Browse
Search
2022-077-E-IT Dept-PUBLIC LIBRARY ASSOCIATION, a divison of the American Library Association-Digital learning
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2020's
>
2022
>
2022-077-E-IT Dept-PUBLIC LIBRARY ASSOCIATION, a divison of the American Library Association-Digital learning
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/23/2022 3:05:36 PM
Creation date
2/23/2022 3:00:56 PM
Metadata
Fields
Template:
Contract
Date
2/15/2022
Contract Starting Date
2/15/2022
Contract Ending Date
2/23/2022
Contract Document Type
Contract
Amount
$15,000.00
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
106
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID:24BBAFA9-CD81-4144-ACEF-E9036E703739 <br /> 17. Does the contract require the cloud vendor to notify the County of any outsourced <br /> functionality and its provider? <br /> N/A <br /> If No, Explain: Click here to enter text. <br /> 1 S. What are the contractually required notification period for the County or the cloud vendor <br /> for termination of the cloud services? <br /> 30 Days Notice <br /> 19. Describe how the County's data will be stored, managed and archived. <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> 20. Will the County's data be stored and managed on a storage system with other data? <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> If Yes, Explain: Click here to enter text. <br /> 21. At what architectural point in the provider's cloud facility will the County's data be <br /> physically connected to networking equipment with non-County data? <br /> N/A There is no private or confidential County data stored on vendor's servers. <br /> 22. What are the cloud provider's information security policies? <br /> Jende Solutions operations, systems and the industry are constantly changing. New threats are routinely <br /> introduced to our environment through systems and operations changes as well as periodic changes in <br /> our staff. To enforce existing security program criteria as well as identify new threats, Jende Solutions <br /> must routinely measure the effectiveness and compliance of its information security program. <br /> Policy Statement <br /> Jende Solutions will monitor, measure, and evaluate the effectiveness, adequacy, and compliance with its <br /> information security program and make adjustments to the program as needed to adequately manage <br /> data security risks. This is accomplished by actively performing ongoing system security reviews. <br /> Reviews will be performed by Information Technology department staff, the Chief Information Security <br /> Officer (CISO), Jende Solutions Internal Audit, and Jende Solutions's auditors or regulators. Summary <br /> reports of the effectiveness, adequacy, and compliance will be made periodically to the Security/IT <br /> Steering Committee, Jende Solutions Executive Leadership Team, and the Board of Directors. The <br /> reports will also discuss changes and additions to the company's information security program deemed <br /> advisable to properly protect information assets. <br /> Applicability <br /> This policy will be enforced by company management and the Security/IT Steering Committee. The scope <br /> of audits will impact all managers regarding staff training, risk management and effectiveness of security <br /> controls. <br /> Standards <br />
The URL can be used to link to this page
Your browser does not support the video tag.