You are here
Network and Technology Services
Information Technology
Title | Major Revision | Previous Schedules | Schedule Item | ||
---|---|---|---|---|---|
Data processing operating procedures, |
records of procedures for data entry, the operation of computer equipment, production control, tape library, system backup, and other aspects of a data processing operation: |
CO2 772; MU1 678; ED1 414; MI1 652 | 1306 | ||
Hardware documentation, |
records documenting the use, operation, and maintenance of a local government's data processing equipment including operating manuals, hardware/operating system requirements, hardware configurations, and equipment control systems: |
CO2 773; MU1 679; ED1 415; MI1 653 | 1307 | ||
Data migration, system upgrade, and hardware conversion records, |
including those relating to the operational aspects of the replacement of equipment or the upgrading of computer operating systems, as well as the migration of data between operating systems. Records include schedules and logs, tracking and data migration tests, notes, correspondence, conversion and implementation plans, and related records generated by the operating system software, application server software, and web server software: |
2020 (♦) |
CO2 774; MU1 680; ED1 416; MI1 654 | 1308 | |
Disaster preparedness and recovery plans, |
records related to the protection and reestablishment of data processing services and equipment in case of a disaster, including disaster recovery manuals, business continuity plans, inventories, procedure plans, contact lists, and other records: |
CO2 775; MU1 681; ED1 417; MI1 655 | 1309 | ||
System backup files, |
copies of master files or databases, application software, logs, directories, and other records needed to restore a system in case of a disaster or inadvertent destruction |
2020 (♦) |
CO2 776; MU1 682; ED1 418; MI1 656 | 1310 |
a.: Full backup files: |
User authorization/access records, |
created to control or monitor individual access to a system, system data, the Internet, and email system, including but not limited to user account records, password files, user acknowledgements of policies, and authorization documentation: |
CO2 777; MU1 683; ED1 419; MI1 657 | 1311 | ||
Computer system security records, |
records used to control or monitor the security of a system and its data, including but not limited to cyber-incident response and investigation records, intrusion detection logs, firewall logs, logs of unauthorized access, and other security logs: |
2020 (♦) |
CO2 1021; MU1 862; ED1 420; MI1 879 | 1312 | |
System/network usage files, |
electronic files or automated logs created to monitor computer system usage including but not limited to login files, system usage files, charge-back files, data entry logs, and records of individual computer program usage: |
2020 (♦) |
CO2 778; MU1 684; ED1 421; MI1 658 | 1313 | |
Summary system/network usage reports, |
summary reports and other paper records created to document computer usage for reporting or cost recovery purposes: |
CO2 779; MU1 685; ED1 422; MI1 659 | 1314 | ||
Computer run scheduling records, |
records used to schedule computer runs including daily schedules, run reports, run requests, and other records documenting the successful completion of a run: |
CO2 780; MU1 686; ED1 423; MI1 660 | 1315 | ||
Input/source documents, |
copies of records or forms designed and used solely for data input and control: |
2020 (♦) |
CO2 781; MU1 687; ED1 424; MI1 661 | 1316 | |
Work/intermediate files, |
records used to facilitate the processing of a specific job/run or to create, update, modify, transfer, export, import, manipulate, or sort data within an automated system, including "macro" or "startup" file or other electronic record created to preserve a combination of data elements and/or method of displaying these data elements when all transactions are captured in a master file, central file, transaction file, or database, and the file is not retained to provide an audit trail: |
2020 (♦) |
CO2 782; MU1 688; ED1 425; MI1 662 | 1317 | |
Processed transaction files, |
records used to update and/or document a transaction in database or master file including valid transaction files, database management system (DBMS) log, update files, and similar records, and not retained to document a program unit action or for fiscal audit purposes: |
2020 (♦) |
CO2 783; MU1 689; ED1 426; MI1 663 | 1318 | |
Print files |
(not used to document a transaction), source output data extracted from the system to produce hard copy publications, printouts of tabulations, ledgers, registers, reports, or other documents when the files are not needed for audit purposes or to document program unit transactions: |
CO2 784; MU1 690; ED1 427; MI1 664 | 1319 | ||
Audit trail files, |
data generated during the creation of a master file or database used to validate a master file or database during a processing cycle: |
2020 (♦) |
CO2 785; MU1 691; ED1 428; MI1 665 | 1320 | |
Information technology unit's copies of output reports, |
data processing unit's copy of output reports produced for client program units: |
CO2 786; MU1 692; ED1 429; MI1 666 | 1321 | ||
Summary or extracted data files, |
summary or aggregate data from a master file or database, including "snapshots" of data, created solely to distribute data to individuals or program units for reference and use, but not altered or augmented to support program-specific needs: |
CO2 787; MU1 693; ED1 430; MI1 667 | 1322 | ||
Finding aids (indexes) or tracking systems, |
electronic indexes, lists, registers, and other finding aids used only to provide access to the hard copy and electronic records in the custody of the information technology unit: |
CO2 788; MU1 694; ED1 431; MI1 668 | 1323 | ||
Automated tape library system files, |
automated records used to control the location, maintenance, and disposition of magnetic media in a tape library: |
CO2 789; MU1 695; ED1 432; MI1 669 | 1324 | ||
Reports on the destruction of files ("scratch reports"), |
records containing information on the destruction of files stored on electronic media in a tape library: |
CO2 790; MU1 696; ED1 433; MI1 670 | 1325 | ||
Tape library control records, |
records used to control the location, maintenance, and disposition of magnetic media in a tape library including list of holdings and control logs: |
CO2 791; MU1 697; ED1 434; MI1 671 | 1326 | ||
Network site/equipment support files, |
records documenting support services provided to specific sites and computer to computer interfaces on a network including site visit reports, trouble reports, service histories, and correspondence and memoranda |
CO2 797; MU1 703; ED1 441; MI1 677 | 1327 |
a: Site visit reports, trouble reports, and related correspondence: |
|
Inventories of network circuits/connections |
containing information on network circuits used by the local government including circuit number, vendor, cost per month, type of connection, terminal series, software, contact person, and other relevant information about the circuit: |
CO2 798; MU1 704; ED1 442; MI1 678 | 1328 | ||
Network or circuit installation and service files, |
copies of requests by local governments to service provider for data communication service, installation, or repair and response to the request including work orders, correspondence, memoranda, work schedules, and copies of building or circuitry diagrams: |
CO2 799; MU1 705; ED1 443; MI1 679 | 1329 | ||
Network usage files, |
electronic files or automated logs created to monitor network usage including but not limited to login files and system usage files: |
CO2 800; MU1 706; ED1 444; MI1 680 | 1330 | ||
Network usage reports, |
summary reports and other records created to document computer usage for reporting or other purposes: |
CO2 801; MU1 707; ED1 445; MI1 681 | 1331 | ||
Network implementation project files, |
local government records used to plan and implement a network including reports, justifications, working diagrams of proposed network, wiring schematics, and diagrams: |
CO2 802; MU1 708; ED1 446; MI1 682 | 1332 | ||
Security breach notifications |
that disclose to residents when their computerized private information was or may have been acquired by a person without valid authorization, including notifications to affected persons and to designated state agencies (if required), logs of notifications, and related records: |
2020 (♦) |
1333 |