2000 - Los Angeles County - Downey Data Centers Information Technology (VIMS) Print Form
arm"^c;` COUNTY OF LOS ANGELES
LOS ANGELES COUNTY
. DOWNEY DATA CENTER
SECURID TOKEN RENEWAL
;,o„„,' For CONTRACTOR or VENDOR , ,,;,,,
PROFILE INFORMATION—print or type
DATE OF REQUEST LOGON ID(C#) E-MAIL ADDRESS TOKEN EXP.DATE
December 8, 2014 gmolleda@cityofrosemead org
REQUESTOR NAME(LAST NAME, FIRST NAME MI) WORK PHONE#
Molleda, Gloria (626)569-2171
LOS ANGELES COUNTY DEPARTMENT–AUTHORIZING SECURID TOKEN
ORGANIZATION/COMPANY NAME
City of Rosemead
WORK MAILING ADDRESS(Street, City, State,Zip)
8838 E.Valley Boulevard, Rosemead, CA 91770
Check one n TOKEN TO BE MAILED ❑ TOKEN TO BE PICKED UP from the ISD Data Security Office
SECURID REMOTE ACCESS —Account Number field will be completed by responsible L.A.County manager.
(ACCOUNT NUMBER is REQUIRED for processing.)
BILLING ACCOUNT NUMBER DEVICE TYPE: KEYFOB
❑VPN —check if you are a VPN customer.
SECURITY STATEMENT FOR VPN CUSTOMERS
Before connecting to the County network you must install anti-virus software,and stay up-to-date with definitions,Microsoft patches(critical and security)
and service packs. A Firewall,either a hardware firewall or personal firewall software,is required for those using broadband Internet access(DSL.ISDN,
cable modem,etc.). You agree not to share your logon id,password and SecunD passcode with others.
SIGNATURES—Request will be submitted to responsible LA.County department for review and approval.
Your signature indicat at you have read and will comply with the above security statement.
REQUESTOR'S SIGNATURE
RESPONSIBLE L.A. COUNTY DEPARTMENT MANAGER'S SIGNATURE PHONE NUMBER
PRINT RESPONSIBLE L.A.COUNTY DEPARTMENT MANAGER'S NAME DATE
NOTE: If submitting a PDF, FAX or COPY,this section must be completed in order to process the request.
Q PDF ❑ FAX ❑ COPY
Email: isdregistration@isd.lacounty.gov Fax#: (562)658-0425 ISD Registration,Mail Stop#29,
9 01E. Imperial Hwy,Downey, A 90242
NAME(Print)Gloria Molleda SIGNATURE lei WA CA! N.LI OIL
My signature above,stipulates that my department has setup a process to maintain the on al form on file for a period of 7 years,and will make
the original form available within 72 hours, upon request from ISD or those acting on the behalf of ISD, ie.,internal or external Auditors.
WARNING: FAILURE TO FULLY COMPLETE 8 SIGN THIS FORM WILL CAUSE A DELAY IN PROCESSING.
Originals can also be submitted to: ISD Registration,Mail Stop#29,9150 E.Imperial Hwy, Downey,CA 90242 to process.
For any questions related to registration please call (562)658-1881.
Revised:March 2010
COUNTY OF LOS ANGELES
AGREEMENT FOR ACCEPTABLE USE AND
CONFIDENTIALITY OF
COUNTY'S INFORMATION TECHNOLOGY ASSETS,
COMPUTERS,NETWORKS,SYSTEMS AND DATA
As a los Angeles County employee, contractor, vendor or other authorized user of County Information Technology
(IT) assets including computers, networks, systems and data, I understand that I occupy a position of trust. I will use
County IT assets for County management approved business purposes only and maintain the confidentiality of
County's business and Citizen's private data. As a user of County's IT assets,I agree to the following:
I. Computer crimes: 1 am aware of California Penal Code 502(c)-Comprehensive Computer Data Access and Fraud
Act(attached). I will immediately report any suspected computer misuse or crimes to my Management.
2. Security access controls: I will not subvert or bypass any security measure or system which has been implemented
to control or restrict access to computers,networks,systems or data. I will not share my computer identification
codes(log-in ID,computer access codes,account codes,ID's,etc.)or passwords.
3. Approved business purposes: I will use the County's Information Technology (IT) assets including computers,
networks,systems and data for County management approved business purposes only.
4. Confidentiality: I will not access or disclose any County program code,data, information or documentation to any
individual or organization unless specifically authorized to do so by the recognized information owner.
5. Computer virus and malicious code: I will not intentionally introduce any computer virus, worms or malicious
code into any County computer,network,system or data. I will not disable or delete computer virus detection and
eradication software on County computers,servers and other computing devices I am responsible for.
6. Offensive materials: 1 will not access or send any offensive materials, e.g., sexually explicit racial, harmful or
insensitive text or images, over County owned, leased or managed local or wide area networks, including the
public Internet and other electronic mail systems, unless it is in the performance of my assigned job duties, e.g.,
law enforcement. I will report to my supervisor any offensive materials observed by me or sent to me on County
systems.
7. Public Internet: I understand that the Public Internet is uncensored and contains many sites that may be considered
offensive in both text and images. I will use County Internet services for approved County business purposes only,
e.g., as a research tool or for electronic communication. I understand that the County's Internet services may he
filtered but in my use of them I may be exposed to offensive materials. I agree to hold the County harmless should
1 be inadvertently exposed to such offensive materials. I understand that my Internet activities may be logged,are
a public record,and are subject to audit and review by authorized individuals.
8. Electronic mail and other electronic data: I understand that County electronic mail (e-mail), and data, in either
electronic or other forms, are a public record and subject to audit and review by authorized individuals. I will
comply with County e-mail use policy and use proper business etiquette when communicating over e-mail systems.
9. Copyrighted materials:I will not copy any licensed software or documentation except as permitted by the license
agreement.
10. Disciplinary action for non-compliance: I understand that my non-compliance with any portion of this Agreement
may result in disciplinary action including my suspension,discharge,denial of service,cancellation of contracts or
both civil and criminal penalties.
Board of Supervisors Policy#6.101 Attachment Revised. July 2004
CALIFORNIA PENAL CODE 502(c)-
"COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT"
Below is a section of the "Comprehensive Computer Data Access and Fraud Act" as it pertains specifically to this
Agreement. California Penal Code 502(c) is incorporated in its entirety into this Agreement by reference and all
provisions of Penal Code 502(c) apply. Por a complete copy, consult the Code directly at website
www.leginfo ca.row_
502.(c) Any person who commits any of the following acts is guilty ofa public offense:
(I) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data,
computer, computer system, or computer network in order to either (A) devise or execute any scheme or
artifice to defraud,deceive,or extort,or(B)wrongly control or obtain money,property,or data.
(2) Knowingly accesses and without permission takes, copies or makes use of any data from a computer,
computer system, or computer network, or takes or copies supporting documentation, whether existing or
residing internal or external to a computer,computer system,or computer network.
(3) Knowingly and without permission uses or causes to be used computer services.
(4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer
software, or computer programs which reside or exist internal or external to a computer, computer system,or
computer network.
(5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes
the denial of computer services to an authorized user ofa computer,computer system,or computer network.
(6) Knowingly and without permission provides or assists in providing a means of accessing a computer,
computer system,or computer network is in violation of this section.
(7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or
computer network.
(8) Knowingly introduces any computer contaminant into any computer,computer system,or computer network.
I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT:
Jason Loc December 8, 2014
Employee's Name Emple e's_ignature Date
Gloria Molleda ( 1 December 8, 2014
� , t C l _•�
Manager's Namc M:'.ger's Signature Date
Board of Supervisors Policy#6.101 Attachment Revised: July 2009