Loading...
CONTRACT 5959 Other595 II Print Form COUNTY OF LOS ANGELES IOSAN firSCOLINTY MAINFRAME, UNIX AND REMOTE ACCESS REGISTRATION FORM' For L.A. COUNTY EMPLOYEES and CONTRACTORS . 11 •. (1) DATE OF REQUEST 1(2) TYPE OF REQUEST 10/13/2020 1 [:]NEW LOGON ID ❑� UPDATE LOGON ID ❑ DELETE LOGON ID (4) LASTNAME, FIRST NAME, MI (5) E-MAIL ADDRESS Shilling, Mona F. (Deputy City Clerk II) � mshilling@elsegundo.org (6) COUNTY DEPARTMENT NAME/ORGANIZATION NAME City of EI Segundo, City Clerk's Office (8) WORK MAILING ADDRESS (STREET, CITY, STATE, ZIP) 350 Main Street, EI Segundo, CA 90245 completeIBM DATA CENTER ACCESS — •r required access, as defined (10) LOGON ID j (11) 2 -DIGIT MAJOR GROUP CODE (12) 2 -DIGIT LSO GROUP CODE ❑ TSO ACCESS — check box for access and complete fields 10, 11, 12 and 13 (see above). (14) 2 -DIGIT TSO GRP CODE 1(15) BIN NUMBER 1(16) SUG-GROUP 1 1(17) SUB -GROUP 2 (3) EMPLOYEE OR CONTRACTOR # (7) COUNTY DEPARTMENT NUMBER RRCC 710 (9) WORK PHONE NUMBER 310-524-2307 (13) SECURITY AUTHORIZATION 1(18) SUB -GROUP 3 ❑ ONLINE ACCESS —check box for access and complete fields 10, 11, 12, 13, 19, and 20. (19) SYSTEM APPLICATION (20) GRP NAME / NATURAL PROFILE (21) OLD GRP/NATURAL PROFILE DMVIJAI/APS APPLIATION COORDINATORS ONLY APs AID: DMV SYSTEM CODE: JAI SYSTEM LOCATION: (22) TYPE OF REQUEST (Check One) ❑ ADD NEW LOGON ID ❑ CHANGE LOGON ID ACCESS ❑ DELETE LOGON ID (23) LOGON ID „(24) APPLICATION 1 (25) ACCESS GROUP ❑ (26a) NEW TOKEN ❑ (26b) REPLACE LOST/STOLEN TOKEN ❑ (26c) REPLACE DEFECTIVE TOKEN ✓❑ (26d) RENEW TOKEN PLEASEL T YOUR REMOTECC TY Expiration Date: Note: When selecting a RSA SecurID Hard Token or Software Token, a valid Billing Account Number is REQUIRED ❑ (27a) TOKENLESS AUTHENTICATION VPN ❑ (27b) HARD TOKEN SECURID VPN 0 (27c) SOFTWARE TOKEN SECURID VPN Uses Password - Does Not Expire Uses KeyFob - 3 Year Expiration Uses Mobile Device or Computer - 3 Year Expiration Select Device Type Below: (28) BILLING ACCOUNT NUMBER for SecurID Token: Al 130092030 ❑✓ IOS ❑ ANDROID ❑ COMPUTER SECURITY STATEMENT: Before connecting to the County network you must install anti-virus software, and stay up-to-date with definitions, Microsoft patches (critical and security) and service packs. A Firewall, either a hardware firewall or personal firewall software, is required for those using broadband Internet access. You agree not to share your logon id, password and SecurID passcode with others. SIGNATURES Please sign, date and print name below. Your signature indicates that you have read and will comply with the above security statement. ' (9) 9 STOMER" St u " IVATURE (30) PHONE # (31) NAME (32) DATE 310-524-2307 Mona Shilling 10/13/2020 $IGNAT Ex (34) PHONE # (35) MANAGER'S NAME (36) DATE AAA S (3 310-524-2389 Barbara Voss 10/13/2020 ) I5EPARTMEN CT OOR tNATOR� S SIGNATURE (38) PHONE # (39) DEPTARTMENT COORDINATOR'S NAME (40) DATE Kevin Sasaki pgea"�08za09z305-0;W 5624-62-2611 K. SASAKI 8/28/2020 WARNING: FAILURE TO FULLY COMPLETE & SIGN THIS FORM WILL CAUSE A DELAY IN PROCESSING. You may submit completed registration form to ISDRe istratio is i, ca ounty. or ISD Registration office at 9150 E. Imperial Hwy, Downey, CA 90242 Mail Stop # 29 for processing. For any questions related to registration please call (562) 940-3305. Revised: June 2020 Version: 2.0 Downey Data Center Registration Instructions For L.A. COUNTY EMPLOYEES and CONTRACTORS Profile Information - print or type 1. Mandatory. Enter the current date. 2. Mandatory. Check appropriate type of request. 3. Mandatory. Enter your 6 -digit County employee number or Contractor number (If you have one). 4. Mandatory. Print your last name, first name and middle initial. 5. Mandatory. Enter your e-mail address. 6. Mandatory. Enter your County Department name or Organization name 7. Mandatory. Enter your 3 -digit County Department number. 8. Mandatory. Enter your complete business mailing address. 9. Mandatory. Enter your complete telephone number. New Logon IDs will be created as follows: County Emolowee E and employee number (e.g. E222222) Contractor C and contractor number (e.g. C222222). You agree not to share your Logon ID and password with others. IBM Data Center Access 10. Mandatory. Enter your existing Logon ID. If this is a new request, your Logon ID will be assigned as described above. 11. Mandatory. Enter your two -digit department major group code, as defined by your management. 12. Mandatory. Enter your two -digit local security group code, as defined by your management. 13. Optional. Complete if you have been designated as a Local Security Officer, by your management. TSO Access - check box if this request applies to TSO access 14. Mandatory. Enter the two -digit identifier of your TSO group, as defined by your management. 15. Optional. Enter Downey bin number for report retrieval. 16. Optional. Enter the two -character identifier, as defined by your management. 17. Optional. Enter the two -character identifier, as defined by your management. 18. Optional. Enter the two -character identifier, as defined by your management. Online Access - check box if this request applies to online access 19. Mandatory. Enter each CICS online or IMS system application you require for access, as defined by your management. 20. Mandatory Enter the group name for each system application you require for access, as defined by your management. 21. Mandatory. Enter the old Natural group/profile name. UNIX Environment Access - check box if this request applies to UNIX access 22. Mandatory. Check appropriate type of request. 23. Mandatory. Enter your existing Logon ID. If this is a new request, your Logon ID will be assigned as described above. 24. Mandatory. Enter the application you require for access, as defined by your management. 25. Mandatory. Enter your UNIX access group. Remote Access - complete for access as required by your management. 26a. Mandatory. Check box for a New Token. 26b. Mandatory. Check box to replace a lost/stolen Token. 26c. Mandatory. Check box to replace a defective/malfunctioned Token. 26d. Mandatory. Check box to renew a Token. 27a. Mandatory. Check box for Tokenless, which is RSA Adaptive Authentication remote access to County -protected resources. 27b. Mandatory. Check box for RSA SecurID Hardware token, which is a KeyFob that is valid for 3 years. 27c. Mandatory. Check box for RSA SecurID Software token, which is a file for your device. Please also indicate device type. IOS/Android - You will receive a QR Code or Hyperlink for your mobile device Computer - You will receive a program (.stdid) file for your Windows/MacOS workstation. You need to install the RSA Software Token client. Checking any of the boxes for 27. indicates your compliance with the security statement. Anti-virus software and staying up-to-date with definitions, patches and service packs applies to everyone. A Firewall, either a hardware firewall or personal firewall software, is required for those using broadband Internet access. Check with your management if you need anti-virus and/or personal firewall software. 28. Mandatory. Enter a valid 11 -digit billing account number, as defined by your management. Signatures - signatures are required 29. - 32. Mandatory. Enter signature, phone # and date of county employee or contractor (sign and print). 33. - 36. Mandatory. Enter signature, phone # and date of authorizing manager (sign and print). 37. - 40. Mandatory. Enter signature, phone # and date of application coordinator (sign and print). If you have indicated a need to access a system not owned by your department, concurrence from the other department(s) is required. Revised: June 2020 Version: 2.0 5959 COUNTY OF LOS ANGELES AGREEMENTIFOR ACCEPTABLE USE AND CONFIDENTIALITY OF COUNTY INFORMATION ASSETS As a County of Los Angeles (County) Workforce Member, and as outlined in Board of Supervisors Policy 6.101 "Use of County Information Assets", I understand and agree: • That I occupy a position of trust, as such I will use County Information Assets in accordance with countywide and Departmental policies, standards, and procedures including, but not limited to, Board of Supervisors Policy 9.015 "County Policy of Equity" (CPOE) and Board of Supervisors Policy 9.040 "Investigations Of Possible Criminal Activity Within County Government". • That I am responsible for the security of information and systems to which I have access or to which I may otherwise obtain access even if such access is inadvertent or unintended. I shall maintain the confidentiality of County Information Assets (as defined in Board of Supervisors Policy 6.100 — Information Security Policy). That County Information Assets must not be used for: o Any unlawful purpose; o Any purpose detrimental to the County or its interests; o Personal financial gain; o In any way that undermines or interferes with access to or use of County Information Asset for official County purposes; o In any way that hinders productivity, efficiency, customer service, or interferes with other County Workforce Members performance of his/her official job duties. • That records, files, databases, and systems contain restricted, confidential or internal use information (i.e. non-public information) as well as Public information. I may access, read or handle Non-public information to the extent required to perform my assigned duties. Although I may have access to Non- public information, I agree to not access such information unless it is necessary for the performance of my assigned duties. Not to divulge, publish, share, expose or otherwise make known to unauthorized persons, organization or the public any County Non-public Information. I understand that: o I may divulge Non-public Information to authorized County staff and managers as necessary to perform my job duties; 0 1 may divulge Non-public Information to others only if specifically authorized to do so by federal, state, or local statute, regulation or court order, and with the knowledge of my supervisor or manager; 0 1 may not discuss Non-public Information outside of the workplace or outside of my usual work area; o To consult my supervisor or manager on any questions I may have concerning whether particular information may be disclosed. • To report any actual breach of Information Security or a situation that could potentially result in a breach, misuse or crime relating to County Information Assets whether this is on my part or on the part of another person following proper County and Departmental procedures. I understand that I am expected to assist in protecting evidence of crimes relating to Information Assets and will follow the instructions of, and cooperate, with management and any investigative response team. • 1 have no expectation of privacy concerning my activities related to the use of, or access to, County Information Assets, including anything I create, store, send, or receive using County Information Assets. My actions may be monitored, logged, stored, made public, and are subject to investigation, audit and review without notice or consent. • Not possess a County Information Asset without authorization. Although I may be granted authorization to possess and use a County Information Asset for the performance of my duties, I will never be granted any ownership or property rights to County Information Assets. All Information Board of Supervisors Policy No. 6.101 Attachment Rev. January 2019 Assets and Information is the property of the County. I must surrender County Information Assets upon request. Any Information Asset retained without authorization will be considered stolen and prosecuted as such. • Not intentionally, or through negligence, damage or interfere with the operation of County Information Assets. • Neither, prevent authorized access, nor enable unauthorized access to County Information Assets. • To not make computer networks or systems available to others unless I have received specific authorization from the Information Owner. o Not share my computer identification codes and other authentication mechanisms (e.g., logon identification (ID), computer access codes, account codes, passwords, ID cards/tokens, biometric logons, and smartcards) with any other person or entity. Nor will I keep or maintain any unsecured record of my password(s) to access County Information Assets, whether on paper, in an electronic file. 0 1 am accountable for all activities undertaken through my authentication mechanisms (e.g., logon identification (ID), computer access codes, account codes, passwords, ID cards/tokens, biometric logons, and smartcards). Not intentionally introduce any malicious software (e.g., computer virus, spyware, worm, key logger, or malicious code), into any County Information Asset or any non -County Information Systems or networks. • Not subvert or bypass any security measure or system which has been implemented to control or restrict access to County Information Assets and any restricted work areas and facilities. o Disable, modify, or delete computer security software (e.g., antivirus, antispyware, firewall, and/or host intrusion prevention software) on County Information Assets. I shall immediately report any indication that a County Information Asset is compromised by malware following proper County and Departmental procedures. • Not access, create, or distribute (e.g., via email, Instant Messaging or any other means) any offensive materials (e.g., text or images which are defamatory, sexually explicit, racial, harmful, or insensitive) on County Information Assets, unless authorized to do so as a part of my assigned job duties (e.g., law enforcement). I will report any offensive materials observed or received by me on County Information Assets following proper County and Departmental procedures. • That the Internet is public and uncensored and contains many sites that may be considered offensive in both text and images. I shall use County Internet services in accordance with countywide and Departmental policies and procedures. I understand that County Internet services may be filtered, however, my use of resources provided on the Internet may expose me to offensive materials. I agree to hold County harmless from and against any and all liability and expense should I be inadvertently exposed to such offensive material. • That County electronic communications (e.g., email, instant messages, etc.) created, sent, and/or stored using County electronic communications services are the property of the County. I will use proper business etiquette when communicating using County electronic communications services. • Only use County Information Assets to create, exchange, publish, distribute, or disclose in public forums and social media (e.g., blog postings, bulletin boards, chat rooms, Twitter, Instagram, Facebook, MySpace, and other social media services) any information (e.g., personal information, confidential information, political lobbying, religious promotion, and opinions) in accordance with countywide and Departmental policies, standards, and procedures. • Not store County Non-public Information on any Internet storage site except in accordance with countywide and Departmental policies, standards, and procedures. • Not copy or otherwise use any copyrighted or other proprietary County Information Assets (e.g., licensed software, documentation, and data), except as permitted by the applicable license Board of Supervisors Policy No. 6.101 Attachment Rev. January 2019 agreement and approved by County Department management. Nor will I use County Information Assets to infringe on copyrighted material. That noncompliance may result in disciplinary action (e.g., suspension, discharge, denial of access, and termination of contracts) as well as both civil and criminal penalties and that County may seek all possible legal redress. I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT: ." /I Mona F. Shillingd-77 County Workforce Member's NamecsuntNlWorktife?v9etls r^r°S Signature ,. Deputy City Clerk 11/35920 10% 3/200 County Workforce Member's ID Number Date Digitally signed by Kevin Sasaki K. SASAKI Kevin Sasaki Date: 2020.08.2816:53:42-07'00' Manager's Name Manager's Signature ADISO ............. __ Manager's Title 8/28/2020 Date 3 Board of Supervisors Policy No. 6.101 Attachment Rev. January 2019