Difference between revisions of "Internal:Technology access policy amendment"

From Wikimedia District of Columbia
Jump to navigation Jump to search
m (ce.)
(Edits)
Line 2: Line 2:
   
 
The [[Technology Access Policy]] is amended:
 
The [[Technology Access Policy]] is amended:
:(a) By striking Article III, Paragraph 3, and inserting the following as Paragraph 3:
+
: (a) By replacing Article II, Paragraph 4 with the following:
  +
:: 4. <u>Continued Access</u>. No later than thirty (30) days after an individual who has been assigned a Corporation Email Address ceases to meet the criteria for access defined in Paragraph 3 of this Article, the President shall evaluate the individual's anticipated involvement in the Corporation's future activities and determine whether continued access to a Corporation Email Address should be granted. If such access is granted, it will be retained indefinitely, subject to the continued approval of the President.
  +
: (b) By replacing Article III, Paragraph 3 with the following:
 
:: 3. <u>Access</u>. Individuals shall only be granted access to a Sensitive PII Tool on a need-to-know basis and with the approval of the President. Shared accounts shall be prohibited.
 
:: 3. <u>Access</u>. Individuals shall only be granted access to a Sensitive PII Tool on a need-to-know basis and with the approval of the President. Shared accounts shall be prohibited.
: (b) By striking Article III, Paragraph 4.
+
: (c) By striking Article III, Paragraph 4.
: (c) By inserting the following as Article V – Offboarding:
+
: (d) By inserting the following as Article V – Termination of Access:
  +
:: 1. <u>Application</u>. Any person who has been granted access to an information technology resource pursuant to this Policy, and who ceases to meet the criteria for such access as defined in this Policy, shall have such access terminated as described in this Article.
:: 1. <u>Use of Protocol</u>. The offboarding protocol as defined in this Policy shall be used when an Officer, Director, employee, contractor, or volunteer is no longer serving in any role in the Corporation, and when access to Corporation systems is no longer warranted. Those who are subject to access removal pursuant to this Policy are considered "offboarded individuals."
 
:: 2. <u>Email Access</u>. The Secretary shall terminate access to any email accounts in use by the offboarded individual. To maintain continuity, it is recommended that terminated email accounts have incoming mail forwarded to a new email address, provided that no emails are sent from the terminated account.
+
:: 2. <u>Termination of Email Access</u>. The Secretary shall terminate, or cause to be terminated, access to any Corporation Email Address.
:: 3. <u>Removal from Sensitive PII Tools</u>. The President shall remove access of an offboarded individual from any Sensitive PII Tools.
+
:: 3. <u>Termination of Sensitive PII Tool Access</u>. The President shall terminate, or cause to be terminated, access to any Sensitive PII Tool.
:: 4. <u>Removal from Servers</u>. The President shall terminate the shell accounts of an offboarded individual. The President at his or her discretion may delete the offboarded individual's home directory and files.
+
:: 4. <u>Termination of Server Access</u>. The President shall terminate, or cause to be terminated, access to any Corporation Server.

Revision as of 04:55, 5 February 2016

Status: Under Review

The Technology Access Policy is amended:

(a) By replacing Article II, Paragraph 4 with the following:
4. Continued Access. No later than thirty (30) days after an individual who has been assigned a Corporation Email Address ceases to meet the criteria for access defined in Paragraph 3 of this Article, the President shall evaluate the individual's anticipated involvement in the Corporation's future activities and determine whether continued access to a Corporation Email Address should be granted. If such access is granted, it will be retained indefinitely, subject to the continued approval of the President.
(b) By replacing Article III, Paragraph 3 with the following:
3. Access. Individuals shall only be granted access to a Sensitive PII Tool on a need-to-know basis and with the approval of the President. Shared accounts shall be prohibited.
(c) By striking Article III, Paragraph 4.
(d) By inserting the following as Article V – Termination of Access:
1. Application. Any person who has been granted access to an information technology resource pursuant to this Policy, and who ceases to meet the criteria for such access as defined in this Policy, shall have such access terminated as described in this Article.
2. Termination of Email Access. The Secretary shall terminate, or cause to be terminated, access to any Corporation Email Address.
3. Termination of Sensitive PII Tool Access. The President shall terminate, or cause to be terminated, access to any Sensitive PII Tool.
4. Termination of Server Access. The President shall terminate, or cause to be terminated, access to any Corporation Server.