Laserfiche WebLink
STANDARD -8. INFORMATION TECHNOLOGY (IT) RECORDS <br />Information technology encompasses all activities undertaken by county departments to design, develop, and operate electronic information systems. This <br />section covers records for which Information Technology personnel are responsible, including administrative records and those used to process data and <br />monitor and control operations. <br />Note: Administration, use, and retention of records concerning computer and information security should comply with applicable provisions of G.S. 132 -6.1 on <br />the confidentiality of records regarding "hardware or software security, passwords, or security standards, procedures, processes, configurations, software, and <br />codes ". (G.S. 132 -6.1 (c)) <br />*See AUDITS, LITIGATION, AND OTHER OFFICIAL ACTIONS, page vi. <br />t See signature page. The agency hereby agrees that it will establish and enforce internal policies setting minimum retention periods for the records that <br />Cultural Resources has scheduled with the disposition instruction "destroy when administrative value ends." Please use the space provided. <br />Attachment number 1 <br />G -3 Page 112 <br />STANDARD -8: INFORMATION TECHNOLOGY RECORDS <br />ITEM # <br />RECORD SERIES TITLE <br />DISPOSITION INSTRUCTIONS <br />CITATION <br />1. <br />AUDIT TRAILS FILE <br />Destroy in office after 3 years.* <br />Records documenting user actions affecting the <br />contents of monitored systems. <br />2. <br />COMPUTER AND NETWORK USAGE RECORDS <br />Destroy in office when administrative value ends.' <br />Comply with applicable <br />Records documenting usage of electronic devices and <br />Agency Policy: Destroy in office after 1 day <br />provisions of G.S. 132 - <br />networks. May include, but is not limited to, login files, <br />6.1 (c) on the <br />system usage files, individual program usage files and <br />confidentiality of <br />records of use of the internet by employees. <br />records regarding <br />"hardware or software <br />security, passwords, or <br />security standards, <br />procedures, processes, <br />configurations, <br />software, and codes." <br />*See AUDITS, LITIGATION, AND OTHER OFFICIAL ACTIONS, page vi. <br />t See signature page. The agency hereby agrees that it will establish and enforce internal policies setting minimum retention periods for the records that <br />Cultural Resources has scheduled with the disposition instruction "destroy when administrative value ends." Please use the space provided. <br />Attachment number 1 <br />G -3 Page 112 <br />