Loading...
HomeMy WebLinkAbout20031949.tiff RESOLUTION RE: APPROVE AGREEMENT FOR CONNECTION TO WELD COUNTY COMPUTER NETWORK TO GAIN INTERNET ACCESS AND AUTHORIZE CHAIR TO SIGN - ISLAND GROVE REGIONAL TREATMENT CENTER, INC. WHEREAS, the Board of County Commissioners of Weld County, Colorado, pursuant to Colorado statute and the Weld County Home Rule Charter, is vested with the authority of administering the affairs of Weld County, Colorado, and WHEREAS,the Board has been presented with an Agreement for Connection to the Weld County Computer Network to Gain Internet Access between the County of Weld,State of Colorado, by and through the Board of County Commissioners of Weld County, and Island Grove Regional Treatment Center, Inc., with terms and conditions being as stated in said agreement, and WHEREAS,after review,the Board deems it advisable to approve said agreement,a copy of which is attached hereto and incorporated herein by reference. NOW,THEREFORE, BE IT RESOLVED by the Board of County Commissioners of Weld County,Colorado,that the Agreement for Connection to the Weld County Computer Network to Gain Internet Access between the County of Weld,State of Colorado,by and through the Board of County Commissioners of Weld County,and Island Grove Regional Treatment Center,Inc.,be,and hereby is, approved. BE IT FURTHER RESOLVED by the Board that the Chair be,and hereby is, authorized to sign said agreement. The above and foregoing Resolution was,on motion duly made and seconded,adopted by the following vote on the 28th day of July, A.D., 2003. BOARD OF COUNTY COMMISSIONERS .-,00 �i/� WEL�U�, C��ADO ATTEST: 1 / '6716. David E. Long, Chair - .my Clerk to the Board EXCUSED Robert D asden, Pro-Tem t 1861• t '///J _ er''�o the Board — �.`v! We/ M. J. eile Willis H. Jerke County ° or ey Glenn Vaad - Date of signature: 9'13 iy 2003-1949 DP0013 ( /KIS AGREEMENT FOR CONNECTION TO WELD COUNTY COMPUTER NETWORK TO GAIN INTERNET ACCESS THIS AGREEMENT is made and entered into effective as of the 'r day of V)--uC=-,ns-k , 2003, between the COUNTY OF WELD, a political subdivT is on of the STATE OF COLORADO, whose address is 915 10th Street, P. O. Box 758, Greeley, CO 80632, hereinafter referred to as "Weld County," and the ISLAND GROVE REGIONAL TREATMENT CENTER, located at 1140 "M" Street, Greeley, CO 80631, hereinafter referred to as "IGRTC." WITNESSETH: WHEREAS, IGRTC is in need of access to a computer network to enhance its efficiencies for internal computer usage, and WHEREAS, County has a computer network to which IGRTC may connect to gain internet access, and WHEREAS, said connection is to County's computer infrastructure and will provide IGRTC with internet access, and WHEREAS, Weld County and IGRTC now desire to enter into this Agreement so as to allow IGRTC to connect to Weld County's computer network. NOW, THEREFORE, in consideration of the mutual promises and covenants contained herein, the parties hereto agree as follows: 1. IGRTC CONNECTION TO COUNTY'S COMPUTER NETWORK FOR INTERNET ACCESS: Upon the signatures of both parties to this Agreement, County shall connect IGRTC to County's computer network in order to gain internet access. The term "connection," as used herein, shall mean connection to County's computer infrastructure. Such connection shall provide IGRTC with internet access. IGRTC shall not be responsible for paying an ongoing connection cost after connection has occurred. The connection shall be terminated at the sole discretion of County, which termination may occur without cause; however, County shall be required to provide IGRTC notice of any such termination at least sixty (60) days prior to the intended date of termination. Any and all IGRTC computers or devices connected to the network shall be first approved for such use by County. 2. REIMBURSEMENT TO COUNTY FOR COSTS INCURRED TO SET UP CONNECTION TO IGRTC: All costs incurred by County to set up the connection of IGRTC computers with the network shall be billed to IGRTC for reimbursement within thirty (30) days of receiving said billing. Costs for "set up," as used herein, shall not include operational costs or costs of maintaining the network. Page 1 of 3 Pages on3 - /299 3. NO GUARANTEE OR WARRANTY OF COMPATIBILITY OR CONTINUED CONNECTION: County makes no guarantee or warranty of the compatibility of the connection with IGRTC computers, nor does it guarantee or warranty the continuity of connection. 4. REQUIREMENTS OF IGRTC FOR NETWORK USE: IGRTC agrees to follow all protocol and rules set by County for use of the network connection, specified in the Weld County Code in Sections 9-3-10 through 9-3-90, a compilation of which is attached hereto as Exhibit"A." 5. INDEMNIFICATION AND HOLD HARMLESS: IGRTC agrees to indemnify and hold harmless County for any injury or damages suffered by IGRTC caused by or as a result of the connection or interruption thereof. 6. ENTIRE AGREEMENT: This writing constitutes the entire Agreement between the parties hereto with respect to the subject matter herein, and shall be binding upon said parties, their officers, employees, agents and assigns and shall inure to the benefit of the respective survivors, heirs, personal representatives, successors and assigns of said parties. 7. NO WAIVER OF IMMUNITY: No portion of this Agreement shall be deemed to constitute a waiver of any immunities the parties or their officers or employees may possess, nor shall any portion of this Agreement be deemed to have created a duty of care which did not previously exist with respect to any person not a party to this Agreement. 8. NO THIRD PARTY BENEFICIARY ENFORCEMENT: It is expressly understood and agreed that the enforcement of the terms and conditions of this Agreement, and all rights of action relating to such enforcement, shall be strictly reserved to the undersigned parties and nothing in this Agreement shall give or allow any claim or right of action whatsoever by any other person not included in this Agreement. It is the express intention of the undersigned parties that any entity other than the undersigned parties receiving services or benefits under this Agreement shall be an incidental beneficiary only. Page 2 of 3 Pages day of July , 2003. Signed by the parties the 28tthdaayy of July,2003. a dj ATTEST: td COUNTY OF WELD, a political Weld Count , o the Board subdivision of the STATE OF E Lam` COLORADO: iB Y" By: Cl): le a Board David E. Long, Chairm (07/28/2003) )� Board of County Commi sioners ?krt ./ of the County of Weld ISLAND GROVE REGIONAL TREATMENT CENTER: BY. (innl Title: — - ur1UC t iqi �-- e Page 3 of 3 Pages EXHIBIT"A" ARTICLE III Internet Acceptable Use Policy Sec. 9-3-10. General provisions. A. The Department of Information Services,in conjunction with the Information Services Governance Committee (ISGC),has taken the necessary steps to provide an Internet Acceptable Use Policy(IAUP)on acceptable use of the Internet by County agencies and departments. Any County agency or department eligible for, and having funding for,the Weld County network or the Internet will be provided with access under the terms and conditions of this policy. B. The objective of this policy is to minimize the risks to business functions and government-owned assets, and to assure adherence to regulatory and legal requirements and enterprise policies when County resources are used to access public networks. C. Violation of this policy may be grounds for having access to the Weld County network and/or Internet services revoked. Continued abuse of this policy could lead to employee disciplinary actions including termination of employment. D. This policy applies to any activity performed from a County-owned asset and to all County employees or contracted agents of the County performing work activities on behalf of the County. Work activities conducted from remote devices or even personally owned devices are subject to this policy,except that this policy does not apply to an employee performing activities solely as a member of the public and without the use of County-owned assets. The policy applies to electronic communications on County networks and public networks including,but not limited to,the following: 1. Electronic Communications: a. E-mail. b. File transfer. c. Remote login. d. Remote control software. e. Discussion groups/bulletin boards. f. World Wide Web, Gopher,web servers,wide area information servers (WAIS). g. Personal computing devices. h. Digital type devices that can communicate with personal computers or public networks. 2. Public Networks: a. Internet. b. America Online, CompuServe,Prodigy, etc. c. Online search services such as Dialog,Paperchase,etc. d. Dialup bulletin board systems. e. Weld County network. (Weld County Code Ordinance 2002-12) Sec. 9-3-20. Introduction. Weld County network access and Internet access can provide significant business benefits for County government agencies. However, there are also significant legal, security and productivity issues related to how the Internet is used. Examples of such issues are listed below. A. The potential to receive computer viruses from Internet information sources. B. The potential for someone to eavesdrop on data or correspondence which is exchanged via the Internet. C. The potential for a County government employee, through the content of his or her Internet exchanges, to impugn the reputation of local government officials and thereby invite civil liabilities. D. The potential for County government employees to be enticed by the vast social and informational forums of the Internet into spending significant work time on nonproductive activities. E. If County government agencies or any person using an Internet connection sufficiently upsets other Internet users, the connection could be flooded with traffic in protest, thus negatively impacting the availability of the service for true business purposes. F. Outside access to local databases can overwhelm the processing power of the local network. (Weld County Code Ordinance 2002-12) Sec. 9-3-30. Definitions. The following words, when used herein, shall have the definitions contained below: Data custodian means an owner or person responsible for the data. Electronic mail (E-mail) means a widely used network application in which mail messages are transmitted electronically between end users over various types of networks using various network protocols.of data residing on multiple hosts. This is done by presenting the user menu documents and by using a client-server communications model. HTTP means Hyper Text Transport Protocol. Internet means the world's largest intemetwork, connecting thousands of networks worldwide and having a "culture" that focuses on simplicity,research and standardization based on real-life use. IP means Internet Protocol, the network layer for the TCP/IP Protocol Suite. It is a connectionless, best-effort switching protocol that offers a common layer over dissimilar networks. Public network means commercial,private or County-owned networks which establish the technical infrastructure that allows computer-type devices to communicate with one another and share data and peripheral devices. These networks usually provide access to the Internet. Usenet means the thousands of topically named newsgroups,the computers which run them and the people who read and submit Usenet news. Wide Area Information Servers means a distributed information service that offers natural language input and indexed searching, and lets the results of initial searches influence future searches. WWWmeans W means the World Wide Web,a project that merges information retrieval and hypertext to make an easy-to-use,powerful, global, academic information system. (Weld County Codification Ordinance 2000-1; Weld County Code Ordinance 2002-12) Sec. 9-3-40. Guidelines. The purpose of the following is to provide a short checklist of procedures which should be followed while accessing public networks through company resources. These guidelines govern County employees, contractors and anyone working via County direction. For more specific and detailed policy statements,refer to the Sections that follow in this Article. A. Use of County resources for accessing public networks is for work-related purposes only. B. Users shall act responsibly when participating in discussions over a public network. They shall be polite and not get abusive in their messages to others. Users should remember that defamation can occur due to malicious use of the Internet. C. Users shall not use public networks inappropriately. The use may be monitored and access may be revoked at any time for inappropriate conduct. D. Users shall determine and abide by the policies and procedures of any external network accessed. Each user is expected to be a responsible network citizen(Netiquette). E. Downloading of any software programs or applications(including but not limited to shareware, freeware, demos, etc.) is strictly prohibited. All such requests must go through the Department of Information Services. F. When downloading nonapplication software, the user shall check for copyright or licensing agreements. If there is any doubt, the user shall not copy the software. If a licensing agreement exists or the user must pay for the information, it must first be approved by the Information Services Governance Committee.G. To minimize network traffic,no automatic requests for information on the Internet and applications that generate constant network traffic, e.g., Internet radio stations, channels, music-sharing services, etc., should always be avoided. H. The generation of excessive Internet e-mail shall be avoided. I. The target directory must be scanned with anti-virus software before and after downloading any files from the Internet. As most downloads are in a"zipped"format,scanning the files after"unzipping" is necessary. It is the user's responsibility to ensure that the downloaded files are free from known viruses. J. Users shall not use software(network"probes")which attempts to discover properties about the public network or computing resources connected to that network. K. Users should be aware that any data transferred via the Internet is prone to be monitored and/or intercepted by unintended destinations. L. All County e-mail is a public record and may be subject to public inspection. M. Even if software allows configuration changes to networks, computers and other hardware or software, actual changes should only be made by members of the Information Services Department. (Weld County Code Ordinance 2002-12) Sec. 9-3-50. Roles and responsibilities. A. The role of the Department of Information Services is as follows: 1. Establish Internet Acceptable Use Guidelines. 2. Apprise elected officials/department heads of any continued abuse. It is specifically NOT the role of the Department of Information Services to act as the "Net Police." The Department of Information Services cannot be held responsible for nonprofessional usage, improper humor or the moderation and monitoring of e-mail or Usenet groups. Disciplinary actions for sexual harassment and hostile work environment violations and for use of County property for personal purposes are defined by the County policy contained in Chapter 2 of this Code. B. The role of the Information Services Governance Committee is as follows: 1. Review and approve the Internet Acceptable Use Guidelines. 2. Advocate adherence to the policy. C. The role of the County departments and agencies is as follows: 1. Act as the authorizing agent that allows access to the Internet. 2. Ensure that guidelines are followed. 3. Provide for training of employees who need access. 4. Budget for service and associated training, if needed. 5. Establish their own data sensitivity policy. (Weld County Code Ordinance 2002-12) Sec. 9-3-60. Protection of proprietary information. A. Data sensitivity. Persons transmitting enterprise data over public networks should ensure that the following sections,if the user is unsure of how to properly handle specific data,he or she should contact the information asset owner(data custodian)for guidance. B. Data sensitivity definitions. 1. Confidential data: a. Shows specific strategies and major directions. b. Confidential information as defined by local, state or federal laws,rules or regulations, e.g., Social Services data. c. Data of other businesses/persons with respect to which the enterprise is under an obligation of confidentiality. 2. Restricted data: a. Working files not completed for public dissemination. b. Is of such a nature that unauthorized disclosure would be against the best interest of the County. c. Personnel data. d. Data with restricted use or access per local, state or federal laws, rules or regulations, e.g., criminal justice data. 3. Proprietary data: All enterprise-related information requiring baseline security protection,but failing to meet specified criteria for higher classifications: a. Organizational policies and procedures that are internal by nature. b. Internal announcements. 4. Unclassified data: Information which requires no security protection: a. Public information. b. Public announcements. c. Internal correspondence and documentation which do not merit a security classification. C. Data sensitivity processing guidelines. Table 9.1 reflects the guidelines to be used in processing sensitive data: Table 9.1 Data Sensitivity Processing Guidelines Confidential Restricted Proprietary Unclassified Encrypted Encrypted Owner defines High volume permissions Use other alternatives(mail carrier) Owner defines Owner defines permissions High volume permissions Use other altematives (mail carrier) Marked confidential High volume Use other alternatives(mail carrier) High volume Use other alternatives(mail carrier) Sec. 9-3-70. Security. A. Internet growth over the last several years has increased greatly. There are millions of pages of Internet information and billions of publicly available files. It is impossible to monitor every available site to determine if the site has material which violates policy. Even if a specific item is in violation of County standards,blocking access will not prevent access to the material, as many sites are either mirrored at other locations, or change their names and Internet Protocol numbers regularly to avoid prosecution. B. Information Services may, without notice, restrict access of any individual to the Internet or the County network, as a whole or in part, in order to protect the security of the County network and its infrastructure and stored data. Restrictions may be placed on workstations and personal computing devices to restrict configuration changes to those devices or to the operating systems to ensure the efficient transfer of network traffic and to minimize network or computer downtime. C. The following modem/Intemet security guidelines shall be followed: 1. When utilizing a modem for remote access to another computer, a user shall be aware of and follow the Acceptable Use Policy, if any,regarding the remote public/private system. 2. There is no such thing as a one-hundred-percent secure system;the human element is always the weakest link in system security. 3. The user shall make sure that any related passwords are secure, and shall not share 4. Within the software which controls the modem, it is recommended that the "answer off" (if applicable)mechanism is exercised in all situations,unless approved by the Department of Information Services. 5. If a user elects to download nonapplication software,the download directory MUST be scanned with an anti-virus program immediately following the download. The Department of Information Services will be happy to train the end-user on utilizing the anti-virus program. The user should be aware that if he or she has a modem and is on the County network, it is possible for a virus to attack any or all networked computers. 6. The user shall not distribute the phone number of the shared or dedicated modem line unless it is absolutely required. 7. If the phone number to the remote system is long-distance, the call shall be kept to a minimum length. 8. If the modem is external, it shall be turned off when not in use. Sec. 9-3-80. Acceptable use guidelines. A. Purpose. This Section represents a guide to the acceptable use of the Internet and the County's own network for County employees. In those cases where data communications are carried across other regional networks or public networks,network users are advised that acceptable use policies of those other networks apply and may limit use. B. General. 1. Participating agencies assume responsebility for providing reasonable publicity and enforcement for this"Internet Acceptable Use Policy". Ultimate responsibility for traffic that does not conform to this policy lies with the individual end user. It is the responsibility of the County agency to monitor and rectify the behavior of its users who disregard this policy. 2. It is also the responsibility of each County agency to provide adequate training for its users to ensure appropriate network use. 3. The Department of Information Services and the County accept no responsibility for the traffic which they transport and which violates the Acceptable Use Policy of any connected networks, beyond informing the County agency if and when a violation is brought to the attention of the Information Services Governance Committee. 4. All use of the network must be consistent with the goals and purposes of the network and within the spirit of this Section. The guidelines listed herein are provided to make clear the categories of use which are consistent with the purposes of the Internet or public network. The intent is not to exhaustively enumerate all such possible uses or misuses. 5. Internet computing resources are world-wide, and all users are urged to exercise common sense and decency with regard to these shared resources. Particular attention should be paid to policies developed for various Internet services by Internet users, such as Usenet policies. 6. Because of the diversity of resources on the Internet and other public networks, it is impossible to list all the do's and don'ts. In general,common sense should be used to judge situations. The following are some guidelines to start with: a. Computing resources should be used only for County-related business in the support of the administrative, instructional,research and public service objectives of the County. b. Appropriate use of resources is limited to the official work of the agencies. Examples of inappropriate use of resources include,but are not limited to: I) Any traffic that violates state/local and federal laws. 2) Any traffic that is unethical in nature. 3) Distribution of unsolicited advertising. 4) Propagation of computer worms and/or viruses. 5) Distribution of chain letters. 6) Attempts to make unauthorized entry to another network node. 7) Use for recreational games. 8) Personal use. 9) Sexually offensive material. 10) Running applications that generate constant unnecessary network traffic. 7. The Information Services Governance Committee endorses the following guidelines concerning computing resources: a. Users shall respect the privacy of others. They shall not seek information about,obtain copies of or modify electronic information belonging to other users unless explicitly authorized to do so by those users. b. Users shall not share passwords with others or use passwords not belonging to them. c. Users shall respect appropriate laws and copyrights. The distribution of programs,databases and other electronic information resources is controlled by copyright laws,licensing agreements and trade secret laws. These shall be observed. 8. All County agencies must accept these guidelines and understand that network traffic originating from its location is to be consistent with this policy. The Department of Information Services cannot police the network but may refer to the appropriate Elected Official or Department Head for disciplinary action any agency that appears to be in persistent and/or serious abuse of this policy. Questions pertaining to the policy or interpretation of the policy should be submitted to the Internal Services Governance Committee. 9. The Department of Information Services may at anytime make a determination that particular uses are not consistent with the purposes of the network connection. Such determinations will be reported to the agency's Elected Official or Department Head,as appropriate,for information and possible imposition of sanctions. Persistent and/or serious violation of the policy may result in withdrawal of approval to use the Internet and other public networks or other penalties. C. Participation in discussion groups. 1. There should be a good business reason for participating in any discussion group over the Internet. 2. The user must be aware that the information he or she puts out on the Internet will be perceived as the official County position unless specifically identified as personal opinion, even in a discussion. If the user is offering his or her own opinion,he or she shall be sure it is clearly identified as such. Also, if you would be embarrassed to have someone read it on a postcard,do not say it on the Internet or in any e-mail. 3. All rules which apply to other forms of written correspondence apply here,even though the style is more casual. D. Classes of mail allowed. Setting the standards for both casual and official correspondence is the responsibility of the individual department and is the same for the Internet as for other forms of written correspondence. E. Qualifications for access authority. Before the Department of Information Services approves a user for Internet or County network access, a Weld County Computer Security Request Form must be properly filled out and processed according to the normal procurement process. Sec. 9-3-90. Web server guidelines. A. Review. The Department of Information Services and the Governance Committee will review all Web access proposals to ensure that the project adheres to all guidelines set forth in this Section. B. Initial approval. Any proposed Web access must be submitted to the Information Services Governance Committee for initial approval of the proposed project. The following information must be provided to the Department of Information Services for it to review and assist in submitting the initial request to the Governance Committee. 1. State the general purpose of the project and how it relates to County business. 2. Define the scope of the project,including what information is going to be made available,to whom it will be available, and who the targeted user is. 3. Provide initial design documentation,which includes a rough page layout,applets,links,images, etc. 4. Identify any County data accessed not located on the Web server and how the data will be used. 5. Identify the designated contact person within the department for this project, who will be responsible for maintaining current information. 6. Identify the security requirements of the project. C. Guidelines. If initial approval is granted for the project,the following guidelines must be followed during the development: 1. The Department of Information Services must establish and maintain a fully functioning firewall for Web access projects to be operating in production. 2. The Department of Information Services will monitor applications and network activity and set restrictions as needed to prevent problems with County data or internal network processing. 3. The Department of Information Services will maintain appropriate security levels. 4. The Department of Information Services will approve and allocate resource requirements. 5. To help ensure compatibility between applications, development tools as defined by the Department of Information Services and approved by the Information Services Governance Committee will be used. 6. The Department of Information Services must review and approve the proposed location of the data and Web page access,Web server and network access points. 7. All development and/or enhancements to a project must be performed and tested on a designated test Web server. 8. After testing is completed and the project is reviewed by the Department of Information Services, the project will be transferred to the production Web server. Only the Department of Information Services will have development access on the production Web server. 9. The Department of Information Services'main priority is to maintain the integrity of the County data and in-house network processing capabilities. If at any time the web page and/or associated links/controls do not adhere to the set standards or cause a problem for whatever reason,the Web page may be terminated without notification. 10. Contents of Web pages should be approved by the Department Head/Elected Official or his or her designee. ISLAND GROVE REGIONAL TREATMENT CENTER, INC. Est. 1974 July 22, 2003 • Bruce T. Barker Weld County Attorney P.O. Box 758 Greeley, CO 80632 Re: Revised Agreement for Connection to Weld County Computer Network to Gain Internet Access Dear Mr. Barker: Enclosed are two originals of the above referenced agreement signed by BJ Dean. Please return a fully executed copy of the agreement to my attention for Island Grove's file. Sincer ly, Ka ryn I. sch Ad istrative Ass tant Enclosures kir 2003-1949 A Behavioral Health Agency Specializing in Alcohol/Drug Abuse ats"a Intensive Treatment/Acute Care Services /Administration 3 �T 1140 M Street,Greeley,CO 00631•(970)356-6664 FAX(970)356-1349 Color a � �4� r Women's Services /Structured Therapy /Youth and Family Services Community Counseling Center 1260 H Street,Greeley,CO 80631 (970)351-6678 FAX(970)352-7457 Fort Lupton (303)857-6365 <o o'a9a a"oaP�,�6�°athPlth Hello