Laserfiche WebLink
<br />b. Poor, weak passwords have the following characteristics: <br />. The password contains less than eight characters <br />. The password is a word found in a dictionary (English or foreign) <br />. The password is a common usage word such as: <br /> 0 Names offamily, pets, friends, co-workers, fantasy characters, etc. <br /> 0 Computer terms and names, commands, sites, companies, hardware, <br /> software. <br /> 0 The words "Hacienda", "Pleasanton", "GIS" or any derivation. <br /> 0 Birthdays and other personal information such as addresses and phone <br /> numbers. <br />C. Anti-Virus Standards <br />1. Purpose <br />To ensure effective virus detection and prevention, anti-virus standards shall be met by <br />all computers connected to systems which have access to the GIS Data ("GIS Connected <br />Computers"). <br />2. Scope <br />These standards apply to all GIS Connected Computers that are PC-based or utilize PC- <br />file directory sharing. These include, but are not limited to, desktop computers, laptop <br />computers, and file/ftp/tftp/proxy servers. <br />3. Standards <br />All GIS Connected computers shall have industry standard anti-virus software installed <br />and running. In addition, the anti-virus software and the virus pattern files shall be kept <br />up-to-date. <br />D. Remote Access Standards <br />1. Purpose <br />These standards concern accessing or connecting to GIS Connected Computers and are <br />designed to minimize the potential exposure to the GIS Providers from damage which <br />may result from unauthorized use of GIS Data. <br />2. Scope <br />These standards apply to remote access connections used to do work on behalf of the GIS <br />Providers. Remote access implementations that are covered by these standards include, <br />but are not limited to, dial-in RAS modems, Tl, frame relay, ISDN, DSL, and cable <br />modems, including VPN, SSL, SSH, Terminal Services (Citrix) and remote desktop. <br />Information Security Standards 3 <br />