Loading...
HomeMy WebLinkAbout053017ws Agenda Package9:00 am 9:15 am 9 :30 am 10:00 am 10:15 am 10 :30 am 10:45 am 11:00 am 11:30 am Harnett County Board of Commissioners Work Session Tuesday, May 30, 2017 Presentation of Budget Message and FY 2017-18 Proposed Budget Plan Budget discussion Harnett Regional Jetport -Terminal Building Schematics, Barry Blevins Electronic Records & Imaging Policy and Technology U se Policy, Ira Hall Property Liability Insurance Carrier discussion, Heather Pollard Town of Erwin 's library request, Angela McCauley County Manager's Report: June 6, 2017 Regular Meeting Agenda Review CCCC Board of Trustee Appointment Closed session Adjourn 053017ws HCBOC Page 1 Terminal Building Preliminary Design Proiect Bullet Points o Preliminary Project Cost for Either Terminal Rehabilitation or Terminal Replacement is estimated at $3M. o HOWEVER, final cost is yet to be determined -Thus, the preliminary design project at 30%. • NCDOT/Division of Aviation may contribute up to $562,500. • FAA monies may be available but only on aviation-related deliverable -such as line manager's office/work area, waiting room , flight planning/pilot's lounge, et cetera. o Final project will require a cost breakout separating eligible & non-eligible project deliverables/funding (Architect provided) • Non-Primary Entitlement (NPE) funds are also available -with 10% county match required - current available funds are $332K with $33K match • The balance of project funding is county-sponsored . ./ Airport Committee recommended the split-level design (building elevation). Layout requires refinement and approval. ./ Requesting Board offer recommendation, get as many comments as possible prior to Architect providing a completion of the 30% Design Level (defined below). 30% Des ign Level: DEFINED Phase 2 -30% Construction Drawing Package ~ Incorporate modifications from schematic design review ~ Establish drawing layout methods and convention s ~ Coordinate location of site grading and underground utilities ~ Design and document thermal envelope requirements ~ Design and document interior layouts of specialty areas and owner-selected equipment ~ Coordination with mechanical, electrical, and plumbing engineering including: ~ Provide narrative of mechanical, electrical, and plumbing system designs ~ Coordinate location of services and underground utilities ~ Participate in an interdisciplinary quality control review ~ Coordination with structural engineering including: ~ Provide narrative of system designs ~ One (1) agency review meeting ~ Deliverables to include 30% construction drawings and narratives ~ One (1) on-site design coordination meetings at 30% completion milestone 053017ws HCBOC Page 2 LANDSIDE PERSPECTIVE AIRSIDE PERSPECTIVE EXISTING TERMINAL HARNETT REGIONAL JETPORT THE WILSON GROUP APRIL 20, 2017 TALBERT & BRIGHT 053017ws HCBOC Page 3 -t f f~ I I ~l ~l _L __ ff«z, /VGA/ !=A'1Sri=. 053017ws HCBOC Page 4 ---1 f i t--n -ft~ I Al/!JtPG ? -t:? ~ <::;;,f-J I I +--f'ii-----.,&. s:Y:::::::E ====sdl .J,o@J r ,.............., L.-----====!:!!~ I I I u I . r £ tVTIL!j f"-",ZC, H L_ __ u _.Jll-- jg_ _ _J ® /,IA ~N8tr ufl);..ql/ v57?7~/CT (PLAN) f.GtWJ1/ATPtN ¢ II di/,rJDJI.J . ' '\ ------------ £~&.IJ/7 .., .e.r--1 s-r~ re, ,l!!'3 lft'f ~ IN --~w ri,JZJ r run>_& -+;8~ NSP- -II I U>.Sr ~65 /I I I ::::;. /1) r6..16=-+.c;.;7 053017ws HCBOC Page 5 r---- ' ) r--1 ' l , ' I I I J I t f j . j,_ ________ .. J ·, -. J . ;::::. Jj All . - H 1 \ lllilt Mo.~--·*" - - - - -----, I 1 ' J t I , ' ' ·---, r-' r I ---__ ,J I '-1 I \ I \ \ ' ' I I i I---... ...... --..__----... .... _.. ..... .... .__ -----....._ .... ..... ..... ..... ---........ . &EU>NP F~t>f>/J._ -,4~() +1Jf= -11 , ?o tf= vNf1Ht~ftw ,,_,.f)~ I ~/1) I 76-16=- +·5·!7 053017ws HCBOC Page 6 J'.f./P~t> If rw? f.t;.,1 053017ws HCBOC Page 7 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 5 CO N C E P T 1 - RE N O V A T I O N / A D D I D O N H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 8 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 6 CO N C E P T 1 - RE N O V A T I O N / . A D D f f i O N H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 9 ~x-,srl: ~ttt?/IJC. ~66&:E~Z::> ~ 't./S"rt:= Pt.f~.%,e 1 L~ - 053017ws HCBOC Page 10 ---- t!!:'rP /())( /() I I I ~==~==~==~---~--~--~--~~ I iO - ;Fife JT rt.otJj2 -4j 8,oo II Sr -~ 2.~ s,: id~cr I ~/1) I 76-16=- +·l'f.17 053017ws HCBOC Page 11 #'C:.ON~ ~y6~ ~~~MGE,pHC /.,.;f ~ 1 hj ¥ ?DI -+ @ /IAf!?.NEr/'" Covurf v5{:;7~ c5£~NP f='.tb'/-!'LAt-l Si5D:wD TLtn>f:- -2 1 t::J'3~ I/Sr -~ JtJ Sr ~SS6~1W J:6:;~ I ~/1) I rD..!6=- +-11,17 053017ws HCBOC Page 12 @ i-,we> cF De :t=,tSYf P'/JN cJfrlt>}.} !(,eA; ~/L.ON~ II I If 1~,t>-0 ,w&:- 4'·$·/1 053017ws HCBOC Page 13 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 11 CO N C E P T 2 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 14 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 12 CO N C E P T 2 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 15 @) ./,~P£10e ~itYATJ~ crptPN N,e,N 6V/~ON~ I Jf 1ol [W~ -4-·19· /1 053017ws HCBOC Page 16 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 14 CO N C E P T 3 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 17 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 15 CO N C E P T 3 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 18 ~ II .. . . d LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 16 CO N C E P T 3 AL T - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 19 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 17 CO N C E P T 3 A L T - N E W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 20 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 20 100 50 0 SCALE IN FEET 1"= 100' 100 ( . ) < ( 3 : X < ( r H A R N E T T R E G I O N A L J E T P O R T A E R I A L P H O T O O F E X I S T I N G A P R O N E X H I B I T 1 0 < ( 3 : X < ( r 0 5 3 0 1 7 w s H C B O C P a g e 2 1 • 100 ' I --=-r--___ _ , r.T "T "T "T "T 49 I . . . . · I I . .i.. . .i.. . .i.. . .i.. . .i.. j -----------"' PROPOSED CONCRETE ..,. APRON -----+--------~ ----~-50 0 100 SCALE IN FEET 1"= 100· • , - T - T _ T _ T _ , = - T ~ T ' i i [ T ~ l I · · . . . . . . . I 1 . . L . . L . . L - . . L . . L - . . l . . . . l . . _ t · . . l . : . , _ _ J ' E X I S T I N G B I T U M I N O U S A P R O N ~ : ~ - - - - ~ - - - - - - - - - - - - , . , --- - - - - - - - - f A l f f • / I A - 1 ' - i ' t - - - - - - - - - - - - - ~ - - - - - - - - - • • • • R U N W A Y 5 - 2 J H A R N E T T R E G I O N A L J E T P O R T C O R P O R A T E A P R O N A N D H E L I P A D C O N S T R U C T I O N E X H I B I T 3 , , - - - - ; : - - - - - - - - - ~ . - ' . , , . . _ _ _ L E G E N D ~ E X I S 1 1 N G P A V E M E N T T O B E R E M O V E D ~ E X I S 1 1 N G P A V E M E N T T D B E R E M O V E D A N D P A V E D C O N C , _ _ ~ , . P R O P O S E D C O N C R E T E P A V E M E N T 0 5 3 0 1 7 w s H C B O C P a g e 2 2 LANDSIDE PERSPECTIVE AIRSIDE PERSPECTIVE EXISTING TERMINAL HARNEIT REGIONAL JETPORT THE WILSON GROUP APRIL 12, 2017 TALBERT & BRIGHT 053017ws HCBOC Page 23 -t f f~ I I ~l ~l _L __ ff«z, /VGA/ !=A'1Sri=. 053017ws HCBOC Page 24 ---1 f i t--n -1J~ I Al/!JIPG ? e, ~<::;;,f-J I I +--f'ii-----..,&. s:Y:::::::E tca:===sdl .J,o@J r ,.............,. L-----====!:!!~ I . r £ tVTJe..!j f"-",ZC, H L_ --u -.Jll-- jg_ _ _J ® /,IA ~N8rr umN7-l/ v57?7~/CT (PLAN) f.GtWJ1/ATPtN ¢ II di/,rJDJI.J . ' '\ ------------ £~/;/J/7 .., .e.r--1 s-r~ re, .e'3 lft'f ~ IN --#Gw /'lrJr run>_& -+; 8~ 1-1 s,: -II I U>.Sr ~65 /I I I ::::;. /1) r6..16=-+.c;.;7 053017ws HCBOC Page 25 J'.f./P~t> If rw? f.t;.,1 053017ws HCBOC Page 26 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 4 CO N C E P T 1 - RE N O V A T I O N / . A D D f f i O N H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 27 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 5 CO N C E P T 1 - RE N O V A T I O N / . A D D f f i O N H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 28 ~x-,srl: ~ttt?/IJC. ~66&:E~Z::> ~ 't./S"rt:= Pt.f~.%,e t::l fL I 'E.k!S7 (FA~ 1 ?d "'10 L~ - 053017ws HCBOC Page 29 } ~ ~ ~ ~ ~ "' ~ -..L "l ' { ~ ~ [ ~ c~ cl .... ? WAl('IVC C:-&»1,:-. --- I • I ~ANeflPI: -'j~~c ~. -------_!..."76=-/----__..,_.---¥~- /;AµIE7T CAfl/)(j~ rfaT73>7Z7 7LAu /V6W f:,t)/t, OIi</~ · " cl\ ;::11:sr ,:tq:::,g_ -4'-1 8()0 HSF -toUJ S.F. ~[ II I I.'/ I :::JD-.z:> 7Wtlf -,.. &; . ,-, 053017ws HCBOC Page 30 i-AND cF De :t=,tSYf P'/JN cJfrlt>}.} !(,eA; ~/L.ON~ II I If 1~,t>-0 ,w&:- 4'·$·/1 053017ws HCBOC Page 31 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 9 CO N C E P T 2 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 32 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 10 CO N C E P T 2 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 33 ® ./,~P£10e ~itYATJ~ r'7PN N,e,N 6V/~ON~ 053017ws HCBOC Page 34 LA N D S I D E PE R S P E C T I V E LANDSIDE PERSPECTIVE 12 CO N C E P T 3 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 35 AI R S I D E PE R S P E C T I V E AIRSIDE PERSPECTIVE 13 CO N C E P T 3 - NE W TE R M I N A L H A R N E T I RE G I O N A L JE T P O R T T H E WI L S O N GR O U P AP R I L 12 , 20 1 7 TALBERT & BRIGHT 053017ws HCBOC Page 36 100 50 0 SCALE IN FEET 1 "= 1 oo· ( . ) X < I - 100 R U N W A ' f 5 - 2 3 H A R N E T T R E G I O N A L J E T P O R T A E R I A L P H O T O O F E X I S T I N G A P R O N - C l T r < ~ x < I - 0 5 3 0 1 7 w s H C B O C P a g e 3 7 100 ---:r---!L _______ _ , r.T.-.T. .T. .T. .T. 49 I . . . . . I I _j__ _j__ ,i_. -_j__ .l_.j --~m PROPOSED CONCqETE s;t-APRON ---------_.__ ______ _ 50 0 100 SCALE IN FEET 1 "= 1 oo· (. ) > - < ( 3 : : X < ( I - • R U N W A Y 5 - 2 3 H A R N E T T R E G I O N A L J E T P O R T F U T U R E C O R P O R A T E A P R O N 0 > - < ( 3 : : X < ( I - • L E G E N D ~ E X I S T I N G P A V E M E N T T O B E R E M O V E D ™ E X I S T I N G P A V E M E N T T O B E R E M O V E D A N D P A V E D C O N C R E T E I I P R O P O S E D C O N C R E T E P A V E M E N T 0 5 3 0 1 7 w s H C B O C P a g e 3 8 Electronic Records and Imaging Policy For Harnett County June 5, 2017 Type of Government Office: County (X) Municipal ( ) State Agency ( ) *Other ( ) County: _H_a_r_n_ett_C_o_u_n_...ty _____________ _ Name of Office : Office Address: Phone: Fax: Email : ---------- Harnett County Electronic Records and Imag in g Po licy , April 2017 Page 1 053017ws HCBOC Page 39 Table of Contents 1. Purpose .................................................................................................................................. 3 2. Responsible Parties .............................................................................................................. 3 3. Availability of System and Records for Outside Inspection ........................................... s 4. Maintenance of Trustworthy Electronic Records ............................................................. 5 5. Components of Information Technology System ............................................................. 7 6. Digital Imaging Program Documentation and Procedures ............................................. 7 7 . Request for Disposal of Original Records Duplicated by Electronic Means ............... 9 8. Other Electronic Records Management Practices ........................................................ 10 9. Compliance and Electronic Records Self-Warranty ...................................................... 11 Harnett County Electronic Records and Imaging Policy, April 2017 Page 2 053017ws HCBOC Page 40 1. Purpose The records covered by this policy are in the custody of Harnett County and are maintained for the benefit of county use in delivering services and in documenting county operations. This electronic records policy reflects guidelines set in the North Carolina Department of Cultural Resources publication, Guidelines for Managing Trustworthy Digital Public Records Version 2 .0. Complying with this policy will increase the reliability and accuracy of records stored in information technology systems, and will ensure that they remain accessible over time . Exhibiting compliance with this policy will enhance records' admissibility and acceptance by the judicial system as being trustworthy. All public records as defined by North Carolina G.S. § 132-1 are covered by this policy. This includes permanent and non-permanent records, and confidential and non- confidential records . These classifications may warrant different treatments when processing the records. This policy serves as basic documentation of the procedures followed by the county in imaging , indexing, auditing, backing up, and purging electronic records in accordance with the disposition schedule, and in handling the original paper record , if applicable. This policy also serves to protect those records digitized by the county's digital imaging systems (see Appendix A for list of county supported imaging systems), which reduces required storage space for original documents as the county transitions to a "paperless" digital system , and provides instant and simultaneous access to documents as needed . The form provided in Section 7 of this document, Request for Disposal of Original Records Duplicated by Electronic Means, is completed and submitted to the Department of Cultural Resources whenever the county wishes to dispose of a new series of paper records that have been digitized . This policy will supersede any electronic records system policy previously adopted. This policy will be reevaluated at a minimum of every five years , or upon the implementation of a new information technology system, and will be updated as required . A copy of this policy will remain on file at the Department of Cultural Resources . 2. Responsible Parties • Department Supervisor • Information Technology (IT) Department • Records Creators Department Supervisor Responsibilities include: 1. Determining access rights to the system. 2 . Approving system as configured by IT. 3 . Performing quality assurance checks by sampling the county's imaged records before the original documents are destroyed . Harnett County Electroni c Record s and Im ag in g Polic y , April 2017 Page 3 053017ws HCBOC Page 41 4 . Creating and updating detailed procedural manuals describing the imaging process . IT Department Responsibilities include : 1. Installing and maintaining equipment and software. 2. Configuring the system according to department needs, including creating and testing applications and indexes . 3 . Controll ing access rights to the system. 4 . Maintaining documentation of system hardware and software. 5. Establishing audit trails that document actions taken on records stored by the document imaging system . 6 . Providing backups for system records , and recovering deleted imaged records when necessary. 7 . Completing d isaster recovery backup at least once every two years. 8 . Establishing and provid ing training on equipment and software and providing remedial training as needed. Such training includes , but is not limited to , training on the imaging system . Records Creators Responsibilities include : 1. Attending and signing off on training conducted by county departmental staff or by the Department of Cultural Resources. 2 . Creating passwords for computers that are long , complex, and frequently changed . 3. Creating and managing electronic records in their purview in accordance with these policies and other guidance issued by the Department of Cultural Resources, and complying with all IT security policies . 4 . Reviewing the system records annually and purging records in accordance with the retention schedule . 5. Carrying out day-to-day processes associated with the county 's imaging program , including : • Designating records to be entered into the imaging system • Noting confidential information or otherwise protected records and fields • Removing transient records • Completing indexing guide form for each record being scanned • Reviewing images and indexing for quality assurance • Naming and storing the scanned images in designated folders • Once approved , destroying or otherwise disposing of original records in accordance with guidance issued by the Department of Cultural Resources . 6. Public employees who have been approved to telecommute or use mobile computing devices must: Harnett County El ectron ic Records and Imaging Policy , April 2017 Page 4 053017ws HCBOC Page 42 • Comply with all information technology security policies , including the county and statewide acceptable use policies , as well as all statutes and policies govern ing public records • Back up information stored on the mobile device daily to ensure proper recovery and restoration of data files 3. Availability of System and Records for Outside Inspection This county recognizes that the judicial system may request pretrial discovery of the information technology system used to produce records and related materials. County personnel will honor requests for outside inspection of the system and testing of data by opposing parties, the court , and government representatives . Records must be available for inspection and audit by a government representative for the full period required by law and approved records retention schedules, regardless of the life expectancy of the media on which the records are stored . Records must continue to exist when litigation , government investigation , or audit is pending, imminent, or if a court order may prohibit specified records from being destroyed or otherwise rendered unavailable. In order to lay a proper foundation for the purposes of admitting the county's electronic records into evidence, the county will be able to provide up-to-date, detailed documentation that describes the procedural controls employed in producing records; procedures for input control including tests used to assure accuracy and reliability ; and evidence of the records' chain of custody. In addition to this policy , such documentation includes: • Procedural manuals -county department • System documentation -IT Department • Training documentation -county department • Audit documentation -county department • Audit trails -IT Department The county will also honor inspection and copy requests pursuant to N.C . G .S . § 132. The county should produce the records in the order they were created and used in the course of business , and in the format in which they were created, unless otherwise specified by the requesting party. However, the county should produce the records in any format it is capable of producing if asked by the requesting party. If it is necessary to separate confidential from non-confidential information in order to permit the inspection or copying of the public records , the county will bear the cost of such separation . 4. Maintenance of Trustworthy Electronic Records • Produced by Methods that Ensure Accuracy • Maintained in a Secure Environment • Associated and Linked with Appropriate Metadata • Stored on Media that are Regularly Assessed and Refreshed Harnett County El ectron ic Records a nd Imaging Pol icy, April 201 7 Page 5 053017ws HCBOC Page 43 Produced by Methods that Ensure Accuracy All platforms used by the county to create and manage electronic records, including email clients , social media platforms, and cloud computing platforms conform w ith all Department of Cultural Resources ' policies and all applicable security policies. Maintained in a Secure Environment Security to the system and to the records it holds is maintained in the following ways: • Access rights are managed by the IT department, and are determined by a supervising authority to prevent unauthorized viewing of documents. • The information technology system is able to separate confidential from non- confidential information, or data creators organize and name file systems to reflect confidential ity of documents stored within. • Confidentia l information is stored on off-network storage systems, and folders with confidential information are restricted . • Physical access to computers, disks , and external hard drives is restricted . • Duplicate copies of digital media and system backup copies are stored in offsite facilities in order to be retrieved after a natural or human-made disaster. • Confidential material is redacted (by electronically "masking information " or hiding unnecessary pages) before it is shared or otherwise made available. Associated and Linked with Appropriate Metadata Metadata is maintained alongside the record. At a minimum , metadata retained includes file creator, date created, title (stored as the file name}, and when appropriate, cell formulae and email header information. Employees are not instructed to create metadata other than metadata that is essential for a file 's current use and/or retention . Stored on Media that is Regularly Assessed and Refreshed Data is converted to new usable file types as old ones become obsolete or otherwise deteriorate . The following steps are taken to ensure the continued accessibility of records kept in electronic formats : • Data is audited and assessed yearly. • Media is refreshed every three to five years. The county documents when and how records are transferred from one storage medium to another. • Records are periodically converted to new file types , particularly when a new information technology system requires that they be brought forward in order to properly render the file . • Metadata is maintained during migration . • Storage media is maintained in a manner and in an envi ronment that promotes bit-level preservation . Humidity does not exceed 50% and should not fall below 30%. Room temperature is set between 65° F to 75 ° F . The county adheres to the media manufacturer's recommendations for specific environmental conditions in which the media should be stored . Harnett County Electronic Records and Imaging Po licy, April 20 17 Page6 053017ws HCBOC Page 44 • Whatever media is used to store imaged data is clearly labeled with enough information that its contents can be determined . 5 . Components of Information Technology System • Training Programs • Audit Trails • Audits Training Programs The county department will conduct training for system use and electronic records management, using material published by the Department of Cultural Resources when appropriate. All employees will be made aware of system procedures and policies, trained on them , and confirm by initialization or signature acknowledging that they are aware of the policies and have received training on them . When appropriate, employees will also attend trainings offered by the Department of Cultural Resources on the maintenance of electronic records . Documentation will be maintained for the distribution of written procedures , attendance of individuals at training sessions and refresher training programs and other relevant information . Audit Trails A log of activities on the system is maintained , which show who accessed the system , how and by whom records were created and modified . Audits Audits are designed to evaluate the process or system's accuracy, timeliness , adequacy of procedures , training provided , and the existence of audit trails. Internal audits are conducted regularly by county department staff. 6. Digital Imaging Program Documentation and Procedures • System and Procedural Documentation • Training • Indexing and Metadata • Auditing and Audit Trails • Retention of Original and Duplicate Records System and Procedural Documentation The IT department is responsible for preparing and updating detailed procedures that describe the process followed to create and recreate electronic records. This documentation will include a description of the system hardware and software . A current procedural manual will be maintained to assure the most current steps are followed and to assure reliable system documentation will be available for judicial or similar proceedings . Each workstation designated as a scanning station will have , at a minimum, the following hardware and software , unless the scanner is collocated by means of a network interface: Harn ett Count y Electronic Records a nd Imagin g Polic y , April 20 17 Page 7 053017ws HCBOC Page 45 • Document/image scanner authorized by IT • Driver software for scanner • Imaging software (see Appendix A for list of county supported imaging systems) Training Only designated staff that have been formally trained by county department staff and signed off on training documentation on the use of the imaging software and equipment will be allowed to enter records into the content management system. Components of the training will include basic techniques for image capture, indexing, quality control, security configuration , use of equipment, and general system maintenance. Rights to image and index records will not be assigned until the user has been trained. If a user improperly indexes or scans a document, a county supervisor will address this occurrence with the operator and remedial training will be performed as necessary. Indexing and Metadata All imaged records should be indexed in order to facilitate efficient retrieval, ease of use, and up-to-date information about the images stored in the system. This index should capture the content, structure, and context of the imaged records . It should also be indexed according to guidelines set by the Department of Cultural Resources (see Section 8 of this policy, Other Electronic Records Management Practices , for more information on database indexing). Auditing and Audit Trails The county department imaging staff will conduct a quality control audit following the imaging of a record to ensure that the following features of the imaged record are legible: • Individual letters, numbers, and symbols • Combinations of letters, numbers, and symbols forming words or sentences • Graphics such as signatures, logos, and pictures • Other features of records such as color, shape, texture, etc., that relate to the content of the information Managerial staff for the various units of the county will also periodically audit imaged records for accuracy, readability, and reproduction capabilities. Audit trails built into the imaging system will automatically document who creates, duplicates, modifies, or otherwise prepares records, and what procedures were taken. Audit trails include the success or failure, date, time, and user of the following events: • Add/Edit electronic document • Assign index template • Copy document • Copy pages • Create document/folder • Delete entry Harnett County Electronic Records a nd Imaging Policy, April 2017 Page 8 053017ws HCBOC Page 46 • Delete pages • Delete volume • Edit image • Email document • Export document • Index creation/deletion/modification • Insert page • Log in/out • Move document • Move pages • Print document Retention of Original and Duplicate Records To obtain permission to destroy original records following imaging , the county will complete Section 7 of this document, Request for Disposal of Original Records Duplicated by Electronic Means. For each new records series to be scanned , the Department of Cultural Resources must approve the destruction of the original records. Permanent records may be imaged for ease of access, but the original documents may not be destroyed unless an analog copy exists prior to the records' destruction. Destruction of original records is allowed only after quality assurance has been conducted on the imaged records, necessary corrections have been made, auditing procedures have been conducted, and the destruction is approved. Prior to destruction of the original record , managerial staff will audit a sample of those records to verify the accurate reproduction of those records . Digital images of scanned records are maintained for the specified retention periods according to the records retention and disposition schedule. The retention period is considered to have begun when the original document was created , not when the electronic reproduction was created. Electronic and digital images of scanned records in a document management system will be considered the "official" county record . Any hard copy generated from the imaged records will be considered the county's duplicate "working" record. A copy of the purchase order and a detailed service-level agreement with all document management systems are maintained. See Section 8 of this policy, Other Electronic Records Management Practices, for more information on contracting out electronic records management services . 7. Request for Disposal of Original Records Duplicated by Electronic Means This form is used to request approval from the Department of Cultural Resources to dispose of non-permanent paper records which have been scanned , entered into databases, or otherwise duplicated through digital imaging or other conversion to a digital environment. This form does not apply to records which have been microfilmed or photocopied, or to records with a permanent retention . Harnett County Electronic Records and Imaging Poli cy , April 2017 Page9 053017ws HCBOC Page 47 GO\'ER..',~,"T RECORDS sEcno:-- ST.\TE RECORDS CEs"TER Request for Disposal of Original Records Duplicated by Electronic Means lf)IO<I---. ool t'f9)807-1350_,_ lorlMRKOld> ""'-"llnily>t,...;,;,,«l10yo,1'9H"'Y Thsio<m511SNID-_...ifnlm .... ~olQAnlR,,_.,,..todisjl050ol-- ---boen5CanOd.-...d no-...S,o,-~dwoughd,gl,l""'U'Vor-"°"'""""'to•dqJ>I_.... Ttvsfom,doeno<applylD _____ o,~ed.or ID~MhilPffl"~~ Agency Contact Name: 1-- Pllone tarea codel: I Emeil: Count)tMuni opelity: I Offiu, M ailing address: . Reconls.riHTdte Des.,,.,iiDn of lncktsiv• Approa.Yoi.-R---A gnqt of~ JS hlld,, ---lwcord5 Spoctt-.. ... -.. - ---2n,~~ ...... f'r,,(.n.()I Dotes of Records ~:-; (o.g.'11io ___ nisont) ·5bo,...·1 A.~U~D.M~~OC>r Sa.tie Aotlul'el ot Nortll. C...,lma ..._t.:0-\1 ... -33 ...... ('19j7t~V..."'1' -...s,@,,ohp As i5ad l"I f'HJOfds -- 8. Other Electronic Records Management Practices • System Planning • Electronic Records Management • Security and Disaster Backup and Restoration System Planning Traditional or microfilm media will only be used for the retention of records when conversion to an electronic system is cost prohibitive or when statutes, administrative office codes, or records retention requirements necessitate it. The county maintains support contracts with relative software vendors to keep systems up to date and the county has a 3-4 year lease rotation on all core networking and computer systems . The county will maintain current hardware and software as budget allows and where applicable. Electronic Records Management Harnett County Electronic Reco rds and Imaging Policy, April 2017 Page 10 053017ws HCBOC Page 48 System documentation, system access records , digitization and scanning records , metadata, and information maintained by that system is listed in an approved records retention and disposition schedule prior to the ir destruction or other disposition . Records produced by local agencies are retained for the period of time required by local records retention schedules regardless of format. Any permanent records maintained in electronic form also exist as a paper or microfilm preservation duplicate copy in compliance with the Department of Cultural Resources' Human-Readable Preservation Duplicates policy. Security and Disaster Backup and Restoration The county has a disaster recovery plan for its electronic data in place, which includes contact information for data recovery vendors and information about back-ups of all data. Security back-ups to protect against data loss are generated for all but the most transitory of files. Routine back-ups are conducted 3-4 times daily depending on the system and are stored in secure off-site storage within the IT Department. Security backups of all imaged documents will be generated nightly and maintained off- site. Imaged documents will be synchronized to a secured offsite location 3 times a day upon document changes or upon document scanning. A backup copy of the scanned data and index database is created on a nightly basis for the purpose of document recovery. Contracting The terms of the service level agreement with document imaging companies detail: • How the vendor provides security, confidentiality, storage, and back-ups for electronic records. • The equipment, including hardware and software, used by the vendor. • The storage environment, including any geographically disparate storage locations. • How the vendor complies with records retention requirements, including what the contractor is able to reproduce should legal proceedings or public records requests be issued. • How the vendor avoids spoliation of evidence once e-discovery has commenced . • How electronic records are to be recovered from the vendor in the event that the system is no longer supported. 9. Compliance and Electronic Records Self-Warranty The completion of this form by all signing employees' signals that all employees of the county will adhere to the rules set forth in this policy . Furthermore, this section is to be used as a self-evaluation tool to ensure that electronic records produced by the county are created, reproduced, and otherwise managed in accordance with guidelines for electronic public records published by the North Carolina Department of Cultural Resources. The self-warranting of records in itself does not authorize the destruction of Harnett County Elect ronic Record s and Imaging Po li cy, April 2017 Page 11 053017ws HCBOC Page 49 records, originals or copies, nor does it change current records retention and disposition scheduling procedures. The county producing electronic records and/or reproductions is responsible for ensuring the records' authenticity and accuracy. The Department of Cultural Resources is not responsible for certifying the authenticity or accuracy of any records, whether originals or reproductions, produced by the originating county. Harnett County Electronic Records and Imaging Policy, April 2017 Page 12 053017ws HCBOC Page 50 _________ Department Director The records custodian is the person responsible for creating records or managing the staff who creates records. The records custodian certifies that: ---The records created or duplicated by electronic means in this office are prepared in accordance with these guidelines as indicated by the following statements: • Quality -Records are legible , accurate, and complete. • The records are produced or reproduced as part of a regularly conducted activity. • Detailed, documented procedures are in place and followed when the records are created, copied , modified , or duplicated . • The person(s) who creates, copies, modifies, or duplicates the records receives formal training on detailed system procedures prior to records preparation. • Details of the training received are adequately documented through written policies and procedures. • Training records are signed by employee after receiving training. This county will comply with the best practices and standards established by the ---Department of Cultural Resources as published on its website. This county will submit to the Department of Cultural Resources Section 7 of this ---policy, Request for Disposal of Original Records Duplicated by Electronic Means, to seek approval for the destruction of original records that have been converted from paper to electronic record . Approved by: Date: ----------------------------Title: Signature: Harnett County Electroni c Records and Imaging Policy, April 2017 Page 13 053017ws HCBOC Page 51 IT Director The IT Director is the person responsible for providing technical support to the records custodians and who may be involved in infrastructure and system maintenance. The IT Director certifies that: ___ Audit trails document the identity of the individual(s) who creates , duplicates, modifies, or otherwise prepares the records, what actions are taken by the individual during the course of the process, when these actions are taken, and what the results of these actions are. Audits: • are performed periodically to confirm that the process or system produces accurate results. • confirm that procedures actually followed are in accordance with procedure stated in the system's documentation. • are performed routinely on documents to ensure no information has been lost. • are adequately documented. The process or system hardware and software are adequately documented Backup procedures are in place and comply with best practices, as established by the ---Department of Cultural Resources. Successful disaster recovery back up is completed at least once every two years. Approved by: Date: ------------------Title : Signature : FOR DEPARTMENT OF CULTURAL RESOURCES USE Approved by: Date : ---------------------------- Title : Sig nature: Harnett County Electronic Records and Imaging Policy, April 2017 Pa ge 14 053017ws HCBOC Page 52 APPENDIX A LaserFiche -County Wide Patagonia -Health Department Northwoods-Social Services A2 (Thomson Reuters) -Register of Deeds CityWorks -Public Utilities NCPTS -Tax Department Tritech Inform -Sheriff and 911 communications Fire House -Fire Marshal, Fire Departments, and Emergency Management EMS Charts -EMS Harnett County Electronic Records and Imaging Policy, April 2017 Page 15 053017ws HCBOC Page 53 Harnett County TECHNOLOGY USE POLICY r-:'I Harnett (~ COUNT V NORTH CAROLINA INFORMATION TECHNOLOGY DEPARTMENT May 30, 2017 Adopted & Effective: xx/xx/2017 • • , • -• • • • 6 ~ .. .. ... • • TechnologyUsePolic y ll Pag e 053017ws HCBOC Page 54 Harnett County TECHNOLOGY USE POLICY Table of Contents PURPOSE, SCOPE & OWNERSHIP .................................................................................................... 3 DEFINITIONS .................................................................................................................................... 5 SECURITY ......................................................................................................................................... 7 ACCEPTABLE USE ..............................................................................................................•........... 10 UNACCEPTABLE USE ..................................................................................................................... 11 VIRUS & MALWARE PROTECTION ................................................................................................. 12 INTERNET USE ............................................................................................................................... 12 COUNTY WEBSITES ....................................................................................................................... 13 ELECTRONIC MAIL ......................................................................................................................... 14 TELEPHONES & MOBILE DEVICES ................................................................................................. 15 Land line Phones ...................................................................................................................................... 15 Cellular Phones & Smartphones ............................................................................................................. 16 iPads and Tablets .................................................................................................................................... 16 Mobile Data Terminals (MDTs) -Public Safety ....................................................................................... 17 DESTRUCTION OF PUBLIC RECORDS .................................................................................•........... 18 COMPLIANCE ................................................................................................................................ 18 MISCELLANEOUS ........................................................................................................................... 19 . . Tec hn o l ogyUsePo li cy 21P age 053017ws HCBOC Page 55 PURPOSE, SCOPE & OWNERSHIP Harnett County TECHNOLOGY USE POLICY This policy covers the use of all technology resources belonging to the Harnett County, hereafter referred to as County. It includes, but is not limited to all computer systems of any size and function and their attached peripherals, software, phones, all mobile communication devices, faxes, copiers, printers, camera systems, voice mail systems, e-mail systems, network resources, user accounts, electronic door locks, time clocks, ID badges, radios, data in any format and any network accessed by these systems including the Internet. Systems containing County data, which are hosted by third parties outside of the County's network, and the personnel with access to those systems, are also subject to this policy. All technology resources owned, rented, or leased by the County are in place to enable the County to provide its services in a timely and efficient manner. This is the primary function of these resources and any activity or action that interferes with this purpose is prohibited . It is critical that these systems and machines be protected from misuse and unauthorized access. All technology resources defined in this section, along with all information transmitted by, received from, and stored upon said systems are considered to be possessed by, and/or the property of the County. Additionally, all documents, messages and attachments composed, sent, received or stored on County Technology Systems are County property. County standards will be established for all technology (hardware and software). Any deviation from these standards may require approval of the department head, IT Director, Finance Director, HR Director, and/or the County Manager. Because technology systems are constantly evolving, the County requires its employees to use a common sense approach to the rules set forth below, complying with not only the letter, but also the intent of this policy. In addition to this policy, users are subject to applicable state and federal laws. Improper use or misuse of County Technology Systems on a person's work time or otherwise is a violation of the County's personnel policies . User violation could result in disciplinary action including suspension, demotion or dismissal. If a policy violation occurs, aside from disciplinary actions specified under the County's policy, system access may be revoked in whole or in part if deemed to be in the best interest of the County's Technology System security. This policy is not intended to supersede any existing laws or policies regarding records that are confidential, including, but not limited to, juvenile records in the Sheriff's Department, certain information contained in personnel files, or medical files. . . Tec h no l ogyUsePo l icy 3j Page 053017ws HCBOC Page 56 This policy is intended for internal use by County employees defined as full-time, part-time, temporary and interns, all County Boards and Commissions that may have access to County equipment or resources, and non-County employees covered under this policy, defined as contractors, vendors, and volunteers who use County owned, rented, or leased resources. . . . . TechnologyUsePolicy 4 1Pa ge 053017ws HCBOC Page 57 DEFINITIONS Anti-virus/ Anti-malware software -Computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software . Applications -Computer software such as word processors, which perform productive tasks for users. Authorized Systems -A computer network that allows entry with proper credentials. Backup Schedule -Plan for duplicating County data and programs. Backup Storage Area -Location where County data and programs reside, typically on a tape, disk or hard drive. Slogging -Web log on a website where entries are written in chronological order and commonly displayed in reverse chronological order. Chain Letter -Message that induces the recipient to forward copies of a document to other users. They may contain viruses, false information or threats . Chatroom -A form of digital conferencing that can be real time on line conversations . Communications Equipment -Device that is physically attached to the County network and enables transmission of data. Computer Access -Ability to utilize the computer and gain admission into the County's network. Computer virus -A computer program that can copy itself and infect a computer without permission or knowledge of the user. Computer worms -A self-replicating computer program that can harm the network. E-Mail -Electronic Mail: Messages, usually text, sent from one person to another via computer. Group Policy-A feature of Microsoft Windows operating systems that provides centralized management and configuration of computers and remote users . Hardware-The physical components of a computer system (monitor, CPU, keyboard). Instant Messenger -Also known as IM, a program that facilitates live chat . -.. . . .. .. .. ... ~ ... Techno l ogyUsePo l icy SI Page 053017ws HCBOC Page 58 Internet -Vast collection of inter-connected networks that all use the TCP/IP protocols. Mobile Devices -Computing appliance that is typically handheld. Network -The connection of two or more computers together so that they can share resources. Online Games -Reference to video games that are played over some form of computer network, most commonly the Internet. Peripheral Devices -Any equipment such as printers, copiers, faxes , scanners that attaches to the network. Public Network-Ability to access the Internet without restrictions. Remote Access -Access to County systems from external systems, e.g. via the Internet. Server -Computer or a software package that provides a specific kind of service to client software running on other computers . Social Media -Commonly used websites, such as, Facebook, Twitter, MySpace, YouTube, Flickr, Blogger, Google+, lnstagram, Snapchat and Linkedln . Software -Collection of computer programs, procedures and documentations that perform some task on a computer system. TCP/IP-Transmission Control Protocol/Internet Protocol : A suite of protocols that defines the Internet. The method used to transmit and receive data over the Internet. County Websites -County's collection of web pages hosted by a server. Workstations -Microcomputer designed for technical applications . User -Any individual who interacts with the computer at an application level. VPN -Virtual Private Network: is a network that is constructed by using public connections, usually the Internet, to connect to a private network such as the County's internal network. -. . . ~ Tec h no l ogyU se Po l icy 61 Page 053017ws HCBOC Page 59 SECURITY Security refers to the protection of all technology resources from any kind of damage and the protection of data from unautho r ized access, distribution, modification or destruction. The following procedures must be followed to ensure a secure environment. • A user will be authorized access to the County's computer systems by the appropriate user department head or designee. A request for services must be submitted by the department head to the Information Technology Department, hereafter referred as the IT Department. The IT Director or his/her designee will establish credentials for the authorized systems, which may include but not limited to software applications, e-mail, Internet, peripheral devices, building access and time clock access . This request should be sent directly to the IT Department from the department head or designee. • Request for services, as well as, any other document containing IT security access informati on, including but not limited to, usernames, passwords, security questions and answers, and user access rights shall not be considered public record and shall not be released to any person, firm, or entity without direct written permission from the IT Director and County Manager. • All County users must read and sign a copy of this policy and return it to thei r department heads. Department heads and Human Resources will keep a file of signed copies in the employee's personnel file. • When an employee is suspended or terminated, a written notification will be submitted from the department head or his/her designee to the IT Department immediately. Access to all systems will be suspended immediately. • Non-County employees, as previously defined, will be the responsibility of the department head, who will notify the IT Department when it is necessary to determine access ibility and establish sy stem credentials . • IT Department will ensure security of unattended workstations by uti lizing a group policy to lock computer screens after twenty (20} minutes of inactivity. Department heads may request a modification of this procedure through written request to the IT Department. Requests will be con sidered based on location and access levels of the computer or user. Users must logoff all computer systems at the end of each work day. • For security, network, and compute r sy stem s maintenance purposes, authorized i ndividuals may monitor equ ipment, systems, data and network traffic at any time. • Any hardware or peripherals not belo nging to the County will not be permitted to attach to the County's internal network without written authorizat ion from the department . -. - TechnologyUsePolicy 7 1Page 053017ws HCBOC Page 60 • • head and final approval from the IT Director. Personal hardware includes, but is not limited to, computers, cell phones, mobile devices, cameras, iPods, MP3 players, flash drives and portable hard drives. If it is determined that a non-County owned computer or device must attach to the network, a checklist of required software will be provided by IT to the department head. Computer owners are responsible for installing all required software. County IT staff will be available for consultation and will validate all required software before non-County owned equipment can participate on the County's network. Unauthorized devices connecting to the County's internal network can create an enormous security risk leaving the County's network exposed to numerous threats and immeasurable damage . A public/guest network will be provided at all County buildings. Personal devices may connect to public/guest networks upon accepting the Terms of Use. For remote assistance help desk purposes, authorized individuals may connect through remote access software to equipment, systems, data and network traffic at any time. The County has the right to monitor, audit, and/or inspect any and all aspects of the County Technology Systems at any time, without advance notice to any users, and without the permission of any user. Failure to monitor in any specific situation does not constitute a waiver of the County's right to monitor. Users within the scope of this policy are advised that they have no privacy rights and no user of County Technology Systems has any expectation of privacy in any message, file, image, or data sent, retrieved, or received when using County Technology Systems. Employees must understand that all technology resources are County property. • The County does not guarantee the confidentiality of user information stored on any network, computer, or communications device belonging to the County. Users should be aware that the data they create on County technology or communications systems remains the property of the County and is not private (unless the data is protected by privacy or confidentiality laws). Information that is stored on or transmitted to or from County Technology Systems may be subject to disclosure pursuant to the North Carolina Public Records Law. Users should refrain from, where possible, storing personal files and data on County Systems . • Users are responsible for safeguarding their own credentials and computer access and SHALL NOT let another person use their credentials or access. Users are directly accountable for all activity connected to their user ID. • Passwords may be required to be changed every ninety (90) days and SHALL NOT be divulged to any other person. Passwords should be memorized and not written down unless kept in a secure place . The IT Director shall determine when access will require routine password changes . , .. . . Tec hn o lo gyUse Polic y 8 j Page 053017ws HCBOC Page 61 • • • • • • • Passwords must be changed at any time a user believes their password has been compromised. Credentials including ID badges and proximity cards that become lost, stolen or misplaced must be reported to the department head and IT Department immediately. Users SHALL NOT abuse or misuse the County's technology resources, or violate any rules in other portions of the County Personnel Policy, local, state, or federal laws via the County's technology resources. Users SHALL NOT copy or attempt to copy any software or data from County Systems without having written authorization. Users SHALL NOT attempt to bypass any security mechanisms . No third party may be allowed access to County Systems without prior authorization and approval from the IT Director. Users SHALL NOT engage in abuse or misuse of the County's technology resources . Users SHALL NOT install any computer software on any County owned computers or devices, not authorized by the County, regardless of the ownership of the software except as allowed in other sections of this policy. Users may not install software personally owned or downloaded for free from the Internet. Thi s includes but is not limited to, music software, photo software, Internet search software, screen savers and desktop backgrounds. Many of these software applications contain viruses and/or malware that may compromise the integrity and security of the County's network. • Administrative rights are granted to IT staff and those departments required by state regulations to have local administrative rights. Department heads must approve software requests and submit to the IT Department. Any software that adversely affects the performance of the machine or network will not be permitted on the County system. • Separation of duties will be practiced in all departments, to the greatest extent possible, such that no individual has total control of a process. • Users shall disclose to their department head, who shall then notify IT of any suspected or confirmed unauthorized use or misuse of technology resources and any potential security breaches or loopholes. • The IT Department, where possible, will work to ensure that all network infrastructures, including but not limited to communication s equipment, servers, data cables and '..... ~.. 4.. .. Tec hn o l ogyUse P o lic y 9 JP age 053017ws HCBOC Page 62 telephone cables are secured behind locked doors with limited access by authorized personnel. • Remote access to County systems consumes technology resources above and beyond those required for local access . Remote access shall be granted on a case-by-case basis based upon the unique needs of the user and availab le resources. Remote access users are subject to all policies herein. ACCEPTABLE USE At all times when an employee is using County technology resources, he or she is representing the County. While in the performance of work-related functions, while on the job, or while using publicly owned or publicly provided technology resources, County employees shall use them responsibly and professionally, and remember that public perception is extremely important. They shall not use these resources in an illegal, malicious, or obscene manner. When using County resources, employees shall abide by all County policies including the County's policy on sexual harassment. County Technology Systems are intended for business use. However, employees may make reasonable, incidental or occasional, personal use of the County's computers and data communications. Any personal use must adhere to the following: • Must not incur any additional cost to the County. If, in a critical situation, an employee must use County resources that incur costs, the employee will reimburse the County within 30 days of the occurrence. • • • • • • • • Must not incur security risks to the County or the County's network . Must not violate the County Personnel Policy . Must not have a negative impact on employee performance, including interfering with work duties, work performance or work productivity. Must not have a negative impact on system performance . Must not violate this Policy or any applicable laws or regulations . Must not violate contractual agreements or intellectual property rights . Must not be used for personal gain . Must not be used for solicitation . Tec h no l ogyUsePolicy 10 IP age 053017ws HCBOC Page 63 Users are required: • To respect the privacy of other users; for example, users shall not intentionally seek information on, obtain copies of, or modify files, data, or passwords belonging to other users, unless explicit permission to do so has been obtained . It shall be understood that this rule does not apply to supervisory personnel, who shall have complete authority to access any files created by users in their departments. • To protect data from unauthorized use or disclosure as required by state and federal laws and agency regulations. (i.e., confidential information) • • To respect the integrity of computing systems; for example, users shall not use or develop programs that harass other users, or infiltrate a computer or computing system and/or damage or alter the software components of a computer or computing system, or otherwise interfere with data, hardware, or system operation. To respect the legal protection provided to programs and data by copyright and license . The County owns licenses to a number of proprietary programs, which allow the County to use the software but severely restricts anything other than the use of the software on a single computer or network. Any redistribution of software from the computing systems breaches agreements with our software suppliers, as well as applicable federal copyright, patent and trade secret laws. U.S. Copyright Law provides for civil damages of $50,000 or more and criminal penalties including fines and imprisonment in cases involving the illegal reproduction of software. Therefore, no copying, downloading, or distributing of any copyrighted materials, including but not limited to messages, e-mail, text files, program files, image files, database files, sound files, and music files is allowed without prior authorization by IT. UNACCEPTABLE USE Unacceptable uses are defined as those uses that do not conform to the purpose, goals, and mission of the County and to each user's authorized job duties and responsibilities as determined by the County Manager or his/her designee. Examples of unacceptable activities include, but are not limited to: • Private or personal, for-profit activities or for any illegal purpose, including but not limited to communications that violate any laws or regulations. • The use of County Systems to access, transmit, store, display, or request obscene, pornographic, erotic, profane, racist, sexist, libelous, or otherwise offensive or abusive material (including messages, images, video, or sound). The County may install monitoring software or use filters to monitor or block access to any sites that would or ... .. . TechnologyUsePolicy llj Page 053017ws HCBOC Page 64 possib ly could violate this policy. Any user who attempts to avoid such software or filter is in strict violation of th is policy and may face disciplinary action up to dismissal. • Intentionally seeking i nformation about, obtaining copies of, or modifying of files, other data, or passwords belonging to other users, unless exp licit permission to do so has been obtained. • Interfering with or disrupting users, services, or equi pment. Such disruptions would include, but are not limited to (1) distribution of unsolicited advertising or messages, (2) propagation of computer worms o r viruses, and (3) attempting to gain unauthorized entry to another computer or computer system whether owned by the County or outside of the County. • • Removing or relocating any computer equipment (hardware, software, data, etc.) without supervisor's prior authorization and IT notification . Allowing unauthorized users, including an employee's family or friends, to use the County's technology resources . VIRUS & MALWARE PROTECTION Every computer user is to remain vigilant and alert to the possible transmittal and infection of a computer viru s. Most e-mail vi ru ses are transmitted through attachments or embedded links. Never click on a link or open attachments that contain the following extensions: .exe, .vbs, .com, .bmt, .hta, .shs, .vbe, .cmd. Upon detecting any virus, or suspected virus, users are to cease activity immediately and report it to the IT Department. Refer to Security section of this policy for software and hardwar e installation requirements, procedures, and policies. Appropriate anti-virus and anti-malware software will be made available by IT and loaded on every workstation and laptop computer. INTERNET USE A County Internet and network access, whether connected by cable, Wi-Fi, wireless air card, or any other means, is a resource granted to employees upon department head approval. All employees are encouraged to use the Internet to its fullest potential, providing effective services of the highest quality, discovering innovative and creative ways to use resources and i mprove services, and encouragi ng staff deve lopment. The Internet should be a primary method for the exchange of ideas and infor mation. TechnologyUsePo li cy 12 1 Page 053017ws HCBOC Page 65 The Internet provides easy access to software distributed by companies on a trial basis . The free access does not necessarily indicate the software is free or that it may be distributed freely. Users are expected to comply with the copyright policy as previously stated . Users should never use or download software from file sharing websites or services (commonly known as "P2P"). Refer to Security section of this policy on downloading and installing software. Slogging, Instant Messaging, online games, online movie/video streaming, online audio streaming, and chat room participation are not permitted unless demonstrable benefits to productivity are proven. These types of activities place extra strain on network resources and can affect network performance for the entire site. In all cases, prior approval of the department head and the IT Department must be obtained. A public/guest network will be provided for outside vendors, contractors, and users who need to access the Internet for the purpose of demonstrations and presentations to County Staff. County Staff may use public/guest network for personal computers and devices upon user acceptance of Terms and Use. COUNTY WEBSITES In order to maintain a consistent, useful and professional presence on the Internet, IT has established procedures that will assist departments in creating, publ ishing and maintaining content for the official County website or any sub-website created by any County Department, Board, Commission or entity directly affiliated with the County or which is funded by County funds. Each Department and its employees have a responsibility to make sure that all public information disseminated via the County website is accurate, current as possible, and in accordance with this policy. Employees shall provide, in association with such information, its source and the date it was published. An electronic mail address or other contact information allowing the recipient to contact public staff must be published. Only authorized employees shall be allowed to update the website. Authorized employees are directly accountable for all activity connected to their user ID. Departments who have a need to create or contract for its own physical website must have approval from the County Manager and the IT Department. Links to personal websites are not allowed. Information on events will be limited to those directly sponsored by or affiliated with the County. " . Techno l ogyUsePolicy 13 1 P age 053017ws HCBOC Page 66 ELECTRONIC MAIL Electronic mail is intended for County bus iness; however, the County recognizes the fact that the use of e-mail for incidental purposes may occur and is not li kely to strain County resources. Personal communications should not be excessive and it must be understood that the use of email passwo r ds does not imply privacy or confidentiality. E-mail messages, made or received in connection with the transaction of public business by any agency of North Carolina government or its subdivisions are considered a publ ic record and the property of the County. The County Manager and supervisory personnel have the right to review the contents of all employees' e-mails (personal or business related). Employees are solely responsible for how their email is used and managed. Contents of email dictate the retention of email and each email user is responsible for the retention of their own ema il. Email must be retained according to the procedures defined in the "Email as a Public Record in North Carolina: Guidelines For Its Retention and Disposition" publication, submitted by the NC Department of Cultural Resources (http://www. records .ncdcr.gov/erecords/ Email Policy.pdf) or other regulatory agencies as applicable. Personal email addresses being used for County business purposes, including but not limited to employees, County Commissioners, boards and commiss ions, should follow the same retention guidelines as County email addresses. Thi s policy does not attempt to monitor or manage personal computer accounts or equipment. Where at all possible, officia l County email addresses should be used to conduct County bus iness. Unacceptable uses of e-mail include, but are not limited to: • • • • • • • • • - Using email software that is not the County adopted standard . Sending or forwarding chain letters . Sending or forwarding copies of documents in violation of copyright laws . Compromising the integrity of the County and its busines s in any way . Sending or forwarding messages containing derogatory, racial , offensive, abusive, threatening, obscene, harassing, or other language inappropriate for the organization . Sending or fo rwarding messages that violate the County's sexual harassment policy . Willful propagation of computer viruses . Overtaxing the network with unnecessary group mailings or large emails (over 20 MB) . Users should utilize SendThisFile or other means of sending large files to recipients. Sending or forwarding confidential information including, but not limited to juvenile records in the Sheriff's Department, certain information contained in personnel files or medical files . This includes confidential information as defined by state and federal laws and agency regulations. • .,--• r .. • • Tec hn o l ogyUsePo li cy 14 /P age 053017ws HCBOC Page 67 TELEPHONES & MOBILE DEVICES The County may provide telephones and mobile devices to employees for business use, when the budget allows and determined necessary by the department head. A mobile device shall be used for appropriate business purposes. Such use is defined to be appropriate when an employee must utilize the device to further County operations. The County may review call logs, voicemail recordings, text messages, email transcripts, GPS data or any other data contained on or from County owned devices. All devices and accessories provided by the County are property of the County and must be returned upon request. The department head , the Finance Department and the IT Department, shall monitor mobile device use and charges . Any intentional, deliberate misuse of any device may result in the loss of mobile device service and employee reimbursement of charges and could result in disciplinary action. It is the responsibility of the department head, or his/her designee, to review the detailed bills for the department each month. The department head/designee should note usage patterns for both individuals and the department and investigate any unusual or questionable patterns. It is also the department head's responsibility to ensure that any required reimbursement to the County is done on a timely basis and in accordance with the requirements set forth herein. Laptops, cell phones, and other electronic devices in vehicles must be stored in a secure location or otherwise out of sight. Devices should never be left in vehicles overnight. To the degree possible, technology resources should be protected from theft and/or vandalism, fire or other damage including natural environmental hazards. Devices damaged or stolen must be reported to department head and IT Director immediately. Landline Phones The use of telephones is a necessary part of the day-to-day operation for many County employees. Unfortunately, inappropriate telephone use may also be a source of distraction that cause lower productivity and, in some instances, may present a safety hazard. Personal calls may be allowed on County land line phones, however, employees are expected to be good stewards of County resources and time, and therefore, personal calls should be limited and not affect job performance or duties. If personal misuse is determined, employee may be restricted to only business use or other disciplinary actions may occur. The County may monitor and/or record phone calls made or received using the County phone systems and may access and review call logs and voicemail recordings to ensure compliance with this and other County policies. Users have no expectation of privacy when using County owned phone systems . Tec hn o l ogyUse Po l ic y 151 P age 053017ws HCBOC Page 68 Cellular Phones & Smartphones The County may provide employees with mobile phones, smartphones, or wireless Internet devices. These devices must be used primarily for business use. Personal calls and use may be allowed on County devices, however, employees are expected to be good stewards of available minutes/data and use free cellular connections whenever possible. If personal misuse is determined, employee may be restricted to only business use or privileges may be revoked. All Smartphone devices shall use passwords and must adhere to the same password standards as previously defined. It is the user's responsibility to ensure devices are property secured. All smartphone devices shall contain County management software/profile. Removal or attempt to bypass this software/profile will be in strict violation of this policy. The County reserves the right to inspect any and all files stored on smartphones that are the property of the County in order to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter created, received, stored in, or sent from any County issued smartphone . Issued smartphones and all County purchased accessories must be returned to the IT Department when the user's service has ended. When the smartphone is returned, the County will conduct any appropriate backup of files in accordance with the Public Records and Retention laws. The smartphone will then be wiped clean of any and all information . iPads and Tablets The County has recognized that mobile devices, including iPads and tablets, may provide a benefit in the efficient performance of County duties and thereby improve service to the public . Users who choose to use their personal email/Apple ID accounts do so with the full knowledge that the content of that account is a public record and would be subject to North Carolina public records law. Users are responsible for the general care of the mobile device issued by the County. Mobile devices that are broken or fail to work properly must be taken to the IT Department for an evaluation. Mobile devices that have been lost, stolen or damaged from misuse, neglect or are accidentally damaged, in the sole and exclusive judgment of the County Manager in consultation with the County Attorney and IT Director, will be replaced or repaired by the County, with the cost borne by the issued user. Mobile devices should remain free of any writing, drawing, stickers or labels that are not the property of the County. Software and applications installed by the County must remain on the mobile device in usable condition and be readily accessible at all times. From time to time, the County may add or upgrade software applications for use by the user such that users may be required to check in their mobile devices with the IT Department for periodic updates and synchronizing. All software purchased by the County is property of the County and may not be transferred to any other individual. Personal software purchased and installed on County mobile devices are at the risk of the user/purchaser. The County offers no guarantee, warranty or support for -" T ec hnolo gyUse Pol ic y 16 IP a ge 053017ws HCBOC Page 69 personal software purchased and installed on County mobile devices nor will the County refund any purchases for personal software installed on County mobile devices . All of the County's computer systems and devices, including iPads and tablets, are considered to be public property. All documents, files and email messages created, received, stored in, or sent from any County mobile device is considered pub lic record , subject to disclosure to the public pursuant to the North Carolina Public Records laws (with only limited exceptions as provided by law). Users shall not use the mobile device, computer or communication devices in any way as to violate the Open Meetings law requirements, applicable governing laws, or ethical conduct and principles of an elected public official. Issued iPads, tablets and all County purchased accessories must be returned to the department head or IT Department when the user's term or service has ended . When the mobile device is returned, the County will conduct any appropriate backup of files in accordance with the Public Records and Retention laws. The mobile devices will then be wiped clean of any and all information . The County reserves the right to inspect any and all files stored on mobile devices that are the property of the County in order to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter created, received, stored i n, o r sent from any County issued mobile device. Mobile Data Terminals (MDTs) -Public Safety The security of the County's computer system is of paramount importance in mai ntaining an efficient and well-guarded database for referencing computerized information. Users will strictly adhere to the following guidelines on the usage of MDTs, regardless of type, make, or manufacturer and associated software to ensure compliance with federal copyright laws and protection against computer viruses. Any and all pol icies contained within the County's Technology Use Pol i cy shall apply to MDTs. MDTs, regardless of type, make, or manufacturer, have been installed in public safety vehicles to assist personnel in the execution of efficient public safety functions and to reduce the amount of rad io traffic necessary to conduct public safety operations. Prior to use, personnel will be trained in the use and care of MDTs and are expected to use this equipment in accordance with instructions provided. MDTs are designed and have been programmed to provide i nformation from State and National computer files on persons, vehicles and other property. Employees shall use the MDTs to check information on persons, vehicles, and other property and shall not request these types of tra nsactions be conducted by Dispatch. The only exceptions will be when an officer needs a printout of the information for inclusion with other reports or does not have an MDT or the MDT is not functioning properly. If the unit is not functioning properly, users are expected to request repairs as soon as possible during the normal working hours of the IT Department. O• •• r • W -· ,Jf- T e ch no l ogy Use Po li cy 1 7j Page 053017ws HCBOC Page 70 MDTs may be programmed to allow for communication of official public safety business between public safety vehicles and between field units and Dispatch. No vulgar, obscene, or derogatory messages, racially and/or sexually derogatory remarks shall be transmitted via the MDT nor shall any private, non-public safety business conversations be conducted between units through the MDT. All transmissions may be logged and maintained for future reference and to provide education and training as deemed necessary. Employees shall log on with their designated username and password. Employees shall never use another employee's credentials. At the end of shift, personnel shall log off the MDT system. All Internet policies must be followed when using MDT devices even if they are not connected to County Internet sources. The use of the Internet is not a private matter and the County reserves the right to monitor all uses without notification to the member; periodic audits may be conducted by the IT Department. The County reserves the right to inspect any and all files stored on MDTs that are the property of the County in order to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter that is created, received, stored in, or sent from any County issued MDT. All MDT devices shall contain County management software/profile. Removal or attempt to bypass this software/profile will be in strict violation of this policy. DESTRUCTION OF PUBLIC RECORDS No public records shall be destroyed, sold, loaned or otherwise disposed of, unless in compliance with the NC Department of Cultural Resources and in accordance with G.S. 121-5. COMPLIANCE The IT Director, department head and County Manager will review reported and perceived violations of this policy and may impose restrictions, suspend or terminate technology access, or remove technology equipment during or as a result of an investigation. The County Manager or IT Director may, at any time, inspect or request to inspect any County equipment issued to any department or to any user. The user shall, immediately produce item for inspection. Failure to produce equipment within a reasonable time may result in disciplinary action . Other appropriate action in response to abuse or misuse of technology resources may include, but not be limited to: • Reimbursement to the County for resources consumed • Legal action, including action to recover damages • Disciplinary actions, including suspension, demotion, or dismissal pursuant to the County's Personnel Policy Tec hn o l ogyUse P o li cy 18 I P age 053017ws HCBOC Page 71 Department heads will be responsible for the enforcement of the County's Technology Use Policy. MISCELLANEOUS .. • Procuring, leasing, receiving, maintaining, and installing hardware or software for or on County networks shall be done only by or under the direction of the IT Director. • Due to technology systems constantly evolving, it is recommended that this policy be reviewed by County IT Department on a yearly basis . TechnologyU s ePol icy 191 Pag e 053017ws HCBOC Page 72 HARNETT COUNTY TECHNOLOGY USE POLICY All County users must read and sign a copy of this policy and return it to their department heads. Department heads and Human Resources will keep a file of signed copies in the employee's personnel file. I have read the Harnett County Technology Use Policy and I understand and agree to its terms. Employee Signature Date Department Head Signature Date . ~ . Tec hnolog yUsePo li cy 20 IP age 053017ws HCBOC Page 73 Harnett County, NC Insurance Proposa l 5/23/2017 >f'" " '• C•"• ·.,..~ .... ," .~ ""<-,;• -,• ''f'•~~ ... •~, . i, r•· -~ -:i,; ... -,··~r ~• • •···r •• .,.., ~;y-: ,-·l'f,'"":>!C"~~-· ~ , ·s;-' '• -r• • .,..·,f;,,/ .: .~ ..... -. ,'" ·,.·~' ~ {5t' -t·.) ·r,.r. , . ,•·.;.,~~·,,. •. • ,;,.·, · 1' J, ·'T_>--.t"~,.t, ·'-t-"·t·. 4 ,._·~ :.\:. -~. i'_··:~-~ ::'~:-,.;~-"'\ r.:-)·.~,~~--~?~:t:\·: .t t· _{, -~--<~-;~-~-:.~:;_A:_ -~~L -·.· .... · .. ~. ~-~:-~::~\ ,_-_/>:t\:'_ ;t_,.,... ,,., __ .......... ~ ................ s, ... ,.~ ... ~.,..,.:..J:is't.~1""····· --·-··-"'·. "'· ~ __ ._...,.. -· ,_..___.._ .......:.~~ .. 2016-2017 2017-2018 Line of Coverage Premium Premium Property $246,899.00 $187,302.00 Inland Marine $18,611.00 Included Crime Included $2,744.00 Ge neral Liability $92 ,187.00 $52 ,762.00 Professional Liability Coverages $120 ,796 .00 $113,386.00 Automobile $204 ,4 37.00 $177 ,307.00 Umbrella $26 ,734 .00 $30,098.00 Package $709,664.00 $563,599.00 Cyber Liability $17 ,035 .00 $17 ,5 4 7 .00 Excess WC $161 ,398.00 $149,278 .00 Broker Fee $30,000.00 $40 ,000.00 Total $918,097.00 $770,424.00 Total Decrease (Dollar Amount) $147 ,673 .00 Total Decrease (Percentage) (16.08%) 053017ws HCBOC Page 74 Gina Wheeler From: Sent: To: Subject: Attachments: From: Joseph Jeffries Paula Stewart Tuesday, May 23, 2017 5:06 PM Gina Wheeler FW: Erwin Library SAdminCopie17051610480.pdf Sent: Tuesday, May 16, 2017 10:51 AM To: Angela Mclamb <amclamb@harnett.org>; Paula Stewart <pstewart@harnett.org> Subject: Erwin Library Good Morning Angela, I met with Richard Hicks Interim Manager for the Town of Erwin this morning and he had a proposal. Attached is copy of the proposal, but in summary the Town would like the County to take over operations now verses waiting and they are willing to pay us what they budget ($52K) and provide facility & maintenance for the first year. Take a look at it and I believe we have a meeting coming up we can discuss then. Thanks jj 1 053017ws HCBOC Page 75 10 -63 0 0 ·02 0 10 - 6 3 0 0 - 0 2 1 10 - 6 3 0 0 . 0 2 2 10 - 6 3 0 0 0 3 0 10 -63 0 0 0 5 0 10 -63 0 0 ·06 0 10 · 6 3 0 0 - 0 7 0 10 -63 0 0 -07 1 10 63 0 0 -11 0 10 -63 0 0 -13 0 10 · 6 3 0 0 -14 0 10 - 6 3 0 0 -15 0 10 - 6 3 0 0 - 1 6 0 10 · 6 3 0 0 -18 0 10 ·63 0 0 -32 0 10 -63 0 0 · 33 0 10 - 6 3 0 0 -33 1 10 - 6 3 0 0 - 3 4 0 10 -63 0 0 -45 0 10 - 6 3 0 0 -53 0 10 ·63 0 0 - 5 7 0 10 -63 0 0 -73 0 10 -63 0 0 -74 0 Yee ( l -- · - - ., -- LI B R A R Y SA l A R I E S S3 6 , 1 5 9 $3 2 , 1 9 7 OV E R T I M E so so CH R I S T M A S BO N U S $3 6 1 S3 6 6 SA l A R I E S • PA R T TI M E Sl 2 , 8 3 8 $1 7 , 0 1 0 FI C A EX P E N S E S3 . 7 7 6 S3 . 7 8 8 GR O U P I N SU R AN CE S5 . 3 9 2 S 3 , 7 1 4 RE T I R E M E N T S2 , 5 5 9 $2 , 2 7 6 40 1 K CO N T R I B U T I O N Sl . 8 0 2 S 1. 6 2 1 TE L E P H O N E / P O S T A G E $S 7 1 Sl 9 4 UT I L I T I E S $5 , 7 4 3 S5 . 6 5 1 TR A V E L so so MA I N T E N A N C E / R E P A I R · GR O U N D S S7 1 2 so MA I N T E N A N C E / R E P A I R - EQ U I P M E N T Sl 6 S4 1 4 DE P A R T M E N T A L EQ U I P M E N T S3 8 8 S2 , 1 6 7 OF F I C E SU P P L I E S $6 6 so DE P A R T M E N T A L SU P P L I E S $2 6 $1 1 , 8 0 5 CI R C U l A T I O N PU R C H A S E S $0 $1 . 4 1 8 JA N I T O R I A L SU P P L I E S $9 $0 CO N T R A C T E D SE R V I C E S S1 6 5 so DU E S AN D SU B S C R I P T I O N S $0 $1 2 9 MI S C E L l A N E O U S EX P E N S E $0 so CA P I T A L OU T L A Y so so CA P I T A L OU T L A Y EQ U I P M E N T so s o TO T A L LI B R A R Y $7 0 , 5 8 3 S8 2 , 7 5 0 - j t ) w " Ct > \ ) c . iS C Ov ( \ 1 \ 1 fo ' 1 S O r i o \ I f ' J ~l. ) ~ c . _ Y f° ' ' < ·t i i ' l \ c : . . 50 . \ c 1 1 ~ ' > TO W N or ER W I N EX P E N S[ WO R K S H E F T 20 1 7 / 2 0 1 8 Pn o r Ye a r Pn o r Ye a , Cu r r en t Ye a r Ac t u a l Th r u Es t i m a t e d To t a l De p a r t m e n t Manager Town Board - - - n - · '· - · - - · -- - ... -~ .. . . . . . . . . . . . . .. . ., . .. . .. ,. .. . . . . . ._ _ . . , . , , , u , ~ . . . , 11 1 1 : ; : c , v '" ' I C " ( U I C . > l nll!\,Ullllllt!IIU) Approveo S3 1 ,09 3 $2 9 . 5 1 0 $3 1 . 0 9 3 Sl 9 , 4 2 6 S l l ,66 7 $3 1 ,09 3 $3 1 , 0 9 3 $32,026 so so so so so so so so $2 9 7 S2 9 7 Sl O O Sl O O so Sl O O SlOO SlOO $1 3 , 1 0 2 $1 2 , 2 3 0 so so so so $1 5 , 8 0 8 so $3 . 4 0 4 S3 . 20 5 $2 , 3 8 7 $1 . 4 9 4 $8 9 3 S2 , 3 8 7 S3 .596 S2.458 $6 , 1 0 0 S2 . 1 9 1 S5 3 0 $4 2 6 $1 0 4 S5 3 0 $530 S530 S2 . 1 0 2 $1 , 9 8 9 S2 . S 3 5 Sl . 4 3 4 S l ,10 1 S2 . 5 3 5 S2.373 S2,452 Sl , 5 5 5 Sl , 5 0 3 Sl , 5 5 S S9 7 1 S5 8 4 $1 , 5 5 5 Sl .555 Sl ,607 Sl . 0 0 0 S6 5 5 $1 ,00 0 S4 7 8 $5 2 2 $1 , 0 0 0 Sl,000 Sl,000 SG . 0 0 0 S5 , 6 4 1 S6 , 3 0 0 S3 . 0 1 2 SJ . 3 5 0 S4 . 3 6 2 S6,000 S5.800 S5 0 0 S1 7 5 so $0 so so $770 S770 so SD so so s o so so so $5 0 0 $7 5 so $0 so so so so $2 , 5 0 0 S2 ,16 3 $1 ,00 0 $2 0 6 S7 5 0 $9 5 6 $1,000 $1,000 so so so so so $0 so $0 52 . 0 0 0 $1 , 6 8 4 so $0 $0 so so so S5 . 0 0 0 S4 .08 3 $5 ,00 0 Sl , 5 1 7 S3 .37 0 $4 ,88 7 S5.000 S5.000 so so $0 so so so so so so so so s o so $0 $0 $0 $0 $0 $0 so so $0 $0 $0 so $0 $0 $0 so $0 so $0 so so s o $0 so so so so S7 ,10 7 $7 . 1 0 7 so $0 so so so so S8 2 . 2 6 0 $7 2 , SO B $5 1 ,50 0 S2 9 .06 4 $2 0 . 3 4 1 $4 9 , 4 0 5 $6 8 ,825 $52 ,743 $0 Page 48 I D v - > I " C. 0 , , \ 1 1 " \ J ' - ) ~ ~ \. ~ , \ \ , ~ ) r, \) \ ,\i \ 1i) c"J ~,~~.-.c~<~ Y~o < )_ - - r - ~ r1 1 7S -7 . "' " so l e , . ~ I ~ ~. ~ 5 , 1, , • .\ , 1 , It i\ " 1 ( .: f l , w; , ) ~~ .. . r 1 \ 1 s 1 . o" ' ~D ' " ' "' \ ) 1 \ t < ' j Ct > l t \ ._ A 7 , 11 l ' . ) ( s i) . J ) Y.: . c ' \ (o " n , ~ u ' r , t . - ~ ~ ~ t.f(. q~? ~ "' ' f " " ' j- t , o ~ I / ~ r o~ o , P"' ' " \ I < " ' o\ o ho - f" ,l • J d , Ye..~ ' 3 \ D \ > . > , - , . r, s SD J . cl - C~ t , \ ) < : , C D ) ) 5. -l t 1 \ &. \ 1 1 . . . Y< t c ' l- \ -r - c . . . . , ... fo ' l j :J . . . S - 7 . t f c\ . , . , I ) . _ C ~ ' n ·. ~ l l , 1 ) / . , I '( Q c ( )_ cl : ) f ' t l , l , ~ I 0-.35 l_Ob I ~~ . ' , C" ' " \ . , \ u ' r - , c . . . . : 1, '~ 1.. , ~ c _ C I l\ (o r < ' I · , \ . ~ It)" II I l~b 053017ws HCBOC Page 76 Gina Wheeler Subject: FW: CCCC Board of Trustees From: clemmedley@yahoo.com [mailto :clemmedley@yahoo .com ] Sent: Wednesday, May 24, 2017 9:08 AM To: Shannon Eason <season@harnett .org> Subject: Re: CCCC Board of Trustees Good morning, Shannon. In response to your request, please accept this as notice that, due to my post retirement plans and activities, I am not able to accept reappointment to the CCCC Board of Trustees. Please convey to the Commissioners my great appreciation for the opportunity I have had to serve on the BOTs and also my appreciation for the honor of being appointed for an additional term. With much gratitude, Clem Medley Sent from my iPhone 1 053017ws HCBOC Page 77 ~ CENTRAL CAROLINA COMMUNITY COLLEGE Chatham County Campus 764 West Street Pittsboro, NC 27312-8822 (919) 542-6495 Harnett County Campus 1075 E. Cornelius Harnett Blvd. Lillington, NC 27546-7672 (910) 893-9101 Lee County Campus 1105 Kelly Dr. Sanford, NC 27330-98 40 (919) 775-5401 May 2, 2017 Mr. Gordon Springle Harnett County Board of Commissioners 540 Tippet Road Angier NC 27501 Dear Chairman Springle: RECEIVED MAY -8 2017 HARNETT COUNTY MANAGER'S OFFICE As Chairman of the Board of Trustees of Central Carolina Community College, I am writing you to inform you that the term of your appointee to the CCCC Board of Trustees, Clem Medley, will expire on June 30, 2017. CCCC Board of Trustee Jim Burgin has been reappointed by the Harnett County Board of Commissioners. Please take the steps to fill this one vacancy by this time. Please be aware that our accrediting body, the Southern Association of Colleges and Schools (SACS) requires that the college's governing board to be free of undue influence from political, religious, or other external bodies, and protects the institution for such influence. Thank you for giving careful thought to select someone who will have the best interests of the college and its students at heart. During the years that Clem Medley has served as your appointee to the CCCC Board, he has regularly attended board and committee meetings and actively participated in the governance of the college. Please notify Dr. Bud Marchant of your selection once it is made. Sincerely, Julian Philpott, Chairman Board of Trustees Cc: Mr. Joseph Jeffries County Manager 053017ws HCBOC Page 78