Laserfiche WebLink
BOOK 22 Pact 982 <br />(b) Garbage pickup/Yard Waste Fees - Fees for these services that are deferred are <br />primarily for businesses and not family or household customers. Records kept for <br />these accounts may include the following identifying information: A person's name, <br />business name, address and telephone number. These accounts do not contain <br />social security or Federal Identification numbers so the risk of identity theft and <br />potential of identity theft is low. <br />(c) Health Department - The Lee County Health Department provides services for <br />which clients are allowed to defer payment; therefore the regulations of FACTA do <br />apply. There are at least three special considerations for local health departments <br />in developing an Identity Theft Prevention Program: (1) health departments' <br />obligation to comply with medical confidentiality laws; (2) their obligation to comply <br />with nondiscrimination laws; and (3) their role as a provider of essential public <br />health services. <br />Procedures <br />1. Managing, maintaining, and storing sensitive and confidential information <br />(a) Employees who have access to sensitive and confidential information are required to <br />create, handle, maintain, and dispose of such information with prudent care in order <br />to ensure proper security. Access to sensitive and confidential information will be <br />limited and only provided in order for authorized employees and contractual third <br />parties to perform essential tasks for County business. <br />(b) The following procedures should be followed while creating, handling, maintaining, <br />storing, and disposing of sensitive information. <br />• Enter information directly to a final destination (i.e. computer system) and <br />refrain from documenting the information in other areas. <br />• Sensitive information should not be included on e-mails. <br />• Sensitive information should not be included on printed reports except as <br />needed for the performance of essential tasks. <br />• Maintain documents that contain sensitive information in a secured area and <br />limit access to the area. <br />• If possible, utilize encryption to secure information in the database or storage <br />system. <br />• Do not leave a computer unattended if sensitive information could be <br />accessed by unauthorized individuals. While away from the computer, log off <br />or lock the workstation. <br />• Do not store files with sensitive information on laptops or on flash drives <br />unless the information and the device can be secured and not accessible to <br />unauthorized individuals. <br />Identity Theft/Red Flag Rules Page 4 <br />