October 24, 2005, and a public hearing and second reading was held on November 16, 2005, with changes being made as listed below. A public hearing and third reading is scheduled to be held in the Chambers of the Board, First Floor Hearing Room, 915 10th Street, Greeley, Colorado 80631 on December 7, 2005. All persons in any manner interested in the next reading of said Ordinance are requested to attend and may be heard. Please contact the Clerk to the Board's Office at phone (970) 336-7215, Extension 4225, or fax (970) 352-0242, prior to the day of the hearing if, as a result of a disability, you require reasonable accommodations in order to participate in this hearing. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners, located in the Weld County Centennial Center, 915 10th Street, Third Floor, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be accessed through the Weld County Web Page (www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. ORDINANCE NO. 2005-13 ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE DATE OF NEXT READING: December 7, 2005, at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: November 18, 2005 PUBLISHED: November 23, 2005, in the Fort Lupton Press * * * * * * * * * * * CHANGES MADE TO CODE ORDINANCE #2005-13 ON SECOND READING Section 9-3-90. Web server guidelines. C. Guidelines. If initial approval is granted for the project,the following guidelines must be followed during the development: 1 through 9 - No change. 10. Contents of Web pages should must be approved by the Department Head/Elected Official or his or her designee. NOTICE OF PROOF OF PUBLICATION SECOND READING OF FORT LUPTON ORDINANCE Pursuant to the Weld County STATE OF COLORADO Home Rule Charter, Ordinance Number 2005-13 was introduced COUNTY OF WELD SS. on first reading on October 24, 2005, and a public hearing and second reading was held on November 16,2005,with changes being made as listed below. A public hearing and third reading is I, Karen Lambert, do solemnly swear that scheduled to be held in the Chambers of the Board,First Floor am the Publisher of the Fort Lupton Press; Hearing Room, 915 10th Street, Greeley, Colorado 80631 on that the same is a weekly newspaper printed December 7,2005.All persons in any manner interested in the next and published in the County of Weld, State reading of said Ordinance are requested to attend and may be of Colorado, and has a general circulation heard. Please contact the Clerk to the therein; that said newspaper has been Board's Office at phone (970) 336-7215, Extension 4225, or fax published continuously and uninterruptedly (970) 209;0242,prior to the day of the the hearing if,as a result of in said county of Adams for a period of more a disability,you require reasonable than fifty-two consecutive weeks prior to the accommodations in order to participate in thisheanng. first publication of the annexed legal notice Any backup material, exhibits or information previously submitted to or advertisement; that said newspaper has the Board of County been admitted to the United States. mails as Commissioners concerning this matter may be examined in the office of the Clerk to the Board of second-class matter under the provisions of heunty WeltlmmCounI n ty rs'Coentenniail the act of March 3, 1879, or any Center, 915 10th Street, Third Floor,Greeley,Colorado,between amendments thereof, and that said the hours of 8:00 a.m. and 5:00 p.m., Monday thnr Friday,or may newspaper is a weekly newspaper duly be accessed through the Weld County Web Page qualified for publishing legal notices and (www.co.weld.co.us). E-Mail messages sent to an individual advertisements within the meaning of the Commissioner may not be included laws of the State of Colorado. That the in the case file.To ensure inclusion of your E-Mail correspondence into the case file,please send a copy to annexed legal notice or advertisement was charding@co.weld.co.us. published in the regular and entire issue of ORDINANCE NO. 2005-13 every number of said weekly newspaper for ORDINATLE: IN THE MATTER R OF RCE IEPEALING AND the period of 1 consecutive insertion(s); and REENACTING,AMENDMENTS, CHAPTER WITH 9 that the first publication of said notice was in INFORMATTHE WELD CCOUNTY CODE ON SERVICES, OF the issue of newspaper, dated 23rd day of DATE OF NEXT READING: November, 2005, and the last on the 23rd December 7,2005,at 9:00 am. BOARD OF COUNTY day of November, 2005. COMMISSIONERS WELD COUNTY,COLORADO DATED: November 18,2005 PUBLISHED: November 23, 2005,in the Fort Lupton Press CHANGES MADE TO CODE ORDINANCE #2005-13 ON SECOND READING Section 9-3-90. Web server guidelines. C.Guidelines. If initial approval is granted for the project, the following guidelines must be followed during the development: 1 through 9-No change. 10.Contents of pros pages should mus t be approved th by the Department Head/Elected Official �'�. i or his or her designee. Publisher. S scribed and swornbefore me, this the 18th day of November, 2005. oa .GZerfity ota Public. ;Li•0Lp CASE NO.370207 key 21970 WELD COUNTY CODE ORDINANCE 2005-13 IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE BE IT ORDAINED BY THE BOARD OF COUNTY COMMISSIONERS OF THE COUNTY OF WELD, STATE OF COLORADO: WHEREAS,the Board of County Commissioners of the County of Weld, State of Colorado, pursuant to Colorado statute and the Weld County Home Rule Charter,is vested with the authority of administering the affairs of Weld County, Colorado, and WHEREAS,the Board of County Commissioners, on December 28, 2000, adopted Weld County Code Ordinance 2000-1,enacting a comprehensive Code for the County of Weld, including the codification of all previously adopted ordinances of a general and permanent nature enacted on or before said date of adoption, and WHEREAS,the Weld County Code is in need of revision and clarification with regard to procedures, terms, and requirements therein. NOW, THEREFORE, BE IT ORDAINED by the Board of County Commissioners of the County of Weld,State of Colorado,that Chapter 9, Information Services,of the Weld County Code be, and hereby is, repealed and re-enacted, with amendments, to read as follows. CHAPTER 9 INFORMATION SERVICES Throughout Chapter 9, replace "The Department of Information Services" with "Information Services". Throughout Chapter 9, replace "SCT" Corporation with "ACS" Corporation. Throughout Chapter 9, replace the subcommittee "Human Services" with "Health and Human Services". Throughout Chapter 9, replace"Geographical Information System(GIS) Division"with"GIS", and replace "the Division" with "GIS". ARTICLE I INFORMATION SERVICES Sec. 9-1-70. Specific duties and responsibilities of Governance Committee. A through G - No change. H. Communication and enforcement of policies and procedures. Sec. 9-1-80. Specific duties and responsibilities of users. The specific duties and responsibilities of each user are as follows: A. General responsibilities: 1. Designate a management level position to act as a liaison between the user department, Governance Committee and Information Services. 2 through 3 - No change. B. No change. C. New system development responsibilities: 1 through 5 - No change. 6. Maintain communication with Information Services by attending regularly scheduled management review meetings. Sec. 9-1-90. Specific duties and responsibilitiesof Information Services via contract services. The following specific duties will be assigned to the Department of Information Services: A and B - No change. C. Direct action responsibilities: 1. Represent the County to vendors of computer and data communications equipment, systems and services. 2. Provide for the acquisition and administration of personnel, hardware, software, contracts, grants and related services necessary to support the information services requirements of any user or the County in general. 3. Inform users in advance of governance approved changes to hardware, software and related resources which may affect their systems. 4 - 16 - No change. 17. Allow for testing of new systems and major enhancements and technology prior to production implementation. 18. Control and coordinate the funding for projects. Remainder of Section - renumber. ARTICLE II INFORMATION SERVICES GOVERNANCE COMMITTEE Sec. 9-2-30. Role. The role of the Information Services Governance Committee includes the following: A through C - No change. D. Identify the annual information system priorities and related budgetary impact. These priority recommendations will become an integral part of the budget process subject to adjustment during budget preparation/adoption, and upon final budget approval, will be established as part of the Department of Information Services annual work program. All projects must be reviewed and approved by the Information Services Governance Committee before they can be added to the Information Services annual work plan. E through G - No change. Sec. 9-2-80 Purpose and structure of subcommittees. A through B - No change. C. The responsibilities of the functional subcommittees are to: 1 through 4 - No change. 5. Ensure that user department systems design decisions are made in accordance with annual information system work plans and approved project schedules. 6 through 8 - No change. ARTICLE III COUNTY NETWORK AND INTERNET ACCEPTABLE USE POLICY Sec. 9-3-10. General provisions. A. The Department of Information Services,in conjunction with the Information Services Governance Committee, has taken the necessary steps to provide a County Network and Internet Acceptable Use Policy on use of the Internet by County agencies and departments. Any County agency or department eligible for, and having funding for, the Weld County network or the Internet will be provided with access under the terms and conditions of this policy. B through C - No change. D. This policy applies to any activity performed from a County-owned asset and to all County employees or contracted agents of the County performing work activities on behalf of the County. Work activities conducted from remote devices or even personally owned devices are subject to this policy. The policy applies to electronic communications on County networks and public networks including,but not limited to, the following: 1. Electronic Communications: a. E-mail. b. File transfer (FTP). c. Remote login, including VPN, and Citrix. d. Remote control software. e. Discussion groups/bulletin boards. f. World Wide Web, web servers, wide area information servers (WAIS). g. Personal computing devices,including Blackberrys,PDA's,and cell phones. h. Digital type devices that can communicate with personal computers or public networks. H3xx, such as video conferencing. j. Voice over IP (VOIP). 2. Public Networks: a. Internet and Internet Services. b. Internet Service Providers. c. Bulletin board systems. d. Weld County network. e. On-line search services. Sec. 9-3-20. Introduction. Weld County network access and Internet access can provide significant business benefits for County government agencies. However, there are also significant legal, security and productivity issues related to how the Internet is used. Examples of such issues are listed below. A. The potential to receive computer viruses Trojans,worms and spyware from Internet information sources. B through F - No change. Sec. 3-2-25. Authorized County Network Access. A. Secure New Employee Accounts. Authorized access to the County network for new employees must be approved by the department head, elected official, or designated person in the department. Requests for new employee security or changes to existing security must be submitted using the Security Request Form (Appendix 9-B). 1. Requests for new employee security must be submitted in advance - - at least three days prior to hire date, and signed by department head, elected official, or designated person. 2. All documentation authorizing user access to controlled computing and information resources must be archived and retrievable upon request for all active accounts. Requests will be retained for a period of five years. 3. Requested access must be approved by the owner of the data. 4. Login passwords must meet the County required standard, as set forth in Section 9-3-70. 5. Generic and shared accounts are strictly prohibited. All UserlD's must uniquely identify users to the system. B. Secure Employee Terminations. 1. All security requests for employee terminations within the County's operations must be submitted prior to the last date of employment. Upon the termination of an employee, all accounts for the employee, including remote access and email,must be immediately suspended or removed from all systems. 2. Notification for unplanned terminations must be communicated to Information Services to immediately disable the account. Security request forms are required for unplanned terminations, and must be approved by the department head,elected official,or designated person in the department to which the terminated employee was assigned. Sec. 9-3-30. Definitions. Add the following definitions: FTP means file transfer protocol. ISP means Internet Service Provider. VPN means virtual private network. Delete the following definitions: Sec. 9-3-40. Guidelines. Replace the entire section with the following: A. Responding to security incidents. All security incidents shall be reported to the IT Help Desk for immediate escalation. B. Responding to malfunctions and violations. All employees must play an active roll in helping to assure the security and quality of all County applications by reporting any continual malfunctions in software and hardware. In doing so,employees help to assure the optimum performance and availability of business systems. 1. Employee obligation to report software malfunction. Any employee that observes continual or recurring malfunctions in any County software must report the malfunction to their supervisor or the person responsible for that software. 2. Employee obligation to report hardware malfunction. Any employee that observes continual or recurring malfunctions in any County information system hardware must report the malfunction to their supervisor or the person responsible for hardware maintenance. 3. Employee obligation to report security and policy violations. Any employee that observes the violation of security and/or security policy is obligated to report the malfunction to their supervisor. C. Employee responsibility. The security, protection, and integrity of County information assets are a premier responsibility of all County employees and contractors. It is each employee's responsibility to fully understand the information security policies contained in this document and to apply these policies effectively to their daily practices and routines. Should an employee be unable to perform, or not fully understand any of the following policies,whether whole or in part, it is that employee's responsibility to alert his or her manager as to their difficulty or confusion with the policy or policies. It is each employee's duty and responsibility to report to their immediate supervisor any and all violations of these policies that he or she may have witnessed or have knowledge of. D. Manager responsibility. It is the responsibility of all managers to assure that all employees under their supervision fully understand and are in compliance with these information security policies. Managers are responsible for keeping their employees up-to-date on any changes regarding these policies. Should any employee consistently break company policy, it is that manager's responsibility to take disciplinary measures in accordance with applicable County disciplinary policies or procedures. It is the responsibility of all managers to ensure that all information assets under their domain are secured and managed in order to ensure compliance with relevant polices and procedures. E. Use of information systems and resources. Employees who are entitled to the usage of County computing systems to perform the necessary functions identified with their position, must not misuse or abuse computing systems and resources. 1. Compliance with software copyrights and licenses. All employees must comply with and respect the copyright laws and license agreements of the software licensed to the County for use on business computing systems. 2. Use of illegal software. Employees must not download and/or install pirated or illegal software that violates existing copyright or license agreements. 3. Use of non-approved software. The County strictly forbids the downloading or installation of non-county owned or licensed software on County computing systems without prior consent from a supervisor. 4. Acceptable use of passwords. Each password owner shall safeguard and protect each password they have created, or that is entrusted to them. Password sharing and account sharing is strictly prohibited. Writing down passwords is not an acceptable practice; however, if passwords must be written down,the information shall be stored securely and be accessible only by the owner. Storing passwords via electronic file or programmable function keys, scripts, macros or automated logon sequences is strictly prohibited. 5. Security of the computer desktop through locking practices and mechanisms. All users of a computing system must either lock the computer desktop or log off of the system when walking away from a computer terminal. Additionally,all computing systems covered by HIPAA must employ the use of a locking screensaver or similar mechanism to automatically enable after a minimum usage lapse of 5 minutes. 6. Transmission of sensitive information over unsecured networks. Employees must not send highly sensitive information over unsecured networks without the use of encryption to secure the transmission. Such examples would be, but not be limited to: a. Use of encryption when sending credit card information over the Internet(look for"https"in the web page URL to assure encryption). b. Sending confidential business information over unsecured, non-county networks. 7. Tampering with security mechanisms. All County computing systems must be equipped with security mechanisms to protect the information and resources of each system. Employees are not to temper with, reconfigure, or disable such mechanisms. Such mechanisms would include, but not be limited to anti-virus software, access controls. 8. Possession of offensive material. County employees are not permitted to access,view,download,upload,e-mail,store or print material that could be considered inappropriate, offensive or disrespectful to others. 9. Communication of personal opinions. Employees must refrain from expressing personal opinions or communicating in a way that could be embarrassing to the County while using County computing and communications systems. 10. Illegal access of computer systems. County computing systems must not be used to obtain illegal access to computer systems, to interfere with the normal operations of computer systems or to perform malicious acts against a computer system. 11. Unauthorized testing of computing system security. Employees must never test the security of computer systems, whether physical or logic based, without written permission from senior management of both the facility from where the test is being launched, and the facility where the system resides. The only exception to this is if such security testing is a known part of the employee's job description and function. 12. Disclosure of classified information. Employees must never disclose information that could be considered sensitive, classified or proprietary to unauthorized persons. 13. User Data Storage. All employees using a County issued computing workstation must store information relating to their job function on servers designated for that purpose. This data should not be stored locally on the workstation unless it is permitted by Information Services. 14. System Changes. Any software that allows configuration changes to networks, computers and other hardware or software, should only be installed by members of Information Services. F. Use of e-mail systems and resources. Based upon the requirements of an employee's job function, those with a legitimate business need for a county e-mail account are entitled to the use of county e-mail systems. Such usage is for enhancing productivity and communications. However, it is important that employees not misuse or abuse e-mail systems and resources. 1. Acceptable use of e-mail. The use of county e-mail systems and resources must be restricted to business purposes only. Incidental personal use is permissible if such use does not interfere with employee productivity,does not preempt any business activity,and does not consume more than a trivial amount of county resources. 2. Transmission of offensive messages. Employees must refrain from sending e-mail messages that may be considered lewd, offensive, or harassing by or to other people. 3. Transmission of hostile messages. Employees must refrain from sending e-mail messages that contain angry, violent, or threatening messages. 4. Transmission of disruptive messages. Employees must not participate in sending, forwarding, or responding to e-mails that are of a disruptive or coercive nature, such as the distribution of SPAM or chain letters. 5. Transmission of non-incidental, personal messages. Employees are not permitted to send messages involving the petition or solicitation for personal gain or interest. 6. Disclosure of login information. The county identifies passwords as highly sensitive information. Account owners must never divulge their e-mail account passwords and login information. 7. E-mail Privacy. All County e-mail is a public record and may be subject to public inspection. G. Use of Internet systems and resources. All employees who are granted Internet access are encouraged to use the Internet as part of their daily work environment. It is, however, important that employees not misuse or abuse County Internet resources, which could result in disciplinary action by the County. 1. Acceptable Internet connectivity. Employees are only permitted to access the Internet for County business, using County computing systems,through authorized County gateways. 2. Personal use of Internet connectivity. Use of County computing resources to access the Internet must be for legitimate business purposes only. Incidental personal use of Internet resources is permissible if the use does not interfere with employee productivity, does not preempt any business activity, and does not consume more than a trivial amount of County resources. 3. Affiliation with the County. Employees may make public their affiliation with the County in work related mailing lists, chat sessions, and other communication resources on the Internet. This affiliation may be accomplished directly or it may be implied; however, employees must indicate that such opinions expressed are their own and not necessarily those of the County. 4. Inappropriate use of Internet resources. Employees initiating or participating in communications of an inappropriate or unprofessional way, is strictly prohibited. Employees must refrain from the use of lewd,offensive or hostile language when communicating using county resources. Likewise, all Internet messages that are intended to harass, annoy or alarm persons are similarly prohibited. 5. Inappropriate use of Internet resources for illegal access. Employees are strictly prohibited from contacting or probing information systems,of County origin or otherwise,with the intent to gain unauthorized access. Similarly, employees must not attempt to disrupt or interfere with the operation or function of any information systems. 6. Generation of excessive internet traffic. To minimize network traffic, no automatic requests for information on the Internet and applications that generate constant network traffic, e.g., Internet radio stations, channels, music-sharing services, etcetera, are prohibited. H. Use of networked systems and resources. All employees of the County are granted access to the network. Employees will require access to the network for Internet access, network storage, Internet access,etcetera. It is important that employees not misuse or abuse this resource, which could result in disciplinary action by the County. 1. Unauthorized testing of computing system security. Employees must never test the security of network systems and resources, whether physical or logic based. The only exception to this is if such security testing is a known part of the employee's job description and function. 2. Disregard for security mechanisms. Employees must not attempt to bypass security mechanisms as a means for creating shortcuts or for the performance of pranks or practical jokes. 3. Unauthorized connections to non-county networks. It is strictly forbidden for employees to establish unauthorized connections to other non-county networks, public or private, while connected to a County network. This includes connecting to non-county wireless networks while connected to the County network. 4. Use of modems on network connected systems. Remote access systems, such as modems, are strictly prohibited. Such modems may be used for specific isolated purposes;however,it must remain in a disconnected state until the exact time that the system is needed. All modems must be registered with Information Services. 5. Use of encryption for highly sensitive information. Employees must be aware that when sending sensitive information over County or public networks that the County does not use encryption to protect the contents of such information by default. Therefore, it is the responsibility of all employees to take the necessary precautions to encrypt highly sensitive information when transmitting. 6. Network Privacy. County and Information Services employees must understand that all communications using County resources may be monitored for statistical, legal, and investigative purposes. County and Information Services employees should expect no right of privacy to communications made using County equipment and resources. Use of remote access (VPN). Remote access into County networks is only permissible through a County owned, Information Services administered, VPN (Virtual Private Network) solution. J. Compliance with legal requirements. All usage of commercial software within the County must conform to all requirements and restrictions imposed by the licenses. 1. Compliance with software licenses and copyrights. All proprietary software, either owned or purchased by the County, must be used in a way that does not violate the license or copyright protecting the software. 2. Maintenance of software licenses. All commercial software licenses must be maintained to assure that any violation of such licenses does not occur due to the inability to track or control the use of software licensed to the County. Installations of software must be documented and the licenses of such software inventoried. 3. Use of pirated or stolen software. Installation of pirated or stolen software on County information computing systems is expressly prohibited. 4. Recording of communications. Employees shall not record any communications without the disclosure of the recording and the specific consent of all persons involved in the communication. This includes, but is not limited to: a. Telephone conversations. b. Teleconferences. c. Video Conferences. Sec. 9-3-50. Roles and responsibilities. A through B - No change. C. The role of the County departments and agencies is as follows: 1. It is the responsibility of all managers to assure all employees under their supervision fully understand,and are in compliance with,the County policies. Managers are responsible for keeping employees up-to-date on any changes regarding these policies. Should any employee consistently break County policy, it is that ma nager's responsibility to take disciplinary measures in accordance with applicable County disciplinary policies or procedures. It is the responsibility of all managers to ensure all information assets under their domain are secured, managed, and employee access is limited to job-specific data. 2. Provide for training of employees who need access. 3. Budget for service and associated training, if needed. 4. Establish their own data sensitivity policy. Sec. 9-3-70. Weld Network and Internet Security. Replace the entire section with the following: A. Weld County relies on internet filtering tools to restrict access to appropriate web sites for County employees. B. Department Heads or Elected Officials are the only authority who can request changes to the default filter restrictions applied to their employees Internet access (Appendix 9-B). C. The following remote/Internet security guidelines shall be followed: 1. All remote access falls under the guidelines of the Acceptable Use Policy. 2. The user shall make sure that any related passwords are secure, and shall not share the passwords or write passwords on paper. Each password owner shall safeguard and protect each password they have created, or that is entrusted to them. Password sharing and account sharing is strictly prohibited. Storing passwords via electronic file or programmable function keys, scripts, macros or automated logon sequences is strictly prohibited. Each individual with approved access to County information computing systems and resources is responsible for creating original, unique and complex passwords(something known only to them and not easily guessed) for each account. 3. The user is responsible for securing their remote access information. Sharing remote access in strictly prohibited. 4. All remote devices and access should be turned off when not being used, such as VPN or modem. The user should be aware that if he or she has a modem and is on the County network, it is possible for a virus to attack any or all networked computers. If the modem is external, it shall be turned off when not in use. Add Section 9-3-75, as follows: Sec. 9-3-75. Physical and Environmental Security Policy. A. Internal security operations. All offices and office areas within Weld County facilities must be secured, as appropriate, to prevent unauthorized access to county information computing systems, resources and network, including the wireless network. 1. A County-wide standard has been developed for wireless access and all equipment. This standard includes access points, wireless cards and all other related equipment. Equipment must be purchased by Information Services. (See Section 9-1-90.) a. Only County devices with approved wireless cards are allowed on the wireless network. b. Only County employees will be given wireless access. c. The "Computing Device Request Form" (Appendix 9-D) must be completed and approved by governance. d. Approved devices will need to be configured by Information Services for secure access to the County wireless network. e. All policies and procedures for accessing the County network apply for wireless access. B. Computing in public and untrusted zones. Weld County operates several computing systems in public access areas and within the County jail for inmate use. Exposures to the County by the use of these systems must be fully understood and all known exposures mitigated. 1. Public computing systems. Weld County operates several public access computers,which are available for use by the public,within the Weld County facilities. These systems,due to the uncontrolled nature of their use, must be segregated to an isolated or physically separate segment of the Weld County network. All access to internal county resources must be tightly controlled and limited to prevent any misuse of these systems. Auditing must be enabled on these systems. Users of these systems must be aware of the specificity and sanctions imposed on these computing systems. 2. Inmate computing systems. Weld County provides several computers for the use of inmates within the County jail. Due to the uncontrolled use of these systems,all inmate computing systems must only maintain a minimal set of computer resources to prevent abuse of such systems and resources. This would include: a. Computers must not maintain any unnecessary ports or peripherals, including a CD-ROM drive, floppy drive, serial ports, USB ports, modem, or other non-essential interfaces. b. Computers must not have access to other computing systems or servers, except to accomplish the specific purpose for the inmate computing systems. c. Computers must not have Internet access. d. Network access must be segregated from the other County network segments. 3. Security zones. Specified areas within a facility that are designated as performing critical functions or contain sensitive information or systems, must make use of security mechanisms and procedures greater than those used for areas of lesser criticality or sensitivity. These zones must be isolated by security controls of reduced permission from the general facility population. Permission must be based on the need to physically access the area for a job function. Such security zones would include: a. Server room. b. Communications closet. C. Equipment security. All information computing equipment, and any information contained or processed by the equipment, must be reasonably protected from damage, interruption and interception. 1. Protection from power interruptions. All sensitive electronic equipment must be reasonably protected from interruptions of the power supply including power fluctuations, power surges, brownouts, and short and long-term losses. Equipment performing critical functions should have additional or increased protection from power interruptions. 2. Safety and protection of electrical and communications cabling. All electrical power and telecommunications cabling must be run observing all local codes and requirements to prevent such cabling from becoming hazardous to environments and personnel. All communications cabling must be reasonably protected from tampering or interception of communications. 3. Secure disposal of computing equipment. All Weld County computing equipment and peripherals must be disposed of securely to prevent unauthorized access to any residual company information. a. Hard drives. Prior to the disposal of any hard drive or disk drive,the device must either be physically destroyed or formatted to current Department of Defense standards. b. Optical media. Prior to the disposal of any optical media, such as CD-ROMs, DVD, and ZIP or Jaz cartridges, these devices must be physically destroyed. This may be accomplished through the use of shredding or incineration. The optical disc itself must be cut with scissors or repeatedly scratched in circular motions over the disc. c. Analog media. Prior to disposal, all analog media must be completely destroyed. Floppy diskettes must either be shredded in a large paper shredder or cut with scissors. Backup tapes should be dismantled with the actual tape shredded or burned (usually this is best performed by a licensed media destruction contractor). d. RAM. Prior to disposal,all Random Access Memory modules must be destroyed. This includes all memory devices such as memory from computers, memory from printers and FAX machines, or other memory devices. This is most commonly accomplished through the use of a hammer where the device is repeatedly struck to physically smash the memory chips. IMPORTANT NOTICE: When manually destroying a media device, always use protective eyewear and apply common sense to avoid physical injury. Sec. 9-3-80. Acceptable use guidelines. A- No change. B. General. 1. County departments assume responsibility for providing reasonable publicity and enforcement for this "Internet Acceptable Use Policy". Ultimate responsibility for traffic that does not conform to this policy lies with the individual end user. It is the responsibility of the County agency to monitor and rectify the behavior of its users who disregard this policy. 2. It is also the responsibility of each County department to provide adequate training for its users. 3. The Department of Information Services and the County accept no responsibility for the traffic which they transport and which violates the Acceptable Use Policy of any connected networks, beyond informing the County if and when a violation is brought to the attention of the Information Services Governance Committee. 4 through 5 - No change. 6. Because of the diversity of resources on the Internet and other public networks,it is impossible to list all the do's and don'ts. In general,common sense should be used to judge situations. The following are some guidelines to start with: a. Computing resources should be used only for County-related business in the support of the administrative,instructional, research and public service objectives of the County. b. Appropriate use of resources is limited to the official work of theCounty. Examples of inappropriate use of resources include, but are not limited to: 1 through 5 - No change. 6) Attempts to make unauthorized entryon the County network. 7 through 10 - No change. 11) Any other activity that can be considered mis-use or harmful to the County network. c. Employees must never test the security of computer systems, whether physical or logic based, without written permission from senior management of both the facility from which the test is being launched and the facility where the system resides. The only exception to this is if such security testing is a known part of the employee's job description and function. 7. No change. 8. All County departments must accept these guidelines and understand that network traffic originating from its location is to be consistent with this policy. The Department of Information Services cannot police the network but may refer to the appropriate Elected Official or Department Head for disciplinary action any agency that appears to be in persistent and/or serious abuse of this policy. Questions pertaining to the policy or interpretation of the policy should be submitted to the Information Services Governance Committee. 9. No change. C. Participation in discussion groups. 1. No change. 2. The user must be aware that the information he or she puts out on the Internet will be perceived as the official County position unless specifically identified as personal opinion,even in a discussion. If the user is offering his or her own opinion, he or she shall be sure it is clearly identified as such. 3. No change. D. No change. E. All County devices are configured for Internet access unless specifically requested by the department head or elected official. Sec. 9-3-90. Web server guidelines. A. Review. The Department of Information Services and the Governance Committee will review all Web access and Web content proposals to ensure the project adheres to all guidelines set forth in this Section. B. Initial approval. Any proposed Web access must be submitted to the Information Services Governance Committee for initial approval of the proposed project. The following information must be provided to the Department of Information Services for review and assistance in submitting the initial request to the Governance Committee. 1. State the general purpose of the project and how it relates to County business. 2. Define the scope of the project, including what information is going to be made available, to whom it will be available, the sensitivity level of the information, and the identity of the targeted user. 3. Identify any County data accessed not located on the Web server and how the data will be used. 4. Identify the designated contact person within the department for this project, who will be responsible for maintaining current information. 5. Identify the security requirements of the project. C. No change. Sec. 9-3-100. Use of electronic mail. Electronic mail(e-mail)is defined as any message that is transmitted electronically between two(2)or more computers or terminals,whether stored digitally or converted to hard(paper)copy. Under Part 2,Article 72,Title 24,C.R.S.,e-mail messages may be considered public records and may be subject to public inspection, pursuant to Section 24-72-203, C.R.S. All computer-related information, including e-mail messages and/or digitally stored documents, are the property of the County and are considered the County's records even if the information resides on privately owned devices. County e-mail may not be forwarded to employee's personal e-mail accounts. Sec. 9-3-110. Employee access to e-mail. A. All County employees with a need are assigned an e-mail address for County business. Sec. 9-3-120. Employee conduct with e-mail. As with any County property or equipment, e-mail should be used for official County business only. Incidental and occasional personal use of e-mail is permitted. However, strictly forbidden e-mail usage includes use for personal profit or gain;transmission of political messages; solicitation of funds for political or other purposes; or sending of harassing messages. A. Employees must refrain from sending e-mail messages that may be considered lewd, offensive, or harassing by, or to, other people. B. Employees must refrain from sending e-mail messages that contain angry,violent, or threatening messages. C. Employees must not participate in sending,forwarding,or responding to e-mails that are of a disruptive or coercive nature, such as the distribution of spam or chain letters. D. The County identifies passwords as highly sensitive information. Account owners must never divluge their e-mail account passwords and login information. E. Employees must never share e-mail accounts. ARTICLE VI GIS System Products and Services Sec. 9-6-60. Service products and services. A- No change. B. The following identify the products and services that are proposed for availability to the public as the GIS system is developed: 1 - No change. 2. Arc Macro Language (AML) products (programs, menus, computer programs, forms and written procedures)developed for the administration of the system may be made available to customers and other County agencies,departments and appointed and elected offices. No maintenance of the products is planned to be furnished by the County. Such products are to be furnished as is,and the decision to release such products is solely at the discretion of the County. Such products are available to customers by license agreement and to other County agencies, departments and appointed and elected offices. It is not intended that custom programs, etcetera, required for the sole use of the customer will be developed by the GIS Division. No change to remainder of section. Sec. 9-6-70. Rates and charges. A - No change. B. Rates and charges for custom products, regular, on-going system services, and technical assistance. 1 through 2 - No change. 3. The rates to be charged for GIS products, subscription services, AML products and digital data are set forth in the Products and Rate Schedule set out at Appendix 5-F of this Code. 4 - No change. 5. All charges are due and payable and shall be collected at the time the order for products and services is taken,except as otherwise might be established by contract or license agreement. No change to remainder of section. ARTICLE VII Workstation Remote Control Policy Sec. 9-7-20. Definitions. Revise definition of"Remote control software", as follows: Remote control software: Any software used that enables remote workstations(a second workstation)to be viewed, controlled or updated remotely,without being physically at the second workstation. Sec. 9-7-30. Statement of policy. A through K - No change. L. In addition, other components of the workstation application make it possible to implement mass changes,fixes,or updates to all County workstations automatically. Updates will be scheduled weekly. It is the end user's responsibility to support regular maintenance to their workstations to keep workstations secure and running at optimal performance. This requires end users to adhere to Information Services guidelines,such as re-booting,etcetera,associated with the maintenance. Unless under emergency conditions where the IT infrastructure can be corrupted or damaged, the activity will be scheduled on a weekly basis. M. Each occurrence where remote control software is utilized to diagnose or resolve a workstation issue will be logged using Information Services Help Desk call tracking procedures. N - No change. Sec. 9-7-40. Procedure. A. To initiate a remote control session,support staff must first make an attempt to get approval from the end user to take control of his or her workstation. Approval can be obtained multiple ways, e.g., phone, e-mail, etcetera. B through E - No change. F. If the end user is not present when the remote control session ends, the support staff should follow up with the end user, indicating the date and time the session was held, a brief description of work performed, and whom to contact if there are questions. This follow up should be by e-mail or phone message. ARTICLE VIII PERSONAL COMPUTING DEVICES Sec. 9-8-30. Statement of Policy. A through B - No change. C. Guidelines. 1 through 3 - No change. 4. To be considered for approval of linking or communicating with the County network, the personal computing device must meet County hardware and software standards, as well as wireless standards, established by the Information Services Governance Committee. Requests failing to meet County standards will result in denial of access to the County network. 5 through 9 - No change. 10. All personally owned devices must be in full operational order prior to requesting the installation of synchronization software on the user's desktop personal computer. 11. If an employee is planning to purchase a personal computing device and wants to synchronize/link it with the County network, it is the employee's responsibility to meet County standards, receive approval from the Elected Official or Department Head, and confirm any County funding of any additional required hardware and/or synchronization software. Approvals should be obtained prior to any purchase. 12 - No change. 13. For an employee to synchronize or link personal computing devices with the County network,the user and personal computing device must be registered as a user with the Information Services Department. 14. The County does not guarantee continued compatibility with any hardware device or software being utilized in this environment and is not liable for personal expenses incurred. 15. The County or Information Services is not responsible for any damage to personally owned hardware or software that may be incurred while supporting the personal computing device or related software. 16. Abuse of this policy can result in removal of authorization to have a personal computing device link or communicate with the County network. Continued abuse of this policy could lead to employee disciplinary actions, including termination of employment. Sec. 9-8-40. Procedure. A- No change. B. Any County employee wishing to synchronize a personal computing device with a desktop personal computer or link it with the County network must first have it approved by his or her Elected Official or Department Head. There must be a clear business need to approve the request. 1 through 2 - No change. 3. The requesting user must sign the Personal Computing Device Request Form explaining the County's right to review any information contained on the device. This form is available from the Information Services Department. Along with the user's signature,the employee's full name,device make and model, operating system and serial number shall be provided. (See Appendix 9-D.) C. Information Services will review the information on the Computing Device Request Form to ensure the hardware and software meet County standards. Information Services will inform the employee of approval or denial. D. If hardware or software purchases are involved, purchases will be made after the Information Services Governance Committee approvals have been obtained. 1. Information Services will process approved requests by ordering and receiving County standard equipment. 2 - No change. E through F - No change. G. Personal Computing Device Standards. 1. Technology standards will be determined by the Information Services Governance Committee and the Board of Weld County Commissioners. 'twill be the responsibility of Information Services to follow those standards when reviewing requests for personal computing devices and purchasing those devices. Revise Appendix 9-A, Information Services Function Sub-Committees, as attached. Revise Appendix 9-B, Computer Security Request Form, as attached. Revise Appendix 9-C, GIS Functional Subcommittees, as attached. Add Appendix 9-D, Computing Device Request Form, as attached. Add Appendix 9-E, Websense Internet Filter Removal Request Form, as attached. BE IT FURTHER ORDAINED by the Board that the Clerk to the Board be, and hereby is, directed to arrange for Colorado Code Publishing to supplement the Weld County Code with the amendments contained herein, to coincide with chapters, articles, divisions, sections, and sub sections as they currently exist within said Code;and to resolve any inconsistencies regarding capitalization,grammar, and numbering or placement of chapters,articles,divisions,sections, and sub-sections in said Code. BE IT FURTHER ORDAINED by the Board if any section,subsection, paragraph,sentence, clause, or phrase of this Ordinance is for any reason held or decided to be unconstitutional, such decision shall not affect the validity of the remaining portions hereof. The Board of County Commissioners hereby declares that it would have enacted this Ordinance in each and every section, subsection, paragraph, sentence, clause, and phrase thereof irrespective of the fact that any one or more sections, subsections, paragraphs, sentences, clauses, or phrases might be declared to be unconstitutional or invalid. NOTICE PURSUANT to the Weld County Home Rule Charter,Ordinance Number2005-13 published above, was introduced and, on motion duly made and seconded, approved upon first reading on October 24, 2005. A public hearing and second reading is scheduled to be held in the Chambers of the Board, First Floor Hearing Room, 915 10th Street, Greeley, Colorado 80631, on November 16, 2005. All persons in any manner interested in the reading of said Ordinance are requested to attend and may be heard. Please contact the Clerk to the Board's office at phone (970) 336-7215, Extension 4225, or fax (970)352-0242, prior to the day of the hearing if,as the result of a disability,you require reasonable accommodations in order to participate in this hearing. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners,located in the Weld County Centennial Center,Third Floor,915 10th Street, Greeley,Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday,or may be accessed through the Weld County Web Page(www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. SECOND READING:November 16, 2005, at 9:00 a.m. THIRD READING: December 7, 2005, at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: October 28, 2005 PUBLISHED: November 2, 2005, in the Fort Lupton Press WELD COUNTY 3. Inform users in advance of PROOF OF PUBLICATION CODE ORDINANCE 2005-13 governance approved changes to IN THE MATTER OF REPEALING hardware, software and related FORT LUPTON N AND REENACTING, WITH resources which may affect their AMENDMENTS, CHAPTER 9 systems. STATE OF COLORADO INFORMATION SERVICES, OF s-16-Nochange. THE WELD COUNTY CODE 17. Allow for testing of new ..-aE IT ORDAINED BY THE systems and major enhancements COUNTY OF WELD SS. ARD OF COUNTY and technology prior to production ,MMISSIONERS OF THE implementation. OUNTY OF WELD, STATE OF 18. Control and coordinate the COLORADO: funding for projects. WHEREAS, the Board of County Remainder of Section-renumber. Commissioners of the County of ARTICLE II I, Karen Lambert, do solemnly swear that I Weld,State of Colorado,pursuant INFORMATION SERVICES to Colorado statute and the Weld GOVERNANCE COMMITTEE am the Publisher of the Fort Lupton Press; County Home Rule Charter, is Sec.9-2-30.Role. that the same is a weekly newspaper rinted vested with the authority of The role of the Informationp administering the affairs of Weld Services Governance Committee County,Colorado,and includes theC-ollowing: and published in the County of Weld, State WHEREAS, the rs,on December rd of cembernty D. Identify ChNochange. Commissioners,on December 28, D. Identity the annual information of Colorado, and has a general circulation 2000,adopted Weld County Code system priorities and related therein; that said newspaper has been Ordinance 2000-1, enacting budgetary impact. These priority comprehensive Code for the recommendations will become an County of Weld, including the integral part of the budget process published continuously and uninterruptedly codification of all previously subject to adjustment during adopted ordinances of a general budget budget option, and in said county of Adams for a period of more and permanent nature enacted on upon final budget approval,will be than fifty-two consecutive weeks prior to the or before said date of adoption, established as part of the y' and Department of Information WHEREAS, the Weld County Services annual work program.All first publication of the annexed legal notice Code is in need of revision and projects must be reviewed and clarification with regard to approved by the Information or advertisement; that said newspaper has procedures, terms, and Services Govemance Committee been admitted to the United States mails as requirements therein. before they can be added to the NOW, THEREFORE, BE IT Information Services annual work ORDAINED by the Board of plan. second-class matter under the provisions of County Commissioners of the E through G-No change. County of Weld,StateofColorado, Sec. 9-2-80 Purpose and the act of March 3, 1879, or any that Cha pter Chapter 9, Information structure of subcommittees. es. Services,of the Weld County Code CA. The h B No change. amendments thereof, and that said be and hereby is, repealed , to responsibilities rofe the newspaper is a weekly newspaper duly re-enacted, with amendments, to functional subcommittees are to: read as follows.9 5 through 4-Nouser change. CHAPTERS 5. Ensure that user department qualified for publishing legal notices and INFORMATION SERVICES systems design deosions are Throughout Chapter 9, replace made in accordance with annual advertisements within the meaning of the "The Department of Information information system work plans and laws of the State of Colorado. That the Services" with 'Information approved project schedules. Services". 6 through 8-No change. Throughout Chapter 9, replace ARTICLE III annexed legal notice or advertisement was "SCE" Corporation with "ACS" COUNTY NETWORK AND corporation. INTERNET ACCEPTABLE USE published in the regular and entire issue of committ Ca 'Human replace thees" POLICY every number of said weekly newspaper for rcommlth a Services. Sec.The Dap General Infer ono. hr ugholut and Human Services". S. ic Department i Information the period of 1 consecutive insertions , and Throughout Chapter 9, replace Services, in conjunction with the "Geographical Information System Information Services Governance that the first publication of said notice was in (GIS) Division" with "GIS", and Committee, has taken the replace"the Division'with"GIS". necessary steps to provide a ARTICLE I County Network and Internet the issue of newspaper, dated 2nd day of INFORMATION SERVICES Acceptable Use Policy on use of November 2005, and the last on the 2nd Sec.9-1-70.Specific duties and the Internet by County agencies , day responsibilities of Governance and departments. Any County Committee. agency or department eligible for, of November, 2005. A through G-No change. and having funding for, the Weld H. Communication and County network or the Internet will enforcement of policies and be provided with access under the procedures. terms and conditions of this policy. Sec.9-1-80.Specific duties and B through C-No change. responsibilities of users. D. This policy applies to any The specific duties and activity performed from a responsibilities of each user are as County-owned asset and to all follows: County employees or contracted A.General responsibilities: agents of the County performing 1. Designate a management level work activities on behalf of the position to act as a liaison between County.Work activities conducted the user department, Govemance from remote devices or even Committee and Information personally owned devices are Services. subject to this policy. The policy 2 through 3-No change. applies to electronic B.No change. communications on County C. New system development networks and public networks responsibilities: including, but not limited to, the 1 through 5-No change. following: 6. Maintain communication a with I.Electronic Communications: --` Information Services s attending a.E-mail. regularly scheduled management b.File transfer(FTP). review meetings. c. Remote login, including VPN, Sec.9-1-90.Specific duties and and Citnz. r, Cu,blis er. u scn a an rn be re me, this the responsibilltlesof information d.Remote control software. Services via contract services. e. Discussion groups/bulletin .- ' ', ay of October, 2005. The following specific duties will be boards. '-f. 4 assigned to the Department of f. World Wide Web, web sery '•`'?' \• Information Services: wide area information se i l \ I A and B No change.spa g. e } O.Direct action responsibilities: g. Personal computing devi �S t 1. Represent the County to including Blackberrys, PDA's d t rVk vendors of computer and data cell phones. i i;(_ ‘ ,_ ommunications equipment, h. Digital type devices that 'stems and services. communicate with rso t ublc- pk dti•. ar-"all"> computers or public networks t a _. Provide for the acquisition and I. H3xx, such as video `tiR_7 ,^, '>c• administration of personnel, conferencing.o ing. VT`+•`W�. hardware, software, contracts, j.Voice over IP(VOIP). grants and related services 2.Public Networks: '" 77"..,..,, necessary to support the clear-"all"> Lily SI O �''' information services requirements a.Internet and Internet Services. I — of any user or the County in b.Internet Service Providers. general. c.Bulletin board systems. CASE NO.370207 key 21409 d.Weld County network. or recuning malfunctions in any the use of a locking screensaver or 2. Transmission of offensive e.On-line search services. County information system similar mechanism to automatically messages.Employees must refrain Sec.9-3-20.Introduction. hardware must report the enable after a minimum usage from sending e-mail messages that Weld County network access and malfunction to their supervisor or lapse of 5 minutes. may be considered lewd,offensive, Internet access can provide the person responsible for 6. Transmission of sensitive or harassing by or to other people. significant business benefits for hardware maintenance. information over unsecured 3. Transmission of hostile County government agencies. 3. Employee obligation to report networks. Employees must not messages.Employees must refrain .,,Uowever,there are also significant security and policy violations.Any send highly sensitive information from sending e-mail messages that al, security and productivity employee that observes the over unsecured networks without contain angry, violent, or ues related to how the Internet violation of security and/or security the use of encryption to secure the threatening messages. ,s used. Examples of such issues policy is obligated to report the transmission. Such examples 4. Transmission of disruptive are listed below. malfunction to their supervisor. would be,but not be limited to: messages. Employees must not A. The potential to receive C. Employee responsibility. The a.Use of encryption when sending participate in sending,forwarding, computer viruses Trojans, worms security,protection,and integrity of credit card information over the or responding to e-mails that are of and spyware from Internet County information assets are a Internet(look for"https"in the web a disruptive or coercive nature, information sources. premier responsibility of all County page URL to assure encryption). such as the distribution of SPAM or B through F-No change. employees and contractors. It is b. Sending confidential business chain letters. Sec. 3-2-25. Authorized County each employee's responsibility to information over unsecured, 5. Transmission of Network Access. fully understand the information non‑county networks. non‑incidental, personal A. Secure New Employee security policies contained in this 7. Tampering with security messages. Employees are not Accounts.Authorized access to the document and to apply these mechanisms.All County computing permitted to send messages County network for new employees policies effectively to their daily systems must be equipped with involving the petition or solicitation must be approved by the practices and routines. Should an security mechanisms to protect the for personal gain or interest. department head, elected official, employee be unable to perform,or information and resources of each 6. Disclosure of login information. or designated person in the not fully understand any of the system. Employees are not to The county identifies passwords as department. Requests for new following policies, whether whole temper with,reconfigure,or disable highly sensitive information. employee security or changes to or in part, it is that employee's such mechanisms. Such Account owners must never existing security must be submitted responsibility to alert his or her mechanisms would include,but not divulge their e-mail account using the Security Request Form manager as to their difficulty or be limited to anti8#8209;virus passwords and login information. (Appendix 9‑B). confusion with the policy or software,access controls. 7. E-mail Privacy. All County 1. Requests for new employee policies.It is each employee's duty clear—"all"> 08#8209:mail is a public record security must be submitted in and responsibility to report to their 8. Possession of offensive and may be subject to public advance - - at least three days immediate supervisor any and all material. County employees are inspection. prior to hire date, and signed by violations of these policies that he not permitted to access, view, G. Use of Internet systems and department head, elected official, or she may have witnessed or download,upload,e-mail,store or resources.All employees who are or designated person. have knowledge of. print material that could be granted Internet access are 2. All documentation authorizing D.Manager responsibility.It is the considered inappropriate,offensive encouraged to use the Internet as user access to controlled responsibility of all managers to or disrespectful to others. part of their daily work computing and information assure that all employees under 9. Communication of personal environment. It is, however, resources must be archived and their supervision fully understand opinions. Employees must refrain important that employees not retrievable upon request for all and are in compliance with these from expressing personal opinions misuse or abuse County Internet active accounts. Requests will be information security policies. or communicating in a way that resources, which could result in retained for a period of five years. Managers are responsible for could be embarrassing to the disciplinary action by the County. 3. Requested access must be keeping their employees County while using County 1.Acceptable Internet connectivity. approved by the owner of the data. up‑to‑date on any computing and communications Employees are only permitted to 4.Login passwords must meet the changes regarding these policies. systems. access the Internet for County County required standard, as set Should any employee consistently 10. Illegal access of computer business,using County computing forth in Section 9-3-70. break company policy, it is that systems. County computing systems, through authorized 5. Generic and shared accounts manager's responsibility to take systems must not be used to County gateways. are strictly prohibited.All UserlD's disciplinary measures in obtain illegal access to computer 2. Personal use of Internet must uniquely identify users to the accordance with applicable County systems, to interfere with the connectivity. Use of County system. disciplinary policies or procedures. normal operations of computer computing resources to access the B.Secure Employee Terminations. It is the responsibility of all systems or to perform malicious Internet must be for legitimate 1. All security requests for managers to ensure that all acts against a computer system. business purposes only.Incidental ""ployee terminations within the information assets under their 11. Unauthorized testing of personal use of Internet resources mty's operations must be domain are secured and managed computing system security. is permissible if the use does not omitted prior to the last date of in order to ensure compliance with Employees must never test the interfere with employee employment.Upon the termination relevant polices and procedures. security of computer systems, productivity,does not preempt any of an employee, all accounts for E.Use of information systems and whether physical or logic based, business activity, and does not the employee, including remote resources. Employees who are without written permission from consume more than a trivial access and email, must be entitled to the usage of County senior management of both the amount of County resources. immediately suspended or computing systems to perform the facility from where the test is being clear="all"> removed from all systems. necessary functions identified with launched, and the facility where 3. Affiliation with the County. 2. Notification for unplanned their position, must not misuse or the system resides. The only Employees may make public their terminations must be abuse computing systems and exception to this is if such security affiliation with the County in work communicated to Information resources. testing is a known part of the related mailing lists,chat sessions, Services to immediately disable 1. Compliance with software employee's job description and and other communication the account. Security request copyrights and licenses. All function. resources on the Internet. This forms are required for unplanned employees must comply with and 12. Disclosure of classified affiliation may be accomplished terminations, and must be respect the copyright laws and information. Employees must directly or it may be implied; approved by the department head, license agreements of the software never disclose information that however,employees must indicate elected official, or designated licensed to the County for use on could be considered sensitive, that such opinions expressed are person in the department to which business computing systems. classified or proprietary to their own and not necessarily the terminated employee was 2. Use of illegal software. unauthorized persons. those of the County. assigned. Employees must not download 13. User Data Storage. All 4. Inappropriate use of Internet Sec.9-3-30.Definitions. and/or install pirated or illegal employees using a County issued resources. Employees initiating or Add the following definitions: software that violates existing computing workstation must store participating in communications of FTP means file transfer protocol. copyright or license agreements. information relating to their job an inappropriate or unprofessional ISP means Internet Service 3. Use of non8#8209;approved function on servers designated for way, is strictly prohibited. Provider. software. The County strictly that purpose.This data should not Employees must refrain from the VPN means virtual private network. forbids the downloading or be stored locally on the workstation use of lewd, offensive or hostile Delete the following definitions: installation of non‑county unless it is permitted by language when communicating Sec.9-3-40.Guidelines. owned or licensed software on Information Services. using county resources. Likewise, Replace the entire section with the County computing systems without 14.System Changes.Any software all Internet messages that are following: prior consent from a supervisor. that allows configuration changes intended to harass,annoy or alarm A. Responding to security 4. Acceptable use of passwords. to networks, computers and other persons are similarly prohibited. incidents. All security incidents Each password owner shall hardware or software,should only 5. Inappropriate use of Internet shall be reported to the IT Help safeguard and protect each be installed by members of resources for illegal access. Desk for immediate escalation. password they have created, or Information Services. Employees are strictly prohibited B.Responding to malfunctions and that is entrusted to them. F. Use of e-mail systems and from contacting or probing violations.All employees must play Password sharing and account resources. Based upon the information systems, of County an active roll in helping to assure sharing is strictly prohibited. requirements of an employee's job origin or otherwise,with the intent the security and quality of all Writing down passwords is not an function, those with a legitimate to gain unauthorized access. County applications by reporting acceptable practice; however, if business need for a county e-mail Similarly, employees must not any continual malfunctions in passwords must be written down, account are entitled to the use of attempt to disrupt or interfere with software and hardware, In doing the information shall be stored county e-mail systems. Such the operation or function of any so, employees help to assure the securely and be accessible only by usage is for enhancing productivity information systems. optimum performance and the owner. Storing passwords via and communications. However, it 6.Generation of excessive internet availability of business systems. electronic file or programmable is important that employees not traffic.To minimize network traffic, 1. Employee obligation to report function keys, scripts, macros or misuse or abuse e-mail systems no automatic requests for software malfunction. Any automated logon sequences is and resources. information on the Internet and •--^Thployee that observes continual strictly prohibited. 1. Acceptable use of e-mail. The applications that generate constant recurring malfunctions in any 5. Security of the computer use of county e-mail systems and network traffic, e.g., Internet radio aunty software must report the desktop through locking practices resources must be restricted to stations, channels, malfunction to their supervisor or and mechanisms. All users of a business purposes only.Incidental music‑sharing services, the person responsible for that computing system must either lock personal use is permissible if such etcetera,are prohibited. software. the computer desktop or log off of use does not interfere with H.Use of networked systems and clear-"all"> the system when walking away employee productivity, does not resources. All employees of the 2. Employee obligation to report from a computer terminal. preempt any business activity,and County are granted access to the hardware malfunction. Any Additionally,all computing systems does not consume more than a network. Employees will require employee that observes continual covered by HIPAA must employ trivial amount of county resources. access to the network fordint ari .370207 key 21409 access, network storage, Internet b.Teleconferences. allowed on the wireless network. be run observing all local codes access, etcetera. It is important c.Video Conferences. clearer"all"> and requirements to prevent such that employees not misuse or Sec. 9-3-50. Roles and b. Only County employees will be cabling from becoming hazardous abuse this resource, which could responsibilities. given wireless access. to environments and personnel.All result in disciplinary action by the A through B-No change. c.The'Computing Device Request communications cabling must be County. C. The role of the County Form' (Appendix 9-0) must be reasonably protected from 1. Unauthorized testing of departments and agencies Is as completed and approved by tampering or interception of ..computing system security. follows: govemance. communications. iployees must never test the 1. It is the responsibility of all d. Approved devices will need to 3. Secure disposal of computing ;urity of network systems and managers to assure all employees be configured by Information equipment. All Weld County resources, whether physical or under their supervision fully Services for secure access to the computing equipment and logic based.The only exception to understand,and are in compliance County wireless network. peripherals must be disposed of this is if such secunty testing is a with, the County policies. e. All policies and procedures for securely to prevent unauthorized known part of the employee's job Managers are responsible for accessing the County network access to any residual company description and function. keeping employees up-to-date on apply for wireless access. information. 2. Disregard for security any changes regarding these B. Computing in public and a.Hard drives.Prior to the disposal mechanisms.Employees must not policies. Should any employee untrusted zones. Weld County of any hard drive or disk drive,the attempt to bypass security consistently break County policy,it operates several computing device must either be physically mechanisms as a means for is that managers responsibility to systems in public access areas destroyed or formatted to current creating shortcuts or for the take disciplinary measures in and within the County jail for Department of Defense standards. performance of pranks or practical accordance with applicable County inmate use. Exposures to the clear=alr> jokes. disciplinary policies or procedures. County by the use of these b. Optical media. Prior to the 3. Unauthorized connections to It is the responsibility of all systems must be fully understood disposal of any optical media,such non‑county networks. It is managers to ensure all information and all known exposures mitigated. as CD‑ROMs, DVD, and strictly forbidden for employees to assets under their domain are 1.Public computing systems.Weld ZIP or Jaz cartridges, these establish unauthorized connections secured, managed, and employee County operates several public devices must be physically to other none#8209;county access is limited to access computers, which are destroyed, This may be networks, public or private, while job8#8209;specifc data. available for use by the public, accomplished through the use of connected to a County network. 2. Provide for training of within the Weld County facilities. shredding or incineration. The This includes connecting to employees who need access. These systems, due to the optical disc itself must be cut with none#8209;county wireless 3. Budget for service and uncontrolled nature of their use, scissors or repeatedly scratched in networks while connected to the associated training,if needed. must be segregated to an isolated circular motions over the disc. County network. 4. Establish their own data or physically separate segment of c.Analog media.Prior to disposal, 4. Use of modems on network sensitivity policy. the Weld County network. All all analog media must be connected systems. Remote Sec. 9-3-70. Weld Network and access to internal county completely destroyed. Floppy access systems,such as modems, Internet Security. resources must be tightly diskettes must either be shredded are strictly prohibited. Such Replace the entire section with the controlled and limited to prevent in a large paper shredder or cut modems may be used for specific following: any misuse of these systems. with scissors.Backup tapes should isolated purposes; however, it A. Weld County relies on Internet Auditing must be enabled on these be dismantled with the actual tape must remain in a disconnected filtering tools to restrict access to systems. Users of these systems shredded or bumed(usually this is state until the exact time that the appropriate web sites for County must be aware of the specificity best performed by a licensed system is needed. All modems employees. and sanctions imposed on these media destruction contractor). must be registered with Information B. Department Heads or Elected computing systems. d. RAM. Prior to disposal, all Services. Officials are the only authority who 2. Inmate computing systems. Random Access Memory modules 5. Use of encryption for highly can request changes to the default Weld County provides several must be destroyed. This includes sensitive information. Employees filter restrictions applied to their computers for the use of inmates all memory devices such as must be aware that when sending employees Internet access within the County ail. Due to the memory from computers, memory sensitive information over County (Appendix 98#8209;B). uncontrolled use of)these systems, from printers and FAX machines, or public networks that the County C. The following remote/Internet all inmate computing systems must or other memory devices. This is does not use encryption to protect security guidelines shall be only maintain a minimal set of most commonly accomplished the contents of such information by followed: computer resources to prevent through the use of a hammer default. Therefore, it is the 1.All remote access falls under the abuse of such systems and where the device is repeatedly responsibility of all employees to guidelines of the Acceptable Use resources.This would include: struck to physically smash the take the necessary precautions to Policy. a. Computers must not maintain memory chips. ' "trypt highly sensitive information 2. The user shall make sure that any unnecessary ports or IMPORTANT NOTICE: When :n transmitting. any related passwords are secure, peripherals, including a manually destroying a media Network Privacy. County and and shall not share the passwords CD‑ROM drive, floppy device, always use protective Information Services employees or write passwords on paper.Each drive, serial ports, USB ports, eyewear and apply common sense must understand that all password owner shall safeguard modem, or other to avoid physical injury. communications using County and protect each password they non8#8209;essential interfaces. Sec. 9-340. Acceptable use resources may be monitored for have created, or that is entrusted b. Computers must not have guidelines. statistical, legal, and investigative to them. Password sharing and access to other computing systems A-No change. purposes.County and Information account sharing is strictly or servers, except to accomplish B.General. Services employees should expect prohibited. Storing passwords via the specific purpose for the inmate 1. County departments assume no right of privacy to electronic file or programmable computing systems. responsibility for providing communications made using function keys, scripts, macros or c. Computers must not have reasonable publicity and County equipment and resources. automated logon sequences is Internet access. enforcement for this 'Internet I. Use of remote access (VPN). strictly prohibited. Each individual d. Network access must be Acceptable Use Policy'. Ultimate Remote access into County with approved access to County segregated from the other County responsibility for traffic that does networks is only permissible information computing systems network segments. not conform to this policy lies with through a County owned, and resources is responsible for 3.Security zones.Specified areas the individual end user. It is the Information Services administered, creating original, unique and within a facility that are designated responsibility of the County agency VPN (Virtual Private Network) complex passwords (something as performing critical functions or to monitor and rectify the behavior solution. known only to them and not easily contain sensitive information or of its users who disregard this J. Compliance with legal guessed)for each account. systems, must make use of policy. requirements. All usage of 3. The user is responsible for security mechanisms and 2. It is also the responsibility of commercial software within the securing their remote access procedures greater than those each County department to provide County must conform to all information. Sharing remote used for areas of lesser criticality adequate training for its users. requirements and restrictions access in strictly prohibited. or sensitivity.These zones must be 3. The Department of Information imposed by the licenses. 4.All remote devices and access isolated by security controls of Services and the County accept no 1. Compliance with software should be turned off when not reduced permission from the responsibility for the traffic which licenses and copyrights. All being used, such as VPN or general facility population. they transport and which violates proprietary software,either owned modem.The user should be aware Permission must be based on the the Acceptable Use Policy of any or purchased by the County, must that if he or she has a modem and need to physically access the area connected networks, beyond be used in a way that does not is on the County network, it is for a job function. Such security informing the County if and when a violate the license or copyright possible for a virus to attack any or zones would include: violation is brought to the attention protecting the software. all networked computers. If the a,Server room. of the Information Services 2. Maintenance of software modem is external, it shall be b.Communications closet. Governance Committee. licenses. All commercial software tumed off when not in use. C. Equipment security. All 4 through 5-No change. licenses must be maintained to Add Section 9-3-75,as follows: information computing equipment, 6. Because of the diversity of assure that any violation of such Sec. 94-75. Physical and and any information contained or resources on the Internet and other licenses does not occur due to the Environmental Security Policy. processed by the equipment,must public networks,it is impossible to inability to track or control the use A. Internal security operations.All be reasonably protected from list all the do's and don'ts. In of software licensed to the County. offices and office areas within damage, interruption and general,common sense should be Installations of software must be Weld County facilities must be interception. used to judge situations. The documented and the licenses of secured,as appropriate,to prevent 1. Protection from power following are some guidelines to such software inventoried. unauthorized access to county interruptions. All sensitive start with: clear-'all'> information computing systems, electronic equipment must be a.Computing resources should be 3. Use of pirated or stolen resources and network, including reasonably protected from used only for County-related software. Installation of pirated or the wireless network. interruptions of the power supply business in the support of the Bolen software on County 1.A County‑wide standard including power fluctuations,power administrative, instructional, ormation computing systems is has been developed for wireless surges, brownouts, and short and research and public service )ressly prohibited. access and all equipment. This long8#8209;term losses. objectives of the County. .. Recording of communications. standard includes access points, Equipment performing critical b.Appropriate use of resources is Employees shall not record any wireless cards and all other related functions should have additional or limited to the official work of communications without the equipment. Equipment must be increased protection from power theCounty. Examples of disclosure of the recording and the purchased by Information interruptions. inappropriate use of resources specific consent of all persons Services. (See Section 2. Safety and protection of include,but are not limited to: involved in the communication. 98#8209;18#8209;90.) electrical and communications 1 through 5-No change. This includes,but is not limited to: a. Only County devices with cabling. All electrical power and 6)Attempts to make unauthorized a.Telephone conversations. approved wireless cards are telecommunications cabling must entryon the County networkASE NO.370207 key 21409 7 through 10-No change. documents,are the property of the control software",as follows: damage to personally owned 11)Any other activity that can be County and are considered the Remote control software : Any hardware or software that may be considered mis-use or harmful to County's records even if the software used that enables remote incurred while supporting the the County network. information resides on privately workstations (a second personal computing device or c. Employees must never test the owned devices.County e-mail may workstation) to be viewed, related software. security of computer systems, not be forwarded to employee's controlled or updated remotely, 16.Abuse of this policy can result whether physical or logic based, personal e-mail accounts. without being physically at the in removal of authorization to have Without written permission from Sec. 9-3-110. Employee access second workstation. a personal computing device link nior management of both the to e-mail. Sec.9-740.Statement of policy. or communicate with the County ;ility from which the test is being A. All County employees with a A through K-No change. network. Continued abuse of this ,aunched and the facility where the need are assigned an e-mail L.In addition,other components of policy could lead to employee system resides.The only exception address for County business. the workstation application make it disciplinary actions, including to this is if such security testing is a Sec.94-120.Employee conduct possible to implement mass termination of employment. known part of the employee's job with e-mail. changes, fixes, or updates to all Sec.9-8-40.Procedure. description and function. As with any County property or County workstations automatically. A-No change. 7.No change. equipment, e8#8209;mail should Updates will be scheduled weekly. B. Any County employee wishing B. All County departments must be used for official County It is the end user's responsibility to to synchronize a personal accept these guidelines and business only. Incidental and support regular maintenance to computing device with a desktop understand that network traffic occasional personal use of their workstations to keep personal computer or link it with originating from its location is to be e8#8209;mail is permitted. workstations secure and running at the County network must first have consistent with this policy. The However, strictly forbidden optimal performance.This requires it approved by his or her Elected Department of Information e8#8209;mail usage includes use end users to adhere to Information Official or Department Head.There Services cannot police the network for personal profit or gain; Services guidelines, such as must be a clear business need to but may refer to the appropriate transmission of political messages; re-booting, etcetera, associated approve the request. Elected Official or Department solicitation of funds for political or with the maintenance. Unless 1 through 2-No change. Head for disciplinary action any other purposes; or sending of under emergency conditions where 3. The requesting user must sign agency that appears to be in harassing messages. the IT infrastructure can be the Personal Computing Device persistent and/or serious abuse of A. Employees must refrain from corrupted or damaged,the activity Request Form explaining the this policy.Questions pertaining to sending e-mail messages that may will be scheduled on a weekly County's right to review any the policy or interpretation of the be considered lewd, offensive, or basis. information contained on the policy should be submitted to the harassing by,or to,other people. M.Each occurrence where remote device.This form is available from Information Services Govemance B. Employees must refrain from control software is utilized to the Information Services Committee. sending e-mail messages that diagnose or resolve a workstation Department.Along with the user's clear-"all"> contain angry, violent, or issue will be logged using signature, the employee's full 9.No change. threatening messages. Information Services Help Desk name, device make and model, C. Participation in discussion C.Employees must not participate call tracking procedures. operating system and serial groups. in sending, forwarding, or N-No change. number shall be provided. (See 1.No change. responding to e-mails that are of a Sec.9-740.Procedure. Appendix 9-D.) 2.The user must be aware that the disruptive or coercive nature,such A. To initiate a remote control C.Information Services will review information he or she puts out on as the distribution of seam or chain session, support staff must first the information on the Computing the Internet will be perceived as letters. make an attempt to get approval Device Request Form to ensure the official County position unless D. The County identifies from the end user to take control of the hardware and software meet specifically identified as personal passwords as highly sensitive his or her workstation. Approval County standards. Information opinion,even in a discussion.If the information.Account owners must can be obtained multiple ways, Services will inform the employee user is offering his or her own never divluge their e-mail account e.g.,phone,e-mail,etcetera. of approval or denial. opinion,he or she shall be sure it passwords and login information. 8 through E-No change. D. If hardware or software is clearly identified as such. E. Employees must never share clear-"all"> purchases are involved,purchases 3.No change. e-mail accounts. F. If the end user is not present will be made after the Information D.No change. cleareall"> when the remote control session Services Govemance Committee E. All County devices are ARTICLE VI ends, the support staff should approvals have been obtained. configured for Internet access GIS System Products and follow up with the end user, 1. Information Services will unless specifically requested by Services indicating the date and time the process approved requests by the department head or elected Sec. 9-640. Service products session was held, a brief ordering and receiving County official. and services. description of work performed,and standard equipment. r"c. 94-90. Web server A-No change. whom to contact if there are 2-No change. delines. B. The following identify the questions.This follow up should be E through F-No change. Review. The Department of products and services that are by e-mail or phone message. Gear-"alr> Information Services and the proposed for availability to the ARTICLE VIII G. Personal Computing Device Governance Committee will review public as the GIS system is PERSONAL COMPUTING Standards. all Web access and Web content developed: DEVICES 1. Technology standards will be proposals to ensure the project 1-No change. Sec.94-30.Statement of Policy. determined by the Information adheres to all guidelines set forth 2. Arc Macro Language (AML) A through B-No change. Services Govemance Committee in this Section. products (programs, menus, C.Guidelines. and the Board of Weld County B. Initial approval. Any proposed computer programs, forms and 1 through 3-No change. Commissioners. It will be the Web access must be submitted to written procedures)developed for 4.To be considered for approval of responsibility of Information the Information Services the administration of the system linking or communicating with the Services to follow those standards Governance Committee for initial may be made available to County network, the personal when reviewing requests for approval of the proposed project. customers and other County computing device must meet personal computing devices and The following information must be agencies, departments and County hardware and software purchasing those devices. provided to the Department of appointed and elected offices. No standards, as well as wireless Revise Appendix 9-A, Information Information Services for review maintenance of the products is standards, established by the Services Function and assistance in submitting the planned to be furnished by the Information Services Govemance Sub-Committees,as attached. initial request to the Govemance County. Such products are to be Committee. Requests failing to Revise Appendix 9-B, Computer Committee. furnished as is,and the decision to meet County standards will result Security Request Form, as 1.State the general purpose of the release such products is solely at in denial of access to the County attached. project and how it relates to the discretion of the County.Such network. Revise Appendix 9-C, GIS County business. products are available to 5 through 9-No change. Functional Subcommittees, as 2. Define the scope of the project, customers by license agreement 10. All personally owned devices attached. including what information is going and to other County agencies, must be in full operational order Add Appendix 9-D, Computing to be made available, to whom it departments and appointed and prior to requesting the installation Device Request Form, as will be available, the sensitivity elected offices. It is not intended of synchronization software on the attached. level of the information, and the that custom programs, etcetera, user's desktop personal computer. Add Appendix 9-E, Websense identity of the targeted user. required for the sole use of the 11. If an employee is planning to Internet Filter Removal Request 3. Identify any County data customer will be developed by the purchase a personal computing Form,as attached. accessed not located on the Web GIS Division. device and wants to BE IT FURTHER ORDAINED by server and how the data will be No change to remainder of section. synchronize/link it with the County the Board that the Clerk to the , used. Sec.94-70.Rates and charges. network, it is the employee's Board be, and hereby is,directed 4. Identify the designated contact A-No change. responsibility to meet County to arrange for Colorado Code person within the department for B. Rates and charges for custom standards, receive approval from Publishing to supplement the Weld this project, who will be products,regular,on-going system the Elected Official or Department County Code with the amendments responsible for maintaining current services,and technical assistance. Head, and confirm any County contained herein, to coincide with information. 1 through 2-No change. funding of any additional required chapters, articles, divisions, 5. Identify the security 3.The rates to be charged for GIS hardware and/or synchronization sections,and sub sections as they requirements of the project. products, subscription services, software. Approvals should be currently exist within said Code; C.No change. AML products and digital data are obtained prior to any purchase. and to resolve any inconsistencies Sec. 9-3-100. Use of electronic set forth in the Products and Rate 12-No change. regarding capitalization, grammar, mall. Schedule set out at Appendix 5-F 13. For an employee to and numbering or placement of Electronic mail (e8#8209;mail) is of this Code. synchronize or link personal chapters, articles, divisions, defined as any message that is 4-No change. computing devices with the County sections,and sub-sections in said transmitted electronically between 5.All charges are due and payable network, the user and personal Code. two (2) or more computers or and shall be collected at the time computing device must be BE IT FURTHER ORDAINED by ^1miners, whether stored digitally the order for products and services registered as a user with the the Board if any section, converted to hard(paper)copy. is taken,except as otherwise might Information Services Department. subsection, paragraph, sentence, cider Par 2, Article 72, Title 24, be established by contract or 14. The County does not clause,or phrase of this Ordinance C.R.S., e-mail messages may be license agreement. guarantee continued compatibility is for any reason held or decided to considered public records and may No change to remainder of section. with any hardware device or be unconstitutional, such decision be subject to public inspection, ARTICLE VII software being utilized in this shall not affect the validity of the pursuant to Section 24-72-203, Workstation Remote Control environment and is not liable for remaining portions hereof. The C.R.S. All computer-related Policy personal expenses incurred. Board of County Commissioners information, including e-mail Sec.9.7.20.Definitions. 15. The County or Information hereby declares that it would have messages and/or digitally stored Revise definition of "Remote Services is not responsible for any enacted this Ordinance Ark, IN I. 370207 key 21409 and every section, subsection, paragraph, sentence, clause, and phrase thereof irrespective of the fact that any one or more sections, subsections, paragraphs, sentences, clauses, or phrases might be declared to be ,...ipconstitutional or invalid. 3TICE -URSUANT to the Weld County Home Rule Charter, Ordinance Number 2005-13 published above, was introduced and, on motion duly made and seconded, approved upon first reading on October 24,2005.A public hearing and second reading is scheduled to be held in the Chambers of the Board, First Floor Hearing Room, 915 10th Street,Greeley,Colorado 80631,on November 16,2005.All persons in any manner interested in the reading of said Ordinance are requested to attend and may be heard. Please contact the Clerk to the Board's office at phone (970) 336-7215, Extension 4225, or fax (970)352-0242,prior to the day of the hearing if, as the result of a disability, you require reasonable accommodations in order to participate in this hearing. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners,located in the Weld County Centennial Center, Third Floor, 915 10th Street, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m.,Monday thru Friday, or may be accessed through the Weld County Web Page (wwa.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure Inclusion of your E-Mall correspondence Into the case P ', please send a copy to vtling@co.weld.co.us. BOND READING: November 16,2005,at 9:00 a.m. THIRD READING: December 7, 2005,at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY,COLORADO DATED:October 28,2005 PUBLISHED: November 2, 2005, in the Fort Lupton Press CASE NO.370207 key 21409 Hello