CONTRACT 5441 Other LOSANCEUS COUNTY COUNTY OF LOS ANGELES Agreement No. 5441
N DOWNEY DATA CENTER REGISTRATION
•'••�- "-�• •• For Contractors/Vendors
PROFILE INFORMATION
(1)DATE OF REQUEST (2)TYPE OF REQUEST(Check One) ❑REPLACE LOST/STOLEN SECUREID TOKEN (3)CONTRACT OR VENDOR NUMBER
12/20/2017 1 El ADEM NEW LOGON ID E'CHANGE�LOGON ID ACCESS (j DELETE LOGON ID
+1) 'E,F T E 141 &)�• L DESS
kinin , ona, e,pruty ,Citi Clerk II(Prev)ously Domann,Cathy,Deputy City�I�lsrp I g a se9sundo.org
(6)COMPANYIORGANIZATION NAME (7)COORDINATING LA.COUNTY DEPARTMENT NAME I NUMBER
City of EI Segundo, City Clerk's Office Registrar-Recorder/County Clerk 710
(8)WORK Main tINGA RoEss
om(S,rEf Segundo, E, ZIP) 5 ............. ._....� .......... _........... .._ i WORK
24-2307NuiusEa,,.,.......,,..,.,.,... ...,.,,..
reet,
CA
IBM DATA CENTER ACCESS completemanagement
(10)LOGON ID (11)2-DIGIT MAJOR GROUP CODE (12)2 DIGIT LSO GROUP CODE _T
C008621(Previous login ID) N/A /A
❑ TSO ACCESS—check box and complete for required access,as defined by L.A.County management Asterisks are optional data.
(13)2-DIGIT TSO GRP CODE (14)SUB-GROUP 1• (15)SUB-GROUP 2 (16)SUBGROUP 3'
N/A IN/A IN/A N/A I
0 ONLINE ACCESS—check box and complete for required access,as defined by County management Asterisks are optional data.
(17)SYSTEM APPLICATION (18)GRP NAME I NATURAL PROFILE (19)OLD GRP/NATURAL PROFILE' DMVIJAIIAPS APPUATION COORDINATORS QW
VIMS LITE WA WA ....... .................................. AM NO:
DMV SYSTEM COPr-*
JAI SYSTEM LOCATION:
ENVIRONMENTUNIX . . . management.
(20)TYPE OFRMUEST(Check One) ❑+ ADD NEW LOGON ID ❑r CHANGE LOGON ID ACCESS ❑DELETE LOGON ID
__j
•
(2}LOGON ID • (22 IAPPLICATIONACCESS GROUP f2 9 ACCOUNT NUMBER
A • • • • • • • address i ••
(25)BILLING ACCOUNT NUMBER for SecurID Token: A1130092030
(26)ACCESS TYPE: SecurID VPN
Adaptive Authentication VPN ❑
SECURITY STATEMENT
Before connecting to the County network you must install anti-virus software, and stay up-to-date with definitions, Microsoft patches (critical and
security)and service packs. A Firewall,either a hardware firewall or personal firewall software,is required for those using broadband Internet access
(DSL,ISDN,cable modem,etc.). You agree not to share your logon id,password and SecurID passcode with others.
SIGNATURES —each signature entry must be completed in full.
Your signature indicates that you have read and will comply with the above security statement.
(27)CUSTO N RE: w
mm/,0, 10-524-2307 Mona Shilling, Deputy City Clerk II 12/20/17
..._ ......_ ._... 3m..... ......_... mm.. . .. ....., ......... __...._......___. __
(2 -" .. W � R� �� DEP'ARTMEN ' S NAME (3VDA(29)P NE• (3[I)P8) 0 T"Y r" i1"I" N TU � MAN ER(32)ISDIAPPLICATION CO RDINATOR a SIGNATURE (33)PHONE# (34)PRINT ISDIAPPUCATION COORDINATORS'NAME (3
WARNING:FAILURE TO FULLY COMPLETE&SIGN THIS FORM WILL CAUSE A DELAY IN PROCESSING.
You may submit completed registration form to ISDELO istlration0is0agountl/,00V or ISD
Registration office at 9150 E. Imperial Hwy, Downey, CA 90242 Mail Stop #29 to process.
For any questions related to registration please call (562) 658-1881.
Revised:October 2015
Downey Data Center Registration Instructions
For Contractors/Vendors Agreement No. 5441
Profile Information - print or type
1. Mandatory. Enter the current date.
2. Mandatory. Check appropriate type of request.
3. Mandatory. Enter your contract or vendor number.
4. Mandatory. Print your last name, first name and middle initial.
5. Mandatory. Enter your e-mail address.
6. Mandatory. Enter your company/organization name.
7. Mandatory. Enter the coordinating L.A. County department name or number.
8. Mandatory. Enter your complete business mailing address.
9. Mandatory. Enter your complete telephone number.
New logon ids will be created as follows:
Contractor/Vendor LOGON ID will be assigned and you will be notified by phone (e.g. Cxxxxxx).
IBM Data Center Access
10. Mandatory. Enter your existing logon id. If this is a new request, your logon id will be assigned as described above.
11. Mandatory. Enter the two-digit department major group code, as defined by L.A. County management.
12. Mandatory. Enter the two-digit local security group code, as defined by L.A. County management.
TSO Access - check box if this request applies to TSO access
13. Mandatory. Enter the two-digit identifier of your TSO group, as defined by L.A. County management.
14. Optional. Enter the two-character identifier, as defined by L.A. County management.
15. Optional. Enter the two-character identifier, as defined by L.A. County management.
16. Optional. Enter the two-character identifier, as defined by L.A. County management.
Online Access- check box if this request applies to online access
17. Mandatory. Enter each CICS online or IMS system application required for access, as defined by L.A. County management.
18. Mandatory Enter the group name for each system application, as defined by L.A. County management.
19. Optional. Enter the old Natural group/profile name.
UNIX Environment Access - complete for required access as defined by L.A. County management
20. Mandatory. Check appropriate type of request.
21. Mandatory. Enter your existing Logon ID. If this is a new request, your logon id will be assigned as described above.
22. Mandatory. Enter the application you require for access, as defined by L.A. County management.
23. Mandatory. Enter your UNIX access group.
24. Optional. Enter a valid 11-digit billing account number.
SecurID Remote Access - complete for required access as defined by L.A. County management.
25. Mandatory. Enter a valid L.A. County 11-digit billing account number.
26. Mandatory. Check box for device type.
VPN customers must check the box and indicate compliance. Anti-virus software and stay up-to-date with
definitions, patches and service packs applies to everyone. A Firewall, either a hardware firewall or personal
firewall software, is required for those using broadband Internet access (DSL, ISDN, cable modem, etc.).
Signatures - original signatures are required
27. Mandatory. Your signature indicates that you have read and will comply with the security statement.
28. -31. Mandatory. Enter signature, phone#and date of authorizing L.A. County department manager(sign and print)
32. -35. Mandatory. Enter signature, phone#and date of ISD manager or application coordinator(sign and print).
Revised:October 2015
Agreement No. 5441
COUNTY OF LOS ANGELES
AGREEMENT FOR ACCEPTABLE USE
AND
CONFIDENTIALITY OF
COUNTY INFORMATION TECHNOLOGY RESOURCES
ANNUAL
As a County of Los Angeles (County) employee, contractor, subcontractor, volunteer, or other
authorized user of County information technology (IT) resources, I understand that I occupy a
position of trust. Furthermore, I shall use County IT resources in accordance with my
Department's policies, standards, and procedures. I understand that County IT resources shall not
be used for:
• For any unlawful purpose;
• For any purpose detrimental to the County or its interests;
a For personal financial gain;
• In any way that undermines or interferes with access to or use of County IT resources for
official County purposes;
In any way that hinders productivity, efficiency, customer service, or interferes with a
County IT user's performance of his/her official job duties;
I shall maintain the confidentiality of County IT resources (e.g., business information, personal
information, and confidential information).
This Agreement is required by Board of Supervisors Policy No. 6.101 — Use of County
Information Technology Resources, which may be consulted directly at website
ltd �f ITct icy Co.la.ca.LIS/6.10I.htm.
As used in this Agreement, the term "County IT resources" includes, without limitation,
computers, systems, networks, software, and data, documentation and other information, owned,
leased, managed, operated, or maintained by, or in the custody of, the County or non-County
entities for County purposes. The definitions of the terms "County IT resources", "County IT
user", "County IT security incident", "County Department", and "computing devices" are fully
set forth in Board of Supervisors Policy No. 6.100—Information Technology and Security Policy,
which may be consulted directly at website lrttw//CouIIIV11oIicy.co..l..,a,,.,aj,j.s/6J 00..1tt.rn. The terms
"personal information" and "confidential information" shall have the same meanings as set forth
in Board of Supervisors Policy No. 3.040—General Records Retention and Protection of Records
Containing Personal and Confidential Information, which may be consulted directly at website
LILtp://co UntN'raAhc °. er.la.ca.us/3.040.htin.
As a County IT user, I agree to the following:
1. Computer crimes: I am aware of California Penal Code Section 502(c)—Comprehensive
Computer Data Access and Fraud Act (set forth, in part, below). I shall immediately
report to my management any suspected misuse or crimes relating to County IT resources
or otherwise.
2. No I_'x atlon of Privacy: I do not expect any right to privacy concerning my activities
related to County IT resources, including, without limitation, in anything I create, store,
send, or receive using County IT resources. I understand that having no expectation to
HOA.1044333.1 Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015
Agreement No. 5441
any right to privacy includes, for example,that my access and use of County IT resources
may be monitored or investigated by authorized persons at any time, without notice or
consent.
3. Activities_related to rrnty FF resources: I understand that my activities related to
County IT resources (e.g., email, instant messaging, blogs, electronic files, County
Internet services, and County systems) may be logged/stored,may be a public record, and
are subject to audit and review, including, without limitation, periodic monitoring and/or
investigation, by authorized persons at any time. I shall not either intentionally, or
through negligence, damage, interfere with the operation of County IT resources. I shall
neither, prevent authorized access, nor enable unauthorized access to County IT resources
responsibly, professionally, ethically, and lawfully.
4. Countv IT securitv incident revorting: I shall notify the County Department's Help Desk
and/or Departmental Information Security Officer (DISO) as soon as a County IT
security incident is suspected.
5. Secuilty access controls: I shall not subvert or bypass any security measure or system
which has been implemented to control or restrict access to County IT resources and any
related restricted work areas and facilities. I shall not share My,�Lt>tr ptrter' identification
codes and other authentication mechanisms (e.L.....
,agt117 identilication 1"11.: 1, computer
access codes �r�,COUllt ....codes,_pass\vords. SecurlD cards/tokens, biometric wlogtar7� �itd
6. Passwords: I shall not keep or maintain any unsecured record of my password(s) to
access County IT resources, whether on paper, in an electronic file, or otherwise. I shall
comply with all County and County Department policies relating to passwords. I shall
immediately report to my management any compromise or suspected compromise of my
password(s) and have the password(s) changed immediately.
7. Business oursioses: I shall use County IT resources in accordance with my Department's
policies, standards, and procedures.
8. Coulidentiality: I shall not send, disseminate, or otherwise expose or disclose to any
person or organization, any personal and/or confidential information, unless specifically
authorized to do so by County management. This includes, without limitation
information that is subject to Health Insurance Portability and Accountability Act of
1996, Health Information Technology for Economic and Clinical Health Act of 2009, or
any other confidentiality or privacy legislation.
9. Computer virus and other malicious devices: I shall not intentionally introduce any
malicious device (e.g., computer virus, spyware, worm, key logger, or malicious code),
into any County IT resources. I shall not use County IT resources to intentionally
introduce any malicious device into any County IT resources or any non-County IT
systems or networks. I shall not disable, modify, or delete computer security software
(e.g., antivirus software, antispyware software, firewall software, and host intrusion
prevention software) on County IT resources. I shall notify the County Department's
Help Desk and/or DISO as soon as any item of County IT resources is suspected of being
compromised by a malicious device.
HOA.1044333.1 Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015
Agreement No. 5441
10. 011i::rlsive materials: I shall not access, create, or distribute(e.g., via email) any offensive
materials (e.g., text or images which are sexually explicit, racial, harmful, or insensitive)
on County IT resources (e.g., over County-owned, leased, managed, operated, or
maintained local or wide area networks; over the Internet; and over private networks),
unless authorized to do so as a part of my assigned job duties (e.g., law enforcement). I
shall report to my management any offensive materials observed or received by me on
County IT resources.
11. Internet: I understand that the Internet is public and uncensored and contains many sites
that may be considered offensive in both text and images. I shall use County Internet
services in accordance with my Department's policies and procedures. I understand that
my use of the County Internet services may be logged/stored, may be a public record, and
are subject to audit and review, including, without limitation, periodic monitoring and/or
investigation, by authorized persons at any time. I shall comply with all County Internet
use policies, standards, and procedures. I understand that County Internet services may be
filtered, but in my use of them, I may be exposed to offensive materials. I agree to hold
County harmless from and against any and all liability and expense should I be
inadvertently exposed to such offensive materials.
12. Electronic Communications: I understand that County electronic communications (e.g.,
email, text messages, etc.) created, sent, and/or stored using County electronic
communications systems/applications/services are the property of the County. All such
electronic communications may be logged/stored, may be a public record, and are subject
to audit and review, including, without limitation, periodic monitoring and/or
investigation, by authorized persons at any time, without notice or consent. I shall
comply with all County electronic communications use policies and use proper business
etiquette when communicating over County electronic communications
systems/applications/services.
13. 1'11b1ic lormns: I shall only use County IT resources to create, exchange, publish,
distribute, or disclose in public forums (e.g., blog postings, bulletin boards, chat rooms,
Twitter, Facebook, MySpace, and other social networking services)any information(e.g.,
personal information, confidential information, political lobbying, religious promotion,
and opinions) in accordance with Department's policies, standards, and procedures.
14. Internet storau sites: I shall not store County information (i.e., personal, confidential
(e.g., social security number, medical record), or otherwise sensitive (e.g., legislative
data)) on any Internet storage site in accordance with Department's policies, standards,
and procedures.
15. Copiahted and other prot3rietary,materials: I shall not copy or otherwise use any
copyrighted or other proprietary County IT resources (e.g., licensed software and
documentation, and data), except as permitted by the applicable license agreement and
approved by designated County Department management. I shall not use County IT
resources to infringe on copyrighted material.
16. Co M 1M1_ c w 1 11 C"c�til�:t:v...o-diiijntc s.., 1tiles, reatiLatimis, wlicies, l�rocc(hir�es,_.I�.�:N..ietLfimles,
dlJAc trvq.5�!rdd mveem nts: I shall comply with all applicable County ordinances, rules,
regulations, policies, procedures, guidelines, directives, and agreements relating to
County IT resources. These include, without limitation, Board of Supervisors Policy No.
6.100 — Information Technology and Security Policy, Board of Supervisors Policy No.
HOA 1044333113oard of Supervisors Policy No. 6.101 Attachment Revised:January 2015
Agreement No. 5441
6.101 — Use of County Information Technology Resources, and Board of Supervisors
Policy No. 3.040 — General Records Retention and Protection of Records Containing
Personal and Confidential Information.
17. Q"isci,jLHq v): ggfl n and other actions and t)enallics fir non-coinilliancae: I understand that
my non-compliance with any provision of this Agreement may result in disciplinary
action and other actions (e.g., suspension, discharge, denial of access, and termination of
contracts) as well as both civil and criminal penalties and that County may seek all
possible legal redress.
CALIFORNIA PENAL CODE SECTION 502(c)
"COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT"
Below is a section of the "Comprehensive Computer Data Access and Fraud Act" as it
pertains specifically to this Agreement. California Penal Code Section 502(c) is
incorporated in its entirety into this Agreement by reference, and all provisions of Penal
Code Section 502(c) shall apply. For a complete copy, consult the Penal Code directly at
website www.letjnf6,ca,aov/.
502(c)Any person who commits any of the following acts is guilty of a public offense:
(1) Knowingly accesses and without permission alters, damages, deletes,
destroys, or otherwise uses any data, computer, computer system, or
computer network in order to either(A)devise or execute any scheme or
artifice to defraud, deceive, or extort, or(B)wrongfully control or obtain
money, property, or data.
(2) Knowingly accesses and without permission takes, copies, or makes use of
any data from a computer, computer system, or computer network, or takes
or copies any supporting documentation, whether existing or residing internal
or external to a computer, computer system, or computer network.
(3) Knowingly and without permission uses or causes to be used computer
services.
(4) Knowingly accesses and without permission adds, alters, damages, deletes,
or destroys any data, computer software, or computer programs which reside
or exist internal or external to a computer, computer system, or computer
network.
(5) Knowingly and without permission disrupts or causes the disruption of
computer services or denies or causes the denial of computer services to an
authorized user of a computer, computer system, or computer network.
(6) Knowingly and without permission provides or assists in providing a means
of accessing a computer, computer system, or computer network in violation
of this section.
(7) Knowingly and without permission accesses or causes to be accessed any
computer, computer system, or computer network.
HOA.1044333.1Board of Supervisors Policy No. 6.101 Attachment Revised: January 2015
Agreement No. 5441
(8) Knowingly introduces any computer contaminant into any computer,
computer system,or computer network.
(9) Knowingly and without permission uses the Internet domain name of another
individual,corporation,or entity in connection with the sending of one or
more electronic mail messages,and thereby damages or causes damage to a
computer,computer system,or computer network.
I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT:
Mona F. Shilling 0 19P
County IT User's Name Co 111%j`. Ne s Sign Wre
Deputy City Clerk IV#35920 1 120/17
County IT Users _ ...., Number.w..
' Employee/IDr Date
Greg Carpenter
Manager's Name.... lay..... a s..F..igAtatt.
m wre
City Manager 12 7
anag Title Date. .........
DAY L
tioxio u.tBoard of Supervisors Policy No.6.101 Attachment Revised:January 2015
Agreement No. 5441
CALIFORNIA PENAL CODE 502(c)-
"COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT"
Below is a section of the"Comprehensive Computer Data Access and Fraud Act" as it pertains specifically
to this Agreement. California Penal Code 502(c) is incorporated in its entirety into this Agreement by
reference and all provisions of Penal Code 502(c) apply. For a complete copy, consult the Code directly at
website www.leeinfo.ca.gov/.
502.(c) Any person who commits any of the following acts is guilty of a public offense:
(1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses
any data, computer, computer system, or computer network in order to either(A)devise or execute
any scheme or artifice to defraud, deceive, or extort, or (B) wrongly control or obtain money,
property, or data.
(2) Knowingly accesses and without permission takes, copies or makes use of any data from a
computer, computer system, or computer network, or takes or copies supporting documentation,
whether existing or residing internal or external to a computer, computer system, or computer
network.
(3) Knowingly and without permission uses or causes to be used computer services.
(4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data,
computer software, or computer programs which reside or exist internal or external to a computer,
computer system,or computer network.
(5) Knowingly and without permission disrupts or causes the disruption of computer services or
denies or causes the denial of computer services to an authorized user of a computer, computer
system, or computer network.
(6) Knowingly and without permission provides or assists in providing a means of accessing a
computer, computer system,or computer network is in violation of this section.
(7) Knowingly and without permission accesses or causes to be accessed any computer, computer
system, or computer network.
(8) Knowingly introduces any computer contaminant into any computer, computer system, or
computer network.
I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT:
Mona F. Shilling, Deputy City Clerk , 14 'ry^ 12/19/17
Employee's Name 17--)
)lo' nIture Date
Greg Carpenter, City Manager 12/19/17
Manager's Name 1Ml10 c Date
�' ;ATORNEY
�"T` FORM.CCT
Board of Supervisors Policy#6.101 Attachment Revised: July 2004
Agreement No. 5441
COUNTY'S INFORMATION TECHNOLOGY ASSETS,
COMPUTERS,NETWORKS,SYSTEMS AND DATA
As a Los Angeles County employee, contractor, vendor or other authorized user of County Information Technology
(IT) assets including computers, networks, systems and data, I understand that I occupy a position of trust. I will use
County IT assets for County management approved business purposes only and maintain the confidentiality of County's
business and Citizen's private data. As a user of County's IT assets,I agree to the following:
1. t„"ont,11utc.p:....cH,iries: I am aware of California Penal Code 502(c) - Comprehensive Computer Data
Access and Fraud Act(attached). I will immediately report any suspected computer misuse or crimes
to my Management.
2. Security iwC ss c„olp„I„rol,s: I will not subvert or bypass any security measure or system which has been
implemented to control or restrict access to computers,networks, systems or data. I,_.w,ill not shah e...illy
llaaugluatea° idlcu�ti ioaxtia>a7 ealcf (11w1d-iuu III, ea°muatllugt .e:. <wo, CS Code " aaclworoalll c•odcs, ID's..w4a� zri:
passwords.
3. Illll;K,1,w,^cta;ia�l. ,IjktrjLos%gs: I will use the County's Information Technology (IT) assets including
computers,networks,systems and data for County management approved business purposes only.
4. (";c�uW�Imclti.aaaiarlity: I will not access or disclose any County program code, data, information or
documentation to any individual or organization unless specifically authorized to do so by the
recognized information owner.
5. Cml'„.".i„1 utcr vims and malicious.-Sti(J.c: I will not intentionally introduce any computer virus, worms or
aluaalicious code into ally County computcr, network, system or data. I will not disable or delete
o:°oraapuuter virus detectioart and cradication s,o tware on County computers, servers and other computing
dcviccs I am respollsiblc 161'.
6. 011*cnsivc malcriaals: I will not access or send any offensive materials, e.g., sexually explicit, racial,
harmful or insensitive text or images, over County owned, leased or managed local or wide area
networks, including the public Internet and other electronic mail systems, unless it is in the
performance of my assigned job duties, e.g., law enforcement. I will report to my supervisor any
offensive materials observed by me or sent to me on County systems.
7. Public Internet: I understand that the Public Internet is uncensored and contains many sites that may be
considered offensive in both text and images. I will use County Internet services for approved County
business purposes only, e.g., as a research tool or for electronic communication, I understand that the
County's Internet servicesmaybe faltered but in my use of them I may be exposed to offensive
materials. I agree to hold the County harmless should I be inadvertently exposed to such offensive
materials. I understand that my Internet activities may be logged,are a public record,and are subject to
audit and review by authorized individuals.
8. Elcclronic,rnalll-land ollrer ciwrotnic data: I understand that County electronic mail (e-mail), and data,
in either electronic or other forms, are a public record and subject to audit and review by authorized
individuals. I will comply with County e-mail use policy and use proper business etiquette when
communicating over e-mail systems.
9. Copyrighted allaateriawls: I will not copy any licensed software or documentation except as permitted by
the license agreement.
10. Disci llina l aaclion foraucyru-cauarul�li�arr,l.�: I understand that my non-compliance with any portion of this
Agreement may result in disciplinary action including my suspension, discharge, denial of service,
cancellation of contracts or both civil and criminal penalties.
Board of Supervisors Policy#6.101 Attachment Revised: July 2004