Loading...
2000 - Los Angeles County - Downey Data Centers Information Technology (VIMS) Print Form arm"^c;` COUNTY OF LOS ANGELES LOS ANGELES COUNTY . DOWNEY DATA CENTER SECURID TOKEN RENEWAL ;,o„„,' For CONTRACTOR or VENDOR , ,,;,,, PROFILE INFORMATION—print or type DATE OF REQUEST LOGON ID(C#) E-MAIL ADDRESS TOKEN EXP.DATE December 8, 2014 gmolleda@cityofrosemead org REQUESTOR NAME(LAST NAME, FIRST NAME MI) WORK PHONE# Molleda, Gloria (626)569-2171 LOS ANGELES COUNTY DEPARTMENT–AUTHORIZING SECURID TOKEN ORGANIZATION/COMPANY NAME City of Rosemead WORK MAILING ADDRESS(Street, City, State,Zip) 8838 E.Valley Boulevard, Rosemead, CA 91770 Check one n TOKEN TO BE MAILED ❑ TOKEN TO BE PICKED UP from the ISD Data Security Office SECURID REMOTE ACCESS —Account Number field will be completed by responsible L.A.County manager. (ACCOUNT NUMBER is REQUIRED for processing.) BILLING ACCOUNT NUMBER DEVICE TYPE: KEYFOB ❑VPN —check if you are a VPN customer. SECURITY STATEMENT FOR VPN CUSTOMERS Before connecting to the County network you must install anti-virus software,and stay up-to-date with definitions,Microsoft patches(critical and security) and service packs. A Firewall,either a hardware firewall or personal firewall software,is required for those using broadband Internet access(DSL.ISDN, cable modem,etc.). You agree not to share your logon id,password and SecunD passcode with others. SIGNATURES—Request will be submitted to responsible LA.County department for review and approval. Your signature indicat at you have read and will comply with the above security statement. REQUESTOR'S SIGNATURE RESPONSIBLE L.A. COUNTY DEPARTMENT MANAGER'S SIGNATURE PHONE NUMBER PRINT RESPONSIBLE L.A.COUNTY DEPARTMENT MANAGER'S NAME DATE NOTE: If submitting a PDF, FAX or COPY,this section must be completed in order to process the request. Q PDF ❑ FAX ❑ COPY Email: isdregistration@isd.lacounty.gov Fax#: (562)658-0425 ISD Registration,Mail Stop#29, 9 01E. Imperial Hwy,Downey, A 90242 NAME(Print)Gloria Molleda SIGNATURE lei WA CA! N.LI OIL My signature above,stipulates that my department has setup a process to maintain the on al form on file for a period of 7 years,and will make the original form available within 72 hours, upon request from ISD or those acting on the behalf of ISD, ie.,internal or external Auditors. WARNING: FAILURE TO FULLY COMPLETE 8 SIGN THIS FORM WILL CAUSE A DELAY IN PROCESSING. Originals can also be submitted to: ISD Registration,Mail Stop#29,9150 E.Imperial Hwy, Downey,CA 90242 to process. For any questions related to registration please call (562)658-1881. Revised:March 2010 COUNTY OF LOS ANGELES AGREEMENT FOR ACCEPTABLE USE AND CONFIDENTIALITY OF COUNTY'S INFORMATION TECHNOLOGY ASSETS, COMPUTERS,NETWORKS,SYSTEMS AND DATA As a los Angeles County employee, contractor, vendor or other authorized user of County Information Technology (IT) assets including computers, networks, systems and data, I understand that I occupy a position of trust. I will use County IT assets for County management approved business purposes only and maintain the confidentiality of County's business and Citizen's private data. As a user of County's IT assets,I agree to the following: I. Computer crimes: 1 am aware of California Penal Code 502(c)-Comprehensive Computer Data Access and Fraud Act(attached). I will immediately report any suspected computer misuse or crimes to my Management. 2. Security access controls: I will not subvert or bypass any security measure or system which has been implemented to control or restrict access to computers,networks,systems or data. I will not share my computer identification codes(log-in ID,computer access codes,account codes,ID's,etc.)or passwords. 3. Approved business purposes: I will use the County's Information Technology (IT) assets including computers, networks,systems and data for County management approved business purposes only. 4. Confidentiality: I will not access or disclose any County program code,data, information or documentation to any individual or organization unless specifically authorized to do so by the recognized information owner. 5. Computer virus and malicious code: I will not intentionally introduce any computer virus, worms or malicious code into any County computer,network,system or data. I will not disable or delete computer virus detection and eradication software on County computers,servers and other computing devices I am responsible for. 6. Offensive materials: 1 will not access or send any offensive materials, e.g., sexually explicit racial, harmful or insensitive text or images, over County owned, leased or managed local or wide area networks, including the public Internet and other electronic mail systems, unless it is in the performance of my assigned job duties, e.g., law enforcement. I will report to my supervisor any offensive materials observed by me or sent to me on County systems. 7. Public Internet: I understand that the Public Internet is uncensored and contains many sites that may be considered offensive in both text and images. I will use County Internet services for approved County business purposes only, e.g., as a research tool or for electronic communication. I understand that the County's Internet services may he filtered but in my use of them I may be exposed to offensive materials. I agree to hold the County harmless should 1 be inadvertently exposed to such offensive materials. I understand that my Internet activities may be logged,are a public record,and are subject to audit and review by authorized individuals. 8. Electronic mail and other electronic data: I understand that County electronic mail (e-mail), and data, in either electronic or other forms, are a public record and subject to audit and review by authorized individuals. I will comply with County e-mail use policy and use proper business etiquette when communicating over e-mail systems. 9. Copyrighted materials:I will not copy any licensed software or documentation except as permitted by the license agreement. 10. Disciplinary action for non-compliance: I understand that my non-compliance with any portion of this Agreement may result in disciplinary action including my suspension,discharge,denial of service,cancellation of contracts or both civil and criminal penalties. Board of Supervisors Policy#6.101 Attachment Revised. July 2004 CALIFORNIA PENAL CODE 502(c)- "COMPREHENSIVE COMPUTER DATA ACCESS AND FRAUD ACT" Below is a section of the "Comprehensive Computer Data Access and Fraud Act" as it pertains specifically to this Agreement. California Penal Code 502(c) is incorporated in its entirety into this Agreement by reference and all provisions of Penal Code 502(c) apply. Por a complete copy, consult the Code directly at website www.leginfo ca.row_ 502.(c) Any person who commits any of the following acts is guilty ofa public offense: (I) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud,deceive,or extort,or(B)wrongly control or obtain money,property,or data. (2) Knowingly accesses and without permission takes, copies or makes use of any data from a computer, computer system, or computer network, or takes or copies supporting documentation, whether existing or residing internal or external to a computer,computer system,or computer network. (3) Knowingly and without permission uses or causes to be used computer services. (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system,or computer network. (5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user ofa computer,computer system,or computer network. (6) Knowingly and without permission provides or assists in providing a means of accessing a computer, computer system,or computer network is in violation of this section. (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network. (8) Knowingly introduces any computer contaminant into any computer,computer system,or computer network. I HAVE READ AND UNDERSTAND THE ABOVE AGREEMENT: Jason Loc December 8, 2014 Employee's Name Emple e's_ignature Date Gloria Molleda ( 1 December 8, 2014 � , t C l _•� Manager's Namc M:'.ger's Signature Date Board of Supervisors Policy#6.101 Attachment Revised: July 2009