Download presentation
Presentation is loading. Please wait.
Published byPhilomena Carroll Modified over 8 years ago
1
Privacy & Security at a Public Entity Randy Snyder, CNE randys@co.warren.ia.us Director of Data Processing Warren County Iowa 515-961-1135
2
Importance of Public Entity Public Trust Sense of Security Continuity of Government Public Records Community Services
3
Public Records Defined Open Records Iowa Code Chapter 22 "public records" includes all records, documents, tape, or other information, stored or preserved in any medium, of or belonging to this state or any county
4
Requirements of Open Records Public Access Availability to Copy Records while in possession Access without charge Additional Access or Copying with a Charge Attorney General Opinions
5
Some Exceptions Medical Records County Attorney Work Products Investigative Reports to Sheriff office Some Personnel related information
6
Attorney General Reasonable charges for copying GIS Data Excluded http://www.state.ia.us/government/ag/index.html http://www.westlaw.com/iowaag/index.html
7
Privacy Perception and Reality Decisions on Accessibility of Public Information Searchable features of Public Information Ease of Use vs. Close Control
8
Security Defined Authentication Authorization Information Integrity Accessibility Accountability
9
Authentication Individual User Names Strong Passwords Small Letters (a-z) Capital Letters (A-Z) Numbers (0-9) Special Characters (!@#) Secure Login Periodic Password Changes (90-120 days) Lockout on Invalid attempts (3)
10
Authorization To ensure only those individuals who are authorized to access or edit data is able to. Separation of duties in County Government. Helps ensure the Integrity of Public Data.
11
Information Integrity Information that can be relied on. Protected against unauthorized changes in data. Uncorrupted information.
12
Accessibility Up-time Data Available when needed The cost of Lost Data Support and Recovery Productivity Revenue Recovery
13
Accountability The checks and balances part of the equation. Audit Logs and Trails.
14
Technologies Employed Antivirus Software Norton Corporate Backup Software Veritas Backup Exec Cisco Router w/Firewall RAID Disk Storage Battery Backup Authentication & Authorization Windows 2000 AD Accountability NT Logs Audit Wizard Redundant Services
15
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.