My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2009/04/22 Council Agenda Packet
>
Council Agenda Packets
>
2009
>
2009/04/22 Council Agenda Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/7/2017 8:57:55 AM
Creation date
4/7/2017 8:57:32 AM
Metadata
Fields
Template:
Council Agenda Packet
Date
4/22/2009
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
88
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
2. Ensure complete and secure destruction of paper documents and computer files <br /> containing customer information; <br /> 3. Ensure that office computers are password protected and that computer screens can be <br /> locked; <br /> 4. Keep offices clear of papers containing customer information; <br /> 5. Ensure computer virus protection is up to date; and <br /> 6. Require and keep only the kinds of customer information that are necessary for utility <br /> purposes. <br /> Internal Controls Regarding Identifying Information <br /> 1. Information Collected <br /> The following identifying information may be collected by the Utility: <br /> a. Name <br /> b. Service Address <br /> c. Mailing Address <br /> d. Telephone Number <br /> 2. Collection Methods <br /> Customer personal identifying information will generally be collected by: <br /> a. Presentation by customer at the office <br /> b. Telephone <br /> c. Internet, email, fax, or other electronic means <br /> d. Mail <br /> 3. Access to Personal Information <br /> a. File cabinets containing personally identifiable information that are not located in <br /> the Utility Services office will be stored in a locked room. <br /> b. The list of people who have access to the Utility Services area where the files are <br /> kept, access to the Utility Services Storage area where the files are kept, or access <br /> to the Utility Services Billing system will be reviewed. <br /> c. Visitors who must enter areas where sensitive files are kept must be escorted by <br /> an authorized employee. <br /> d. No visitor will be given any entry codes or allowed unescorted access through the <br /> office. <br /> 4. General Network Security <br /> a. General network security and firewalls will be managed by the Information <br /> Technology department. <br /> f” <br /> 6 <br />
The URL can be used to link to this page
Your browser does not support the video tag.