Browse
Search
Agenda - 02-17-2009 - 6d
OrangeCountyNC
>
Board of County Commissioners
>
BOCC Agendas
>
2000's
>
2009
>
Agenda - 02-17-2009
>
Agenda - 02-17-2009 - 6d
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/22/2016 9:32:32 AM
Creation date
2/16/2009 4:28:31 PM
Metadata
Fields
Template:
BOCC
Date
2/17/2009
Meeting Type
Regular Meeting
Document Type
Agenda
Agenda Item
6d
Document Relationships
Minutes - 20090217
(Linked From)
Path:
\Board of County Commissioners\Minutes - Approved\2000's\2009
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
28
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Orange County Information Technologies Strategic Plan 21 <br /> • determine current exposure for ensuring availability <br /> of critical systems during: <br /> o short and long-term electrical failure <br /> o short and long-term interruptions in internet <br /> availability <br /> o relocation of services to emergency facilities <br /> • determine plan for remote storage and retrieval of <br /> critical County information <br /> • evaluate methods for addressing the above <br /> findings, including: <br /> o cost information <br /> o partnerships with peer governments for <br /> support during localized emergencies <br /> o partnerships with vendors capable of <br /> providing interim solutions during <br /> emergencies <br /> Information Technologies should bring in an external <br /> security auditing firm, as well as security consultants to <br /> enact network changes and policies to ensure the <br /> evolution of security in proportion to growing security <br /> threats. <br /> Enterprise Wide OCIT Standards <br /> With the exception of the PC Replacement Program, <br /> Orange County's historical approach to upgrading <br /> technology has been largely reactive. In addition, <br /> application selections have involved IT as a final step in <br /> the purchasing process, providing little influence other <br /> than an approval/disapproval for even large scale <br /> applications. <br /> This has resulted in a de facto architecture which has <br /> confounded efforts to standardize on specific <br /> technologies, which in turn results in: <br /> Page 20 of 25 2/9/2009 <br />
The URL can be used to link to this page
Your browser does not support the video tag.