Loading...
CONTRACT 5441 Other LOSANCEUS COUNTY COUNTY OF LOS ANGELES Agreement No. 5441 N DOWNEY DATA CENTER REGISTRATION •'••�- "-�• •• For Contractors/Vendors PROFILE INFORMATION (1)DATE OF REQUEST (2)TYPE OF REQUEST(Check One) ❑REPLACE LOST/STOLEN SECUREID TOKEN (3)CONTRACT OR VENDOR NUMBER 12/20/2017 1 El ADEM NEW LOGON ID E'CHANGE�LOGON ID ACCESS (j DELETE LOGON ID +1) 'E,F T E 141 &)�• L DESS kinin , ona, e,pruty ,Citi Clerk II(Prev)ously Domann,Cathy,Deputy City�I�lsrp I g a se9sundo.org (6)COMPANYIORGANIZATION NAME (7)COORDINATING LA.COUNTY DEPARTMENT NAME I NUMBER City of EI Segundo, City Clerk's Office Registrar-Recorder/County Clerk 710 (8)WORK Main tINGA RoEss om(S,rEf Segundo, E, ZIP) 5 ............. ._....� .......... _........... .._ i WORK 24-2307NuiusEa,,.,.......,,..,.,.,... ...,.,,.. reet, CA IBM DATA CENTER ACCESS completemanagement (10)LOGON ID (11)2-DIGIT MAJOR GROUP CODE (12)2 DIGIT LSO GROUP CODE _T C008621(Previous login ID) N/A /A ❑ TSO ACCESS—check box and complete for required access,as defined by L.A.County management Asterisks are optional data. (13)2-DIGIT TSO GRP CODE (14)SUB-GROUP 1• (15)SUB-GROUP 2 (16)SUBGROUP 3' N/A IN/A IN/A N/A I 0 ONLINE ACCESS—check box and complete for required access,as defined by County management Asterisks are optional data. (17)SYSTEM APPLICATION (18)GRP NAME I NATURAL PROFILE (19)OLD GRP/NATURAL PROFILE' DMVIJAIIAPS APPUATION COORDINATORS QW VIMS LITE WA WA ....... .................................. AM NO: DMV SYSTEM COPr-* JAI SYSTEM LOCATION: ENVIRONMENTUNIX . . . management. (20)TYPE OFRMUEST(Check One) ❑+ ADD NEW LOGON ID ❑r CHANGE LOGON ID ACCESS ❑DELETE LOGON ID __j • (2}LOGON ID • (22 IAPPLICATIONACCESS GROUP f2 9 ACCOUNT NUMBER A • • • • • • • address i •• (25)BILLING ACCOUNT NUMBER for SecurID Token: A1130092030 (26)ACCESS TYPE: SecurID VPN Adaptive Authentication VPN ❑ SECURITY STATEMENT Before connecting to the County network you must install anti-virus software, and stay up-to-date with definitions, Microsoft patches (critical and security)and service packs. A Firewall,either a hardware firewall or personal firewall software,is required for those using broadband Internet access (DSL,ISDN,cable modem,etc.). You agree not to share your logon id,password and SecurID passcode with others. SIGNATURES —each signature entry must be completed in full. Your signature indicates that you have read and will comply with the above security statement. (27)CUSTO N RE: w mm/,0, 10-524-2307 Mona Shilling, Deputy City Clerk II 12/20/17 ..._ ......_ ._... 3m..... ......_... mm.. . .. ....., ......... __...._......___. __ (2 -" .. W � R� �� DEP'ARTMEN ' S NAME (3VDA(29)P NE• (3[I)P8) 0 T"Y r" i1"I" N TU � MAN ER(32)ISDIAPPLICATION CO RDINATOR a SIGNATURE (33)PHONE# (34)PRINT ISDIAPPUCATION COORDINATORS'NAME (3 WARNING:FAILURE TO FULLY COMPLETE&SIGN THIS FORM WILL CAUSE A DELAY IN PROCESSING. You may submit completed registration form to ISDELO istlration0is0agountl/,00V or ISD Registration office at 9150 E. Imperial Hwy, Downey, CA 90242 Mail Stop #29 to process. For any questions related to registration please call (562) 658-1881. Revised:October 2015 Downey Data Center Registration Instructions For Contractors/Vendors Agreement No. 5441 Profile Information - print or type 1. Mandatory. Enter the current date. 2. Mandatory. Check appropriate type of request. 3. Mandatory. Enter your contract or vendor number. 4. Mandatory. Print your last name, first name and middle initial. 5. Mandatory. Enter your e-mail address. 6. Mandatory. Enter your company/organization name. 7. Mandatory. Enter the coordinating L.A. County department name or number. 8. Mandatory. Enter your complete business mailing address. 9. Mandatory. Enter your complete telephone number. New logon ids will be created as follows: Contractor/Vendor LOGON ID will be assigned and you will be notified by phone (e.g. Cxxxxxx). IBM Data Center Access 10. Mandatory. Enter your existing logon id. If this is a new request, your logon id will be assigned as described above. 11. Mandatory. Enter the two-digit department major group code, as defined by L.A. County management. 12. Mandatory. Enter the two-digit local security group code, as defined by L.A. County management. TSO Access - check box if this request applies to TSO access 13. Mandatory. Enter the two-digit identifier of your TSO group, as defined by L.A. County management. 14. Optional. Enter the two-character identifier, as defined by L.A. County management. 15. Optional. Enter the two-character identifier, as defined by L.A. County management. 16. Optional. Enter the two-character identifier, as defined by L.A. County management. Online Access- check box if this request applies to online access 17. Mandatory. Enter each CICS online or IMS system application required for access, as defined by L.A. County management. 18. Mandatory Enter the group name for each system application, as defined by L.A. County management. 19. Optional. Enter the old Natural group/profile name. UNIX Environment Access - complete for required access as defined by L.A. County management 20. Mandatory. Check appropriate type of request. 21. Mandatory. Enter your existing Logon ID. If this is a new request, your logon id will be assigned as described above. 22. Mandatory. Enter the application you require for access, as defined by L.A. County management. 23. Mandatory. Enter your UNIX access group. 24. Optional. Enter a valid 11-digit billing account number. SecurID Remote Access - complete for required access as defined by L.A. County management. 25. Mandatory. Enter a valid L.A. County 11-digit billing account number. 26. Mandatory. Check box for device type. VPN customers must check the box and indicate compliance. Anti-virus software and stay up-to-date with definitions, patches and service packs applies to everyone. A Firewall, either a hardware firewall or personal firewall software, is required for those using broadband Internet access (DSL, ISDN, cable modem, etc.). Signatures - original signatures are required 27. Mandatory. Your signature indicates that you have read and will comply with the security statement. 28. -31. Mandatory. Enter signature, phone#and date of authorizing L.A. County department manager(sign and print) 32. -35. Mandatory. Enter signature, phone#and date of ISD manager or application coordinator(sign and print). Revised:October 2015 Agreement No. 5441 COUNTY OF LOS ANGELES AGREEMENT FOR ACCEPTABLE USE AND CONFIDENTIALITY OF COUNTY INFORMATION TECHNOLOGY RESOURCES ANNUAL As a County of Los Angeles (County) employee, contractor, subcontractor, volunteer, or other authorized user of County information technology (IT) resources, I understand that I occupy a position of trust. Furthermore, I shall use County IT resources in accordance with my Department's policies, standards, and procedures. I understand that County IT resources shall not be used for: • For any unlawful purpose; • For any purpose detrimental to the County or its interests; a For personal financial gain; • In any way that undermines or interferes with access to or use of County IT resources for official County purposes; In any way that hinders productivity, efficiency, customer service, or interferes with a County IT user's performance of his/her official job duties; I shall maintain the confidentiality of County IT resources (e.g., business information, personal information, and confidential information). This Agreement is required by Board of Supervisors Policy No. 6.101 — Use of County Information Technology Resources, which may be consulted directly at website ltd �f ITct icy Co.la.ca.LIS/6.10I.htm. As used in this Agreement, the term "County IT resources" includes, without limitation, computers, systems, networks, software, and data, documentation and other information, owned, leased, managed, operated, or maintained by, or in the custody of, the County or non-County entities for County purposes. The definitions of the terms "County IT resources", "County IT user", "County IT security incident", "County Department", and "computing devices" are fully set forth in Board of Supervisors Policy No. 6.100—Information Technology and Security Policy, which may be consulted directly at website lrttw//CouIIIV11oIicy.co..l..,a,,.,aj,j.s/6J 00..1tt.rn. The terms "personal information" and "confidential information" shall have the same meanings as set forth in Board of Supervisors Policy No. 3.040—General Records Retention and Protection of Records Containing Personal and Confidential Information, which may be consulted directly at website LILtp://co UntN'raAhc °. er.la.ca.us/3.040.htin. As a County IT user, I agree to the following: 1. Computer crimes: I am aware of California Penal Code Section 502(c)—Comprehensive Computer Data Access and Fraud Act (set forth, in part, below). I shall immediately report to my management any suspected misuse or crimes relating to County IT resources or otherwise. 2. No I_'x atlon of Privacy: I do not expect any right to privacy concerning my activities related to County IT resources, including, without limitation, in anything I create, store, send, or receive using County IT resources. I understand that having no expectation to HOA.1044333.1 Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015 Agreement No. 5441 any right to privacy includes, for example,that my access and use of County IT resources may be monitored or investigated by authorized persons at any time, without notice or consent. 3. Activities_related to rrnty FF resources: I understand that my activities related to County IT resources (e.g., email, instant messaging, blogs, electronic files, County Internet services, and County systems) may be logged/stored,may be a public record, and are subject to audit and review, including, without limitation, periodic monitoring and/or investigation, by authorized persons at any time. I shall not either intentionally, or through negligence, damage, interfere with the operation of County IT resources. I shall neither, prevent authorized access, nor enable unauthorized access to County IT resources responsibly, professionally, ethically, and lawfully. 4. Countv IT securitv incident revorting: I shall notify the County Department's Help Desk and/or Departmental Information Security Officer (DISO) as soon as a County IT security incident is suspected. 5. Secuilty access controls: I shall not subvert or bypass any security measure or system which has been implemented to control or restrict access to County IT resources and any related restricted work areas and facilities. I shall not share My,�Lt>tr ptrter' identification codes and other authentication mechanisms (e.L..... ,agt117 identilication 1"11.: 1, computer access codes �r�,COUllt ....codes,_pass\vords. SecurlD cards/tokens, biometric wlogtar7� �itd 6. Passwords: I shall not keep or maintain any unsecured record of my password(s) to access County IT resources, whether on paper, in an electronic file, or otherwise. I shall comply with all County and County Department policies relating to passwords. I shall immediately report to my management any compromise or suspected compromise of my password(s) and have the password(s) changed immediately. 7. Business oursioses: I shall use County IT resources in accordance with my Department's policies, standards, and procedures. 8. Coulidentiality: I shall not send, disseminate, or otherwise expose or disclose to any person or organization, any personal and/or confidential information, unless specifically authorized to do so by County management. This includes, without limitation information that is subject to Health Insurance Portability and Accountability Act of 1996, Health Information Technology for Economic and Clinical Health Act of 2009, or any other confidentiality or privacy legislation. 9. Computer virus and other malicious devices: I shall not intentionally introduce any malicious device (e.g., computer virus, spyware, worm, key logger, or malicious code), into any County IT resources. I shall not use County IT resources to intentionally introduce any malicious device into any County IT resources or any non-County IT systems or networks. I shall not disable, modify, or delete computer security software (e.g., antivirus software, antispyware software, firewall software, and host intrusion prevention software) on County IT resources. I shall notify the County Department's Help Desk and/or DISO as soon as any item of County IT resources is suspected of being compromised by a malicious device. HOA.1044333.1 Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015 Agreement No. 5441 10. 011i::rlsive materials: I shall not access, create, or distribute(e.g., via email) any offensive materials (e.g., text or images which are sexually explicit, racial, harmful, or insensitive) on County IT resources (e.g., over County-owned, leased, managed, operated, or maintained local or wide area networks; over the Internet; and over private networks), unless authorized to do so as a part of my assigned job duties (e.g., law enforcement). I shall report to my management any offensive materials observed or received by me on County IT resources. 11. Internet: I understand that the Internet is public and uncensored and contains many sites that may be considered offensive in both text and images. I shall use County Internet services in accordance with my Department's policies and procedures. I understand that my use of the County Internet services may be logged/stored, may be a public record, and are subject to audit and review, including, without limitation, periodic monitoring and/or investigation, by authorized persons at any time. I shall comply with all County Internet use policies, standards, and procedures. I understand that County Internet services may be filtered, but in my use of them, I may be exposed to offensive materials. I agree to hold County harmless from and against any and all liability and expense should I be inadvertently exposed to such offensive materials. 12. Electronic Communications: I understand that County electronic communications (e.g., email, text messages, etc.) created, sent, and/or stored using County electronic communications systems/applications/services are the property of the County. All such electronic communications may be logged/stored, may be a public record, and are subject to audit and review, including, without limitation, periodic monitoring and/or investigation, by authorized persons at any time, without notice or consent. I shall comply with all County electronic communications use policies and use proper business etiquette when communicating over County electronic communications systems/applications/services. 13. 1'11b1ic lormns: I shall only use County IT resources to create, exchange, publish, distribute, or disclose in public forums (e.g., blog postings, bulletin boards, chat rooms, Twitter, Facebook, MySpace, and other social networking services)any information(e.g., personal information, confidential information, political lobbying, religious promotion, and opinions) in accordance with Department's policies, standards, and procedures. 14. Internet storau sites: I shall not store County information (i.e., personal, confidential (e.g., social security number, medical record), or otherwise sensitive (e.g., legislative data)) on any Internet storage site in accordance with Department's policies, standards, and procedures. 15. Copiahted and other prot3rietary,materials: I shall not copy or otherwise use any copyrighted or other proprietary County IT resources (e.g., licensed software and documentation, and data), except as permitted by the applicable license agreement and approved by designated County Department management. I shall not use County IT resources to infringe on copyrighted material. 16. Co M 1M1_ c w 1 11 C"c�til�:t:v...o-diiijntc s.., 1tiles, reatiLatimis, wlicies, l�rocc(hir�es,_.I�.�:N..ietLfimles, dlJAc trvq.5�­!rdd mveem nts: I shall comply with all applicable County ordinances, rules, regulations, policies, procedures, guidelines, directives, and agreements relating to County IT resources. These include, without limitation, Board of Supervisors Policy No. 6.100 — Information Technology and Security Policy, Board of Supervisors Policy No. HOA 1044333113oard of Supervisors Policy No. 6.101 Attachment Revised:January 2015 Agreement No. 5441 6.101 — Use of County Information Technology Resources, and Board of Supervisors Policy No. 3.040 — General Records Retention and Protection of Records Containing Personal and Confidential Information. 17. Q"isci,jLHq v): ggfl n and other actions and t)enallics fir non-coinilliancae: I understand that my non-compliance with any provision of this Agreement may result in disciplinary action and other actions (e.g., suspension, discharge, denial of access, and termination of contracts) as well as both civil and criminal penalties and that County may seek all possible legal redress. CALIFORNIA PENAL CODE SECTION 502(c) "COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT" Below is a section of the "Comprehensive Computer Data Access and Fraud Act" as it pertains specifically to this Agreement. California Penal Code Section 502(c) is incorporated in its entirety into this Agreement by reference, and all provisions of Penal Code Section 502(c) shall apply. For a complete copy, consult the Penal Code directly at website www.letjnf6,ca,aov/. 502(c)Any person who commits any of the following acts is guilty of a public offense: (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either(A)devise or execute any scheme or artifice to defraud, deceive, or extort, or(B)wrongfully control or obtain money, property, or data. (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. (3) Knowingly and without permission uses or causes to be used computer services. (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system, or computer network. (5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user of a computer, computer system, or computer network. (6) Knowingly and without permission provides or assists in providing a means of accessing a computer, computer system, or computer network in violation of this section. (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network. HOA.1044333.1Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015 Agreement No. 5441 (8) Knowingly introduces any computer contaminant into any computer, computer system,or computer network. (9) Knowingly and without permission uses the Internet domain name of another individual,corporation,or entity in connection with the sending of one or more electronic mail messages,and thereby damages or causes damage to a computer,computer system,or computer network. I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT: Mona F. Shilling 0 19P County IT User's Name Co 111%j`. Ne s Sign Wre Deputy City Clerk IV#35920 1 120/17 County IT Users _ ...., Number.w.. ' Employee/IDr Date Greg Carpenter Manager's Name.... lay..... a s..F..igAtatt. m wre City Manager 12 7 anag Title Date. ......... DAY L tioxio u.tBoard of Supervisors Policy No.6.101 Attachment Revised:January 2015 Agreement No. 5441 CALIFORNIA PENAL CODE 502(c)- "COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT" Below is a section of the"Comprehensive Computer Data Access and Fraud Act" as it pertains specifically to this Agreement. California Penal Code 502(c) is incorporated in its entirety into this Agreement by reference and all provisions of Penal Code 502(c) apply. For a complete copy, consult the Code directly at website www.leeinfo.ca.gov/. 502.(c) Any person who commits any of the following acts is guilty of a public offense: (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either(A)devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongly control or obtain money, property, or data. (2) Knowingly accesses and without permission takes, copies or makes use of any data from a computer, computer system, or computer network, or takes or copies supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. (3) Knowingly and without permission uses or causes to be used computer services. (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system,or computer network. (5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user of a computer, computer system, or computer network. (6) Knowingly and without permission provides or assists in providing a means of accessing a computer, computer system,or computer network is in violation of this section. (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network. (8) Knowingly introduces any computer contaminant into any computer, computer system, or computer network. I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT: Mona F. Shilling, Deputy City Clerk , 14 'ry^ 12/19/17 Employee's Name 17--) )lo' nIture Date Greg Carpenter, City Manager 12/19/17 Manager's Name 1Ml10 c Date �' ;ATORNEY �"T` FORM.CCT Board of Supervisors Policy#6.101 Attachment Revised: July 2004 Agreement No. 5441 COUNTY'S INFORMATION TECHNOLOGY ASSETS, COMPUTERS,NETWORKS,SYSTEMS AND DATA As a Los Angeles County employee, contractor, vendor or other authorized user of County Information Technology (IT) assets including computers, networks, systems and data, I understand that I occupy a position of trust. I will use County IT assets for County management approved business purposes only and maintain the confidentiality of County's business and Citizen's private data. As a user of County's IT assets,I agree to the following: 1. t„"ont,11utc.p:....cH,iries: I am aware of California Penal Code 502(c) - Comprehensive Computer Data Access and Fraud Act(attached). I will immediately report any suspected computer misuse or crimes to my Management. 2. Security iwC ss c„olp„I„rol,s: I will not subvert or bypass any security measure or system which has been implemented to control or restrict access to computers,networks, systems or data. I,_.w,ill not shah e...illy llaaugluatea° idlcu�ti ioaxtia>a7 ealcf (11w1d-iuu III, ea°muatllugt .e:. <wo, CS Code " aaclworoalll c•odcs, ID's..w4a� zri: passwords. 3. Illll;K,1,w,^cta;ia�l. ,IjktrjLos%gs: I will use the County's Information Technology (IT) assets including computers,networks,systems and data for County management approved business purposes only. 4. (";c�uW�Imclti.aaaiarlity: I will not access or disclose any County program code, data, information or documentation to any individual or organization unless specifically authorized to do so by the recognized information owner. 5. Cml'„.".i„1 utcr vims and malicious.-Sti(J.c: I will not intentionally introduce any computer virus, worms or aluaalicious code into ally County computcr, network, system or data. I will not disable or delete o:°oraapuuter virus detectioart and cradication s,o tware on County computers, servers and other computing dcviccs I am respollsiblc 161'. 6. 011*cnsivc malcriaals: I will not access or send any offensive materials, e.g., sexually explicit, racial, harmful or insensitive text or images, over County owned, leased or managed local or wide area networks, including the public Internet and other electronic mail systems, unless it is in the performance of my assigned job duties, e.g., law enforcement. I will report to my supervisor any offensive materials observed by me or sent to me on County systems. 7. Public Internet: I understand that the Public Internet is uncensored and contains many sites that may be considered offensive in both text and images. I will use County Internet services for approved County business purposes only, e.g., as a research tool or for electronic communication, I understand that the County's Internet servicesmaybe faltered but in my use of them I may be exposed to offensive materials. I agree to hold the County harmless should I be inadvertently exposed to such offensive materials. I understand that my Internet activities may be logged,are a public record,and are subject to audit and review by authorized individuals. 8. Elcclronic,rnalll-land ollrer ciwrotnic data: I understand that County electronic mail (e-mail), and data, in either electronic or other forms, are a public record and subject to audit and review by authorized individuals. I will comply with County e-mail use policy and use proper business etiquette when communicating over e-mail systems. 9. Copyrighted allaateriawls: I will not copy any licensed software or documentation except as permitted by the license agreement. 10. Disci llina l aaclion foraucyru-cauarul�li�arr,l.�: I understand that my non-compliance with any portion of this Agreement may result in disciplinary action including my suspension, discharge, denial of service, cancellation of contracts or both civil and criminal penalties. Board of Supervisors Policy#6.101 Attachment Revised: July 2004