Laserfiche WebLink
<br />B. GIS Data Distribution and Storage Standards <br />1. Purpose <br />These standards provide methods to securely move and distribute the GIS Data. <br />2. Standards <br />Approved Consultants shall collect, distribute, use, receive and store by secure <br />technologies, including, but not limited to, secured FTP sites and password protected <br />physical media such as CD-ROM and DVD and other secured and attended storage <br />devices, including, but not limited to, portable hard drives and USB Flash drives, GIS <br />Data according to the following: <br />a. All systems and media shall be password protected consistent with guidelines <br /> provided below in section 4 (General Password Construction Guidelines); <br />b. All passwords shall be secure and not shared; <br />c. The GIS Data shall not be shared with or distributed to anyone who has not <br /> signed, acknowledged and delivered to the GIS Providers the GIS Providers' <br /> Non-Disclosure Agreement. <br />d. The GIS Data shall not to be distributed as an attachment in email; <br />e. The GIS Data shall not to be faxed; <br />f. The GIS Data shall not to be stored on anonymous, unsecured FTP servers; <br />g. The GIS Data shall not to be accessible via unsecured web servers as a download; <br />h. The distribution of GIS Data shall be logged and audited; <br />1. Servers and computers shall be protected from unauthorized physical access; and <br />J. Portable Computer Devices shall not be left unattended unless the device has been <br /> secured. <br />4. General Password Construction Guidelines. Passwords shall be constructed using <br />characteristics of strong passwords, as described below. Passwords shall not be <br />constructed using characteristics of poor, weak passwords, as described below: <br />a. Strong passwords have the following characteristics: <br />. Contain both upper and lower case characters (e.g., a-z, A-Z); <br />. Have digits and punctuation characters as well as letters e.g., 0-9, <br /> !@#$%^&*(L+I--=\' {} []:";'<>?,.I); <br />. Are at least eight alphanumeric characters long; <br />. Are not based on a word in any language, slang, dialect, jargon; and <br />. Are not based on personal information, including names of family members. <br />Information Security Standards 2 <br />