My WebLink
|
Help
|
About
|
Sign Out
SR 05:267
City of Pleasanton
>
CITY CLERK
>
AGENDA PACKETS
>
2005
>
SR 05:267
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
9/19/2005 3:55:46 PM
Creation date
9/16/2005 11:37:48 AM
Metadata
Fields
Template:
CITY CLERK
CITY CLERK - TYPE
STAFF REPORTS
DOCUMENT DATE
9/20/2005
DESTRUCT DATE
15 Y
DOCUMENT NO
SR 05:267
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
16
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />B. GIS Data Distribution and Storage Standards <br />1. Purpose <br />These standards provide methods to securely move and distribute the GIS Data. <br />2. Standards <br />Approved Consultants shall collect, distribute, use, receive and store by secure <br />technologies, including, but not limited to, secured FTP sites and password protected <br />physical media such as CD-ROM and DVD and other secured and attended storage <br />devices, including, but not limited to, portable hard drives and USB Flash drives, GIS <br />Data according to the following: <br />a. All systems and media shall be password protected consistent with guidelines <br /> provided below in section 4 (General Password Construction Guidelines); <br />b. All passwords shall be secure and not shared; <br />c. The GIS Data shall not be shared with or distributed to anyone who has not <br /> signed, acknowledged and delivered to the GIS Providers the GIS Providers' <br /> Non-Disclosure Agreement. <br />d. The GIS Data shall not to be distributed as an attachment in email; <br />e. The GIS Data shall not to be faxed; <br />f. The GIS Data shall not to be stored on anonymous, unsecured FTP servers; <br />g. The GIS Data shall not to be accessible via unsecured web servers as a download; <br />h. The distribution of GIS Data shall be logged and audited; <br />1. Servers and computers shall be protected from unauthorized physical access; and <br />J. Portable Computer Devices shall not be left unattended unless the device has been <br /> secured. <br />4. General Password Construction Guidelines. Passwords shall be constructed using <br />characteristics of strong passwords, as described below. Passwords shall not be <br />constructed using characteristics of poor, weak passwords, as described below: <br />a. Strong passwords have the following characteristics: <br />. Contain both upper and lower case characters (e.g., a-z, A-Z); <br />. Have digits and punctuation characters as well as letters e.g., 0-9, <br /> !@#$%^&*(L+I--=\' {} []:";'<>?,.I); <br />. Are at least eight alphanumeric characters long; <br />. Are not based on a word in any language, slang, dialect, jargon; and <br />. Are not based on personal information, including names of family members. <br />Information Security Standards 2 <br />
The URL can be used to link to this page
Your browser does not support the video tag.