Browse
Search
Agenda - 12-11-2008 - 7a late
OrangeCountyNC
>
Board of County Commissioners
>
BOCC Agendas
>
2000's
>
2008
>
Agenda - 12-11-2008
>
Agenda - 12-11-2008 - 7a late
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/9/2008 4:11:20 PM
Creation date
12/9/2008 4:11:16 PM
Metadata
Fields
Template:
BOCC
Date
12/11/2008
Meeting Type
Regular Meeting
Document Type
Agenda
Agenda Item
7a late
Document Relationships
Minutes - 20081211
(Linked From)
Path:
\Board of County Commissioners\Minutes - Approved\2000's\2008
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
26
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Orange County Information Technologies Strategic Plan <br />Data Retention <br />See "Data retention" for information on data backup and <br />recovery. <br />Security Initiatives <br />Orange County IT needs to develop a comprehensive <br />network security plan. While critical components are <br />already in place, including: <br />• Firewall protection against intruders and inappropriate <br />use <br />• Secure login policies with enforcement <br />• Spam filtering <br />• Email filtering of viruses <br />• Desktop virus protection <br />• Desktop controls and monitoring <br />• Secure off-site storage of backup media <br />• Server-level virus protection <br />These components have been developed in ad hoc <br />response to various emerging threats. The need for an <br />overarching security plan is acute. <br />Orange County IT must evolve its security policy which <br />accommodates growth of applications, access and user <br />needs, while anticipating the growing sophistication of <br />threats. <br />Disaster Recovery and Business Continuity <br />While several initiatives have been undertaken to react to <br />a variety of disasters (see section titled, Business <br />continuity on page 6), there is no comprehensive plan for <br />ensuring critical technology systems are available during <br />and after disasters. <br />The IT organization must continue work with the <br />Emergency Services department to: <br />• conduct an audit of critical systems <br />20 <br />Page 19 of 25 12/1/2008 <br />
The URL can be used to link to this page
Your browser does not support the video tag.