My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2009 - 07-20-09 Regular Meeting
public access
>
Clerk
>
MINUTES
>
2009
>
2009 - 07-20-09 Regular Meeting
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/20/2009 2:46:15 PM
Creation date
8/20/2009 2:38:51 PM
Metadata
Fields
Template:
Admin-Clerk
Committee
Board of Commissioners
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
95
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
BOOK 22 mE S$3 <br />Take reasonable measures when destroying sensitive data that will prohibit <br />the information from being read or reconstructed. Documents with sensitive <br />data should be shredded by the individual who has authorized access to the <br />data or by another employee while in the presence of the authorized <br />employee. The County may enter into a written contract with a third party in <br />the business of record destruction to destroy sensitive information in a <br />manner consistent with this policy. <br />(c) In order to protect sensitive and confidential information, the County will only release <br />sensitive information to the account holder or individual(s) who own the information <br />upon confirmation of personal identifying information or a valid picture ID. The <br />confirmed account holder or individual may authorize the release of sensitive <br />information to a third party. Confidential information will only be released in <br />accordance with state statute. The only exception will be the release of specified <br />information pursuant to a court order, warrant, subpoena or other requirement by <br />law. <br />2. Identification of Red Flags <br />The Red Flags rule defines "Identity Theft" as "fraud" using "identifying information" of <br />another person. "Identifying information" includes: name, address, telephone number, <br />social security number, date of birth, government issued driver's license or identification <br />number, alien registration number, government passport number, employer or taxpayer <br />identification number, unique electronic identification number, computer's internet <br />protocol address, routing code. <br />In order to identify relevant Red Flags, the County considers the types of accounts that is <br />offers and maintains, the methods it provides to open its accounts, the methods it <br />provides to access its accounts, and any previous experiences with Identity Theft. <br />(a) Steo 1. Employees shall be aware of the following "Red Flags: that suggest a breach <br />of sensitive or confidential information as occurred. <br />1. Physical Breach - The following are indications that there has been <br />unauthorized access to sensitive and confidential information via a <br />physical breach. Other activities may occur that are also physical <br />breaches that are not included in this listing. <br />a. Evidence of lock tampering on file cabinets or office doors. <br />b. Evidence of unauthorized entry in an area where sensitive and <br />confidential information is stored. <br />c. Missing files or documents that contain sensitive information. <br />Identity Theft/Red Flag Rules Page 5 <br />
The URL can be used to link to this page
Your browser does not support the video tag.