My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2009 - 07-20-09 Regular Meeting
public access
>
Clerk
>
MINUTES
>
2009
>
2009 - 07-20-09 Regular Meeting
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/20/2009 2:46:15 PM
Creation date
8/20/2009 2:38:51 PM
Metadata
Fields
Template:
Admin-Clerk
Committee
Board of Commissioners
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
95
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
BOOK 22 Pact 982 <br />(b) Garbage pickup/Yard Waste Fees - Fees for these services that are deferred are <br />primarily for businesses and not family or household customers. Records kept for <br />these accounts may include the following identifying information: A person's name, <br />business name, address and telephone number. These accounts do not contain <br />social security or Federal Identification numbers so the risk of identity theft and <br />potential of identity theft is low. <br />(c) Health Department - The Lee County Health Department provides services for <br />which clients are allowed to defer payment; therefore the regulations of FACTA do <br />apply. There are at least three special considerations for local health departments <br />in developing an Identity Theft Prevention Program: (1) health departments' <br />obligation to comply with medical confidentiality laws; (2) their obligation to comply <br />with nondiscrimination laws; and (3) their role as a provider of essential public <br />health services. <br />Procedures <br />1. Managing, maintaining, and storing sensitive and confidential information <br />(a) Employees who have access to sensitive and confidential information are required to <br />create, handle, maintain, and dispose of such information with prudent care in order <br />to ensure proper security. Access to sensitive and confidential information will be <br />limited and only provided in order for authorized employees and contractual third <br />parties to perform essential tasks for County business. <br />(b) The following procedures should be followed while creating, handling, maintaining, <br />storing, and disposing of sensitive information. <br />• Enter information directly to a final destination (i.e. computer system) and <br />refrain from documenting the information in other areas. <br />• Sensitive information should not be included on e-mails. <br />• Sensitive information should not be included on printed reports except as <br />needed for the performance of essential tasks. <br />• Maintain documents that contain sensitive information in a secured area and <br />limit access to the area. <br />• If possible, utilize encryption to secure information in the database or storage <br />system. <br />• Do not leave a computer unattended if sensitive information could be <br />accessed by unauthorized individuals. While away from the computer, log off <br />or lock the workstation. <br />• Do not store files with sensitive information on laptops or on flash drives <br />unless the information and the device can be secured and not accessible to <br />unauthorized individuals. <br />Identity Theft/Red Flag Rules Page 4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.