Browse
Search
Agenda 08-26-2025; 8-d - Adoption of Program and General Records Retention and Disposition Schedules for Local Government Agencies
OrangeCountyNC
>
BOCC Archives
>
Agendas
>
Agendas
>
2025
>
Agenda - 08-26-2025 Business Meeting
>
Agenda 08-26-2025; 8-d - Adoption of Program and General Records Retention and Disposition Schedules for Local Government Agencies
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/21/2025 11:54:26 AM
Creation date
8/21/2025 11:32:20 AM
Metadata
Fields
Template:
BOCC
Date
8/26/2025
Meeting Type
Business
Document Type
Agenda
Agenda Item
8-d
Document Relationships
Agenda for August 26, 2025 BOCC Meeting
(Message)
Path:
\BOCC Archives\Agendas\Agendas\2025\Agenda - 08-26-2025 Business Meeting
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
242
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
184 <br /> 2021 GENERAL RECORDS SCHEDULE: LOCAL GOVERNMENT AGENCIES ;n NATURA AND <br /> OF <br /> ����� NATURAL AND CULTURAL RESOURCES <br /> STANDARD 5:INFORMATION TECHNOLOGY RECORDS <br /> ITEM# <br /> RECORDS SERIES TITLE DISPOSITION INSTRUCTIONS CITATION <br /> 5.08 INFORMATION TECHNOLOGY ASSISTANCE RECORDS Destroy in office 1 year after work is completed. <br /> Records documenting troubleshooting and problem- <br /> solving assistance provided by agency information <br /> systems personnel to users of the systems. Includes <br /> help desk assistance requests,resolution records,and <br /> related documentation. <br /> cn <br /> 5.09 NETWORK AND SYSTEM SECURITY RECORDS a) Destroy in office finalized cyber incident reports 5 years Confidentiality: <br /> c <br /> Records documenting cybersecurity efforts. Includes after resolution. G.S. 132-6.1( ) <br /> t records concerning firewalls,anti-virus programs, <br /> b) Destroy in office after 2 years records documenting <br /> intruder scanning logs,and other related records. incidents involving unauthorized attempted entry or <br /> probes on data processing systems, IT systems, <br /> telecommunications networks,and electronic security <br /> systems. <br /> c) Destroy in office after 1 year records concerning firewalls, <br /> anti-virus programs,and other related records. <br /> 5.10 NETWORK DIAGRAMS Destroy in office when superseded or obsolete. Confidentiality: <br /> �^ Records documenting the logical and physical <br /> G.S. 132-6.1(c) <br /> t relationships of network components for purposes of <br /> organization,deployment,troubleshooting, <br /> monitoring of access,and management of day-to-day <br /> operations. <br /> * No destruction of records may take place if audits or litigation are pending or reasonably anticipated. See AUDITS, LITIGATION, AND OTHER OFFICIAL <br /> ACTION,page A-5. <br /> t The agency hereby agrees that it will establish and enforce internal policies setting minimum retention periods for the records that Natural and Cultural <br /> Resources has scheduled with the disposition instruction "destroy when reference value ends." Please use the space provided. <br /> 63 <br />
The URL can be used to link to this page
Your browser does not support the video tag.