Loading...
Res 1546 - Good Faith Eff Y2K ,- COUNCIL BILL NO. 1985 RESOLUTION NO. 1546 A RESOLUTION DECLARING THE CITY OF WOODBURN'S GOOD FAITH EFFORTS TO A VOID YEAR 2000 FAILURES, PURSUANT TO THE PROVISIONS OF SENATE BILL 268, PASSED BY THE 1999 OREGON LEGISLATURE WHEREAS, the City of Woodburn has a written analysis of the systems it believes most susceptible to Year 2000 failures; and WHEREAS, the Year 2000 effects are unknown and uncertain, with experts' opinions ranging from no effect to catastrophe; and WHEREAS, the City of Woodburn acknowledges that in the absence ofa commitment to addressing Year 2000 problems, such so-called "Y-2K" failures may cause interruption of essential public services; and WHEREAS, there are multiple existing concerns which must compete for the limited public resources available to deliver governmental services; and WHEREAS, it is the opinion of the City of Woodburn that such limited resources are best utilized, as they concern Year 2000 issues, for those matters deemed "Mission-Critical"; and WHEREAS, the City of Woodburn has allocated funds within the 1999-2000 City budget to address possible Year 2000 failures, NOW, THEREFORE THE CITY OF WOODBURN RESOLVES AS FOLLOWS: Section 1. The City of Woodburn has a conducted a written analysis of the systems it believes most susceptible to Year 2000 failures. The City Council has reviewed and considered this analysis and attaches it to this resolution as Exhibit "N'. Section 2. The City of Woodburn hereby declares the following services to be deemed most likely susceptible to Year 2000 failures to be "Mission-Critical": 1. Police 2. Water 3. Sewer 4. Municipal Court Section 3. The City of Woodburn's 1999-2000 Budget authorizes the expenditure of certain funds to address Year 2000 problems. The City of Woodburn delegates the discretion to determine these expenditures to the City Administrator. Page 1 - COUNCIL BILL NO. 1985 RESOLUTION NO. 1546 . -r--- '" '- Section 4. Although the City of Woodburn clearly recognizes that the Year 2000 problems may affect other areas, in recognition of the limited public resources available, it shall be the public policy of the City of Woodburn to address the areas determined above as in the overall best interest of the public. /'I ./ /\ \ Approved as to formcq). <}of' ~ 'B' Il '1lat~e '1 City Attorney ~ APPROVED: ~ RICHARDJENN GS,MAYOR Submittedtothe~ayor August 23, 1999 August 24, 1999 Passed by the Council Approved by the ~ayor AU<lust 24, 1999 Filed in the Office ofthe Recorder August 24, 1999 ATTEST: fY1cu ~ ~ary T~ant, City Recorder City ofW oodbum, Oregon Page 2 - COUNCIL BILL NO. 1985 RESOLUTION NO. 1546 .. ~..,....--'- ~~, IXHIIIT A IIiU@ ~ of I E) ~ CITY of WOODBURN YEAR 2000 PREPAREDNESS August 11, 1999 The City of Wood bum has reviewed all major systems the are used to manage information or control processes in an effort to identify those systems that rely on electronic calendars. Any system that incorporates an electronic calendar is deemed to be susceptible to year 2000 (Y2K) problems. The City has also identified those systems that are reliant on outside parties and are therefor sensitive to any problems those third parties may experience. These systems (listed in order from most important to least important) are most susceptible to year 2000 problems: Police communications RAIN 9* 1 * 1 dispatch Water Sewer Municipal Court Office buildings Library Accounting General Ledger Payroll Utility billing Business license Recreation and Parks RAIN The Regional Automated Information Network (RAIN) is a system administered by the Salem Data Center for disseminating information on crimes and criminals. In response to City inquiries about the Y2K readiness of the RAIN system, officials said the system has been analyzed. Deficiencies have been identified and corrected, and the system has been tested. Corrective measures included extensive replacement of equipment. 9*1*1 9*1 *1 emergency dispatch is administered by Norcom. Officials there responded that their software and hardware have been updated to avoid any interruptions of service as a result of Y2K. Most of their equipment was replaced. .,,_.... ..,"~-_.........~~._.~,-~,.. .. -.-- ~, EX~'B~ -LLof 1 P> = Page Water The water supply and distribution system is a mechanical system that does not rely on electronic calendars. To that extent it is not susceptible to Y2K problems. However, it relies on electricity to operate pumps and telephone lines to convey signals to control the pumps. If the telephone telemetry were to fail the water wells could be operated manually. The Bonneville Power Administration (BP A) and PGE have made assurances to the region that their systems have been updated and tested. In addition PGE has written the City making the same claims. In the unlikely event that there is an interruption of electric power, the City has three wells that have diesel engines that provide an alternative power source for operating the wells and two wells that have been prepared to have a generator provide electrical power for pump operation. The City currently has six active wells. During the winter the water use is at its lowest and no more than two wells are required for meeting the City's water needs. Sewer The sewer plant is being replaced. Some of the control systems will be replaced by December 31, 1999. The City has requested and received written assurances from the various contractors that the systems they are installing are Y2K compliant. Like the water system, the sewer system relies on electricity to operate the plant and the pump stations. The Bonneville Power Administration (BP A) and PGE have made assurances to the region that their systems have been updated and tested. In addition PGE has written the City making the same claims. In the unlikely event that there is an interruption of electric power, the City has a suitable generator at the Mill Creek Pump Station, and a large portable generator would be used to operated the 1-5 pump station. Small pump stations would be operated by utilizing small shared pumping systems. Telemetry is another potential problem. Phone lines are used to monitor and control the pump stations. If they fail, the problem will be immediately apparent to the operator at the sewer plant. Employees can be dispatched to the critical pump stations and they can be manually controlled. Municipal Court The version of the Court system the City is using is not year 2000 compliant. The vendor, MCr, has available version that does not have Y2K problems. That version will run only on a Novell netware 5.0 platform. The City is upgrading from Netware 4.2 to version 5.0. The court system is expected to be year 2000 compliant by December 1. Office Buildings Office buildings have been inventoried to determine if heating/ventilating/air conditioning (HV AC) systems, security systems, or elevators are susceptible to year 2000 problems. No problems were identified. Library The library is dependent on Chemeketa Cooperative Regional Library Services (CCRLS) for its I' ._,--'-",-- - EXHIBit A Page --4- of j 8 check out/check in system, catalogue system, and Internet connection. CCRLS has assured the City that those systems have been evaluated and tested for Y2K compliance. General Ledger The vendor, Eden Systems, acknowledged in 1998 that many of their systems were not Y2K compliant. They programmed and tested corrections. The updated software was installed on the City's server in March. Payroll In 1998 the vendor, Eden Systems, announced that the payroll system the City was using (version 2.0) would not be supported after December 31, 1999. The 12 year old system was not year 2000 compliant, and it had been improved in other ways in newer versions. The City purchased version 5.0 which is Y2K compliant. It was installed in April 1999. Utility Billing This is custom software developed in house. All date fields are being expanded to four characters and testing will be completed by August 31, 1999. Business License This is custom software developed in house. All date fields have been expanded to four digits. Testing is completed. Recreation and Parks The Recreation and Parks Department uses the "Class" activities registration software system. The version of "Class" that the City uses is Y2K compliant. Anytime a system failure occurs, the Department has procedures in place to manually register programs participants. ----------0--------- In the event there is a disruption of service as a result of year 2000, the City will treat it like any other emergency. The procedures detailed in the City ofW oodburn Emergency Management Plan will be followed. Management will conduct an emergency exercise in September to refresh employees knowledge of the procedures. The manpower and resources committed to managing a Y2K emergency will be consistent with the City's Emergency Management Plan. T' -_.....--' ,.. Software Profile Worksheet EXHIBIT ~ Page -.:.::L. of ) R = Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make e'nough copies of this worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Type: o Windows l61ASDOS o Macintosh 0 Unix o Other: Version Number: Serial Number: Type of Software (Operating System, Database, ~adsheet, etc. ).: ~i/t I3lt-s~ Package Is Used for: {j cNE1Zltl LE7::GE7<. ManufacturerlDeveloper: E-P E tV Year of ManufacturelDevelopment: Jqq I ManufacturerlDeveloper Contact: ~7)EN Address: Phone Numher Z '?to? 3.2~ -$/ It! Fax Number: :20~57 - ~/5 E-mail Address: I ntemet Address: .._............._......, ....._._....... ... 'd. ............ '"P''' ,...___ _.p..,... ...._... ,. ". ..............-......-....................-.......-....................................................................... .........................................-................................................................................ .................................................................................................h....................... .......................................................................................................................... ;~s:.:!9B!mmmi9#.:i:~t~t~!~l!~~~~AA::fi~~i.#l:::: ~~::::::::::::i:I:::::::I::::::I::::::;::=:::::=:I::::::::=:::::::::lli1$tri:::::::::I::II::::::;::=:::::::::;} l!llIlllia_,1I .................... ..... :.:.:.:-:.:.;.:.:.:.:......::. ...... .:.:.:.::::=;=::::.:., ..........;.:.:. ..::::::;:::::::::::::::::::::::::::::::.:.:.:.::............... :i_I._"II~! 2. Dctcrminc the Risk LfvJ:~ " I Expected Failure Date: ~E : Level of Risk to City/County if this software fails (high, medium, low): , .----r--.....--....-....-..'---- 3. Detcrminc a Compliancc Stratcgy Manufacturer/Developer Recommendations for Compliance: Compliance Strategy: D Retain D R~re .zrUpgrade D Replace with: Planned Start Date: Planned Completion Date: . I 3!J!9r 4. Determine a Testing Strategy Testing Strategy D Full Simulation o Limited Simulation D Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $ Repair cost of software $ Other costs $ Total Cost: $ -0-. Compliance Completion Date: .~ J I J 9 9 , 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, docwnent your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 1.... ~-""""'<<, Software Profile Worksheet EXHIBIT A- Page...s...... of J p. Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies ofthis worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Type: o Windows o Macintosh o Other: Version Number: Serial Number: .J31VISDOS o Unix 3. Determine a Compliance Strategy Manufacturer/Developer Recommendations for Compliance: Compliance Strategy: D Retain DR~e ...ErtJ pgrade D Replace with: Type of Software (Operating System, Database, spreadsheet~.) : yA-TIT IJ C;E- Package Is Used for: '}J/} YW L L- ManufacturerlDeveloper: E 7) t;- )y Year of ~ufacturelDevelopment: " 199-~ Planned Start Date: . Planned Completion Date: :5/1/99 M~facturerlDeveloper Contact: -Pc It/ Address: Phone Number ~~~? _3~f( - 00/2 Fax Number: 5 - ~ E-mail Address: Internet Address: 4. Determine a Testing Strategy Testing Strategy D Full Simulation D Limited Simulation D Walk-through D Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $12,/.aI . Repair cost of software $ Other costs $ .............. . - ..... ......... ...'..... ..... ...........,.. .................... ............................ .............. .................... ......................... .............. ... .................... .... ....... ... ........ .. .. ....... .. .. .... ...... .. . . ..!I~II!!lllj!~!!~~~~IJ-~I~I~I!!II~r-~~!I!!I:!j !1~li~~ll:!I~~~~~!1111~.AI1:.111:lilll:11!1:::1:liii:li\111:!\ ::::;:::::}}~{:~:~:\}{j?~frjr~~rrr~~~~t~~~~~~?~t~t~~~t~~~~~~~~~r:::::~:::~:}r?~{;}~:}:;;;:::;:;:;::::::;:::::::::::::::\?~~~:~.::::::::::::::::::::::::~::::::::::: !1~~1~~1MtI~, Total Cost: $ )2.(X)O. ,- Compliance Completion Date: t5/1 ) 99 f 6. Available Resources to Correct? 2. Determine the Risk ~ Expected Failure Date: , A/ b i Level of Risk to City/County if this software fails (high, medium, low): 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, docwnent your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 T ~~" r Software Profile Worksheet - EXHIBIT A- Page~ of iA Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies of this worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Type: o Windows Ja1:1SDOS o Macintosh 0 Unix o Other: Version Number: Serial Number: Type of Software (Operating System, Database, . S preadsheet~c.): -PitTA ASG Package Is Used for: UTILITY 75/L L/A/(] ManufacturerlDeveloper: c!IJST 01--1 )N)J OU S E . Year of ManufacturelDevelopment: , 19Q5 MwufacturerlDeveloper Contact: 0E;i>IJL]) L,EI/l1i3IJCII Address: Phone Number: :2/? Fax Number: E-mail Address: Internet Address: ..'.........-.........-.......'...............-..... ..'........-.-...-................... -.................................-.......................... ...........-...-............................ ............ ..... ...... ...... . ........... . .................. ........ ....... ........ !RI&I!!li~:::::::::!i:I!!!i!I!:~i!:::.!.:::i:I.:::::!11:.il.:.lj.~~'~i~~lt:::.::::::::.~:.:..:.:..!:!..:I.:::.::::: 2. Determine the Risk ~ Expected Failure Date: AIr : Level of Risk to City/County if this software fails (high, medium, low): '-'_.,....._~--'---t--."--_.- .---,--....,.... 3. Determine a Compliance Strategy ManufacturerlDeveloper Recommendations for Compliance: Compliance Strategy: o Retain o Retire Ja1]j;grade o Replace with: Planned Start Date: Planned Completion Date: q)J5)99 t f 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $ Repair cost of software $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Lcvel for Implemcnting Compliancc On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 ,,. Software Profile Worksheet -----, EXHIBIT A page..::L.. of I B Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies of this worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Type: o Windows .01Vi.SDOS o Macintosh 0 Unix o Other: Version Number: Serial Number: Type of Software (Operating System, Database, ~eadsheet, ~: ~ T/) A56;; Package Is Uscd for:15Ve;!ESS 1/(' FN 5 E ManufacturerlDeveloper: iJ STan )N )/Oi./SE Year of ManufacturelDevelopment: I /qq? ManufacturerlDeveloper Contact: Address: Phone Number: Fax Number: E-mail Address: Internet Address: .__~tll :-;.:.:.:.;.:-:.:.:.;.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.: .......................:......................:......:.:.:.:.:.:.:.......................:-:.:-:.:.:.:-:.:.:.....................-.................-.....-...;.:.:.;.:.:.:.:.:.:.: Ptl~~~i~:Mi.~~~~ft:~I__~::~~:::~:::::::I~i:.~::::~:::;:::~~:::~I:::I:~::~:::::::::::~:::~::~~~~:::::::t::~::::I:~:::::~~:~:.::! iil.'_i~1 2. Determine the Risk Level Expected Failure Date: " Level of Risk to City/County if this software fails (high, medium, low): .'.-.... -....__..~"--.._--..".,,._~...,',...,-~"~... W t 3. Determine a Compliance Strategy Manufacturer/Developer Recommendations for Compliance: Compliance Strategy: D Retain D Retire ~grade D Replace with: Planned Start Date: Planned Completion Date: q /J5/cfl 4. Determine a Testing Strategy Testing Strategy D Full Simulation D Limited Simulation o Walk-through D Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $ Repair cost of software $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 ~r Software Profile Worksheet EXHIBIT A Page...Ii- of /8 Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies ofthis worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Ty~ Ef"Windows o Macintosh o Other: AI T , Version Number: Serial Number: o MSDOS o Unix Type of Software (Operating System, Database, S~sheet, etc.): C ()(! is ~ S () /tI7m L Package Is Used for: ~ IG Ii T J(j Iv' ManufacturerlDeveloper: -We) ^tDt':7< \AlA 1? b . Year of ManufacturelDevelopment: I lqqq ManufacturerlDeveloper Contact: J!.I M /} NDE""R S (j N Address: Phone Number: <5-'11> 752 -.lf2 t.j / Fax Number: E-mail Address: Internet Address: .. ...... d............... .. . _ ._.... .... ,. ... ........_......... . ,.... .............. ...... .., .................. ................. ...-..... .......................... ........ ........................ ................ '" .... .................. :tm~::!~:~9.iW~::@P.PW$::I::~!!1R;~~':m~~~~~::g~!~#*::::'. .1_- ,....- 2. Determine the Risk Level Expected Failure Date: _ " Level of Risk to City/County if this software fails (high, medium, low): 'II" 3. Determine a Compliance Strategy Manufacturer/Developer Recommendations for Compliance: COl~li~nce Strategy: .Jd"Retam o Retire o Upgrade o Replace with: Plmmed Start Date: Planned Completion Date: 7/99 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $ Repair cost of software $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 ,~ Software Profile Worksheet EXHIBI1- 6 Page -'- of I B Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies of this worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) (J _ Type: NUN Ie IPI'r L {)O1<1 o Windows B'lYfSDOS o Macintosh 0 Unix o Other: Version Number: Serial Number: Type of Software (Operating System, Database, Spreadsheet, ~B: --Pfii./t ASC Package Is Used for: (!/lC;Em ltC'I' IA/() Manufacturer/Developer: M S I , Year of ManufacturelDevelopment: I /qC?O ManufacturerlDe~oper Contact: DRYf}N ~nlTIf Address: Phone Number: <So) > Fax Number: E-mail Address: Internet Address: .L/52 -~ 452 -t/03?- ..'..n...................._ .. ........... ,.. ..... . n. ...... n.. ........... ......................... .................... m~~..fl':f~lfil:~II..~,fr~tlli~~.'m~.,,~I~~i~:.':.i. ~:!=~::::::::::::::::::::I::::::::::::::::::::::!:::!:!!!!!!!j:!!!!!:!:!!jll:l!:!!!!!~:l!!:!!!!!!!\!!!!:!!!!!!:!!!!:).:!:/:::., ~~i~~!~'!~~~~~~:~'If:I:.!::!:!:!::::!!!!!!!:!:!!:::!:!!i!::!:::::l::':!!!!!!!:::!:!!!l!!!!!!:!!!.!!!!!!!!!!!!:!!!!:!!:::!!!!! IlIlIt\I;I_lllllll 2. Determine the Risk Level Expectcd Failure Datc: 1213 I /9 9 , Level of Risk to City/County if this softwarc fails (high, medium, low): ~_.~.,-~. t""" ~. 3. Determine a Compliance Strategy Manufacturer/Developer Recommendations for Compliance: Compliance Strategy: D Retain DR~e ..zo pgrade D Replace with: Planned Start Date: Planned Completion Date: 12/1/99 ( 4. Determine a Testing Strategy Testing Strategy D Full Simulation D Limited Simulation D Walk-through D Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ 2 LW . -- , Purchase cost of software $ Repair cost of software $ Other costs $ Total Cost: $ 2 {)CO . Compliance Completion Date: /.2)1/9 tt f ( 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 ^......., Software Profile Worksheet EXHIBIT A page..& of J f1 Develop a Profile for Each Piece of Software Draw up a detailed profile for each piece of computer software listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies ofthis worksheet so that you can use one for each piece of software in your inventory. 1. Gather Basic Information Software Name: (if operating system:) Type: ~indows o Macintosh o Other: Version Number: Serial Number: o MSDOS o Unix 3. Determine a Compliance Strategy Manufacturer/Developer Recommendations for Compliance: Co~liance Strategy: ffRetain o Retire o Upgrade o Replace with: Type of Software (Operating System, Database, ~dsheet, e~: Planned Start Date: . j//fTA - J-5/J )'E Planned Completion Date: Package Is Used forPI11?KS --PE(;IS7!jI}7A}JY 4. Determine a Testing Strategy ManufacturerlDeveloper: Testing Strategy Year of ManufacturelDevelopment: 0 Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: ManufacturerlDeveloper Contact: (I LA S 'S Address: Phone Number: Fax Number: E-mail Address: Internet Address: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of software $ Repair cost of software $ Other costs $ ..-................, . . '" - ... .... ... ..".-- _."p--.... ...'........-................................................... .................. ............................................................... P. ....... ,_ .... .. .. .... '" .. mg@:~~,~9B~ltlillim::i::E~~~M~t,:!M.~~JMIaSt~~#~:,[:: O:y~~:::::,j:::::::::::::::m::::II:::::II:::::::m:::::::::::::,:,:::::::::::I:::::~S::::::::I::::::::::::t:::I::::::i/:: .......................;.......:::.:...-...........:.:::.:::<:;;:::::::::::;;:-:.;.;.............:-:..........................;.;.:.:...................;.:................... . . . . ........ .... ...... .. -":':': ........:-:.:.~:~:~:~:~:~~~;~~:;~:~:::~::::::.:.~\){ftr:t:::::::r:t~:~:::::~:~:~:~:~~~:~:~:~:;t~f[:;:;:;:;;.:':::':".::::::: ::: ............ :~r!~~~~!!l~~~~~~!:!"_~!::::j::!!!::!\:!!!j::!:\!\:!^::::::!\!!!:!!::!!!!.::!!!:!\!l!!!I!::'!!!!;::;:;!;:\!ill:!:!!!:!!!!:;!!!!::: '_JiIlIlIIIi,1 Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 2. Determine the Risk ~ Expected Failure Date: XI c- \ Level of Risk to City/County if this software fails (high, medium, low): 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. Enclosure 3 .-....,. ..--...,..-....'.-.. t-..'..,--.-----..'-.--.---- Computer Hardware Profile Worksheet EXHIBIT A Page -LL of 111 Develop a Profile for Each Piece of Computer Hardware Draw up a detailed profile for each piece of computer hardware listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies 0 r this worksheet so that you can use one for each pieee of equipment in your inventory. 1. Gather Basic Information Manufacturer: (! () 11'711 ~ Model Name: 'P:ROL)1f- AI r :25CO Model Number: Year of Manufacture: 191' Serial Number: If this equipment part of a network: Type of Network: W.hl~ Custodian of Network: eN GlttE:S7:>/E Use on Network (server, PC, printer, etc.: SE7?VE7< Manufacturer Contact: ) J( 0 N Address: Phone Number: <503) 0~ 4- )/! X' \ Fax Number: . &~.c:; -398 I E-mail Address: Internet Address: ....... ....... . .............................. .-- .... .... .... ..-........ .................................... .................... ...... .................. ..... 2. Determine the Risk Level Expected Failure Date: ,410 AJ C Level of Risk to City/County if this component fails (high, medium, low): , -.-.---- 3. Determine a Compliance Strategy Vendor/Manufacturer Recommendations for Compliance: Co~i~ce Strategy: )2rRetam o Retire o Upgrade o Replace with: Planned Start Date: Planned Completion Date: 3) 15) 9<;1/ , ( 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of hardware $ Repair cost of hardware $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 3 Enclosure 3 Computer Hardware Profile Worksheet EXHIBIT A Page.J.siL of I p..J . Develop a Profile for Each Piece of Computer Hardware Draw up a detailed profile fix each piece of computer hardware listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies of this worksheet so that you can use one for each piece of equipment in your inventory. 1. Gather Basi~ Information) > Manufacturer: (}j 11 P /fa. ~ LJ ~ Model Name: nO;: Jf) NT ~d Model Number: ./ Year of Manufacture: let)?' Serial Number: I f this equipment part of a network: Type of Network: Wt9 IV Custodian of Network: 73eN G/LL-C '!)l>/C;:- Use. on Network (server, PC, printer, etc.: ~nJ/57? Manufacturer Contact: / J: {; N Address: Phone Number: (.t:::;O 3'/ &, rt 4 .- / II ~ \ Fax Number: . (784 - 39_:fi I , E-mail Address: Internet Address: ;:::::::::::::::::::"~::::;~:: ....... '.'~.:.:.;.'.' 2. Determine the Risk Ler<JI Expected Failure Date: /)IeJ AlE Level of Risk to City/County if this component fails (high, medium, low): ._'_.,.....,--.-._~---- 3. Determinc a Compliance Strategy Vendor/Manufacturer Recommendations for Compliance: Co~i~ce Strategy: zRetam o Retire o Upgrade o Replace with: Planned Start Date: Planned Completion Date: 3) /~j 9 ?/ , , 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of hardware $ Repair cost of hardware $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resourccs to Correct? 7. Dcterminc a Priority Lcvcl for Implcmcnting Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 3 Enclosure 3 Computer Hardware Profile Worksheet EXHIBIT A Page ~ of 1/8 Develop a Profile for Each Piece of Computer Hardware Draw up a detailed profile for each picce of computer hardware listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Make enough copies of this workshect so that you can use one for each piece of equipment in your inventory. 1. Gather Basic Information Manufacturer: 1iCi'Ri EL Model Name:. ilA 1- JAlTE7?NcT Model Number: .lJ<jO Year of Manufacture: /q'lq Serial Number: If this equipment part of a network: Type of Network: )JVTE7?-1-ET CustodiaTl of Network: De. aiL L GS7'/G Use on Network (server, PC, printer, etc.: )jET Se??Ve72 Manufacturer Contact: I k 0 N Address: ~ PhoneNumber: <~03) &V4- III? \ Fax Number: . ~f.1j-'59~1 , E-mail Address: Internet Address: 11.."_1 2. Determine the Risk LX~f Expected Failure Date: () N ~ Level of Risk to City/County if this component fails (high, medium, low): --_..-...........'--r--~. 3. Determine a Compliance Strategy Vendor/Manufacturer Recommendations for Compliance: Compliance Strategy: ~etain o Retire o Upgrade o Replace with: Planned Start Date: I-. Planned Completion Date: q/I/9 9 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of hardware $ Repair cost of hardware $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 3 Enclosure 3 ,- Uther Date-Sensitive Hardware Profile Worksheet - EMBED~ SiXS ~ _Jlv1S Develop a Profilc for Each Piecc of Othcr Date-Sensitivc Hardware Draw up a dctailed profile for cach piece of datc-sensitivc hardware listed in your inventory. You may have to contact the manufacturer or your computer professional to obtain some of this information. Makc cnough copies of this worksheet so that you can use one for each piece of equipment in your inventory. 1. Gather Basic Information Type of Equipmcnt (Phone, Fax, Elevator, Thermostat, Manufacturin achinc, etc.): Manufacturer: 0-- Model Name: /i7)YIi Nf E :12/1('/< ::;w/T(!H Model Number: 22 L/ r Year of Manufacture: i 9 V Serial Number: Manufacturer Contact: ) 1<0 AI Address: Phone Number: <5ZJ3) &f 4- 1)/'6 Fax Number: 6r4l- 39'S I E-mail Address: Internet Address: 2. Determine the Risk Level Expected proble~s ifNo9jcompliant: lo~s ()~ It bT L{J!1MvIV/{lAT/(1),JS , Level of Risk to City/County if this component fails (high, medium, low): _.,,_.. ..-'-yo--.--.-r--.~.-~-~.---.- 3. Determine a Compliance Strategy V cndor/Manufacturer Recommendations for Compliance: COI~li~ce Strategy: ..01ze ta 111 o Retirc o Upgrade o Replace with: Planned Start Date: J J , Planned Completion Date: 5/2 q' /9 f ( 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of hardware $ Repair cost of hardware $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determinc a Priority Level for Implementing Compliancc On the backsidc of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 5 Enclosure 3 ,,. -, Uther Date-Sensitive Hardware Profile Worksheet - EMBEDDED CHIP SYS 1 GMS EXHIBIT A Page..J..:S... of lid Develop a Profile for Each Piece of Other Date-Sensitive Hardware Draw up a dctailed profilc for cach piece of date-scnsitive hardware listed in your inventory. Y Oll may have to contact the manufacturcr or your computer professional to obtain some of this information. Makc enough copies or this worksheet so that YOll can use one for each piece of equipment in your inventory. 1. Gather Basic Information Type of Equipment (Phone, Fax, Elevator, Thermostat, Manufacturing Machine, etc.): Manufacturer: bY ..__ Model Name: /rPY/JJr/(ft-S7ACk ~WITCH Model NWl1ber: ~ T . Year of Manufacture: ~__!J..Z..____~ Serial Number: Manufacturer Contact: / Ku N Address: Phone Number: <~~> h~.y - )IIV Fax Number: &'f.L./ - 393 I E-mail Address: Internet Address: 2. Determine the Risk Level Expected probleM if Non-~ompliant: .Lt,f;:5 tJ F. ET ('{)I1I1U AIle /tTJONS Level of Risk to City/County if this component fails (high, medium, low): ....--'-r--'--..-.-..-.-... 3. Determine a Compliance Strategy Vendor/Manufacturer Recommendations for Compliance: Con;pli~ce Strategy: Ja1Zetall1 o Retire o Upgrade o Replace with: Planned Start Date: J /" Plarmed Completion Date: 5)2 tit} ~ 4. Determine a Testing Strategy Testing Strategy o Full Simulation o Limited Simulation o Walk-through o Other: Date Tested: 5. Estimate Compliance Costs Consultant costs $ Purchase cost of hardware $ Repair cost of hardware $ Other costs $ Total Cost: $ Compliance Completion Date: 6. Available Resources to Correct? 7. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 5 Enclosure 3 ,.~ Business Partners Profile Worksheet 'J Develop a Profile for Each External Business Partner Draw up a detailed profile for each business partner listed in your inventory. You may have to contact your business partners to obtain some of this infom1ation. Make enough copies of this worksheet so that you can use one for each of your business partners. EXHIBIT ---A Page.JJ.iz.. of If{ 1. Gather Basic Information Name of Provider/Customer: _CC'7!L S 3. Determine a Compliance Strategy Recommendations for Compliance: Contact Person: Address: Phone Nwnber: Fax Number: E-mail Address: Internet Address: Supplies or seic Provided/) (JIIE(,K /,.v '!lEek ut/l . f i/N!JIJ ('Ot1I11?IJItIE <.503> .sqq-~S/()5 Co~li~nce Strategy: ,B'Retam o Discontinue Service o Replace with: Planned Start Date: Planned Completion Date: 4. Verify Compliance Verification Assurance: I J Date Verified: t! 5/9 9 il_illli ............. ........... ....................... . ....................... . ....... ........................ .. ::::::::::::::;::::::;::;::;::::;::::::::::;:;:::;::::::::;:;:;:;:::;:::::::: .:::::. :;.:.:::.:;;;::::::::::::::::::;::;:::::::::.:-: ::qilijgW.::1M~~~~I::~~I~~i:r:.::::::I:r:::: ..................... ......-............... .................... ..................... .................... 5. Estimate-Compliance Costs Consultant costs $ Other costs $ . ......................... ............................... .. .......................... .................... .................................................................... :::::;;:::::::;:.:.:.:.;.:.:;::::::::::: .;.:.:.:.;.:.:.:.:.:.:.:.:.:.;.:.:.:.:.:.:.;.:.:.:.:-:.:.:.:.:.:.:.; .. ........ . ._-.. ........... .. . .~~~$fui~::~g;1.!~rJ::~rY~9~Hi.rQy~4~t{:9t:~~~Qmi:#~x~:::: .~Il-:~I~I~:I~~~~~~~tol~lill~i:!lil:i:iill:i .......-............ .. ..................... . ...-........................ ........................ .. ...................... .. ... !_.I.:~:~J ...............................:...:.:.:.:.:.:.:.:.;.;.:.:-:.:.:.:.:.:.:-:.:.;...:...... ..........................:...:.:.:.:...:-:.:.:-:.:.:.:.:.:............. Total Cost: $ .-0- . Compliance Completion Date: City/County Function Supported: L 1137( IJJ( Y 6. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 2. Determine the Risk Le~ Expected Failure Date: (::) Ai F Level of Risk to City/County if this partner fails (high, medium, low): 7 Enclosure 3 .....~~. .".._....-~...,--..,~;.".,."'....".~.,..._,..,.__...,._.~~~-~,-...-.- 1~ Business Partners Profile Worksheet - EXHIBIT --L1 Page -L:.2. of / fJJ ") Develop a Profile for Each External Business Partner , Draw up a detailed profile for each business partner listed in your inventory. You may have to contact your business partners to obtain somc ofthis infonnation. Make enough copies of this worksheet so that you can use one for each of your business partners. 1. Gather Basic Information Name ofProvider/Customer: KAlA! ~plies or Service Plpvided: ]?1,M/;<5; ~ L7?IMINALS Contact Person: SA 1 E /VI VA T /} CAI77< Address: Phone Nwnber: <:5:/ 3) sg-'E( - & 35/ Fax Number: E-mail Address: Internet Address: ................ .........,...... ...-.............,............. ",. ... i__. Ci~y/County Function Supported: .LftW ~).JF()'J((,E)//E~ 2. Determine the Risk LMI Expected Failure Date: 0 N '= , Level of Risk to City/County if this partner fails (high, medium, low): T 1 -.- 3. Determine a Compliance Strategy Recommendations for Compliance: Co~li~nce Strategy: .0'Retam o Discontinue Service o Replace with: Planned Start Date: Planned Completion Date: 4. Verify Compliance Verification Assurance: Date Verified: z15}99 5. Estimate-Compliance Costs Consultant costs $ Other costs $ Total Cost: $ -0-: Compliance Completion Date: 6. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 7 Enclosure 3 I '- Business Partners Profile Worksheet EXHIBIT .A Page.J..1L of I 8 ") Develop a Profile for Each External Business Partner . Draw up a detailed profile for each business partner listed in your inventory. You may have to contact your business partners to obtain some of this information. Make enough copies of this worksheet so that you can use one for each of your business partners. 1. Gather Basic Information Name of Provider/Customer: Ah"RCO M 3. Determine a Compliance Strategy Recommendations for Compliance: Supplies or Service Provided: > 7) ) 5Pfi T(111 (-PC)L Ie E Co~liance Strategy: .E"'"Retain o Discontinue Service o Replace with: Contact Person: Address: Phone Number: Fax Number: E-mail Address: Internet Address: a / If IJ A t/]/;p /(' If ~44 Planned Start Date: d Planned Completion Date: <6f/s/9 9 4. Verify Compliance Verification Assurance: ........... . ........ ......... .......... ................... ................... ................... .................. ......h......... ................. .... .... ............ it_Ii! Date Verified: 15/9 Of 5. Estimate-Compliance Costs Consultant costs $ Other costs $ Total Cost: $ Compliance Completion Date: City/County Function Supported: LAW rNFOK(!eM~NT 6. Determine a Priority Level for Implementing Compliance On the backside of this profile, document your activities, milestones, expenditures, contingency plans and actions taken. 2. Determine the Risk LJ;b1 Expected Failure Date: 'A/r- , Level of Risk to City/County if this partner fails (high, medium, low): 7 Enclosure 3 . m