HomeMy WebLinkAbout20182036.tiffNOTICE OF
FINAL READING OF ORDINANCE
Pursuant to the Weld County Home Rule Charter, Ordinance Number 2018-06 was introduced on
first reading on July 2, 2018, and a public hearing and second reading was held on July 23, 2018.
A public hearing and final reading was completed on August 13, 2018, with changes being made
as listed below, and on motion duly made and seconded, was adopted. Effective date of said
Ordinance is listed below.
Any backup material, exhibits or information previously submitted to the Board of County
Commissioners concerning this matter may be examined in the office of the Clerk to the Board of
County Commissioners, located within the Weld County Administration Building, 1150 O Street,
Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be
accessed through the Weld County Web Page (www.co.weld.co.us). E -Mail messages sent to
an individual Commissioner may not be included in the case file. To ensure inclusion of your
E -Mail correspondence into the case file, please send a copy to egesick@co.weld.co.us.
ORDINANCE NO. 2018-06
ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH
AMENDMENTS, CHAPTER 9 INFORMATION TECHOLOGY, OF THE WELD COUNTY CODE
EFFECTIVE DATE: August 27, 2018
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
DATED: August 17, 2018
PUBLISHED: August 22, 2018, in the Greeley Tribune
*******
CHANGES MADE TO CODE ORDINANCE 2018-06 ON FINAL READING
Change made in the title of this ordinance, as follows:
IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9
INFORMATION TECHNOLOGY, OF THE WELD COUNTY CODE
CHAPTER 9
INFORMATION TECHNOLOGY
Affidavit of Publication
NOTICE OF FINAL, READING
Pursuant to the Weld �CF ORDINANCE
yRHoome Rule
eChharter, Ordinance
Number 2018-06 was introduced on first reading on July 2, 2018,
and a public hearing and second reading was held on July 23,
2018. A public hearing and final reading was completed on Au-
gust 13, 2018, with changes being made as listed below, and on
motion duly made and seconded, was adopted. Effective date
of said Ordinance is listed below. Any backup material, exhibits
or information previously submitted to the Board of County Com-
missioners concerning this matter may be examined in the office
of the Clerk to the Board of County Commissioners, located
within the Weld County Administration Building, 1150 O Street,
Greeley, Colorado, between the hours of 8:00 a.m. and 5:00
p.m., Monday thru Friday, or may be accessed through the Weld
County Web Page (www.co.wetd.co.us;: E -Mail messages sent
to an individual Commissioner may not/be included in the case
tile. To ensure inclusion of your E -Mail correspondence in-
to the case file, please send a copy to egeslck@co.weld.co.
us.
ORDINANCE NO. 2018.06
ORDINANCE TITLE: IN THE MATTER OF REPEALING AND
REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMA-
TION TECHOLOGY, OF THE WELD COUNTY CODE
EFFECTIVE DATE: August 27, 2018
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
DATED: August 17, 2018
CHANGES MADE TO CODE ORDINANCE 2018.06 ON FINAL
READING
Change made in the title of this ordinance, as follows:
IN THE MATTER OF REPEALING AND REENACTING, WITH
AMENDMENTS, CHAPTER 9 INFORMATION TECHNOLOGY,
OF THE WELD COUNTY CODE
CHAPTER 9
INFORMATION TECHNOLOGY
The Tribune
August 22, 2018
STATE OF COLORADO
County of Weld,
I Vickie Garretts
of said County of Weld, being duly sworn,
that I am an advertising clerk of
THE GREELEY TRIBUNE,
ss.
say
that the same is a daily newspaper of general
circulation and printed and published in the City of
Greeley, in said county and state; that the notice or
advertisement, of which the annexed is a true copy,
has been published in said daily newspaper for
consecutive (days): that the notice was published in
the regular and entire issue of every number of said
newspaper during the period and time of
publication of said notice, and in the newspaper
proper and not in a supplement thereof; that the
first publication of said notice was contained in the
Twenty -Second day of August A.D. 2018 and the
last publication thereof: in the issue of said
newspaper bearing the date of the
Twenty -Second day of August A.D. 2018 that
said The Greeley Tribune has been published
continuously and uninterruptedly during the period
of at least six months next prior to the first issue
thereof contained said notice or advertisement
above referred to; that said newspaper has been
admitted to the United States mails as second-class
matter under the provisions of the Act of March
3,1879, or any amendments thereof; and that said
newspaper is a daily newspaper duly qualified for
publishing legal notices and advertisements within
the meaning of the laws of the State of Colorado.
August 22, 2018
Total Charges: $13.16
22th day of August2018
My Commission Expires 09/28/2021
KELLY ASH
NOTARY PUBLIC
STATE OF COLORADO
NOTARY ID 2O'174O4O535
MY COMMISSION EXPIRES SEPTEMBCR 28, 2021
NOTICE OF
SECOND READING OF ORDINANCE
Pursuant to the Weld County Home Rule Charter, Ordinance Number 2018-06 was introduced on
first reading on July 2, 2018, and a public hearing and second reading was held on July 23, 2018,
with no change being made to the text of said Ordinance. A public hearing and third reading is
scheduled to be held in the Chambers of the Board, located within the Weld County Administration
Building, 1150 O Street, Greeley, Colorado 80631, on August 13, 2018. All persons in any
manner interested in the next reading of said Ordinance are requested to attend and may be
heard.
Please contact the Clerk to the Board's Office at phone (970) 400-4225, or fax (970) 336-7233,
prior to the day of the hearing if, as a result of a disability, you require reasonable accommodations
in order to participate in this hearing.
Any backup material, exhibits or information previously submitted to the Board of County
Commissioners concerning this matter may be examined in the office of the Clerk to the Board of
County Commissioners, located within the Weld County Administration Building, 1150 O Street,
Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be
accessed through the Weld County Web Page (www.co.weld.co.us). E -Mail messages sent to
an individual Commissioner may not be included in the case file. To ensure inclusion of your
E -Mail correspondence into the case file, please send a copy to egesick@co.weld.co.us.
ORDINANCE NO. 2018-06
ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH
AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE
DATE OF NEXT READING: August 13, 2018, at 9:00 a.m.
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
DATED: July 27, 2018
PUBLISHED: August 1, 2018, in the Greeley Tribune
o2O/� aza,3 6
Affidavit. of Publication
NOTICE OF SECOND READING
OF ORDINANCE
Pursuant to the Weld County Home Rule Charter, Ordinance
Number 2018.06 was introduced on first reading on July 2, 2018,
and a public hearing and second reading was herd on July 23,
2018, with no chance being made to the text of said Ordinance.
A public hearing and third reading is scheduled to be held in the
Chambers of the Board, located within the Weld County Admin-
istration Building, 1150 O Street, Greeley, Colorado 80631, on
August 13, 2018. All persons in any manner interested in the
:next reading of said Ordinance are requested to attend and may
be heard. Please contact the Clerk to the Board's Office at
phone (970) 400-4225, or fax (970) 336 7233, prior to the day of
the hearing if, as a result of a disability, you require reasonable
accommodations in order to participate in this hearing, Any
backup material, exhibits or information previously submitted to
the Board of County Commissioners concerning this matter may
be examined in the office of the Clerk to the Board of County
Commissioners, located within the Weld County Administration
Building, 1 150 O Street, Greeley, Colorado, between the hours
of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be ac-
cessed through the Weld County Web Page (www.co.weld.co.us
). E -Mail messages sent to an individual Commissioner may not
be included in the case file, To ensure inclusion of your 8-
-Mail correspondence into the case file, please send a copy
toegesick@coryeid.co.us.
ORDINANCE NO. 2018-06
ORDINANCE TITLE•: W THE MATTER OF REPEALING AND
REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMA-
TION SERVICES, OF THE WELD COUNTY CODE
DATE OF NEXT READING: August 13, 2018, at 9:00 a.m.
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
DATED: July 27. 2018
The Tribune
August 1, 2018
STATE OF COLORADO
County of Weld,
I Vickie Garretts
ss.
of said County of Weld, being duly sworn, say
that I am an advertising clerk of
THE GREELEY TRIBUNE,
that the same is a daily newspaper of general
circulation and printed and published in the City of
Greeley, in said county and state; that the notice or
advertisement, of which the annexed is a true copy,
has been published in said daily newspaper for
consecutive (days): that the notice was published in
the regular and entire issue of every number of said
newspaper during the period and time of
publication of said notice, and in the newspaper
proper and not in a supplement thereof; that the
first publication of said notice was contained in the
First day of August A.D. 2018 and the last
publication thereof: in the issue of said newspaper
bearing the date of the
First day of August A.D. 2018 that said The
Greeley Tribune has been published continuously
and uninterruptedly during the period of at least six
months next prior to the first issue thereof
contained said notice or advertisement above
referred to; that said newspaper has been admitted
to the United States mails as second-class matter
under the provisions of the Act of March 3,1879, or
any amendments thereof; and that said newspaper
is a daily newspaper duly qualified for publishing
legal notices and advertisements within the
meaning of the laws of the State of Colorado.
August 1, 2018
Total Charges: $11.62
1st day of August 2018
My Commission Expires 09/28/2021
KELLY ASH
NOTARY PUBLIC
STATE OF COLORADO
NOTARY ID 20174040535
MY COMMISSION EXPIRES SEPTEMBI!R 28, 2021
NOTICE OF
FIRST READING OF ORDINANCE
Pursuant to the Weld County Home Rule Charter, Ordinance Number 2018-06 published below,
was introduced and, on motion duly made and seconded, approved upon first reading on
July 2, 2018. A public hearing and second reading is scheduled to be held in the Chambers of the
Board, located within the Weld County Administration Building, 1150 O Street, Greeley, Colorado
80631, on July 23, 2018. All persons in any manner interested in the reading of said Ordinance
are requested to attend and may be heard.
Please contact the Clerk to the Board's office at phone (970) 400-4225, or fax (970) 336-7233,
prior to the day of the hearing if, as the result of a disability, you require reasonable
accommodations in order to participate in this hearing.
Any backup material, exhibits or information previously submitted to the Board of County
Commissioners concerning this matter may be examined in the office of the Clerk to the Board of
County Commissioners, located within the Weld County Administration Building, 1150 O Street,
Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be
accessed through the Weld County Web Page (www.co.weld.co.us). E -Mail messages sent to
an individual Commissioner may not be included in the case file. To ensure inclusion of your
E -Mail correspondence into the case file, please send a copy to egesick@co.weld.co.us.
ORDINANCE NO. 2018-06
ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH
AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE
DATE OF NEXT READING: July 23, 2018, at 9:00 a.m.
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY, COLORADO
DATED: July 6, 2018
PUBLISHED: July 11, 2018, in the Greeley Tribune
WELD COUNTY
CODE ORDINANCE 2018-06
IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9
INFORMATION SERVICES, OF THE WELD COUNTY CODE
BE IT ORDAINED BY THE BOARD OF COUNTY COMMISSIONERS OF THE COUNTY OF
WELD, STATE OF COLORADO:
WHEREAS, the Board of County Commissioners of the County of Weld, State of
Colorado, pursuant to Colorado statute and the Weld County Home Rule Charter, is vested with
the authority of administering the affairs of Weld County, Colorado, and
WHEREAS, the Board of County Commissioners, on December 28, 2000, adopted Weld
County Code Ordinance 2000-1, enacting a comprehensive Code for the County of Weld,
2018-2036
including the codification of all previously adopted ordinances of a general and permanent nature
enacted on or before said date of adoption, and
WHEREAS, the Weld County Code is in need of revision and clarification with regard to
procedures, terms, and requirements therein.
NOW, THEREFORE, BE IT ORDAINED by the Board of County Commissioners of the
County of Weld, State of Colorado, that certain existing Chapters of the Weld County Code be,
and hereby are, repealed and re-enacted, with amendments, and the various Chapters are
revised to read as follows.
CHAPTER 9
INFORMATION SERVICES
Repeal and Replace Article I — Information Technology, in its entirety, as follows:
Article I
Weld County Information Technology Acceptable Use Policy
Sec. 9-1-10. General Provisions.
A. The Information Technology Acceptable Use Policy is to be followed by ALL employees (full
time, part time, seasonal, temporary, interns), elected officials, contractors, vendors, and other
authorized individuals ("Users") who utilize any information technology (IT), electronic, or
other communication device owned and provided by Weld County, or who are granted access
to any Local Area Networks and/or Wide Area Networks or other technology services
maintained and provided by Weld County.
B. This policy applies to any activity performed from a County -owned computing device or
personally owned computing device that is connected to, or has access to, the County
computing network. Additional policies related to information technology must be approved
by Information Technology and the Board of County Commissioners, based on internal
business needs.
Responding to security incidents. All security incidents shall be reported to the Information
Technology Technical Support Center for immediate review and response. Information
Technology employees will follow the Computer Incident Response Plan to address any IT
security related events. ANY USER FOUND VIOLATING THIS POLICY MAY FACE
SANCTIONS WHICH SHALL INCLUDE, BUT ARE NOT LIMITED TO, DISCIPLINARY
ACTION BASED ON PROVISIONS OF HUMAN RESOURCE RULES, DEVICE
REVOCATION OR SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION.
Sec. 9-1-20. Ownership of Devices and Services.
A. All IT and communication devices and services, including, but not limited to, computers,
peripherals, cell phones, pagers, software, files, e-mail messages, internet activity logs,
remote access, and any other data or records stored on devices or other media provided by
Weld County regardless of their physical location, or the form in which they are maintained,
are considered property of Weld County and are owned exclusively by Weld County.
B. USERS HAVE NO EXPECTATION OF PRIVACY WHEN USING ANY INFORMATION
TECHNOLOGY OR COMMUNICATION DEVICE, SERVICE, SYSTEM, NETWORK, FILE,
OR ANY OTHER DATA OWNED BY WELD COUNTY. The County, as directed by the Board
of County Commissioners, reserves the right to access, review, delete, and/or disclose any
files, records, e-mail messages, or other data without notice to, or authorization from, a User,
and to seize any IT or communication devices provided by Weld County. This right continues
after the User ceases to have access to a device or service provided by Weld County.
Sec. 9-1-30. Organizations Affected.
A. The scope of this policy defines the obligations of Users, as defined in Section 9-1-10, in using
County Information Technology resources owned, managed, supported, maintained or
operated by Weld County Information Technology. While this policy contains specific
information regarding expected use of Weld IT resources, Users must follow and stay current
on all additional requirements stated in Weld County Cyber-Security guidelines and standard
operating procedures which are available on the County Intranet.
Sec. 9-1-40. Authorized County Network Access.
A. Authorized access to the County network for new Users must be approved by the department
head, elected official, or designated person in the department. Requests for new employee
security, or changes to existing security, must be submitted using the online IT Security
Request Form.
1. All documentation authorizing User access to controlled computing and information
resources must be archived and retrievable upon request for all accounts. Requests will
be retained for a period of seven (7) years.
2. Login passwords must meet the County required standard as set forth in Section 9-1-50.
3. Generic and shared accounts are strictly prohibited. All User IDs must uniquely identify
Users to the system, unless specified by the Chief Information Officer and/or the IT
Security Manager.
B. All IT security requests for user terminations within the County's operations must be submitted
to the Department of Human Resources who will then coordinate with Information Technology.
Upon the termination of an employee, the employee's access to all accounts, including remote
access and e-mail, will be immediately suspended. All devices must be gathered and returned
to IT immediately. The department head or elected official must coordinate with Human
Resources, IT, and Legal Counsel prior to destruction or reassignment of any hardware,
device, or electronic information.
Sec. 9-1-50. Guidelines
A. Responding to security incidents. All security incidents shall be reported to the Information
Technology Technical Support Center for immediate review and response. Information
Technology employees will follow the Computer Incident Response Plan to address any IT
security related events.
B. Responding to violations. All Users must play an active role in helping to assure the security
and quality of all County applications by reporting any violations of this policy. In doing so,
Users help to assure the optimum performance and availability of County systems.
C. User obligation to report security and policy violations. Any User who observes violations of the IT
Acceptable Use Policy should report the violation to his or her supervisor or Information Technology.
D. User responsibility. The security, protection, and integrity of County information assets are the
responsibility of all Users. It is each User's responsibility to fully understand the information
security policies contained in this Article and to apply these policies effectively to his or her
daily practices and routines.
E. Manager responsibility. It is the responsibility of all managers to ensure all Users under their
supervision fully understand and follow these information security policies. Managers are
responsible for keeping their Users informed on any changes regarding these policies. Should
any User consistently not adhere to County policy, the manager shall take appropriate
remedial steps. It is the responsibility of all managers to ensure all information assets under
their purview are secured and managed to ensure compliance with relevant policies and
procedures.
F. Use of information systems and resources. Any User who is allowed to use County computing
systems to perform the necessary functions identified with his or her position must not misuse
or abuse computing systems and resources.
G. Compliance with software copyrights and licenses. All Users must comply with, and respect,
the copyright laws and license agreements of the software licensed to the County for use on
business computing systems.
1. Use of illegal software. Users must not download and/or install pirated or illegal software
or software that violates existing copyright or license agreements.
2. Use of nonapproved software. The County strictly forbids the downloading or installation
of non -County -owned, non -County -licensed, or other unapproved software on County
computing systems without prior consent from Information Technology. Applications which
are no cost and do not threaten security of the computing system may be installed unless
IT objects.
H. Acceptable use of passwords. Each password owner is required to safeguard and protect
each password he or she has created or that is entrusted to him or her. Password sharing and
account sharing is strictly prohibited. Writing down passwords is not an acceptable practice.
I. Security of the computer through locking practices and mechanisms. All Users of a computing
system must either lock the computing device, or logoff the system, when away from a
computer device for any length of time.
J. HIPAA systems. Computing systems covered by HIPAA must employ the use of a locking
screensaver or similar mechanism to automatically enable after a minimum usage lapse of
five (5) minutes. All other County systems will be fifteen (15) minutes, unless specified by
Information Technology.
K. Transmission of sensitive information over unsecured networks. Users must not send
sensitive information over unsecured networks without the use of encryption technologies to
secure the transmission. Such examples would be, but are not limited to:
1. Sending credit card information over the Internet.
2. Sending confidential business information over unsecured, non -County networks.
3. Sending information via e-mail without applying the appropriate security protocols.
Any questions about whether information should be encrypted or secured should be
referred to Information Technology.
L. Tampering with security mechanisms. All County computing systems are equipped with
security mechanisms to protect the information and resources of each system. Users shall not
tamper with, reconfigure or disable such mechanisms. Such mechanisms would include, but
not be limited to, anti -virus software, encryption and access controls.
M. Prohibited Activity. The following are prohibited:
1. Introduction of malicious programs into the network or server (e.g. viruses, worms, Trojan
horses, e-mail phishing, etc.).
2. Circumventing User authentication or security of any host, network or account.
3. Introducing honeypots, honeynets, or similar technology on the network is prohibited.
4. Providing access to another individual, either deliberately, or through failure, to secure
access.
5. Accessing a server or an administrative account for any purpose other than conducting
County business, even with authorized access.
N. Illegal access of computer systems. County computing systems must not be used to obtain
illegal access to computer systems, to interfere with the normal operations of computer
systems, or to perform malicious acts against a computer system.
O. Unauthorized testing of computing system security. Users shall never test the security of
computer systems, whether physical or logic based, without written permission from the
Information Technology Security Manager and the senior management of both the facility from
where the test is being launched, and the facility where the system resides.
P. Disclosure of Attorney -Client privilege information. Users must never disclose information that
could be considered classified or proprietary to unauthorized persons.
Q. Disclosure of classified information. Users must never disclose information that could be
considered sensitive, classified, or proprietary to unauthorized persons.
R. Use of system. Data is intended to be accessed, used, and shared only to the extent that it is
authorized and necessary to fulfill a User's assigned job duties.
S. System changes. Any software that allows configuration changes to networks, computers and
other hardware or software, should only be installed by members of Information Technology.
T. Workstation reallocation. Information Technology is responsible for maintaining all computing
hardware on the County network. A User may not remove or retain hardware or software
without County IT permission. The procedure for the reallocation of a workstation is as follows:
1. Remove PC from location.
2. Re -format hard drive and re -image for new User.
3. Redeploy to new location.
U. Security breaches and disruptions of network communication. Security breaches include, but
are not limited to, accessing data of which the employee is not an intended recipient, or
logging into a server or account that the employee is not expressly authorized to access,
unless these duties are within the scope of regular assigned duties. Disruption includes, but
is not limited to, network sniffing, ping floods, packet spoofing, denial of service, and forged
routing information for malicious purposes.
V. Use of e-mail systems and resources. Users with legitimate business needs for a County
e-mail account may have the use of the County e-mail system. Such usage is for enhancing
productivity and communication. Users shall not misuse or abuse e-mail systems and
resources.
1. Electronic mail (e-mail) is defined as any message that is transmitted electronically
between two (2) or more computers or terminals, whether stored digitally or converted to
hard (paper) copy.
2. Under Part 2, Article 72, Title 24, C.R.S., e-mail messages may be considered public
record and may be subject to public inspection. Users must be aware of the potential
public release of their emails. All computer -related information, including e-mail messages
and/or digitally stored documents, are the property of the County and are considered the
County's records, even if the information resides on privately owned devices. County e-
mail should remain within the County e-mail system until archived or deleted.
3. E-mail messages that concern policies, decision -making, specific case files, contracts
or other information that should be kept as part of the official records of County business,
shall be retained within the County's e-mail archiving system by the recipients of such
e-mail.
4. E-mail messages will be automatically deleted by the e-mail system on the 90th day
following receipt, unless stored within the County's e-mail archiving system.
5. The Board of County Commissioners retain ultimate authority over all electronically and
digitally stored e -mails, except for emails containing criminal justice information.
6. For purposes of open records requests, either the department head or designated
data/records steward is the custodian. Information Technology will assist in retrieving
any data and information.
7. Users must cooperate in the preservation and retention of any hardware, information, or
documentation related to potential litigation. This includes maintaining any hardware,
e-mail, electronic files or other information.
8. As with any County property or equipment, e-mail is intended to be used for official County
business only. Strictly forbidden e-mail usage includes transmission of political messages,
solicitation of funds for political or other purposes, or sending of harassing messages.
a. Users must refrain from sending e-mail messages that are considered lewd, offensive
or harassing.
b. Users must not participate in sending, forwarding or responding to e -mails that are of
a disruptive or coercive nature; such as, the distribution of spam or chain letters.
c. The County identifies passwords as highly sensitive information. Account owners shall
never divulge their e-mail account passwords and login information.
9. Users must never share e-mail accounts.
10. E-mail is County property. The County has the right to inspect and review any e-mail or
other data stored on County computers and equipment or on privately owned devices if
used for County business. Additionally, County officials may inspect and copy e-mail and
computer records when there are indications of impropriety by a User, when substantive
information must be located and no other means are readily available, or when necessary
for conducting County business. Supervisors may review the contents of an employee's
electronic mail, without the employee's consent, with the approval of the Department
Head, the Director of Human Resources and/or County Legal Counsel.
W. Use of Internet systems and resources. Users shall not misuse or abuse County Internet
resources, which could result in disciplinary action by the County.
1. Acceptable Internet connectivity. Users access to the Internet is intended for County
business, through authorized County gateways.
2. Personal use of Internet connectivity. Use of County computing resources to access the
Internet is intended for legitimate County business purposes only.
3. Affiliation with the County. Users may make public their affiliation with the County in work -
related mailing lists and other work -related communication resources on the Internet.
4. Inappropriate use of Internet resources. Users initiating or participating in communications
of an inappropriate nature, or in an unprofessional way are strictly prohibited. Users must
refrain from the use of lewd, offensive or hostile language when communicating using
County resources. Likewise, all Internet messages that are intended to harass, annoy or
alarm persons are prohibited.
5. Inappropriate use of Internet resources for illegal access. Users are strictly prohibited from
contacting or probing information systems with the intent to gain unauthorized access.
Users must not attempt to disrupt, or interfere with, the operation or function of any
information systems.
X. Use of networked systems and network related resources. Users must not misuse or abuse
networked systems and network related resources. This could result in disciplinary action by
the County, pursuant to Chapter 3 of the Weld County Code.
1. Disregard for security mechanisms. Users must not attempt to bypass security
mechanisms.
2. Use of encryption for highly sensitive information. It is the responsibility of all Users to take
the necessary precautions to encrypt highly sensitive information.
3. Network privacy. All communications using County resources may be monitored for
statistical, legal and investigative purposes. Users should expect no right of privacy to
communications made using County equipment and resources. The County retains the
right to preserve, catalogue, and distribute any County -owned information or resource.
Y. Use of remote access (VPN). Remote access into County networks is only permissible
through an Information Technology -administered VPN (Virtual Private Network) solution.
Z. Compliance with software licenses. Each department is responsible to ensure that all software
licenses are complied with.
Sec. 9-1-50. Password Policy.
A. All passwords must conform to the requirements described below. This includes County -
owned systems that are managed outside of IT, as well as IT -managed systems. Any User
found to have violated this policy may be subject to disciplinary action, pursuant to Chapter 3
of the Weld County Code.
1. Password Creation Requirements.
a. Must be a minimum of nine (9) characters in length.
b. Must possess a minimum of three (3) of these four (4) characteristics:
1) One lower case letter.
2) One upper case letter.
3) One number.
4) One special character.
2. Password must be changed every 90 days.
Sec. 9-1-60. County network and Internet security.
A. Access to inappropriate and malicious websites for Users is prohibited.
B. The Board of County Commissioners is the only authority that can approve changes to the
default filter restrictions applied to Users Internet access.
C. All remote access must follow the guidelines of the Acceptable Use Policy.
D. Users shall not access malicious websites, files or other potentially malicious content. Such
activity is a direct violation of this policy and may result in disciplinary action.
Sec. 9-1-70. Physical and Environmental Security Policy.
A. Internal security operations. All County facilities must be secured, as appropriate, to prevent
unauthorized access to County information computing systems, resources and networks,
including the wireless network.
1. All information technology equipment must be purchased by Information Technology.
(See Section 9-9-10.)
a. Only County devices with approved wireless adaptors are allowed on the wireless
network.
b. Approved devices will be configured by Information Technology for secure access to
the County wireless network.
c. Guest wireless access is permissible in certain areas of the County wireless network.
Guest wireless is restricted to web browsing only and is provided on a limited basis.
d. All policies and procedures for accessing the County network apply for wireless
access.
B. Computing in public and untrusted zones. The County operates several computing systems.
There are computing systems in public access areas. There are also computing systems
within the County jail for inmate use.
C. Public computing systems. The County operates several public access computers which are
available for use by the public, within County facilities. These systems, due to the uncontrolled
nature of their use, must be segregated to an isolated or physically separate segment of the
County network. All access to internal County resources must be tightly controlled and limited,
to prevent any misuse of these systems. Auditing must be enabled on these systems.
D. Inmate computing systems. The County provides several computers for the use of inmates
within the County jail. Due to the uncontrolled use of these systems, all inmate computing
systems must only maintain a minimal set of computer resources to prevent abuse of such
systems and resources. This would include:
1. Computers must not maintain any unnecessary ports or peripherals, including a CD-ROM
drive, floppy drive, serial ports, USB ports, modems or other nonessential interfaces.
2. Computers must not have access to other computing systems or servers, except to
accomplish the specific purpose for the inmate computing systems.
3. Computers must not have Internet access.
4. Network access must be segregated from the other County network segments.
E. Security zones. Specified areas within a facility that are designated as performing critical
functions, or that contain sensitive information or systems, must make use of security
mechanisms and procedures. These zones must be isolated by security controls of reduced
permission from the general facility population. Permission must be based on the need to
physically access the area for a job function. Such security zones would include server rooms
and the communications closets. Access to these areas is controlled by the Department of
Buildings and Grounds, in conjunction with Information Technology. Information Technology
monitors all access. Access is limited to the following Information Technology employees via
proximity card security:
1. Chief Information Officer.
2. Information Technology Security Manager.
3. Technical Director.
4. System Administrators.
5. Network Specialist.
6. Vendors working with Information Technology who require access to server rooms will be
escorted by one (1) of the above authorized employees, and will be required to sign and
date the access log located outside of the secured area.
F. Equipment security. All information -computing equipment, and any information contained or
processed by the equipment, must be reasonably protected from damage, interruption and
interception.
G. Secure disposal of computing equipment. All County computing equipment, including phones,
and peripherals, must be disposed of securely by IT personnel to prevent unauthorized access
to any residual company information.
1. Hard drives. Prior to the disposal of any hard drive or disk drive, the device must either be
physically destroyed or formatted to current Department of Defense standards. This is to
be performed only by Information Technology.
2. Optical media. Prior to the disposal of any optical media, such as CD-ROMs or DVDs,
these devices must be physically destroyed. This may be accomplished using shredding
or incineration.
3. RAM. Prior to disposal, all Random -Access Memory modules must be destroyed. This
includes all memory devices; such as, memory from computers, memory from printers and
FAX machines, or other memory devices. This is to be performed only by Information
Technology.
4. Secure disposal of computing equipment. All County computing equipment, including
phones and peripherals, must be disposed of securely by IT personnel to prevent
unauthorized access to any residual company information.
H. Data security and protection guidelines.
1. Information Technology is responsible for ensuring that all County data on the network is
backed up.
2. Backup retention is as follows:
a. Incremental daily backups: one (1) week on site.
b. Weekly full backups: one (1) month on site.
c. Monthly full backups: one (1) year.
d. Annual full backups: seven (7) years.
3. Backup storage will be as follows:
a. Weekly and monthly backups will be retained on site up to three (3) months.
b. All other monthly and annual backups will be stored off site.
4. For any major changes to a server or application, a full backup is run prior to changes
being completed.
Section 9-1-80. Definitions.
A. LAN - A Local Area Network (LAN) is a computer network within a small geographical area
such as a home, school, computer laboratory, office building or group of buildings.
A LAN is composed of inter -connected workstations and personal computers which are each
capable of accessing and sharing data and devices; such as, printers, scanners and data
storage devices, anywhere on the LAN. LANs are characterized by higher communication and
data transfer rates and the lack of any need for leased communication lines.
B. WAN - A Wide Area Network (WAN) is a network that exists over a large-scale geographical
area. A WAN connects different smaller networks, including local area networks (LANs). This
ensures that computers and Users in one location can communicate with computers and users
in other locations. WAN implementation can be done either with the help of the public
transmission system or a private network.
C. Encryption - the process of converting information or data into a code, especially to prevent
unauthorized access.
D. Computing Device - a unit of hardware, outside or inside the case or housing for the essential
computer (processor, memory, and data paths) that can provide input to the essential
computer, or of receiving output, or of both.
E. Computing Network - a set of computers connected for sharing resources. The most common
resource shared is connection to LAN and WAN. Other shared resources can include a printer,
a file server, or database server.
F. Honeypot — a computer security mechanism set to detect, deflect, or in some manner,
counteract attempts at unauthorized use of computing networks. Generally, a honeypot
consists of data which appears to be a legitimate part of the site, but is isolated and monitored,
and that seems to contain information, or a resource of value to attackers, who are then
blocked.
G. Phishing - the fraudulent practice of sending emails purporting to be from reputable companies
to induce individuals to reveal personal information; such as, passwords and credit card
numbers.
H. Security Incident - An information security incident is a suspected, attempted, successful, or
imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction
of information, interference with information technology operations, or significant violation of
responsible use policy.
BE IT FURTHER ORDAINED by the Board that the Clerk to the Board be, and hereby is,
directed to arrange for Municode to supplement the Weld County Code with the amendments
contained herein, to coincide with chapters, articles, divisions, sections, and subsections as they
currently exist within said Code; and to resolve any inconsistencies regarding capitalization,
grammar, and numbering or placement of chapters, articles, divisions, sections, and subsections
in said Code.
BE IT FURTHER ORDAINED by the Board, if any section, subsection, paragraph,
sentence, clause, or phrase of this Ordinance is for any reason held or decided to be
unconstitutional, such decision shall not affect the validity of the remaining portions hereof. The
Board of County Commissioners hereby declares that it would have enacted this Ordinance in
each and every section, subsection, paragraph, sentence, clause, and phrase thereof irrespective
of the fact that any one or more sections, subsections, paragraphs, sentences, clauses, or
phrases might be declared to be unconstitutional or invalid.
Affidavit of Publication
STATE OF COLORADO
County of Weld,
I Vickie Garretts
of said County of Weld, being duly sworn, say
that I am an advertising clerk of
THE GREELEY TRIBUNE,
SS.
that the same is a daily newspaper of general
circulation and printed and published in the City of
Greeley, in said county and state; that the notice or
advertisement, of which the annexed is a true copy,
has been published in said daily newspaper for
consecutive (days): that the notice was published in
the regular and entire issue of every number of said
newspaper during the period and time of
publication of said notice, and in the newspaper
proper and not in a supplement thereof; that the
first publication of said notice was contained in the
Eleventh day of July A.D. 2018 and the last
publication thereof: in the issue of said newspaper
bearing the date of the
Eleventh day of July A.D. 2018 that said The
Greeley Tribune has been published continuously
and uninterruptedly during the period of at least six
months next prior to the first issue thereof
contained said notice or advertisement above
referred to; that said newspaper has been admitted
to the United States mails as second-class matter
under the provisions of the Act of March 3,1879, or
any amendments thereof; and that said newspaper
is a daily newspaper duly qualified for publishing
legal notices and advertisements within the
meaning of the laws of the State of Colorado.
July 11, 2018
Total Charges: $292.44
l lth day of July 2018
My Commission Expires 09/28/2021
NOTARASH
Y PUBLIC
STATE OF COLORADO
NOTARY ID 20174040535
MY COMMISSION DARES SEPTEMBER 26,2021
1
1
NOTIt#t Oh
FIRST READING OF ORDINANCE
Pursuant to the Weld County Home Rule Charter. Ordinance Number 2018-06 published below, was introduced and, on motion
duly made and seconded, approved upon first reading on July 2, 2018. A public hearing and second reading is scheduled to be
held In the Chambers of the Board, located within the Weld County Administration Building, 1150 O Street, Greeley, Colorado
80631, on July 23, 2018. All persons in any manner interested in the reading of said Ordinance are requested to attend and may be
heard. Please contact the Clerk to the Board's office at phone (970) 400-4225, or fax (970) 336-7233, prior to the day of the hearing
If, as the result of a disability, you require reasonable accommodations in order to participate In this hearing. Any backup material.
exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the
office of the Clerk to the Board of County Commissioners, located within the Weld County Administration Building, 1150 0 Street,
Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m.. Monday thru Friday, or may be accessed through the Weld
County Web Page (vnvw.co.weld.co.us). E -Mail messages sent to an individual Commissioner may not be included in the case fie.
To ensure Inclusion of your E -Mall correspondence into the case file, please send a copy to egesickiEco.weld.co.us.
ORDINANCE NO. 2018-06
ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMATION
SERVICES, OF THE WELD COUNTY CODE
DATE OF NEXT READING: July 23, 2018, at 9:00 a.m.
BOARD OF COUNTY COMMISSIONERS
WELD COUNTY. COLORADO
DATED: July 6, 2018
WELD COUNTY
CODE ORDINANCE 2018-06
IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 9 INFORMATION SERVICES, OF THE
WELD COUNTY CODE
BE IT ORDAINED BY THE BOARD OF COUNTY COMMISSIONERS OF THE COUNTY OF WELD, STATE OF COLOBADO:
WHEREAS, the Board.of County Commissioners of the County of Weld, State of Colorado, pursuant to Colorado statute and the
Weld County Home Rule Charter, Is vested with the authority of administering the affairs of Weld County, Colorado, end
WHEREAS, the Board of County Commissioners, on December 28, 2000, adopted Weld County Code Ordinance 2000-1, enacting
a comprehensive Code for the County of Weld, Including the codification of all previously adopted ordinances of a general and
permanent nature enacted on or before said date of adoption, and
WHEREAS, the Weld County Code Is in need of revision and clarification with regard to procedures. terms, and requirements
therein. .
NOW, THEREFORE, BE IT ORDAINED by the Board of County Commissioners of the County of Weld, State of Colorado, that'cer-
tain existing Chapters of the Weld County Code be, and hereby are,repealed and re-enacted, with amendments, and the various
Chapters are revised to read as follows. CHAPTER 9
INFORMATION SERVICES
Repeal and Replace Article I - Information Technology, in Its entirety, as follows:
Article I
Weld County Information Technology Acceptable Use Policy
Sec. 9-1-10. General Provisions.
A. The Information Technology Acceptable Use Policy is to be followed.y ALL employees (full time, part time, seasonal, temporary,
interns), elected officials, contractors, vendors, and other authorized individuals ("User?) who utilize any information technology
Networks and/or Wideor r Area Networks oommunication r other technology evice owned and services mrovided aintained ed and eld rovid d by or who are Weld County. anted access to any Local Area
B. This policy applies to any activity perlurmed from a County-ovmed computing device or personally owned computing device
that Is connected to. or has access to, the County computing network. Additional policies related to Information technology must
be approved by Information Technology and the Board of County Commissioners, based on internal business needs.
Responding to security Incidents. All security incidents shall be reported to the Information Technology Technical Support Center
for immediate review and response. Information Technology employees wilt follow the Computer Incident Response Plan to
address any tT security related events. ANY USER FOUND VIOLATING THIS POLICY MAY FACE SANCTIONS WHICH SHALL
INCLUDE, BUT ARE NOT LIMITED TO, DISCIPUNARY ACTION EASED ON PROVISIONS OF HUMAN RESOURCE RULES,
DEVICE REVOCATION OR SERVICE ACCESS TERMINATION, AND/OR LEGAL ACTION.
Sec. 9-1-20. Ownership of Devices and Services. cell phones, pagers, A. All IT and communication devices and services, including, but not limited to, computers, peripherals,p 9
soft-
ware, files, e-mail messages, Internet activity logs, remote access, and any other data or records stored on devices or other media
provided by Wald County regardless of their physical location, or the form in which they are Maintained, are considered property of
Weld County and are owned exclusively by Weld County.
B. USERS HAVE NO EXPECTATION OF PRIVACY WHEN USING ANY INFORMATION TECHNOLOGY OR COMMUNICATION DE-
VICE, SERVICE. SYSTEM, NETWORK, FILE, OR ANY OTHER DATA OWNED BY WELD COUNTY. The County, as directed by the
Board of County Commissioners, reserves the right to access, review; delete, and/or disclose any files, records, e-mail messages.
or other data without notice to, or authorization from, a User, and to seize any -IT or communication devices provided by Weld
County. This right continues after the User ceases to have access to a device or service provided by Weld County.
Sec. 9-1-30. Organizations Affected.
A. The scope of this policy defines the obligations of Users, as defined in Section 9-1-10, in using County Information Technology
resources owned, managed, supported. maintained or operated by Weld County Information Technology. While this policy contains
specific Information regarding expected use of Weld IT resources, Users must follow and stay current on all additional requirements
stated in Weld County Cyber-Security guidelines and standard operating procedures which are available on the County Intranet.
Sec. 9-1-40. Authorized County Network Access.
A. Authorized access to the County network for new Users must be approved by the department head, elected official, or desig-
nated person in the department. Requests for new employee security, or changes to existing security, must be submitted using the
online IT Security Request Form.
1. All documentation authorizing User access to controlled computing and information resources must be archived and retrievable
upon request for all accounts. Requests will be retained for a period of seven (7) years. .
2. Login passwords must meet the County required standard as set forth In Section 9-1.50. -
3. Generic and shared accounts are strictly prohibited. All User IDs must uniquely Identify Users to the system, unless specified
by the Chief Information Officer and/or the IT Security Manager.
R. Alt IT security requests for user terminations within the County's operations must be submitted to the Department of Human
2. Sending confidential business information over unsecureo, non-i,.ounry
3. Sending information via e-mail without applying the appropriate security protocols.
Any questions about whether information should be encrypted or secured should be referred to Information Technology.
L. Tampering with security mechanisms. All County computing systems are equipped with security mechanisms to protect the in-
formation and resources of each system. Users shall not tamper with, reconfigure or disable such mechanisms. Such mechanisms
would include, but not be limited to, anti -virus software, encryption and access controls.
M. Prohibited Activity. The following are prohibited:
1. Introduction of malicious programs Into the network or server (e.g. viruses, worms, Trojan horses, e-mail phishing. etc.).
2. Circumventing User authentication or security of any host, network or account.
3. Introducing honeypols, honeynets, or similar technology on the network is prohibited.
4. Providing access to another individual, either deliberately, or through failure, to secure access.
S. Accessing a server or an administrative account for any purpose other than conducting County business, even with authorized
access.
N. illegal access of computer systems. County computing systems must not be used to obtain illegal access to computer sys-
tems, to interfere with the normal operations of computer systems, or to perform malicious acts against a computer system.
O. Unauthorized testing of computing system security. Users shall never test the security of computer systems, whether physical
tor he logic based, where the written tepermissionis bf from
the d the Information facility where gyhe Secsystum ras. Manager and the senior management of both fromP. Disclosure of Attorney -Client privilege information. Users must never disclose information that could be considered classified
or proprietary to unauthorized persons. .
0, Disclosure of classified information. Users must never disclose information that could be considered sensitive, classified, or
proprietary to unauthorized persons.
R. Use of system. Data is intended to be accessed, used, and shared only to the extent that it is authorized and necessary to fulfill
a User' assigned job duties.
S. Systemm changes. Any software that allows configuration changes to networks, computers and other hardware or software,
should only be installed by members of Information Technology.
T. Workstation reallocation. Information Technology is responsible for maintaining all computing hardware on the County network.
A User may not remove or retain hardware or software without County IT permission. The procedure for the reallocation of a work-
station is as follows:
I , Remove PC from location. ,.
2. Re -format hard drive and re -image for new User.
3. Redeploy to new location.
U. Security breaches and disruptions of network communication. Security breaches include, but are not limited to, accessing
data of which the employee is not an intended recipient, or logging
eInto a server or account that the employee is not expressly
authorized to access, network sniffing, ping flood ,these packet spoofi g, denial of service,ies are within the e fand forgedgular sroutng informationned dutles. iorr malicioution s
purposes t limited to,
V. Use of e-mail systems and resources. Users with legitimate business needs fora County e mail account may have the use of
(he County e-mail system. Such usage is for enhancing productivity and communication. Users shall not misuse or abuse email'
Systems and resources.
1. \` Electronic mail (e-mail) is defined as any message that is transmitted electronically between two (2) or more computers or
ter₹ninals, whether stored digitally or converted to hard (paper) copy.
2. Under Part 2, Article 72, Title 24, C.R.S., e-mail messages may be considered public record and may be subject to public
inspection. Users must be aware of thepotential public release of their emails. All computer -related Information, including e-mail
messages and/or digitally stored documents, are the properly of the Countyand are considered the County's records, even if the
information resides on privately owned devices, County e-mail should remain within the County e-mail system until archived or
deleted.
3. E-mail as part of the sofficial records of Coes tharconcern unty Ies, business,shalbdecision-making,
iwiithin thfiles,
eCounty�s e-mail archiving system bythat
the recipients kept
f
such e-mail. .
4. E-mail messages will be automatically deleted by the e-mail system on the 90th day following receipt, unless stored within the
County's e-mail archiving system.
5. The Board of County Commissioners retain ultimate authority over all electronically and digitally stored e -mails, except for
emails containing criminal justice information.
6. For purposes of open records requests, either the department head or designated data/records steward Is the custodian.
Information Technology will assist in retrieving any data and information.
7. Users must cooperate in the preservation and retention of any hardware, information, or documentation related to potential
litigation. This includes maintaining any hardware, a mail, electronic files or other Information.
8. As with any County property or equipment, e-mail is intended to be used for official County business only. Strictly forbidden
e-mail usage includes transmission of political messages, solicitation of funds for political or other purposes, or sending of harass-
ing messages.
a. Users must retrain from sending e-mail messages that are considered lewd, offensive or harassing.
b. Users must not participate in sending, forwarding or responding toe -mails that are of a disruptive or coercive nature; such as.
the distribution of spam or chain letters.
c. The County identifies passwords as highly sensitive Information. Account owners shall never divulge their e-mail account
passwords and ogin information.
9. Users must never share e-mail accounts.
Sec. 9-1-30. Organizations Affected.
A, The scope of this policy defines the obligations of Users, as defined fn Section 9.1-10, in using County Information Technology
resources owned, managed, supported, maintained or operated by Weld County Information Technology. While this policy contains
specific infomiation regarding expected use of Weld IT resources, Users must follow and stay currant on all additional requirements
stated In Weld County Cyber-Security guidelines and standard operating procedures which are available on the County Intranet.
Sec. 9-1-40. Authorized County Network Access.
A. Authorized access to the County network for new Users must be approved by the department head, elected official, or desig-
nated person in the department. Requests for new employee security, or changes to existing security, must be submitted using the
online IT Security Request Form.
1. All documentation authorizing User access to controlled computing and information resources must be archived and retrievable
upon request for all accounts. Requests will be retained for a period of seven (7) years.
2. Login passwords must meet the County required standard as set forth in Section 9-1-50.
3. Generic and shared accounts are strictly prbhibited. All User tDs must uniquely identify Users to the system, unless specified
by the Chief Information Officer and/or the ST Security Manager.
B. All IT security requests for user terminations within the County's operations must be submitted to the Department of Human
Resources who will then coordinate with Information Technology. Upon the termination of an employee, the employee's access
to all accounts, Including remote access and e-mail, will be immediately suspended. All devices must be gathered and returned
to IT Immediately. The department head or elected official must coordinate with Human Resources, IT, and Legal Counsel prior to
destruction or reassignment of any hardware, device, or electronic information.
Sec. 9-1-50. Guidelines
A. Responding to security incidents. All security incidents shall be reported to the Information Technology Technical Support
Center for immediate review and response. Information Technology employees will follow the Computer Incident Response Plan to
address any IT security related events.
B. Responding to violations. All Users must play an active role in helping to assure the security and quality of all County appli-
cations by reporting any violations of this policy. In doing so. Users help to assure the optimum performance and availability of
County systems.
C. User obligation to report security and policy violations. Any User who observes violations of the IT Acceptable Use Policy
should report the violation to his or her supervisor or Information Technology.
D. User responsibility. The security, protection, and Integrity of County information assets are the responsibility of all Users. It is
each User's responsibility to fu0y understand the information security policies contained in this Article and to apply these policies
effectively to his or her daily practices and routines.
E. Manager responsibility. It is the responsibility of all managers to ensure all Users under their supervision fully understand and
follow these Information security policies. Managers are responsible for keeping their Users Informed on any changes regarding
these policies. Should any User consistently not adhere to County policy, the manager shell take appropriate remedial steps. It is
the responsibility of all managers to ensure ail information assets under their purview are secured and managed to ensure compli-
ance with relevant policies and procedures.
F. Use of information systems and resources. Any User who is allowed to use County computing systems to perform the neces-
sary functions identified with his or her position must not misuse or abuse computing systems and resources.
G. Compliance with software copyrights and licenses. All Users must comply with, and respect. the copyright laws and license
agreements of the software licensed to the County for use on business computing systems.
1, Use of Illegal software, Users must not download and/or Install pirated or illegal software or software that violates existing
copyright or license agreements.
2. Use of nonapproved software. The County strictly forbids the downloading or Installation ofnon-County-owned, non -Coun-
ty -licensed, or other unapproved software on County computing systems without prior consent from Information Technology.
Applications which are no cost and do not threaten security of the computing system may be installed unless IT objects.
H. Acceptable use of passwords. Each password owner is required to safeguard and protect each password he or she has creat-
ed or that is entrusted to him or her. Password sharing and account sharing is strictly prohibited. Writing down passwords is not an
acceptable practice.
I. Security of the computer through locking practices and mechanisms. All Users of a computing system must either lock the
computing device, or logoff the system, when away from a computer device for any length of time.
J. HIPAA systems. Computing systems covered by HIPAA must employ the use of a locking screensaver or similar mechanism to
automatically enable after a minimum usage lapse of five (5) minutes. All other County systems will be fifteen (15) minutes, unless
specified by Information Technology.
K. Transmission of sensitive information over unsecured networks. Users must not send sensitive information over unsecured
networks without the use of encryption technologies to secure the transmission. Such examples would be, but are not limited to:
I. Sending credit card information over the Internet.
awaits containing criminal justice Intormation.
6. For purposes of open records requests, either the department head or designated data/records steward Is the custodian.
Information Technology will assist in retrieving any data and information.
7. Users must cooperate in the preservation and retention of any hardware, information, or documentation related to potential
litigation. This includes maintaining any hardware, a mail, electronic files or other information.
8. As with any County property or equipment, e-mail is intended to be used for official County business only. Strictly forbidden
e-mail usage includes transmission of political messages, solicitation of funds for political or other purposes, or sending of harass-
ing messages.
a. Users must refrain kern sending e-mail messages that are considered lewd, offensive or harassing.
b. Users must not participate in sending, forwarding or responding to a -mails that are of a disruptive or coercive nature: such as,
the distribution of spem or chain letters.
e. The County identifies passwords as highly sensitive information. Account owners shall never divulge their e-mail account
passwords and login information.
9. Users must never share e-mail accounts.
10. E-mail is County property. The County hes the right to inspect and review any e-mail or other data stored on County computers
and equipment or on privately owned devices if used for County business. Additionally, County officials may inspect and copy e
mail and computer records when there are indications:of impropriety by a User, when substantive information must be located and
no other means are readily available, or when necessary for conducting County business. Supervisors may review the contents of
an employee's electronic mail, without the employee's consent, with the approval of the Department Head, the Director of Human
Resources and/or County Legal Counsel.
W. Use of Internet systems and resources. Users shall not misuse or abuse County Internet resources, which could result in
disciplinary action by the County.
1. Acceptable Internet connectivity. Users access to the Internet is intended for County business, through authorized County
gateways.
2. Personal use of Internet connectivity. Use of County computing resources to access the Internet is intended for legitimate
County business purposes only.
3. Affiliation with the County. Users may make public their affiliation with the County in work -related mailing lists and other
work -related communication resources on the Internet.
4. Inappropriate use of Internet resources. Users initiating or participating in communications of an inappropriate nature, or in an
unprofessional way are strictly prohibited. Users must refrain from the use of lewd, offensive or hostile language when communi-
cating using County resources. Likewise, all Internet messages that are intended to harass, annoy or alarm persons are prohibited.
5. Inappropriate use of Internet resources for illegal access. Users are strictly prohibited from contacting or probing information
systems with the intent to gain unauthorized access. Users must not attempt to disrupt. or Interfere with, the operation or function
of any information systems.
X. Use of networked systems and network related resources. Users must not misuse or abuse networked systems and network
related resources. This could result in disciplinary action by the County, pursuant to Chapter 3 of the Weld County Code.
1. Disregard for security mechanisms. Users must not attempt to bypass security mechanisms.
2. Use of encryption for highly sensitive information. It is the responsibility of all Users to take the necessary precautions to
encrypt highly sensitive information.
3. Network privacy. All communications using County resources may be monitored for statistical, legal and investigative purposes.
Users should expect no right of privacy to communications made using County equipment and resources. The County retains the
right to preserve, catalogue, and distribute any County -owned information or resource,
Y. LVse of remote access (VPN). Remote access into County networks is only permissible through an Information Technology-ad-
ministbred VPN (Virtual Private Network) solution.
Z. Compliance with software licenses. Each department is responsible to ensure that all software licenses am complied with.
Sec. 9-1.50. Password Policy.
A. All passwords must conform to the requirements described below. This includes County -owned systems that are managed
outside of IT, as well as IT -managed systems. Any User found to have violated this policy may be subject to disciplinary action,
pursuant to Chapter 3 of the Weld County Code.
1. Password Creation Requirements.
a. Must be a minimum of nine (9) characters in length.
b Must possess a minimum of three (3) of these four (4) characteristics:
B10 TRIBUNE Wednesday, July 11, 2018
1) One lower case letter.
2) One upper case letter
3) One number.
' 4) One special character.
2. Password must be changed every 90 days.
Seo. 9-1-6D. County network and Internet security.
A. Access to inappropriate and malicious websites for Users is prohibited.
B. The Board of County Commissioners is the only authority that can approve changes to the default filter restrictions applied to
Users Internet access.
C. All remote access must follow the guidelines of the Acceptable Use Policy.
D. Users shall not access malicious websites, files or other potentially malicious content. Such activity Is a direct violation of this
policy and May result in disciplinary action.
Sec. 9-1-70, Physical and Environmental Security Policy.
A. Internal security operations. Al County facilities must be secured, as appropriate, to prevent unauthorized access to County
information computing systems, resources and networks, including the wireless network.
1. All information technology equipment must be purchased by Information Technology. (See Section 9-9-10.)
a. Only County devices with approved wireless adaptors are allowed on the wireless network.
b. Approved devices will be configured by Information Technology for secure access to the County wireless network.
c. Guest wireless access is permissible in certain areas of the County wireless network, Guest wireless is restricted to web
browsing only and is provided on a limited basis.
d. All policies and procedures for accessing the County network apply for wireless access.
8. Computing in public and untrusted zones. The County operates several computing systems. There are computing systems in
public access areas. There are also computing systems within the County jail for inmate use.
C. Public computing systems. The County operates several public access computers which are available for use by the public.
within County facilities. These systems, due to the uncontrolled nature of their use, must be segregated to an isolated or physically
separate segment of the County network. All access to internal County resources must be tightly controlled and limited, to prevent
any misuse of these systems. Auditing must be enabled on these systems.
D. Inmate computing systems. The County provides several computers for the use of inmates within the County jail. Due to the
uncontrolled use of these systems, all inmate computing systems must only maintain a minimal set of computer resources to
prevent abuse of such systems and resources. This would include:
1. Computers must not maintain any unnecessary ports or peripherals, Including a CD-ROM drive, floppy drive, serial ports, USB
ports, modems or other nonessential interfaces.
2. Computers must riot have access to other computing systems or servers, except to accomplish the specific purpose for the
Inmate computing systems.
3. Computers must not have Internet access.
4. Network access must be segregated from the other County network segments.
E. Security zones. Specified areas within a facility that are designated as performing critical functions, or that contain sensitive in-
formation or systems, must make use of security mechanisms and procedures. These zones must be isolated by security controls
of reduced permission from the general facility population. Permission must be based on the need to physically access the area
for a job function. Such security zones would include server rooms and the communications closets. Access to these areas is con-
trolled by the Department of Buildings and Grounds, in conjunction with Information Technology. Information Technology monitors
all access. Access is limited to the following Information Technology employees via proximity card security:
t. Chief Information Officer.
2. Infornatloti Technology Security Manager.
3. Technical Director.
4. System Administrators.
5. Network Specialist.
6. Vendors working with Information Technology who require access to server rooms will be escorted by one (1) of the above
authorized employees, and will be required to sign and date the access log located outside of the secured area,
F. Equipment security. All Information -computing equipment, and any information contained or processed by the equipment, must
be reasonably protested from damage, interruption and Interception.
G. Secure disposal of computing equipment. All County computing equipment, including phones, and peripherals, must ba
disposed of securely by IT personnel to prevent unauthorized access to any residual company information.
1. Hard drives. Prior to the disposal of any hard drive or disk drive, the device must either be physically destroyed or formatted to
current Department of Defense standards. This is to be performed only by Information Technology.
2. Optical media. Prior to the disposal of any optical media, such as CD-ROMs or OVDs, these devices must be physically de-
stroyed. This may be accomplished using shredding or incineration.
3, RAM. Prior to disposal, all Random -Access Memory modules must be destroyed. This includes ail memory devices; such as,
memory from computers, Memory from printers and FAX machines. or other memory devices. This is to be performed only by
Information Technology.
•
4. Secure disposal of computing equipment. All County computing equipment, including phones and peripherals, must be dis-
posed of securely by IT personnel to prevent unauthorized access to any residual company information_
H. Data security and protection guidelines.
1, Information Technology is responsible for ensuring that all County data on the network is backed up.
2. Backup retention is as follows:
a. Incremental daily backups: one (1) week on site.
b. Weekly full backups: one (1) month on site.
c. Monthly full backups: one (1) year.
d. Annual fullbackups: seven (7) years.
3. Backup' storage will be as follows:
a. Weekly and monthly backups will be•retained on site up to three (3) months.
b. All other monthly and annual backups will be stored off site.
4. For any major changes to a server or application, a full backup is run prior to changes being completed.
Section 9-1-80. Definitions.
A. LAN - A Local Area Network (LAN) is a computer network within a smelt geographical area such as a home, school, computer
laboratory, office building or group of buildings.
A LAN Is composed of inter -connected workstations and personal computers which are each capable of accessing and sharing
data and devices; such as, printers, scanners and data storage devices, anywhere on the IAN. LANs are characterized by higher
communication and data transfer rates and the lack of any need for leased communication lines.
B. WAN - A Wide Area Network (WAN) is a network that exists over a large-scale geographical area. A WAN connects different
smaller networks, including local area networks (LANs). This ensures that computers end Users in one location can communicate
with computers and users in other locations. WAN implementation can be dons eitherwith the help of the public transmission
system or a private network.
C. %tcryption - the process of converting information Or data into a code, especially to prevent unauthorized access.
D. Computing Device - a unit of hardware, outside or inside the case or housing for the essential computer (processor, memory,
and data paths) that can provide input to the essential computer, or of receiving output, or of both.
E. Computing Network - a set of computers connected for sharing resources. The most common resource shared is connection
to LAN and WAN. Other shared resources can include a printer, a fife server, or database server.
F. Honeypot - a computer security mechanism set to detect, deflect, or in some manner, counteract attempts at unauthorized use
of computing networks. Generally, a honeypot consists of data which appears to be a legitimate part of the site, but is isolated and
monitored, and that seems to contain information, or a resource of value to attackers, who are then blocked.
G. Phishing - the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal
personal information; such as, passwords and credit card numbers.
H. Security Incident - An information security incident is a suspected, attempted, successful, or imminent threat of unauthorized
access, use, disclosure, breach, modification, or destruction of information, Interference with information technology operations, or
significant violation of responsible use policy.
BE IT FURTHER ORDAINED by the Board that the Clerk to the Board be, and hereby Is, directed to arrange for Municode to
supplement the Weld County Code with the amendments contained herein, to coincide with chapters, articles, divisions, sections,
and subsections as they currently exist within said Code; and to resolve any inconsistencies regarding capitalization, grammar, and
numbering or placement of chapters, articles, divisions, sections, and subsections in said Code.
BE IT FURTHER ORDAINED by the Board, if any section, subsection, paragraph, sentence, clause, or phrase of this Ordinance
is for any reason held or decided to be unconstitutional, such decision shall not affect the validity of the remaining portions hereof.
The Board of County Commissioners hereby declares that it would have enacted this Ordinance in each and every section,
subsection, paragraph, sentence, clause, and phrase thereof irrespective of the fact that any one or more sections, subsections,
paragraphs, sentences. clauses, or phrases might be declared. to be unconstitutional or invalid. _
The Tribune
July 11; 2018
Hello