Res 1546 - Good Faith Eff Y2K
,-
COUNCIL BILL NO. 1985
RESOLUTION NO. 1546
A RESOLUTION DECLARING THE CITY OF WOODBURN'S GOOD FAITH
EFFORTS TO A VOID YEAR 2000 FAILURES, PURSUANT TO THE PROVISIONS OF
SENATE BILL 268, PASSED BY THE 1999 OREGON LEGISLATURE
WHEREAS, the City of Woodburn has a written analysis of the systems it believes most
susceptible to Year 2000 failures; and
WHEREAS, the Year 2000 effects are unknown and uncertain, with experts' opinions
ranging from no effect to catastrophe; and
WHEREAS, the City of Woodburn acknowledges that in the absence ofa commitment to
addressing Year 2000 problems, such so-called "Y-2K" failures may cause interruption of
essential public services; and
WHEREAS, there are multiple existing concerns which must compete for the limited
public resources available to deliver governmental services; and
WHEREAS, it is the opinion of the City of Woodburn that such limited resources are
best utilized, as they concern Year 2000 issues, for those matters deemed "Mission-Critical"; and
WHEREAS, the City of Woodburn has allocated funds within the 1999-2000 City
budget to address possible Year 2000 failures, NOW, THEREFORE
THE CITY OF WOODBURN RESOLVES AS FOLLOWS:
Section 1. The City of Woodburn has a conducted a written analysis of the systems it
believes most susceptible to Year 2000 failures. The City Council has reviewed and considered
this analysis and attaches it to this resolution as Exhibit "N'.
Section 2. The City of Woodburn hereby declares the following services to be deemed
most likely susceptible to Year 2000 failures to be "Mission-Critical":
1. Police
2. Water
3. Sewer
4. Municipal Court
Section 3. The City of Woodburn's 1999-2000 Budget authorizes the expenditure of
certain funds to address Year 2000 problems. The City of Woodburn delegates the discretion to
determine these expenditures to the City Administrator.
Page 1 - COUNCIL BILL NO. 1985
RESOLUTION NO. 1546
.
-r---
'"
'-
Section 4. Although the City of Woodburn clearly recognizes that the Year 2000
problems may affect other areas, in recognition of the limited public resources available, it shall be
the public policy of the City of Woodburn to address the areas determined above as in the overall
best interest of the public. /'I ./ /\ \
Approved as to formcq). <}of' ~ 'B' Il '1lat~e '1
City Attorney ~
APPROVED: ~
RICHARDJENN GS,MAYOR
Submittedtothe~ayor
August 23, 1999
August 24, 1999
Passed by the Council
Approved by the ~ayor
AU<lust 24, 1999
Filed in the Office ofthe Recorder
August 24, 1999
ATTEST:
fY1cu ~
~ary T~ant, City Recorder
City ofW oodbum, Oregon
Page 2 - COUNCIL BILL NO. 1985
RESOLUTION NO. 1546
..
~..,....--'-
~~,
IXHIIIT A
IIiU@ ~ of I E) ~
CITY of WOODBURN
YEAR 2000 PREPAREDNESS
August 11, 1999
The City of Wood bum has reviewed all major systems the are used to manage information or
control processes in an effort to identify those systems that rely on electronic calendars. Any
system that incorporates an electronic calendar is deemed to be susceptible to year 2000 (Y2K)
problems. The City has also identified those systems that are reliant on outside parties and are
therefor sensitive to any problems those third parties may experience.
These systems (listed in order from most important to least important) are most susceptible to
year 2000 problems:
Police communications
RAIN
9* 1 * 1 dispatch
Water
Sewer
Municipal Court
Office buildings
Library
Accounting
General Ledger
Payroll
Utility billing
Business license
Recreation and Parks
RAIN
The Regional Automated Information Network (RAIN) is a system administered by the Salem
Data Center for disseminating information on crimes and criminals. In response to City inquiries
about the Y2K readiness of the RAIN system, officials said the system has been analyzed.
Deficiencies have been identified and corrected, and the system has been tested. Corrective
measures included extensive replacement of equipment.
9*1*1
9*1 *1 emergency dispatch is administered by Norcom. Officials there responded that their
software and hardware have been updated to avoid any interruptions of service as a result of
Y2K. Most of their equipment was replaced.
.,,_.... ..,"~-_.........~~._.~,-~,.. ..
-.--
~,
EX~'B~ -LLof 1 P> =
Page
Water
The water supply and distribution system is a mechanical system that does not rely on electronic
calendars. To that extent it is not susceptible to Y2K problems. However, it relies on electricity
to operate pumps and telephone lines to convey signals to control the pumps. If the telephone
telemetry were to fail the water wells could be operated manually. The Bonneville Power
Administration (BP A) and PGE have made assurances to the region that their systems have been
updated and tested. In addition PGE has written the City making the same claims. In the unlikely
event that there is an interruption of electric power, the City has three wells that have diesel
engines that provide an alternative power source for operating the wells and two wells that have
been prepared to have a generator provide electrical power for pump operation. The City
currently has six active wells. During the winter the water use is at its lowest and no more than
two wells are required for meeting the City's water needs.
Sewer
The sewer plant is being replaced. Some of the control systems will be replaced by December 31,
1999. The City has requested and received written assurances from the various contractors that
the systems they are installing are Y2K compliant. Like the water system, the sewer system relies
on electricity to operate the plant and the pump stations. The Bonneville Power Administration
(BP A) and PGE have made assurances to the region that their systems have been updated and
tested. In addition PGE has written the City making the same claims. In the unlikely event that
there is an interruption of electric power, the City has a suitable generator at the Mill Creek Pump
Station, and a large portable generator would be used to operated the 1-5 pump station. Small
pump stations would be operated by utilizing small shared pumping systems. Telemetry is another
potential problem. Phone lines are used to monitor and control the pump stations. If they fail, the
problem will be immediately apparent to the operator at the sewer plant. Employees can be
dispatched to the critical pump stations and they can be manually controlled.
Municipal Court
The version of the Court system the City is using is not year 2000 compliant. The vendor, MCr,
has available version that does not have Y2K problems. That version will run only on a Novell
netware 5.0 platform. The City is upgrading from Netware 4.2 to version 5.0. The court system
is expected to be year 2000 compliant by December 1.
Office Buildings
Office buildings have been inventoried to determine if heating/ventilating/air conditioning
(HV AC) systems, security systems, or elevators are susceptible to year 2000 problems. No
problems were identified.
Library
The library is dependent on Chemeketa Cooperative Regional Library Services (CCRLS) for its
I' ._,--'-",--
-
EXHIBit A
Page --4- of j 8
check out/check in system, catalogue system, and Internet connection. CCRLS has assured the
City that those systems have been evaluated and tested for Y2K compliance.
General Ledger
The vendor, Eden Systems, acknowledged in 1998 that many of their systems were not Y2K
compliant. They programmed and tested corrections. The updated software was installed on the
City's server in March.
Payroll
In 1998 the vendor, Eden Systems, announced that the payroll system the City was using (version
2.0) would not be supported after December 31, 1999. The 12 year old system was not year
2000 compliant, and it had been improved in other ways in newer versions. The City purchased
version 5.0 which is Y2K compliant. It was installed in April 1999.
Utility Billing
This is custom software developed in house. All date fields are being expanded to four characters
and testing will be completed by August 31, 1999.
Business License
This is custom software developed in house. All date fields have been expanded to four digits.
Testing is completed.
Recreation and Parks
The Recreation and Parks Department uses the "Class" activities registration software system.
The version of "Class" that the City uses is Y2K compliant. Anytime a system failure occurs, the
Department has procedures in place to manually register programs participants.
----------0---------
In the event there is a disruption of service as a result of year 2000, the City will treat it like any
other emergency. The procedures detailed in the City ofW oodburn Emergency Management
Plan will be followed. Management will conduct an emergency exercise in September to refresh
employees knowledge of the procedures.
The manpower and resources committed to managing a Y2K emergency will be consistent with
the City's Emergency Management Plan.
T' -_.....--'
,..
Software Profile Worksheet
EXHIBIT ~
Page -.:.::L. of ) R
=
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
e'nough copies of this worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Type:
o Windows l61ASDOS
o Macintosh 0 Unix
o Other:
Version Number:
Serial Number:
Type of Software (Operating System, Database,
~adsheet, etc. ).:
~i/t I3lt-s~
Package Is Used for: {j cNE1Zltl LE7::GE7<.
ManufacturerlDeveloper: E-P E tV
Year of ManufacturelDevelopment:
Jqq I
ManufacturerlDeveloper Contact:
~7)EN
Address:
Phone Numher Z '?to? 3.2~ -$/ It!
Fax Number: :20~57 - ~/5
E-mail Address:
I ntemet Address:
.._............._......, ....._._....... ... 'd. ............ '"P''' ,...___ _.p..,... ...._... ,. ".
..............-......-....................-.......-.......................................................................
.........................................-................................................................................
.................................................................................................h.......................
..........................................................................................................................
;~s:.:!9B!mmmi9#.:i:~t~t~!~l!~~~~AA::fi~~i.#l::::
~~::::::::::::i:I:::::::I::::::I::::::;::=:::::=:I::::::::=:::::::::lli1$tri:::::::::I::II::::::;::=:::::::::;}
l!llIlllia_,1I
.................... ..... :.:.:.:-:.:.;.:.:.:.:......::. ...... .:.:.:.::::=;=::::.:., ..........;.:.:. ..::::::;:::::::::::::::::::::::::::::::.:.:.:.::...............
:i_I._"II~!
2. Dctcrminc the Risk LfvJ:~ " I
Expected Failure Date: ~E
: Level of Risk to City/County if this software fails
(high, medium, low):
,
.----r--.....--....-....-..'----
3. Detcrminc a Compliancc Stratcgy
Manufacturer/Developer Recommendations for
Compliance:
Compliance Strategy:
D Retain
D R~re
.zrUpgrade
D Replace with:
Planned Start Date:
Planned Completion Date:
. I
3!J!9r
4. Determine a Testing Strategy
Testing Strategy
D Full Simulation
o Limited Simulation
D Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $
Repair cost of software $
Other costs $
Total Cost:
$ -0-.
Compliance Completion Date: .~ J I J 9 9
,
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, docwnent your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
1....
~-""""'<<,
Software Profile Worksheet
EXHIBIT A-
Page...s...... of J p.
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies ofthis worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Type:
o Windows
o Macintosh
o Other:
Version Number:
Serial Number:
.J31VISDOS
o Unix
3. Determine a Compliance Strategy
Manufacturer/Developer Recommendations for
Compliance:
Compliance Strategy:
D Retain
DR~e
...ErtJ pgrade
D Replace with:
Type of Software (Operating System, Database,
spreadsheet~.) :
yA-TIT IJ C;E-
Package Is Used for: '}J/} YW L L-
ManufacturerlDeveloper: E 7) t;- )y
Year of ~ufacturelDevelopment:
" 199-~
Planned Start Date: .
Planned Completion Date: :5/1/99
M~facturerlDeveloper Contact:
-Pc It/
Address:
Phone Number ~~~? _3~f( - 00/2
Fax Number: 5 - ~
E-mail Address:
Internet Address:
4. Determine a Testing Strategy
Testing Strategy
D Full Simulation
D Limited Simulation
D Walk-through
D Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $12,/.aI .
Repair cost of software $
Other costs $
.............. . - ..... ......... ...'..... .....
...........,.. .................... ............................
.............. .................... .........................
.............. ... .................... .... ....... ...
........ .. .. ....... .. .. .... ...... .. . .
..!I~II!!lllj!~!!~~~~IJ-~I~I~I!!II~r-~~!I!!I:!j
!1~li~~ll:!I~~~~~!1111~.AI1:.111:lilll:11!1:::1:liii:li\111:!\
::::;:::::}}~{:~:~:\}{j?~frjr~~rrr~~~~t~~~~~~?~t~t~~~t~~~~~~~~~r:::::~:::~:}r?~{;}~:}:;;;:::;:;:;::::::;:::::::::::::::\?~~~:~.::::::::::::::::::::::::~:::::::::::
!1~~1~~1MtI~,
Total Cost:
$ )2.(X)O.
,-
Compliance Completion Date: t5/1 ) 99
f
6. Available Resources to Correct?
2. Determine the Risk ~
Expected Failure Date: , A/ b
i Level of Risk to City/County if this software fails
(high, medium, low):
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, docwnent your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
T
~~" r
Software Profile Worksheet
-
EXHIBIT A-
Page~ of iA
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies of this worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Type:
o Windows Ja1:1SDOS
o Macintosh 0 Unix
o Other:
Version Number:
Serial Number:
Type of Software (Operating System, Database,
. S preadsheet~c.):
-PitTA ASG
Package Is Used for: UTILITY 75/L L/A/(]
ManufacturerlDeveloper: c!IJST 01--1 )N)J OU S E
. Year of ManufacturelDevelopment:
, 19Q5
MwufacturerlDeveloper Contact:
0E;i>IJL]) L,EI/l1i3IJCII
Address:
Phone Number: :2/?
Fax Number:
E-mail Address:
Internet Address:
..'.........-.........-.......'...............-..... ..'........-.-...-................... -.................................-.......................... ...........-...-............................
............ ..... ...... ...... . ........... . .................. ........ ....... ........
!RI&I!!li~:::::::::!i:I!!!i!I!:~i!:::.!.:::i:I.:::::!11:.il.:.lj.~~'~i~~lt:::.::::::::.~:.:..:.:..!:!..:I.:::.:::::
2. Determine the Risk ~
Expected Failure Date: AIr
: Level of Risk to City/County if this software fails
(high, medium, low):
'-'_.,....._~--'---t--."--_.- .---,--....,....
3. Determine a Compliance Strategy
ManufacturerlDeveloper Recommendations for
Compliance:
Compliance Strategy:
o Retain
o Retire
Ja1]j;grade
o Replace with:
Planned Start Date:
Planned Completion Date:
q)J5)99
t f
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $
Repair cost of software $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Lcvel for Implemcnting
Compliancc
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
,,.
Software Profile Worksheet
-----,
EXHIBIT A
page..::L.. of I B
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies of this worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Type:
o Windows .01Vi.SDOS
o Macintosh 0 Unix
o Other:
Version Number:
Serial Number:
Type of Software (Operating System, Database,
~eadsheet, ~:
~ T/) A56;;
Package Is Uscd for:15Ve;!ESS 1/(' FN 5 E
ManufacturerlDeveloper: iJ STan )N )/Oi./SE
Year of ManufacturelDevelopment:
I /qq?
ManufacturerlDeveloper Contact:
Address:
Phone Number:
Fax Number:
E-mail Address:
Internet Address:
.__~tll
:-;.:.:.:.;.:-:.:.:.;.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.: .......................:......................:......:.:.:.:.:.:.:.......................:-:.:-:.:.:.:-:.:.:.....................-.................-.....-...;.:.:.;.:.:.:.:.:.:.:
Ptl~~~i~:Mi.~~~~ft:~I__~::~~:::~:::::::I~i:.~::::~:::;:::~~:::~I:::I:~::~:::::::::::~:::~::~~~~:::::::t::~::::I:~:::::~~:~:.::!
iil.'_i~1
2. Determine the Risk Level
Expected Failure Date:
" Level of Risk to City/County if this software fails
(high, medium, low):
.'.-.... -....__..~"--.._--..".,,._~...,',...,-~"~... W t
3. Determine a Compliance Strategy
Manufacturer/Developer Recommendations for
Compliance:
Compliance Strategy:
D Retain
D Retire
~grade
D Replace with:
Planned Start Date:
Planned Completion Date: q /J5/cfl
4. Determine a Testing Strategy
Testing Strategy
D Full Simulation
D Limited Simulation
o Walk-through
D Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $
Repair cost of software $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
~r
Software Profile Worksheet
EXHIBIT A
Page...Ii- of /8
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies ofthis worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Ty~
Ef"Windows
o Macintosh
o Other: AI T
,
Version Number:
Serial Number:
o MSDOS
o Unix
Type of Software (Operating System, Database,
S~sheet, etc.): C
()(! is ~ S () /tI7m L
Package Is Used for: ~ IG Ii T J(j Iv'
ManufacturerlDeveloper: -We) ^tDt':7< \AlA 1? b
. Year of ManufacturelDevelopment:
I lqqq
ManufacturerlDeveloper Contact:
J!.I M /} NDE""R S (j N
Address:
Phone Number: <5-'11> 752 -.lf2 t.j /
Fax Number:
E-mail Address:
Internet Address:
.. ...... d............... .. . _ ._.... .... ,. ... ........_......... . ,.... .............. ...... ..,
.................. ................. ...-..... .......................... ........ ........................
................ '" .... ..................
:tm~::!~:~9.iW~::@P.PW$::I::~!!1R;~~':m~~~~~::g~!~#*::::'.
.1_-
,....-
2. Determine the Risk Level
Expected Failure Date: _
" Level of Risk to City/County if this software fails
(high, medium, low):
'II"
3. Determine a Compliance Strategy
Manufacturer/Developer Recommendations for
Compliance:
COl~li~nce Strategy:
.Jd"Retam
o Retire
o Upgrade
o Replace with:
Plmmed Start Date:
Planned Completion Date: 7/99
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $
Repair cost of software $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
,~
Software Profile Worksheet
EXHIBI1- 6
Page -'- of I B
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies of this worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:) (J _
Type: NUN Ie IPI'r L {)O1<1
o Windows B'lYfSDOS
o Macintosh 0 Unix
o Other:
Version Number:
Serial Number:
Type of Software (Operating System, Database,
Spreadsheet, ~B:
--Pfii./t ASC
Package Is Used for: (!/lC;Em ltC'I' IA/()
Manufacturer/Developer: M S I
, Year of ManufacturelDevelopment:
I /qC?O
ManufacturerlDe~oper Contact:
DRYf}N ~nlTIf
Address:
Phone Number: <So) >
Fax Number:
E-mail Address:
Internet Address:
.L/52 -~
452 -t/03?-
..'..n...................._ .. ........... ,.. .....
. n. ...... n.. ........... .........................
....................
m~~..fl':f~lfil:~II..~,fr~tlli~~.'m~.,,~I~~i~:.':.i.
~:!=~::::::::::::::::::::I::::::::::::::::::::::!:::!:!!!!!!!j:!!!!!:!:!!jll:l!:!!!!!~:l!!:!!!!!!!\!!!!:!!!!!!:!!!!:).:!:/:::.,
~~i~~!~'!~~~~~~:~'If:I:.!::!:!:!::::!!!!!!!:!:!!:::!:!!i!::!:::::l::':!!!!!!!:::!:!!!l!!!!!!:!!!.!!!!!!!!!!!!:!!!!:!!:::!!!!!
IlIlIt\I;I_lllllll
2. Determine the Risk Level
Expectcd Failure Datc: 1213 I /9 9
, Level of Risk to City/County if this softwarc fails
(high, medium, low):
~_.~.,-~.
t""" ~.
3. Determine a Compliance Strategy
Manufacturer/Developer Recommendations for
Compliance:
Compliance Strategy:
D Retain
DR~e
..zo pgrade
D Replace with:
Planned Start Date:
Planned Completion Date:
12/1/99
(
4. Determine a Testing Strategy
Testing Strategy
D Full Simulation
D Limited Simulation
D Walk-through
D Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $ 2 LW . --
,
Purchase cost of software $
Repair cost of software $
Other costs $
Total Cost: $ 2 {)CO .
Compliance Completion Date: /.2)1/9 tt
f (
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
^.......,
Software Profile Worksheet
EXHIBIT A
page..& of J f1
Develop a Profile for Each Piece of Software
Draw up a detailed profile for each piece of computer software listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies ofthis worksheet so that you can use one for each piece of software in your inventory.
1. Gather Basic Information
Software Name:
(if operating system:)
Type:
~indows
o Macintosh
o Other:
Version Number:
Serial Number:
o MSDOS
o Unix
3. Determine a Compliance Strategy
Manufacturer/Developer Recommendations for
Compliance:
Co~liance Strategy:
ffRetain
o Retire
o Upgrade
o Replace with:
Type of Software (Operating System, Database,
~dsheet, e~: Planned Start Date:
. j//fTA - J-5/J )'E Planned Completion Date:
Package Is Used forPI11?KS --PE(;IS7!jI}7A}JY 4. Determine a Testing Strategy
ManufacturerlDeveloper: Testing Strategy
Year of ManufacturelDevelopment: 0 Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
ManufacturerlDeveloper Contact:
(I LA S 'S
Address:
Phone Number:
Fax Number:
E-mail Address:
Internet Address:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of software $
Repair cost of software $
Other costs $
..-................, . . '" - ... .... ... ..".-- _."p--....
...'........-................................................... .................. ...............................................................
P. ....... ,_ ....
.. .. .... '" ..
mg@:~~,~9B~ltlillim::i::E~~~M~t,:!M.~~JMIaSt~~#~:,[::
O:y~~:::::,j:::::::::::::::m::::II:::::II:::::::m:::::::::::::,:,:::::::::::I:::::~S::::::::I::::::::::::t:::I::::::i/::
.......................;.......:::.:...-...........:.:::.:::<:;;:::::::::::;;:-:.;.;.............:-:..........................;.;.:.:...................;.:...................
. . . . ........ .... ...... .. -":':': ........:-:.:.~:~:~:~:~:~~~;~~:;~:~:::~::::::.:.~\){ftr:t:::::::r:t~:~:::::~:~:~:~:~~~:~:~:~:;t~f[:;:;:;:;;.:':::':".::::::: ::: ............
:~r!~~~~!!l~~~~~~!:!"_~!::::j::!!!::!\:!!!j::!:\!\:!^::::::!\!!!:!!::!!!!.::!!!:!\!l!!!I!::'!!!!;::;:;!;:\!ill:!:!!!:!!!!:;!!!!:::
'_JiIlIlIIIi,1
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
2. Determine the Risk ~
Expected Failure Date: XI c-
\ Level of Risk to City/County if this software fails
(high, medium, low):
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
Enclosure 3
.-....,. ..--...,..-....'.-.. t-..'..,--.-----..'-.--.----
Computer Hardware Profile Worksheet
EXHIBIT A
Page -LL of 111
Develop a Profile for Each Piece of Computer Hardware
Draw up a detailed profile for each piece of computer hardware listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies 0 r this worksheet so that you can use one for each pieee of equipment in your inventory.
1. Gather Basic Information
Manufacturer: (! () 11'711 ~
Model Name: 'P:ROL)1f- AI r :25CO
Model Number:
Year of Manufacture: 191'
Serial Number:
If this equipment part of a network:
Type of Network: W.hl~
Custodian of Network: eN GlttE:S7:>/E
Use on Network (server, PC, printer, etc.:
SE7?VE7<
Manufacturer Contact: ) J( 0 N
Address:
Phone Number: <503) 0~ 4- )/! X'
\ Fax Number: . &~.c:; -398 I
E-mail Address:
Internet Address:
....... ....... .
..............................
.-- .... .... .... ..-........
....................................
.................... ......
.................. .....
2. Determine the Risk Level
Expected Failure Date: ,410 AJ C
Level of Risk to City/County if this component
fails (high, medium, low):
, -.-.----
3. Determine a Compliance Strategy
Vendor/Manufacturer Recommendations for
Compliance:
Co~i~ce Strategy:
)2rRetam
o Retire
o Upgrade
o Replace with:
Planned Start Date:
Planned Completion Date:
3) 15) 9<;1/
, (
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of hardware $
Repair cost of hardware $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
3
Enclosure 3
Computer Hardware Profile Worksheet
EXHIBIT A
Page.J.siL of I p..J
.
Develop a Profile for Each Piece of Computer Hardware
Draw up a detailed profile fix each piece of computer hardware listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies of this worksheet so that you can use one for each piece of equipment in your inventory.
1. Gather Basi~ Information) >
Manufacturer: (}j 11 P /fa. ~ LJ ~
Model Name: nO;: Jf) NT ~d
Model Number: ./
Year of Manufacture: let)?'
Serial Number:
I f this equipment part of a network:
Type of Network: Wt9 IV
Custodian of Network: 73eN G/LL-C '!)l>/C;:-
Use. on Network (server, PC, printer, etc.:
~nJ/57?
Manufacturer Contact: / J: {; N
Address:
Phone Number: (.t:::;O 3'/ &, rt 4 .- / II ~
\ Fax Number: . (784 - 39_:fi I
, E-mail Address:
Internet Address:
;:::::::::::::::::::"~::::;~::
....... '.'~.:.:.;.'.'
2. Determine the Risk Ler<JI
Expected Failure Date: /)IeJ AlE
Level of Risk to City/County if this component
fails (high, medium, low):
._'_.,.....,--.-._~----
3. Determinc a Compliance Strategy
Vendor/Manufacturer Recommendations for
Compliance:
Co~i~ce Strategy:
zRetam
o Retire
o Upgrade
o Replace with:
Planned Start Date:
Planned Completion Date: 3) /~j 9 ?/
, ,
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of hardware $
Repair cost of hardware $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resourccs to Correct?
7. Dcterminc a Priority Lcvcl for Implcmcnting
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
3
Enclosure 3
Computer Hardware Profile Worksheet
EXHIBIT A
Page ~ of 1/8
Develop a Profile for Each Piece of Computer Hardware
Draw up a detailed profile for each picce of computer hardware listed in your inventory. You may have
to contact the manufacturer or your computer professional to obtain some of this information. Make
enough copies of this workshect so that you can use one for each piece of equipment in your inventory.
1. Gather Basic Information
Manufacturer: 1iCi'Ri EL
Model Name:. ilA 1- JAlTE7?NcT
Model Number: .lJ<jO
Year of Manufacture: /q'lq
Serial Number:
If this equipment part of a network:
Type of Network: )JVTE7?-1-ET
CustodiaTl of Network: De. aiL L GS7'/G
Use on Network (server, PC, printer, etc.:
)jET Se??Ve72
Manufacturer Contact: I k 0 N
Address: ~
PhoneNumber: <~03) &V4- III?
\ Fax Number: . ~f.1j-'59~1
, E-mail Address:
Internet Address:
11.."_1
2. Determine the Risk LX~f
Expected Failure Date: () N ~
Level of Risk to City/County if this component
fails (high, medium, low):
--_..-...........'--r--~.
3. Determine a Compliance Strategy
Vendor/Manufacturer Recommendations for
Compliance:
Compliance Strategy:
~etain
o Retire
o Upgrade
o Replace with:
Planned Start Date: I-.
Planned Completion Date: q/I/9 9
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of hardware $
Repair cost of hardware $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
3
Enclosure 3
,-
Uther Date-Sensitive Hardware Profile Worksheet - EMBED~ SiXS ~ _Jlv1S
Develop a Profilc for Each Piecc of Othcr Date-Sensitivc Hardware
Draw up a dctailed profile for cach piece of datc-sensitivc hardware listed in your inventory. You may
have to contact the manufacturer or your computer professional to obtain some of this information.
Makc cnough copies of this worksheet so that you can use one for each piece of equipment in your
inventory.
1. Gather Basic Information
Type of Equipmcnt (Phone, Fax, Elevator,
Thermostat, Manufacturin achinc, etc.):
Manufacturer: 0--
Model Name: /i7)YIi Nf E :12/1('/< ::;w/T(!H
Model Number: 22 L/ r
Year of Manufacture: i 9 V
Serial Number:
Manufacturer Contact: ) 1<0 AI
Address:
Phone Number: <5ZJ3) &f 4- 1)/'6
Fax Number: 6r4l- 39'S I
E-mail Address:
Internet Address:
2. Determine the Risk Level
Expected proble~s ifNo9jcompliant:
lo~s ()~ It bT L{J!1MvIV/{lAT/(1),JS
,
Level of Risk to City/County if this component
fails (high, medium, low):
_.,,_.. ..-'-yo--.--.-r--.~.-~-~.---.-
3. Determine a Compliance Strategy
V cndor/Manufacturer Recommendations for
Compliance:
COI~li~ce Strategy:
..01ze ta 111
o Retirc
o Upgrade
o Replace with:
Planned Start Date: J J ,
Planned Completion Date: 5/2 q' /9 f
(
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of hardware $
Repair cost of hardware $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determinc a Priority Level for Implementing
Compliancc
On the backsidc of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
5
Enclosure 3
,,.
-,
Uther Date-Sensitive Hardware Profile Worksheet - EMBEDDED CHIP SYS 1 GMS
EXHIBIT A
Page..J..:S... of lid
Develop a Profile for Each Piece of Other Date-Sensitive Hardware
Draw up a dctailed profilc for cach piece of date-scnsitive hardware listed in your inventory. Y Oll may
have to contact the manufacturcr or your computer professional to obtain some of this information.
Makc enough copies or this worksheet so that YOll can use one for each piece of equipment in your
inventory.
1. Gather Basic Information
Type of Equipment (Phone, Fax, Elevator,
Thermostat, Manufacturing Machine, etc.):
Manufacturer: bY ..__
Model Name: /rPY/JJr/(ft-S7ACk ~WITCH
Model NWl1ber: ~ T .
Year of Manufacture: ~__!J..Z..____~
Serial Number:
Manufacturer Contact: / Ku N
Address:
Phone Number: <~~> h~.y - )IIV
Fax Number: &'f.L./ - 393 I
E-mail Address:
Internet Address:
2. Determine the Risk Level
Expected probleM if Non-~ompliant:
.Lt,f;:5 tJ F. ET ('{)I1I1U AIle /tTJONS
Level of Risk to City/County if this component
fails (high, medium, low):
....--'-r--'--..-.-..-.-...
3. Determine a Compliance Strategy
Vendor/Manufacturer Recommendations for
Compliance:
Con;pli~ce Strategy:
Ja1Zetall1
o Retire
o Upgrade
o Replace with:
Planned Start Date: J /"
Plarmed Completion Date: 5)2 tit} ~
4. Determine a Testing Strategy
Testing Strategy
o Full Simulation
o Limited Simulation
o Walk-through
o Other:
Date Tested:
5. Estimate Compliance Costs
Consultant costs $
Purchase cost of hardware $
Repair cost of hardware $
Other costs $
Total Cost:
$
Compliance Completion Date:
6. Available Resources to Correct?
7. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
5
Enclosure 3
,.~
Business Partners Profile Worksheet
'J Develop a Profile for Each External Business Partner
Draw up a detailed profile for each business partner listed in your inventory. You may have to contact
your business partners to obtain some of this infom1ation. Make enough copies of this worksheet so that
you can use one for each of your business partners.
EXHIBIT ---A
Page.JJ.iz.. of If{
1. Gather Basic Information
Name of Provider/Customer:
_CC'7!L S
3. Determine a Compliance Strategy
Recommendations for Compliance:
Contact Person:
Address:
Phone Nwnber:
Fax Number:
E-mail Address:
Internet Address:
Supplies or seic Provided/)
(JIIE(,K /,.v '!lEek ut/l
. f
i/N!JIJ ('Ot1I11?IJItIE
<.503> .sqq-~S/()5
Co~li~nce Strategy:
,B'Retam
o Discontinue Service
o Replace with:
Planned Start Date:
Planned Completion Date:
4. Verify Compliance
Verification Assurance:
I J
Date Verified: t! 5/9 9
il_illli
............. ...........
....................... .
....................... .
....... ........................
.. ::::::::::::::;::::::;::;::;::::;::::::::::;:;:::;::::::::;:;:;:;:::;:::::::: .:::::. :;.:.:::.:;;;::::::::::::::::::;::;:::::::::.:-:
::qilijgW.::1M~~~~I::~~I~~i:r:.::::::I:r::::
.....................
......-...............
....................
.....................
....................
5. Estimate-Compliance Costs
Consultant costs $
Other costs $
. .........................
............................... .. ..........................
.................... ....................................................................
:::::;;:::::::;:.:.:.:.;.:.:;::::::::::: .;.:.:.:.;.:.:.:.:.:.:.:.:.:.;.:.:.:.:.:.:.;.:.:.:.:-:.:.:.:.:.:.:.; .. ........ . ._-.. ........... .. .
.~~~$fui~::~g;1.!~rJ::~rY~9~Hi.rQy~4~t{:9t:~~~Qmi:#~x~::::
.~Il-:~I~I~:I~~~~~~~tol~lill~i:!lil:i:iill:i
.......-............ ..
..................... .
...-........................ ........................ .. ...................... .. ...
!_.I.:~:~J
...............................:...:.:.:.:.:.:.:.:.;.;.:.:-:.:.:.:.:.:.:-:.:.;...:...... ..........................:...:.:.:.:...:-:.:.:-:.:.:.:.:.:.............
Total Cost:
$ .-0- .
Compliance Completion Date:
City/County Function Supported:
L 1137( IJJ( Y
6. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
2. Determine the Risk Le~
Expected Failure Date: (::) Ai F
Level of Risk to City/County if this partner fails
(high, medium, low):
7
Enclosure 3
.....~~. .".._....-~...,--..,~;.".,."'....".~.,..._,..,.__...,._.~~~-~,-...-.-
1~
Business Partners Profile Worksheet
-
EXHIBIT --L1
Page -L:.2. of / fJJ
") Develop a Profile for Each External Business Partner
, Draw up a detailed profile for each business partner listed in your inventory. You may have to contact
your business partners to obtain somc ofthis infonnation. Make enough copies of this worksheet so that
you can use one for each of your business partners.
1. Gather Basic Information
Name ofProvider/Customer:
KAlA!
~plies or Service Plpvided:
]?1,M/;<5; ~ L7?IMINALS
Contact Person: SA 1 E /VI VA T /} CAI77<
Address:
Phone Nwnber: <:5:/ 3) sg-'E( - & 35/
Fax Number:
E-mail Address:
Internet Address:
................
.........,......
...-.............,............. ",. ...
i__.
Ci~y/County Function Supported:
.LftW ~).JF()'J((,E)//E~
2. Determine the Risk LMI
Expected Failure Date: 0 N '=
,
Level of Risk to City/County if this partner fails
(high, medium, low):
T
1 -.-
3. Determine a Compliance Strategy
Recommendations for Compliance:
Co~li~nce Strategy:
.0'Retam
o Discontinue Service
o Replace with:
Planned Start Date:
Planned Completion Date:
4. Verify Compliance
Verification Assurance:
Date Verified: z15}99
5. Estimate-Compliance Costs
Consultant costs $
Other costs $
Total Cost:
$ -0-:
Compliance Completion Date:
6. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
7
Enclosure 3
I
'-
Business Partners Profile Worksheet
EXHIBIT .A
Page.J..1L of I 8
") Develop a Profile for Each External Business Partner
. Draw up a detailed profile for each business partner listed in your inventory. You may have to contact
your business partners to obtain some of this information. Make enough copies of this worksheet so that
you can use one for each of your business partners.
1. Gather Basic Information
Name of Provider/Customer:
Ah"RCO M
3. Determine a Compliance Strategy
Recommendations for Compliance:
Supplies or Service Provided: >
7) ) 5Pfi T(111 (-PC)L Ie E
Co~liance Strategy:
.E"'"Retain
o Discontinue Service
o Replace with:
Contact Person:
Address:
Phone Number:
Fax Number:
E-mail Address:
Internet Address:
a / If IJ A t/]/;p /(' If
~44
Planned Start Date: d
Planned Completion Date: <6f/s/9 9
4. Verify Compliance
Verification Assurance:
........... . ........
......... ..........
...................
...................
...................
..................
......h.........
................. .... .... ............
it_Ii!
Date Verified: 15/9 Of
5. Estimate-Compliance Costs
Consultant costs $
Other costs $
Total Cost:
$
Compliance Completion Date:
City/County Function Supported:
LAW rNFOK(!eM~NT
6. Determine a Priority Level for Implementing
Compliance
On the backside of this profile, document your
activities, milestones, expenditures, contingency
plans and actions taken.
2. Determine the Risk LJ;b1
Expected Failure Date: 'A/r-
,
Level of Risk to City/County if this partner fails
(high, medium, low):
7
Enclosure 3
.
m