HomeMy WebLinkAbout20031949.tiff RESOLUTION
RE: APPROVE AGREEMENT FOR CONNECTION TO WELD COUNTY COMPUTER
NETWORK TO GAIN INTERNET ACCESS AND AUTHORIZE CHAIR TO SIGN -
ISLAND GROVE REGIONAL TREATMENT CENTER, INC.
WHEREAS, the Board of County Commissioners of Weld County, Colorado, pursuant to
Colorado statute and the Weld County Home Rule Charter, is vested with the authority of
administering the affairs of Weld County, Colorado, and
WHEREAS,the Board has been presented with an Agreement for Connection to the Weld
County Computer Network to Gain Internet Access between the County of Weld,State of Colorado,
by and through the Board of County Commissioners of Weld County, and Island Grove Regional
Treatment Center, Inc., with terms and conditions being as stated in said agreement, and
WHEREAS,after review,the Board deems it advisable to approve said agreement,a copy
of which is attached hereto and incorporated herein by reference.
NOW,THEREFORE, BE IT RESOLVED by the Board of County Commissioners of Weld
County,Colorado,that the Agreement for Connection to the Weld County Computer Network to Gain
Internet Access between the County of Weld,State of Colorado,by and through the Board of County
Commissioners of Weld County,and Island Grove Regional Treatment Center,Inc.,be,and hereby
is, approved.
BE IT FURTHER RESOLVED by the Board that the Chair be,and hereby is, authorized to
sign said agreement.
The above and foregoing Resolution was,on motion duly made and seconded,adopted by
the following vote on the 28th day of July, A.D., 2003.
BOARD OF COUNTY COMMISSIONERS
.-,00 �i/� WEL�U�, C��ADO
ATTEST: 1 / '6716.
David E. Long, Chair
- .my Clerk to the Board
EXCUSED
Robert D asden, Pro-Tem
t 1861• t '///J
_ er''�o the Board — �.`v! We/
M. J. eile
Willis H. Jerke
County ° or ey
Glenn Vaad -
Date of signature: 9'13 iy
2003-1949
DP0013
( /KIS
AGREEMENT FOR CONNECTION TO WELD COUNTY COMPUTER NETWORK
TO GAIN INTERNET ACCESS
THIS AGREEMENT is made and entered into effective as of the 'r day of
V)--uC=-,ns-k , 2003, between the COUNTY OF WELD, a political subdivT is on of the
STATE OF COLORADO, whose address is 915 10th Street, P. O. Box 758, Greeley, CO 80632,
hereinafter referred to as "Weld County," and the ISLAND GROVE REGIONAL TREATMENT
CENTER, located at 1140 "M" Street, Greeley, CO 80631, hereinafter referred to as "IGRTC."
WITNESSETH:
WHEREAS, IGRTC is in need of access to a computer network to enhance its
efficiencies for internal computer usage, and
WHEREAS, County has a computer network to which IGRTC may connect to gain
internet access, and
WHEREAS, said connection is to County's computer infrastructure and will provide
IGRTC with internet access, and
WHEREAS, Weld County and IGRTC now desire to enter into this Agreement so as to
allow IGRTC to connect to Weld County's computer network.
NOW, THEREFORE, in consideration of the mutual promises and covenants contained
herein, the parties hereto agree as follows:
1. IGRTC CONNECTION TO COUNTY'S COMPUTER NETWORK FOR
INTERNET ACCESS: Upon the signatures of both parties to this Agreement,
County shall connect IGRTC to County's computer network in order to gain
internet access. The term "connection," as used herein, shall mean connection to
County's computer infrastructure. Such connection shall provide IGRTC with
internet access. IGRTC shall not be responsible for paying an ongoing
connection cost after connection has occurred. The connection shall be
terminated at the sole discretion of County, which termination may occur without
cause; however, County shall be required to provide IGRTC notice of any such
termination at least sixty (60) days prior to the intended date of termination. Any
and all IGRTC computers or devices connected to the network shall be first
approved for such use by County.
2. REIMBURSEMENT TO COUNTY FOR COSTS INCURRED TO SET UP
CONNECTION TO IGRTC: All costs incurred by County to set up the
connection of IGRTC computers with the network shall be billed to IGRTC for
reimbursement within thirty (30) days of receiving said billing. Costs for "set
up," as used herein, shall not include operational costs or costs of maintaining the
network.
Page 1 of 3 Pages
on3 - /299
3. NO GUARANTEE OR WARRANTY OF COMPATIBILITY OR CONTINUED
CONNECTION: County makes no guarantee or warranty of the compatibility of
the connection with IGRTC computers, nor does it guarantee or warranty the
continuity of connection.
4. REQUIREMENTS OF IGRTC FOR NETWORK USE: IGRTC agrees to follow
all protocol and rules set by County for use of the network connection, specified
in the Weld County Code in Sections 9-3-10 through 9-3-90, a compilation of
which is attached hereto as Exhibit"A."
5. INDEMNIFICATION AND HOLD HARMLESS: IGRTC agrees to indemnify
and hold harmless County for any injury or damages suffered by IGRTC caused
by or as a result of the connection or interruption thereof.
6. ENTIRE AGREEMENT: This writing constitutes the entire Agreement between
the parties hereto with respect to the subject matter herein, and shall be binding
upon said parties, their officers, employees, agents and assigns and shall inure to
the benefit of the respective survivors, heirs, personal representatives, successors
and assigns of said parties.
7. NO WAIVER OF IMMUNITY: No portion of this Agreement shall be deemed to
constitute a waiver of any immunities the parties or their officers or employees
may possess, nor shall any portion of this Agreement be deemed to have created a
duty of care which did not previously exist with respect to any person not a party
to this Agreement.
8. NO THIRD PARTY BENEFICIARY ENFORCEMENT: It is expressly
understood and agreed that the enforcement of the terms and conditions of this
Agreement, and all rights of action relating to such enforcement, shall be strictly
reserved to the undersigned parties and nothing in this Agreement shall give or
allow any claim or right of action whatsoever by any other person not included in
this Agreement. It is the express intention of the undersigned parties that any
entity other than the undersigned parties receiving services or benefits under this
Agreement shall be an incidental beneficiary only.
Page 2 of 3 Pages
day of July , 2003.
Signed by the parties the 28tthdaayy of July,2003.
a dj ATTEST: td COUNTY OF WELD, a political Weld
Count , o the Board subdivision of the STATE OF
E Lam` COLORADO:
iB
Y" By: Cl):
le a Board David E. Long, Chairm (07/28/2003)
)� Board of County Commi sioners
?krt ./ of the County of Weld
ISLAND GROVE REGIONAL
TREATMENT CENTER:
BY. (innl
Title: — - ur1UC t iqi �--
e
Page 3 of 3 Pages
EXHIBIT"A"
ARTICLE III
Internet Acceptable Use Policy
Sec. 9-3-10. General provisions.
A. The Department of Information Services,in conjunction with the Information Services Governance
Committee (ISGC),has taken the necessary steps to provide an Internet Acceptable Use Policy(IAUP)on
acceptable use of the Internet by County agencies and departments. Any County agency or department
eligible for, and having funding for,the Weld County network or the Internet will be provided with access
under the terms and conditions of this policy.
B. The objective of this policy is to minimize the risks to business functions and government-owned
assets, and to assure adherence to regulatory and legal requirements and enterprise policies when County
resources are used to access public networks.
C. Violation of this policy may be grounds for having access to the Weld County network and/or Internet
services revoked. Continued abuse of this policy could lead to employee disciplinary actions including
termination of employment.
D. This policy applies to any activity performed from a County-owned asset and to all County employees
or contracted agents of the County performing work activities on behalf of the County. Work activities
conducted from remote devices or even personally owned devices are subject to this policy,except that this
policy does not apply to an employee performing activities solely as a member of the public and without the
use of County-owned assets. The policy applies to electronic communications on County networks and
public networks including,but not limited to,the following:
1. Electronic Communications:
a. E-mail.
b. File transfer.
c. Remote login.
d. Remote control software.
e. Discussion groups/bulletin boards.
f. World Wide Web, Gopher,web servers,wide area information servers (WAIS).
g. Personal computing devices.
h. Digital type devices that can communicate with personal computers or public networks.
2. Public Networks:
a. Internet.
b. America Online, CompuServe,Prodigy, etc.
c. Online search services such as Dialog,Paperchase,etc.
d. Dialup bulletin board systems.
e. Weld County network. (Weld County Code Ordinance 2002-12)
Sec. 9-3-20. Introduction.
Weld County network access and Internet access can provide significant business benefits for County
government agencies. However, there are also significant legal, security and productivity issues related to
how the Internet is used. Examples of such issues are listed below.
A. The potential to receive computer viruses from Internet information sources.
B. The potential for someone to eavesdrop on data or correspondence which is exchanged via the
Internet.
C. The potential for a County government employee, through the content of his or her Internet
exchanges, to impugn the reputation of local government officials and thereby invite civil liabilities.
D. The potential for County government employees to be enticed by the vast social and informational
forums of the Internet into spending significant work time on nonproductive activities.
E. If County government agencies or any person using an Internet connection sufficiently upsets other
Internet users, the connection could be flooded with traffic in protest, thus negatively impacting the
availability of the service for true business purposes.
F. Outside access to local databases can overwhelm the processing power of the local network.
(Weld County Code Ordinance 2002-12)
Sec. 9-3-30. Definitions.
The following words, when used herein, shall have the definitions contained below:
Data custodian means an owner or person responsible for the data.
Electronic mail (E-mail) means a widely used network application in which mail messages are
transmitted electronically between end users over various types of networks using various network
protocols.of data residing on multiple hosts. This is done by presenting the user menu documents and by
using a client-server communications model.
HTTP means Hyper Text Transport Protocol.
Internet means the world's largest intemetwork, connecting thousands of networks worldwide and
having a "culture" that focuses on simplicity,research and standardization based on real-life use.
IP means Internet Protocol, the network layer for the TCP/IP Protocol Suite. It is a connectionless,
best-effort switching protocol that offers a common layer over dissimilar networks.
Public network means commercial,private or County-owned networks which establish the technical
infrastructure that allows computer-type devices to communicate with one another and share data and
peripheral devices. These networks usually provide access to the Internet.
Usenet means the thousands of topically named newsgroups,the computers which run them and the
people who read and submit Usenet news.
Wide Area Information Servers means a distributed information service that offers natural language
input and indexed searching, and lets the results of initial searches influence future searches.
WWWmeans W means the World Wide Web,a project that merges information retrieval and hypertext to make
an easy-to-use,powerful, global, academic information system. (Weld County Codification Ordinance
2000-1; Weld County Code Ordinance 2002-12)
Sec. 9-3-40. Guidelines.
The purpose of the following is to provide a short checklist of procedures which should be followed while
accessing public networks through company resources. These guidelines govern County employees,
contractors and anyone working via County direction. For more specific and detailed policy statements,refer
to the Sections that follow in this Article.
A. Use of County resources for accessing public networks is for work-related purposes only.
B. Users shall act responsibly when participating in discussions over a public network. They shall
be polite and not get abusive in their messages to others. Users should remember that defamation can
occur due to malicious use of the Internet.
C. Users shall not use public networks inappropriately. The use may be monitored and access may
be revoked at any time for inappropriate conduct.
D. Users shall determine and abide by the policies and procedures of any external network accessed.
Each user is expected to be a responsible network citizen(Netiquette).
E. Downloading of any software programs or applications(including but not limited to shareware,
freeware, demos, etc.) is strictly prohibited. All such requests must go through the Department of
Information Services.
F. When downloading nonapplication software, the user shall check for copyright or licensing
agreements. If there is any doubt, the user shall not copy the software. If a licensing agreement exists
or the user must pay for the information, it must first be approved by the Information Services
Governance Committee.G. To minimize network traffic,no automatic requests for information on the
Internet and applications that generate constant network traffic, e.g., Internet radio stations, channels,
music-sharing services, etc., should always be avoided.
H. The generation of excessive Internet e-mail shall be avoided.
I. The target directory must be scanned with anti-virus software before and after downloading any
files from the Internet. As most downloads are in a"zipped"format,scanning the files after"unzipping"
is necessary. It is the user's responsibility to ensure that the downloaded files are free from known
viruses.
J. Users shall not use software(network"probes")which attempts to discover properties about the
public network or computing resources connected to that network.
K. Users should be aware that any data transferred via the Internet is prone to be monitored and/or
intercepted by unintended destinations.
L. All County e-mail is a public record and may be subject to public inspection.
M. Even if software allows configuration changes to networks, computers and other hardware or
software, actual changes should only be made by members of the Information Services Department.
(Weld County Code Ordinance 2002-12)
Sec. 9-3-50. Roles and responsibilities.
A. The role of the Department of Information Services is as follows:
1. Establish Internet Acceptable Use Guidelines.
2. Apprise elected officials/department heads of any continued abuse. It is specifically NOT the role
of the Department of Information Services to act as the "Net Police." The Department of Information
Services cannot be held responsible for nonprofessional usage, improper humor or the moderation and
monitoring of e-mail or Usenet groups. Disciplinary actions for sexual harassment and hostile work
environment violations and for use of County property for personal purposes are defined by the County
policy contained in Chapter 2 of this Code.
B. The role of the Information Services Governance Committee is as follows:
1. Review and approve the Internet Acceptable Use Guidelines.
2. Advocate adherence to the policy.
C. The role of the County departments and agencies is as follows:
1. Act as the authorizing agent that allows access to the Internet.
2. Ensure that guidelines are followed.
3. Provide for training of employees who need access.
4. Budget for service and associated training, if needed.
5. Establish their own data sensitivity policy. (Weld County Code Ordinance 2002-12)
Sec. 9-3-60. Protection of proprietary information.
A. Data sensitivity. Persons transmitting enterprise data over public networks should ensure that the
following sections,if the user is unsure of how to properly handle specific data,he or she should contact the information
asset owner(data custodian)for guidance.
B. Data sensitivity definitions.
1. Confidential data:
a. Shows specific strategies and major directions.
b. Confidential information as defined by local, state or federal laws,rules or regulations, e.g.,
Social Services data.
c. Data of other businesses/persons with respect to which the enterprise is under an obligation of
confidentiality.
2. Restricted data:
a. Working files not completed for public dissemination.
b. Is of such a nature that unauthorized disclosure would be against the best interest of the County.
c. Personnel data.
d. Data with restricted use or access per local, state or federal laws, rules or regulations, e.g.,
criminal justice data.
3. Proprietary data: All enterprise-related information requiring baseline security protection,but
failing to meet specified criteria for higher classifications:
a. Organizational policies and procedures that are internal by nature.
b. Internal announcements.
4. Unclassified data: Information which requires no security protection:
a. Public information.
b. Public announcements.
c. Internal correspondence and documentation which do not merit a security classification.
C. Data sensitivity processing guidelines. Table 9.1 reflects the guidelines to be used in processing
sensitive data:
Table 9.1
Data Sensitivity Processing Guidelines
Confidential Restricted Proprietary Unclassified
Encrypted Encrypted Owner defines High volume
permissions Use other alternatives(mail
carrier)
Owner defines Owner defines permissions High volume
permissions Use other altematives
(mail carrier)
Marked confidential High volume
Use other alternatives(mail carrier)
High volume
Use other alternatives(mail
carrier)
Sec. 9-3-70. Security.
A. Internet growth over the last several years has increased greatly. There are millions of pages of
Internet information and billions of publicly available files. It is impossible to monitor every available
site to determine if the site has material which violates policy. Even if a specific item is in violation of
County standards,blocking access will not prevent access to the material, as many sites are either
mirrored at other locations, or change their names and Internet Protocol numbers regularly to avoid
prosecution.
B. Information Services may, without notice, restrict access of any individual to the Internet or the
County network, as a whole or in part, in order to protect the security of the County network and its
infrastructure and stored data. Restrictions may be placed on workstations and personal computing devices
to restrict configuration changes to those devices or to the operating systems to ensure the efficient transfer
of network traffic and to minimize network or computer downtime.
C. The following modem/Intemet security guidelines shall be followed:
1. When utilizing a modem for remote access to another computer, a user shall be aware of and
follow the Acceptable Use Policy, if any,regarding the remote public/private system.
2. There is no such thing as a one-hundred-percent secure system;the human element is always the
weakest link in system security.
3. The user shall make sure that any related passwords are secure, and shall not share
4. Within the software which controls the modem, it is recommended that the "answer off" (if
applicable)mechanism is exercised in all situations,unless approved by the Department of Information
Services.
5. If a user elects to download nonapplication software,the download directory MUST be scanned
with an anti-virus program immediately following the download. The Department of Information
Services will be happy to train the end-user on utilizing the anti-virus program. The user should be aware
that if he or she has a modem and is on the County network, it is possible for a virus to attack any or all
networked computers.
6. The user shall not distribute the phone number of the shared or dedicated modem line unless it is
absolutely required.
7. If the phone number to the remote system is long-distance, the call shall be kept to a minimum
length.
8. If the modem is external, it shall be turned off when not in use.
Sec. 9-3-80. Acceptable use guidelines.
A. Purpose. This Section represents a guide to the acceptable use of the Internet and the County's own
network for County employees. In those cases where data communications are carried across other regional
networks or public networks,network users are advised that acceptable use policies of those other networks
apply and may limit use.
B. General.
1. Participating agencies assume responsebility for providing reasonable publicity and enforcement
for this"Internet Acceptable Use Policy". Ultimate responsibility for traffic that does not conform to this
policy lies with the individual end user. It is the responsibility of the County agency to monitor and
rectify the behavior of its users who disregard this policy.
2. It is also the responsibility of each County agency to provide adequate training for its users to
ensure appropriate network use.
3. The Department of Information Services and the County accept no responsibility for the
traffic which they transport and which violates the Acceptable Use Policy of any connected networks,
beyond informing the County agency if and when a violation is brought to the attention of the
Information Services Governance Committee.
4. All use of the network must be consistent with the goals and purposes of the network and within
the spirit of this Section. The guidelines listed herein are provided to make clear the categories of use
which are consistent with the purposes of the Internet or public network. The intent is not to exhaustively
enumerate all such possible uses or misuses.
5. Internet computing resources are world-wide, and all users are urged to exercise common sense
and decency with regard to these shared resources. Particular attention should be paid to policies
developed for various Internet services by Internet users, such as Usenet policies.
6. Because of the diversity of resources on the Internet and other public networks, it is impossible
to list all the do's and don'ts. In general,common sense should be used to judge situations. The following
are some guidelines to start with:
a. Computing resources should be used only for County-related business in the support of the
administrative, instructional,research and public service objectives of the County.
b. Appropriate use of resources is limited to the official work of the agencies. Examples of
inappropriate use of resources include,but are not limited to:
I) Any traffic that violates state/local and federal laws.
2) Any traffic that is unethical in nature.
3) Distribution of unsolicited advertising.
4) Propagation of computer worms and/or viruses.
5) Distribution of chain letters.
6) Attempts to make unauthorized entry to another network node.
7) Use for recreational games.
8) Personal use.
9) Sexually offensive material.
10) Running applications that generate constant unnecessary network traffic.
7. The Information Services Governance Committee endorses the following guidelines concerning
computing resources:
a. Users shall respect the privacy of others. They shall not seek information about,obtain copies
of or modify electronic information belonging to other users unless explicitly authorized to do so by
those users.
b. Users shall not share passwords with others or use passwords not belonging to them.
c. Users shall respect appropriate laws and copyrights. The distribution of programs,databases
and other electronic information resources is controlled by copyright laws,licensing agreements and
trade secret laws. These shall be observed.
8. All County agencies must accept these guidelines and understand that network traffic
originating from its location is to be consistent with this policy. The Department of Information
Services cannot police the network but may refer to the appropriate Elected Official or
Department Head for disciplinary action any agency that appears to be in persistent and/or serious
abuse of this policy. Questions pertaining to the policy or interpretation of the policy should be
submitted to the Internal Services Governance Committee.
9. The Department of Information Services may at anytime make a determination that particular uses
are not consistent with the purposes of the network connection. Such determinations will be reported to
the agency's Elected Official or Department Head,as appropriate,for information and possible imposition
of sanctions. Persistent and/or serious violation of the policy may result in withdrawal of approval to use
the Internet and other public networks or other penalties.
C. Participation in discussion groups.
1. There should be a good business reason for participating in any discussion group over the Internet.
2. The user must be aware that the information he or she puts out on the Internet will be perceived
as the official County position unless specifically identified as personal opinion, even in a discussion.
If the user is offering his or her own opinion,he or she shall be sure it is clearly identified as such. Also,
if you would be embarrassed to have someone read it on a postcard,do not say it on the Internet or in any
e-mail.
3. All rules which apply to other forms of written correspondence apply here,even though the style
is more casual.
D. Classes of mail allowed. Setting the standards for both casual and official correspondence is the
responsibility of the individual department and is the same for the Internet as for other forms of written
correspondence.
E. Qualifications for access authority. Before the Department of Information Services approves a user
for Internet or County network access, a Weld County Computer Security Request Form must be properly
filled out and processed according to the normal procurement process.
Sec. 9-3-90. Web server guidelines.
A. Review. The Department of Information Services and the Governance Committee will review all Web
access proposals to ensure that the project adheres to all guidelines set forth in this Section.
B. Initial approval. Any proposed Web access must be submitted to the Information Services
Governance Committee for initial approval of the proposed project. The following information must be
provided to the Department of Information Services for it to review and assist in submitting the initial request
to the Governance Committee.
1. State the general purpose of the project and how it relates to County business.
2. Define the scope of the project,including what information is going to be made available,to whom
it will be available, and who the targeted user is.
3. Provide initial design documentation,which includes a rough page layout,applets,links,images,
etc.
4. Identify any County data accessed not located on the Web server and how the data will be used.
5. Identify the designated contact person within the department for this project, who will be
responsible for maintaining current information.
6. Identify the security requirements of the project.
C. Guidelines. If initial approval is granted for the project,the following guidelines must be followed
during the development:
1. The Department of Information Services must establish and maintain a fully functioning firewall
for Web access projects to be operating in production.
2. The Department of Information Services will monitor applications and network activity and set
restrictions as needed to prevent problems with County data or internal network processing.
3. The Department of Information Services will maintain appropriate security levels.
4. The Department of Information Services will approve and allocate resource requirements.
5. To help ensure compatibility between applications, development tools as defined by the
Department of Information Services and approved by the Information Services Governance Committee
will be used.
6. The Department of Information Services must review and approve the proposed location of the
data and Web page access,Web server and network access points.
7. All development and/or enhancements to a project must be performed and tested on a designated
test Web server.
8. After testing is completed and the project is reviewed by the Department of Information Services,
the project will be transferred to the production Web server. Only the Department of Information
Services will have development access on the production Web server.
9. The Department of Information Services'main priority is to maintain the integrity of the County
data and in-house network processing capabilities. If at any time the web page and/or associated
links/controls do not adhere to the set standards or cause a problem for whatever reason,the Web page
may be terminated without notification.
10. Contents of Web pages should be approved by the Department Head/Elected Official or his or her
designee.
ISLAND GROVE
REGIONAL TREATMENT CENTER, INC.
Est. 1974
July 22, 2003
•
Bruce T. Barker
Weld County Attorney
P.O. Box 758
Greeley, CO 80632
Re: Revised Agreement for Connection to Weld County Computer Network to
Gain Internet Access
Dear Mr. Barker:
Enclosed are two originals of the above referenced agreement signed by BJ Dean.
Please return a fully executed copy of the agreement to my attention for Island Grove's
file.
Sincer ly,
Ka ryn I. sch
Ad istrative Ass tant
Enclosures
kir
2003-1949
A Behavioral Health Agency Specializing in Alcohol/Drug Abuse
ats"a Intensive Treatment/Acute Care Services /Administration
3 �T 1140 M Street,Greeley,CO 00631•(970)356-6664 FAX(970)356-1349 Color a � �4�
r Women's Services /Structured Therapy /Youth and Family Services
Community Counseling Center 1260 H Street,Greeley,CO 80631 (970)351-6678 FAX(970)352-7457
Fort Lupton (303)857-6365 <o o'a9a a"oaP�,�6�°athPlth
Hello