Orange County NC Website
DocuSign Envelope ID:24BBAFA9-CD81-4144-ACEF-E9036E703739 <br /> 17. Does the contract require the cloud vendor to notify the County of any outsourced <br /> functionality and its provider? <br /> N/A <br /> If No, Explain: Click here to enter text. <br /> 1 S. What are the contractually required notification period for the County or the cloud vendor <br /> for termination of the cloud services? <br /> 30 Days Notice <br /> 19. Describe how the County's data will be stored, managed and archived. <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> 20. Will the County's data be stored and managed on a storage system with other data? <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> If Yes, Explain: Click here to enter text. <br /> 21. At what architectural point in the provider's cloud facility will the County's data be <br /> physically connected to networking equipment with non-County data? <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> 22. What are the cloud provider's information security policies? <br /> Jende Solutions operations, systems and the industry are constantly changing. New threats are routinely <br /> introduced to our environment through systems and operations changes as well as periodic changes in <br /> our staff. To enforce existing security program criteria as well as identify new threats, Jende Solutions <br /> must routinely measure the effectiveness and compliance of its information security program. <br /> Policy Statement <br /> Jende Solutions will monitor, measure, and evaluate the effectiveness, adequacy, and compliance with its <br /> information security program and make adjustments to the program as needed to adequately manage <br /> data security risks. This is accomplished by actively performing ongoing system security reviews. <br /> Reviews will be performed by Information Technology department staff, the Chief Information Security <br /> Officer (CISO), Jende Solutions Internal Audit, and Jende Solutions's auditors or regulators. Summary <br /> reports of the effectiveness, adequacy, and compliance will be made periodically to the Security/IT <br /> Steering Committee, Jende Solutions Executive Leadership Team, and the Board of Directors. The <br /> reports will also discuss changes and additions to the company's information security program deemed <br /> advisable to properly protect information assets. <br /> Applicability <br /> This policy will be enforced by company management and the Security/IT Steering Committee. The scope <br /> of audits will impact all managers regarding staff training, risk management and effectiveness of security <br /> controls. <br /> Standards <br />