Download presentation
Presentation is loading. Please wait.
1
IT GOVERNANCE COMMITTEE MEETING February 19, 2008
3
IT GOVERNANCE COMMITTEE MEETING February 19, 2008
4
PROJECT UPDATE What’s going on in Catawba County……………..
5
PROJECT UPDATE What’s going on in Catawba County…………….. E911 Telephone Replacement E911 CAD Upgrade E911 Mapping Project AVL and Mobile for EMS and Law Enforcement Emergency Services Badging Maintenance Work Order System Unified Payment System
6
PROJECT UPDATE What’s going on in Catawba County…………….. eConnect/Tidemark Replacement Tax Mapping Project Land Records Upgrade Internet Bandwidth Increase Wireless Connectivity Firewall Upgrade SAN Expanded CAS (Citizens Alert System)
7
PROJECT UPDATE What’s going on in Catawba County…………….. Local Update of Census Addresses(LUCA) PeopleSoft Enterprise Initiative – Special Needs/Critical Care Database – Portal Implementation – Workflow Implementation – Online Expense Reporting Day to Day – Keep it Running Webpage…….Update…….Again………
8
? ? ? ? ? ? ? PROJECT UPDATE What’s going on in Catawba County……………..
9
View New York City Headquarters in the Positive
10
Reception……………..
11
Cafeteria
12
snack stations throughout Micro kitchens &
13
Writer Elizabeth Gilbert talks about her latest book Eat, Pray, Love
14
Office Space…………..
15
Massage chair…………. …………………….in gaming area
16
Google Engineer of the Future Creativity training……….
17
Bouncing an exercise ball….
18
Work Space…………..
19
Massages too??????
20
View What can we learn from …… in the Positive
21
MOBILE COMPUTER EQUIPMENT POLICY Protecting Our Resources……………..
22
The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use
23
Government Attack Trends from 2007 Government accounted for 26 percent of data breaches that could lead to identity theft. Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information. The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting, such as a USB key. Hacking was responsible for 73 percent of identities exposed during the period. 36% of the top attacks were SMTP-based. 46% of malicious code that propagated did so in email attachments www.symantec.com/ISTR2007
25
A laptop containing thousands of people's personal information is missing in Cabarrus County They don’t know if it was stolen or destroyed in traffic contains names, address, phone numbers and social security numbers of approximately 28,000 people
26
The identity theft risk from a stolen Wake County EMS laptop is far worse than originally estimated 5,000 people whose personal information -- including Social Security numbers, addresses and ages -- included personal information of more than 3,400 EMS and firefighters from across the county Wake EMS officials waited eight days to officially report the loss to WakeMed police
27
Implications…… Government records are a big source of identity threat and we must recognize that fact. Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. Mobile devices require special security training. Training in security practices needs to be ongoing. Security practices will at times be a burden but users must understand the importance.
28
MOBILE COMPUTER EQUIPMENT POLICY Reviewing the Draft…………….. Issues
29
? Reviewing the Draft…………….. Hands-free devices, how do they fit in? (ie, inspectors with cell phones) Streaming of non-business related news, music, ballgames – Should it be added Employees sharing equipment on an infrequent basis. Guest speakers using equipment “Employee use cannot be in violations with good public policy or employment” What does that mean? DOES THE POLICY ADDRESS THE ISSUES?
30
Reviewing the Draft…………….. Issues
31
IT NEXT MEETING – MARCH 20TH Notice the Time Change: 2:30 Time Change for April: 1:30 – 3:00 TIME CHANGE FOR APRIL 17TH
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.