My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
AG 2013 08 19
CabarrusCountyDocuments
>
Public Meetings
>
Agendas
>
BOC
>
2013
>
AG 2013 08 19
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/4/2013 4:47:42 PM
Creation date
11/27/2017 10:59:19 AM
Metadata
Fields
Template:
Meeting Minutes
Doc Type
Minutes
Meeting Minutes - Date
8/19/2013
Board
Board of Commissioners
Meeting Type
Regular
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
532
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
*See AUDITS, LITIGATION, AND OTHER OFFICIAL ACTIONS, page vi. <br />t See signature page. The agency hereby agrees that it will establish and enforce internal policies setting minimum retention periods for the records that <br />Cultural Resources has scheduled with the disposition instruction "destroy when administrative value ends." Please use the space provided. <br />Attachment number 1 <br />.1 <br />G -3 Page 114 <br />STANDARD -S: INFORMATION TECHNOLOGY RECORDS <br />ITEM # <br />RECORD SERIES TITLE <br />DISPOSITION INSTRUCTIONS <br />CITATION <br />6. <br />NETWORK AND SYSTEM SECURITY RECORDS <br />Destroy in office after 3 years.* <br />Comply with applicable <br />Records documenting the security of network and <br />provisions of G.S. 132 - <br />system. May include, but is not limited to, records <br />6.1 (c) on the <br />concerning firewalls, anti -virus programs, and intruder <br />confidentiality of <br />scanning logs. <br />records regarding <br />"hardware or software <br />security, passwords, or <br />security standards, <br />procedures, processes, <br />configurations, <br />software, and codes." <br />7. <br />NETWORK DIAGRAMS <br />Destroy in office when superseded or obsolete. <br />Comply with applicable <br />Records documenting the logical and physical <br />provisions of G.S. 132 - <br />relationships of network components for purposes of <br />6.1 (c) on the <br />organization, deployment, troubleshooting, <br />confidentiality of <br />monitoring of access, and management of day -to -day <br />records regarding <br />operations. <br />"hardware or software <br />security, passwords, or <br />security standards, <br />procedures, processes, <br />configurations, <br />software, and codes." <br />g, <br />PROJECT DOCUMENTATION FILES <br />a) Retain records with historical value permanently. <br />Records created to design, develop, control, or <br />monitor a specific project or group of projects. May <br />b) Destroy in office remaining records 3 years after <br />include, but is not limited to, statements of work, <br />completion of project. <br />assessments, maintenance agreements, and testing <br />records. <br />*See AUDITS, LITIGATION, AND OTHER OFFICIAL ACTIONS, page vi. <br />t See signature page. The agency hereby agrees that it will establish and enforce internal policies setting minimum retention periods for the records that <br />Cultural Resources has scheduled with the disposition instruction "destroy when administrative value ends." Please use the space provided. <br />Attachment number 1 <br />.1 <br />G -3 Page 114 <br />
The URL can be used to link to this page
Your browser does not support the video tag.