Loading...
HomeMy Public PortalAboutICRMP Renewal 2023 Questions MRAICRMP Renewal Questions (2023) Liability Questions      Total Salaries/Wages from W-3 (line 5):  Law Enforcement Salaries/wages Total: (include jail and dispatcher staff)   # of Full-Time Employees:  # of Part-Time Employees:     # of EMTS/Paramedics:   # of Full-Time Law Enforcement Officers:  # of Part-Time Law Enforcement Officers:   #of Detention Officers:  # of Jail Nurses:   # of Jail Beds:  Average Detention/Jail Population:   Water/Sewer/Wastewater Payroll:  Total Operating Budget or Expenditures:   Do You Own or Operate an Airport or Airstrip:      Do you have employees who have a pesticide applicator license that requires proof of insurance for the Idaho Department of Agriculture?       The following is Not Applicable to The Urban Renewal District Cyber Related Exposures  My organization/county has formalized IT and cybersecurity policies and plans that document, for example, guidelines for acceptable use of IT, passwords, reporting of unusual activity (e.g., workstation locking up or not functioning properly), cybersecurity training, and cyber incident response:  cyber policy:         We review our organizations' IT and cybersecurity policies, procedures, and plans at least annually and we make updates/changes based on changes in the organization, the cybersecurity environment, and technology.  review annually:       In the case of a cybersecurity incident, we report the incident to:  incident report:          (note: Cyber Incident Support Vendors may include Cyber Forensics, Cyber Legal Support, and other cyber incident support)  Our staff receive mandatory cybersecurity awareness training at least annually on expectations of staff to recognize common cyber-attacks, such as social engineering and phishing, to report possible cybersecurity incidents or other types of cyber-attacks, and to know who to report cybersecurity issues/problems to.  staff training:        We have staff (either internal staff or outsourced contractors/vendors) who are responsible for maintaining our IT systems and applying maintenance and cybersecurity patches to software on the workstations within our organization.  self-staffed IT:       Our staff logs in to their IT workstations using multi-factor authentication (e.g., receiving a text message to validate log in).  multi-factor authentication logins:       We have cybersecurity tools and systems that monitor who is on our network, when they are on the network, and what network resources they are using.  network monitoring:       We have implemented email content filtering and web content filtering to identify unauthorized activity, malicious attachments, and other prohibited activity that may negatively impact our IT network and systems.  network filtering:       Our critical and sensitive data is backed up, stored and encrypted offline on a different logical or physical network such as a cloud backup to support recovery from a catastrophic cyber incident if required.  cloud or off-site data backups:           We have implemented tools (e.g., Endpoint Detection and Response tools such as Microsoft Defender for endpoints, CrowdStrike Falcon, or Malwarebytes Endpoint Security) to automatically monitor, log, and report unusual and unauthorized activities that occur on our IT workstations.  unauthorized monitoring:       We have software/hardware that is no longer supported by the manufacturer or vendor but is active on our IT network.  unsupported systems:         We have a formal Disaster Recovery Plan and a formal Business Continuity Plan that guides us in setting the priority of system (applications / systems / databases) restoration to recover from a cyber incident that impacts our business operations.  recovery plan: