Loading...
112922 ws agenda packetWORK SESSION AGENDA Date: Tuesday, November 29, 2022 Time: 9:00 a.m. Location: Commissioners Meeting Room Harnett County Resource Center & Library 455 McKinney Parkway, Lillington Harnett County Board of Commissioners Page | 1 1.Call to order – Chairman Lewis Weatherspoon 2.Pledge of Allegiance and Invocation – Commissioner Brooks Matthews 3.Discuss a request for a public hearing to allow citizens an opportunity to comment ontransportation needs and the proposed 5311 Community Transportation Program as well as the5307 CARES Act to be submitted to the North Carolina Department of Transportation, PublicTransportation Division; Barry Blevins, General Services Director 4.Discuss a grant agreement with the City of Fayetteville, as the designated recipient of funding forurbanized area formula grants within the Fayetteville Area Metropolitan Planning Organization(FAMPO) defined urbanized area; Barry Blevins, General Services Director 5.Discuss the Harnett Area Rural Transit System (HARTS) Public Transportation Agency SafetyPlan; Barry Blevins; General Services Director 6.Discuss a request to terminate Review Officers that are no longer employed with Harnett Countyor no longer in the GIS Division of the IT Department and update the Review Officers; Ira Hall,Chief Information Officer 7.Discuss a request to adopt the updated Technology Use Policy; Ira Hall, Chief Information Officer 8.Discuss a request to allow Investigator Truelove and Sergeant Lackey, retirees, to purchaseservice weapons; Sheriff Wayne Coats 9.Discuss the selection of a vendor and approval of an agreement for the Medical Mobile Clinic;John Rouse; Health Department Director 10.Discuss ARPA/CSLFRF Grant Project Ordinance Amendments for VIPER Radios and EMS PremiumPay; Ally Fouts, Lead for NC Fellow 11.Discuss a Resolution authorizing the sale of real property owned by Harnett County and the Cityof Dunn on East Edgerton Street in Dunn, NC; Dwight Snow, County Attorney 12.Discuss and review the 2023 Schedule of Meetings for the Harnett County Board ofCommissioners. 13.Review applications to serve on Boards and Committees. HCBOC 112922 ws Pg. 1 Harnett County Board of Commissioners Page | 2 14.County Manager’s Report- Brent Trout, County Manager •December 5, 2022 Regular Meeting Agenda Review •Upcoming meetings and invitations 15.Closed Session 16.Recess 17.Reconvene at 2095 Kipling Rd, Fuquay Varina, NC to tour Johnson Farm. 18.Adjourn CONDUCT OF THE NOVEMBER 29, 2022 MEETING Live audio of the meeting will be streamed on the Harnett County Government’s YouTube Channel at https://www.youtube.com/channel/UCU7mTF6HTD65x_98EhAMeMg/featured. HCBOC 112922 ws Pg. 2 Item 3 HCBOC 112922 ws Pg. 3 HCBOC 112922 ws Pg. 4 HCBOC 112922 ws Pg. 5 HCBOC 112922 ws Pg. 6 HCBOC 112922 ws Pg. 7 HCBOC 112922 ws Pg. 8 HCBOC 112922 ws Pg. 9 HCBOC 112922 ws Pg. 10 HCBOC 112922 ws Pg. 11 HCBOC 112922 ws Pg. 12 HCBOC 112922 ws Pg. 13 HCBOC 112922 ws Pg. 14 HCBOC 112922 ws Pg. 15 HCBOC 112922 ws Pg. 16 HCBOC 112922 ws Pg. 17 HCBOC 112922 ws Pg. 18 HCBOC 112922 ws Pg. 19 HCBOC 112922 ws Pg. 20 HCBOC 112922 ws Pg. 21 HCBOC 112922 ws Pg. 22 HCBOC 112922 ws Pg. 23 HCBOC 112922 ws Pg. 24 HCBOC 112922 ws Pg. 25 HCBOC 112922 ws Pg. 26 HCBOC 112922 ws Pg. 27 HCBOC 112922 ws Pg. 28 HCBOC 112922 ws Pg. 29 HCBOC 112922 ws Pg. 30 HCBOC 112922 ws Pg. 31 HCBOC 112922 ws Pg. 32 HCBOC 112922 ws Pg. 33 HCBOC 112922 ws Pg. 34 HCBOC 112922 ws Pg. 35 HCBOC 112922 ws Pg. 36 HCBOC 112922 ws Pg. 37 HCBOC 112922 ws Pg. 38 HCBOC 112922 ws Pg. 39 HCBOC 112922 ws Pg. 40 HCBOC 112922 ws Pg. 41 HCBOC 112922 ws Pg. 42 HCBOC 112922 ws Pg. 43 HCBOC 112922 ws Pg. 44 HCBOC 112922 ws Pg. 45 HCBOC 112922 ws Pg. 46 HCBOC 112922 ws Pg. 47 HCBOC 112922 ws Pg. 48 HCBOC 112922 ws Pg. 49 HCBOC 112922 ws Pg. 50 HCBOC 112922 ws Pg. 51 HCBOC 112922 ws Pg. 52 HCBOC 112922 ws Pg. 53 HCBOC 112922 ws Pg. 54 HCBOC 112922 ws Pg. 55 HCBOC 112922 ws Pg. 56 HCBOC 112922 ws Pg. 57 HCBOC 112922 ws Pg. 58 HCBOC 112922 ws Pg. 59 HCBOC 112922 ws Pg. 60 HCBOC 112922 ws Pg. 61 HCBOC 112922 ws Pg. 62 HCBOC 112922 ws Pg. 63 HCBOC 112922 ws Pg. 64 HCBOC 112922 ws Pg. 65 HCBOC 112922 ws Pg. 66 HCBOC 112922 ws Pg. 67 HCBOC 112922 ws Pg. 68 HCBOC 112922 ws Pg. 69 HCBOC 112922 ws Pg. 70 HCBOC 112922 ws Pg. 71 HCBOC 112922 ws Pg. 72 HCBOC 112922 ws Pg. 73 HCBOC 112922 ws Pg. 74 HCBOC 112922 ws Pg. 75 HCBOC 112922 ws Pg. 76 HCBOC 112922 ws Pg. 77 HCBOC 112922 ws Pg. 78 HCBOC 112922 ws Pg. 79 HCBOC 112922 ws Pg. 80 HCBOC 112922 ws Pg. 81 HCBOC 112922 ws Pg. 82 HCBOC 112922 ws Pg. 83 HCBOC 112922 ws Pg. 84 HCBOC 112922 ws Pg. 85 HCBOC 112922 ws Pg. 86 HCBOC 112922 ws Pg. 87 HCBOC 112922 ws Pg. 88 HCBOC 112922 ws Pg. 89 HCBOC 112922 ws Pg. 90 HCBOC 112922 ws Pg. 91 HCBOC 112922 ws Pg. 92 HCBOC 112922 ws Pg. 93 HCBOC 112922 ws Pg. 94 HCBOC 112922 ws Pg. 95 HCBOC 112922 ws Pg. 96 HCBOC 112922 ws Pg. 97 HCBOC 112922 ws Pg. 98 HCBOC 112922 ws Pg. 99 HCBOC 112922 ws Pg. 100 HCBOC 112922 ws Pg. 101 HCBOC 112922 ws Pg. 102 HCBOC 112922 ws Pg. 103 Item 4 HCBOC 112922 ws Pg. 104 HCBOC 112922 ws Pg. 105 HCBOC 112922 ws Pg. 106 HCBOC 112922 ws Pg. 107 HCBOC 112922 ws Pg. 108 HCBOC 112922 ws Pg. 109 HCBOC 112922 ws Pg. 110 HCBOC 112922 ws Pg. 111 HCBOC 112922 ws Pg. 112 HCBOC 112922 ws Pg. 113 HCBOC 112922 ws Pg. 114 HCBOC 112922 ws Pg. 115 HCBOC 112922 ws Pg. 116 HCBOC 112922 ws Pg. 117 HCBOC 112922 ws Pg. 118 HCBOC 112922 ws Pg. 119 HCBOC 112922 ws Pg. 120 HCBOC 112922 ws Pg. 121 HCBOC 112922 ws Pg. 122 HCBOC 112922 ws Pg. 123 HCBOC 112922 ws Pg. 124 HCBOC 112922 ws Pg. 125 HCBOC 112922 ws Pg. 126 HCBOC 112922 ws Pg. 127 HCBOC 112922 ws Pg. 128 HCBOC 112922 ws Pg. 129 HCBOC 112922 ws Pg. 130 HCBOC 112922 ws Pg. 131 HCBOC 112922 ws Pg. 132 HCBOC 112922 ws Pg. 133 HCBOC 112922 ws Pg. 134 HCBOC 112922 ws Pg. 135 HCBOC 112922 ws Pg. 136 HCBOC 112922 ws Pg. 137 HCBOC 112922 ws Pg. 138 HCBOC 112922 ws Pg. 139 HCBOC 112922 ws Pg. 140 HCBOC 112922 ws Pg. 141 HCBOC 112922 ws Pg. 142 HCBOC 112922 ws Pg. 143 HCBOC 112922 ws Pg. 144 HCBOC 112922 ws Pg. 145 HCBOC 112922 ws Pg. 146 HCBOC 112922 ws Pg. 147 HCBOC 112922 ws Pg. 148 Item 5 HCBOC 112922 ws Pg. 149 HCBOC 112922 ws Pg. 150 HCBOC 112922 ws Pg. 151 HCBOC 112922 ws Pg. 152 HCBOC 112922 ws Pg. 153 HCBOC 112922 ws Pg. 154 HCBOC 112922 ws Pg. 155 HCBOC 112922 ws Pg. 156 HCBOC 112922 ws Pg. 157 HCBOC 112922 ws Pg. 158 HCBOC 112922 ws Pg. 159 HCBOC 112922 ws Pg. 160 HCBOC 112922 ws Pg. 161 HCBOC 112922 ws Pg. 162 HCBOC 112922 ws Pg. 163 HCBOC 112922 ws Pg. 164 HCBOC 112922 ws Pg. 165 HCBOC 112922 ws Pg. 166 HCBOC 112922 ws Pg. 167 HCBOC 112922 ws Pg. 168 HCBOC 112922 ws Pg. 169 HCBOC 112922 ws Pg. 170 HCBOC 112922 ws Pg. 171 HCBOC 112922 ws Pg. 172 HCBOC 112922 ws Pg. 173 HCBOC 112922 ws Pg. 174 HCBOC 112922 ws Pg. 175 HCBOC 112922 ws Pg. 176 HCBOC 112922 ws Pg. 177 HCBOC 112922 ws Pg. 178 HCBOC 112922 ws Pg. 179 HCBOC 112922 ws Pg. 180 HCBOC 112922 ws Pg. 181 HCBOC 112922 ws Pg. 182 HCBOC 112922 ws Pg. 183 HCBOC 112922 ws Pg. 184 HCBOC 112922 ws Pg. 185 HCBOC 112922 ws Pg. 186 Item 6 HCBOC 112922 ws Pg. 187 HCBOC 112922 ws Pg. 188 S:\Clerk to the Board docs\AGENDAS\2022\112922 ws\7.1 tech use policy Agenda request 2022.docx Page 1 of 1 Board Meeting Agenda Item MEETING DATE: December 5, 2022 TO: HARNETT COUNTY BOARD OF COMMISSIONERS SUBJECT: Technology Use Policy REQUESTED BY: Ira Hall, CIO, Information Techology Department REQUEST: Harnett County Information Technology Department requests the adoption of the updated Technology Use Policy. This policy covers the use of all technology resources belonging to the Harnett County. The main updates are on page 29 pertaining to the requirements for multi-factor authentication. FINANCE OFFICER’S RECOMMENDATION: COUNTY MANAGER’S RECOMMENDATION: Item 7 HCBOC 112922 ws Pg. 189 T e c h n o l o g y U s e P o l i c y 1 | P a g e Harnett County TECHNOLOGY USE POLICY INFORMATION TECHNOLOGY DEPARTMENT October 25, 2022 Adopted & Effective: HCBOC 112922 ws Pg. 190 T e c h n o l o g y U s e P o l i c y 2 | P a g e Harnett County TECHNOLOGY USE POLICY Table of Contents PURPOSE, SCOPE & OWNERSHIP .................................................................................................... 3 DEFINITIONS ................................................................................................................................... 5 SECURITY ......................................................................................................................................... 7 ACCEPTABLE USE .......................................................................................................................... 11 UNACCEPTABLE USE ..................................................................................................................... 12 VIRUS & MALWARE PROTECTION ................................................................................................ 13 INTERNET USE ............................................................................................................................... 13 COUNTY WEBSITES ....................................................................................................................... 14 ELECTRONIC MAIL ......................................................................................................................... 15 TELEPHONES & MOBILE DEVICES ................................................................................................. 16 Landline Phones ...................................................................................................................................... 16 Cellular Phones & Smartphones ............................................................................................................. 17 iPads and Tablets .................................................................................................................................... 17 Mobile Data Terminals (MDTs) – Public Safety ...................................................................................... 18 DESTRUCTION OF PUBLIC RECORDS ............................................................................................. 19 COMPLIANCE ................................................................................................................................ 19 MISCELLANEOUS ........................................................................................................................... 19 HCBOC 112922 ws Pg. 191 T e c h n o l o g y U s e P o l i c y 3 | P a g e Harnett County TECHNOLOGY USE POLICY PURPOSE, SCOPE & OWNERSHIP This policy covers the use of all technology resources belonging to the Harnett County, hereafter referred to as County. It includes, but is not limited to all computer systems of any size and function and their attached peripherals, software, phones, all mobile communication devices, faxes, copiers, printers, camera systems, voice mail systems, e-mail systems, network resources, user accounts, electronic door locks, time clocks, ID badges, radios, data in any format and any network accessed by these systems including the Internet. Systems containing County data, which are hosted by third parties outside of the County’s network, and the personnel with access to those systems, are also subject to this policy. All technology resources owned, rented, or leased by the County are in place to enable the County to provide its services in a timely and efficient manner. This is the primary function of these resources and any activity or action that interferes with this purpose is prohibited. It is critical that these systems and machines be protected from misuse and unauthorized access. All technology resources defined in this section, along with all information transmitted by, received from, and stored upon said systems are considered to be possessed by, and/or the property of the County. Additionally, all documents, messages and attachments composed, sent, received or stored on County Technology Systems are County property. County standards will be established for all technology (hardware and software). Any deviation from these standards may require approval of the department head, Chief Information Officer (CIO), Finance Director, HR Director, and/or the County Manager. Because technology systems are constantly evolving, the County requires its employees to use a common sense approach to the rules set forth below, complying with not only the letter, but also the intent of this policy. In addition to this policy, users are subject to applicable state and federal laws. Improper use or misuse of County Technology Systems on a person’s work time or otherwise is a violation of the County’s personnel policies. User violation could result in disciplinary action including suspension, demotion or dismissal. If a policy violation occurs, aside from disciplinary actions specified under the County’s policy, system access may be revoked in whole or in part if deemed to be in the best interest of the County’s Technology System security. This policy is not intended to supersede any existing laws or policies regarding records that are confidential, including, but not limited to, juvenile records in the Sheriff’s Department, certain information contained in personnel files, or medical files. HCBOC 112922 ws Pg. 192 T e c h n o l o g y U s e P o l i c y 4 | P a g e This policy is intended for internal use by County employees defined as full-time, part-time, temporary and interns, all County Boards and Commissions that may have access to County equipment or resources, and non-County employees covered under this policy, defined as contractors, vendors, and volunteers who use County owned, rented, or leased resources. HCBOC 112922 ws Pg. 193 T e c h n o l o g y U s e P o l i c y 5 | P a g e DEFINITIONS Anti-virus/Anti-malware software – Computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Applications – Computer software such as word processors, which perform productive tasks for users. Authorized Systems – A computer network that allows entry with proper credentials. Backup Schedule – Plan for duplicating County data and programs. Backup Storage Area – Location where County data and programs reside, typically on a tape, disk or hard drive. Blogging – Web log on a website where entries are written in chronological order and commonly displayed in reverse chronological order. Chain Letter – Message that induces the recipient to forward copies of a document to other users. They may contain viruses, false information or threats. Chatroom – A form of digital conferencing that can be real time online conversations. Communications Equipment – Device that is physically attached to the County network and enables transmission of data. Computer Access – Ability to utilize the computer and gain admission into the County’s network. Computer virus – A computer program that can copy itself and infect a computer without permission or knowledge of the user. E-Mail – Electronic Mail: Messages, usually text, sent from one person to another via computer. Group Policy – A feature of Microsoft Windows operating systems that provides centralized management and configuration of computers and remote users. Hardware – The physical components of a computer system (monitor, CPU, keyboard). Instant Messenger – Also known as IM, a program that facilitates live chat. HCBOC 112922 ws Pg. 194 T e c h n o l o g y U s e P o l i c y 6 | P a g e Internet – Vast collection of inter-connected networks that all use the TCP/IP protocols. Malware- malicious software designed to damage or gain unauthorized access to a computer system. Mobile Devices – Computing appliance that is typically handheld. MultiFactor Authentication (MFA)- additional layer of security that authenticates your identity along with your account password. Usually authenticated by a pin sent via text, email or authenticator app. Network – The connection of two or more computers together so that they can share resources. Online Games – Reference to video games that are played over some form of computer network, most commonly the Internet. Peripheral Devices – Any equipment such as printers, copiers, faxes, scanners that attaches to the network. Public Network – Ability to access the Internet without restrictions. Remote Access – Access to County systems from external systems, e.g. via the Internet. Server – Computer or a software package that provides a specific kind of service to client software running on other computers. Social Media – Commonly used websites, such as, Facebook, Twitter, , YouTube, Flickr, Blogger, Google+, Instagram, Snapchat and LinkedIn. Software – Collection of computer programs, procedures and documentations that perform some task on a computer system. TCP/IP – Transmission Control Protocol/Internet Protocol: A suite of protocols that defines the Internet. The method used to transmit and receive data over the Internet. County Websites – County’s collection of web pages hosted by a server. Workstations – Microcomputer designed for technical applications. User – Any individual who interacts with the computer at an application level. VPN – Virtual Private Network: is a network that is constructed by using public connections, usually the Internet, to connect to a private network such as the County’s internal network. HCBOC 112922 ws Pg. 195 T e c h n o l o g y U s e P o l i c y 7 | P a g e SECURITY Security refers to the protection of all technology resources from any kind of damage and the protection of data from unauthorized access, distribution, modification or destruction. The following procedures must be followed to ensure a secure environment. • A user will be authorized access to the County’s computer systems by the appropriate user department head or designee. A request for services must be submitted by the department head or their designee to the Information Technology Department, hereafter referred as the IT Department. The CIO or their designee will establish credentials for the authorized systems, which may include but not limited to software applications, e-mail, Internet, peripheral devices, building access and time clock access. This request should be sent directly to the IT Department from the department head or designee. • Request for services, as well as, any other document containing IT security access information, including but not limited to, usernames, passwords, security questions and answers, and user access rights shall not be considered public record and shall not be released to any person, firm, or entity without direct written permission from the CIO and County Manager. • All County users must read and sign a copy of this policy and return it to their department heads. Department heads and Human Resources will keep a file of signed copies in the employee’s personnel file. • When an employee is suspended or terminated, a written notification will be submitted from the department head or his/her designee to the IT Department immediately. Access to all systems will be suspended immediately. • Non-County employees, as previously defined, will be the responsibility of the department head, who will notify the IT Department when it is necessary to determine accessibility and establish system credentials. • IT Department will ensure security of unattended workstations by utilizing a group policy to lock computer screens after twenty (20) minutes or less of inactivity. Department heads may request a modification of this procedure through written request to the IT Department. Requests will be considered based on location and access HCBOC 112922 ws Pg. 196 T e c h n o l o g y U s e P o l i c y 8 | P a g e levels of the computer or user. Users must logoff all computer systems at the end of each work day. • For security, network, and computer systems maintenance purposes, authorized individuals may monitor equipment, systems, data and network traffic at any time. • Any hardware or peripherals not belonging to the County will not be permitted to attach to the County’s internal network without written authorization from the department head and final approval from the CIO. Personal hardware includes, but is not limited to, computers, cell phones, mobile devices, cameras, iPods, MP3 players, flash drives and portable hard drives. If it is determined that a non-County owned computer or device must attach to the network, a checklist of required software will be provided by IT to the department head. Computer owners are responsible for installing all required software. County IT staff will be available for consultation and will validate all required software before non-County owned equipment can participate on the County’s network. Unauthorized devices connecting to the County’s internal network can create an enormous security risk leaving the County’s network exposed to numerous threats and immeasurable damage. A public/guest network will be provided at all County buildings. Personal devices may connect to public/guest networks upon accepting the Terms of Use. • For remote assistance help desk purposes, authorized individuals may connect through remote access software to equipment, systems, data and network traffic at any time. • The County has the right to monitor, audit, and/or inspect any and all aspects of the County Technology Systems at any time, without advance notice to any users, and without the permission of any user. Failure to monitor in any specific situation does not constitute a waiver of the County’s right to monitor. Users within the scope of this policy are advised that they have no privacy rights and no user of County Technology Systems has any expectation of privacy in any message, file, image, or data sent, retrieved, or received when using County Technology Systems. Employees must understand that all technology resources are County property. • The County does not guarantee the confidentiality of user information stored on any network, computer, or communications device belonging to the County. Users should be aware that the data they create on County technology or communications systems remains the property of the County and is not private (unless the data is protected by privacy or confidentiality laws). Information that is stored on or transmitted to or from County Technology Systems may be subject to disclosure pursuant to the North Carolina Public Records Law. Users should refrain from, where possible, storing personal files and data on County Systems. HCBOC 112922 ws Pg. 197 T e c h n o l o g y U s e P o l i c y 9 | P a g e • Users are responsible for safeguarding their own credentials and computer access and SHALL NOT let another person use their credentials or access. Users are directly accountable for all activity connected to their user ID. • Passwords may be required to be changed every ninety (90) days and SHALL NOT be divulged to any other person. Passwords should be memorized and not written down unless kept in a secure place. The CIO shall determine when access will require routine password changes. • Multi-Factor Authentication (MFA) may be required to utilize any County user account or technology. Users may use their personal or county issued devices to set up an approved authenticator app or ? personal phone number to authenticate. If the user does not wish to use one of these methods, they will be issued a County Security device token. It is imperative that the user keep the device secured at all times. • Security device tokens will be issued to County users to provide access with multi-factor authentication. Routine wear and tear or theft of the token does not incur a charge for replacement, however loss of the token carries a $40 replacement fee. • The County has no control or access to any Authenticator apps used for MFA by the users on their personal device. All authentication is solely handled by the app provider. • Passwords must be changed at any time a user believes their password has been compromised. Any credentials such as ID badges,proximity cards or security tokens that become lost, stolen or misplaced must be reported to the department head and IT Department immediately. • Users SHALL NOT abuse or misuse the County’s technology resources or violate any rules in other portions of the County Personnel Policy, local, state, or federal laws via the County’s technology resources. • Users SHALL NOT copy or attempt to copy any software or data from County Systems without having written authorization. • Users SHALL NOT attempt to bypass any security mechanisms. HCBOC 112922 ws Pg. 198 T e c h n o l o g y U s e P o l i c y 10 | P a g e • No third party may be allowed access to County Systems without prior authorization and approval from the CIO. • Users SHALL NOT engage in abuse or misuse of the County’s technology resources. • Users SHALL NOT install any computer software on any County owned computers or devices, not authorized by the County, regardless of the ownership of the software except as allowed in other sections of this policy. Users may not install software personally owned or downloaded for free from the Internet. This includes but is not limited to, music software, photo software, Internet search software, screen savers and desktop backgrounds. Many of these software applications may contain viruses and/or malware that may compromise the integrity and security of the County’s network. • Administrative rights are granted to IT staff and those departments required by state regulations to have local administrative rights. Department heads must approve software requests and submit to the IT Department. Any software that adversely affects the performance of the machine or network will not be permitted on the County system. • Separation of duties will be practiced in all departments, to the greatest extent possible, such that no individual has total control of a process. • Users shall disclose to their department head, who shall then notify IT of any suspected or confirmed unauthorized use or misuse of technology resources and any potential security breaches or loopholes. • The IT Department, where possible, will work to ensure that all network infrastructures, including but not limited to communications equipment, servers, data cables and telephone cables are secured behind locked doors with limited access by authorized personnel. • Remote access to County systems consumes technology resources above and beyond those required for local access. Remote access shall be granted on a case-by-case basis based upon the unique needs of the user and available resources. Remote access users are subject to all policies herein. HCBOC 112922 ws Pg. 199 T e c h n o l o g y U s e P o l i c y 11 | P a g e ACCEPTABLE USE At all times when an employee is using County technology resources, he or she is representing the County. While in the performance of work-related functions, while on the job, or while using publicly owned or publicly provided technology resources, County employees shall use them responsibly and professionally, and remember that public perception is extremely important. They shall not use these resources in an illegal, malicious, or obscene manner. When using County resources, employees shall abide by all County policies including the County’s policy on sexual harassment. County Technology Systems are intended for business use. However, employees may make reasonable, incidental or occasional, personal use of the County’s computers and data communications. Any personal use must adhere to the following: • Must not incur any additional cost to the County. If, in a critical situation, an employee must use County resources that incur costs, the employee will reimburse the County within 30 days of the occurrence. • Must not incur security risks to the County or the County’s network. • Must not violate the County Personnel Policy. • Must not have a negative impact on employee performance, including interfering with work duties, work performance or work productivity. • Must not have a negative impact on system performance. • Must not violate this Policy or any applicable laws or regulations. • Must not violate contractual agreements or intellectual property rights. • Must not be used for personal gain. • Must not be used for solicitation. HCBOC 112922 ws Pg. 200 T e c h n o l o g y U s e P o l i c y 12 | P a g e Users are required: • To respect the privacy of other users; for example, users shall not intentionally seek information on, obtain copies of, or modify files, data, or passwords belonging to other users, unless explicit permission to do so has been obtained. It shall be understood that this rule does not apply to supervisory personnel, who shall have complete authority to access any files created by users in their departments. • To protect data from unauthorized use or disclosure as required by state and federal laws and agency regulations. (i.e., confidential information) • To respect the integrity of computing systems; for example, users shall not use or develop programs that harass other users, or infiltrate a computer or computing system and/or damage or alter the software components of a computer or computing system, or otherwise interfere with data, hardware, or system operation. • To respect the legal protection provided to programs and data by copyright and license. The County owns licenses to a number of proprietary programs, which allow the County to use the software but severely restricts anything other than the use of the software on a single computer or network. Any redistribution of software from the computing systems breaches agreements with our software suppliers, as well as applicable federal copyright, patent and trade secret laws. U.S. Copyright Law provides for civil damages of $50,000 or more and criminal penalties including fines and imprisonment in cases involving the illegal reproduction of software. Therefore, no copying, downloading, or distributing of any copyrighted materials, including but not limited to messages, e-mail, text files, program files, image files, database files, sound files, and music files is allowed without prior authorization by IT. UNACCEPTABLE USE Unacceptable uses are defined as those uses that do not conform to the purpose, goals, and mission of the County and to each user’s authorized job duties and responsibilities as determined by the County Manager or his/her designee. Examples of unacceptable activities include, but are not limited to: • Private or personal, for-profit activities or for any illegal purpose, including but not limited to communications that violate any laws or regulations. • The use of County Systems to access, transmit, store, display, or request obscene, pornographic, erotic, profane, racist, sexist, libelous, or otherwise offensive or abusive material (including messages, images, video, or sound). The County may install monitoring software or use filters to monitor or block access to any sites that would or HCBOC 112922 ws Pg. 201 T e c h n o l o g y U s e P o l i c y 13 | P a g e possibly could violate this policy. Any user who attempts to avoid such software or filter is in strict violation of this policy and may face disciplinary action up to dismissal. • Intentionally seeking information about, obtaining copies of, or modifying of files, other data, or passwords belonging to other users, unless explicit permission to do so has been obtained. • Interfering with or disrupting users, services, or equipment. Such disruptions would include, but are not limited to (1) distribution of unsolicited advertising or messages, (2) propagation of computer worms or viruses, and (3) attempting to gain unauthorized entry to another computer or computer system whether owned by the County or outside of the County. • Removing or relocating any computer equipment (hardware, software, data, etc.) without supervisor’s prior authorization and IT notification. • Allowing unauthorized users, including an employee’s family or friends, to use the County’s technology resources. VIRUS & MALWARE PROTECTION Every computer user is to remain vigilant and alert to the possible transmittal and infection of a computer virus. Most e-mail viruses are transmitted through attachments or embedded links. Never click on a link or open attachments that contain the following extensions: .exe, .vbs, .com, .bmt, .hta, .shs, .vbe, .cmd. Upon detecting any virus, or suspected virus, users are to cease activity immediately and report it to the IT Department. Refer to Security section of this policy for software and hardware installation requirements, procedures, and policies. Appropriate anti-virus and anti-malware software will be made available by IT and loaded on every workstation and laptop computer. INTERNET USE A County Internet and network access, whether connected by cable, Wi-Fi, wireless air card, or any other means, is a resource granted to employees upon department head approval. All employees are encouraged to use the Internet to its fullest potential, providing effective services of the highest quality, discovering innovative and creative ways to use resources and improve services, and encouraging staff development. The Internet should be a primary method for the exchange of ideas and information. HCBOC 112922 ws Pg. 202 T e c h n o l o g y U s e P o l i c y 14 | P a g e The Internet provides easy access to software distributed by companies on a trial basis. The free access does not necessarily indicate the software is free or that it may be distributed freely. Users are expected to comply with the copyright policy as previously stated. Users should never use or download software from file sharing websites or services (commonly known as “P2P”). Refer to Security section of this policy on downloading and installing software. Blogging, Instant Messaging, online games, online movie/video streaming, online audio streaming, and chat room participation are not permitted unless demonstrable benefits to productivity are proven. These types of activities place extra strain on network resources and can affect network performance for the entire site. In all cases, prior approval of the department head and the IT Department must be obtained. A public/guest network will be provided for outside vendors, contractors, and users who need to access the Internet for the purpose of demonstrations and presentations to County Staff. County Staff may use public/guest network for personal computers and devices upon user acceptance of Terms and Use. COUNTY WEBSITES In order to maintain a consistent, useful and professional presence on the Internet, IT has established procedures that will assist departments in creating, publishing and maintaining content for the official County website or any sub-website created by any County Department, Board, Commission or entity directly affiliated with the County or which is funded by County funds. Each Department and its employees have a responsibility to make sure that all public information disseminated via the County website is accurate, current as possible, and in accordance with this policy. Employees shall provide, in association with such information, its source and the date it was published. An electronic mail address or other contact information allowing the recipient to contact public staff must be published. Only authorized employees shall be allowed to update the website. Authorized employees are directly accountable for all activity connected to their user ID. Departments who have a need to create or contract for its own physical website must have approval from the County Manager and the IT Department. Links to personal websites are not allowed. Information on events will be limited to those directly sponsored by or affiliated with the County. HCBOC 112922 ws Pg. 203 T e c h n o l o g y U s e P o l i c y 15 | P a g e ELECTRONIC MAIL Electronic mail is intended for County business; however, the County recognizes the fact that the use of e-mail for incidental purposes may occur and is not likely to strain County resources. Personal communications should not be excessive and it must be understood that the use of email passwords does not imply privacy or confidentiality. E-mail messages, made or received in connection with the transaction of public business by any agency of North Carolina government or its subdivisions are considered a public record and the property of the County. The County Manager and supervisory personnel have the right to review the contents of all employees’ e-mails (personal or business related). Employees are solely responsible for how their email is used and managed. Contents of email dictate the retention of email and each email user is responsible for the retention of their own email. Email must be retained according to the procedures defined in the “Email as a Public Record in North Carolina: Guidelines For Its Retention and Disposition” publication, submitted by the NC Department of Cultural Resources or other regulatory agencies as applicable. Personal email addresses being used for County business purposes, including but not limited to employees, County Commissioners, boards and commissions, should follow the same retention guidelines as County email addresses. This policy does not attempt to monitor or manage personal computer accounts or equipment. Where at all possible, official County email addresses should be used to conduct County business. Unacceptable uses of e-mail include, but are not limited to: • Using email software that is not the County adopted standard. • Sending or forwarding chain letters. • Sending or forwarding copies of documents in violation of copyright laws. • Compromising the integrity of the County and its business in any way. • Sending or forwarding messages containing derogatory, racial, offensive, abusive, threatening, obscene, harassing, or other language inappropriate for the organization. • Sending or forwarding messages that violate the County’s sexual harassment policy. • Willful propagation of computer viruses. • Overtaxing the network with unnecessary group mailings or large emails (over 20 MB). Users should utilize SendThisFile, Microsoft 365,or other means of sending large files to recipients. • Sending or forwarding confidential information including, but not limited to juvenile records in the Sheriff’s Department, certain information contained in personnel files or medical files. This includes confidential information as defined by state and federal laws and agency regulations. HCBOC 112922 ws Pg. 204 T e c h n o l o g y U s e P o l i c y 16 | P a g e TELEPHONES & MOBILE DEVICES The County may provide telephones and mobile devices to employees for business use, when the budget allows and determined necessary by the department head. A mobile device shall be used for appropriate business purposes. Such use is defined to be appropriate when an employee must utilize the device to further County operations. The County may review call logs, voicemail recordings, text messages, email transcripts, GPS data or any other data contained on or from County owned devices. All devices and accessories provided by the County are property of the County and must be returned upon request. The department head, the Finance Department and the IT Department, shall monitor mobile device use and charges. Any intentional, deliberate misuse of any device may result in the loss of mobile device service and employee reimbursement of charges and could result in disciplinary action. It is the responsibility of the department head, or his/her designee, to review the detailed bills for the department each month. The department head/designee should note usage patterns for both individuals and the department and investigate any unusual or questionable patterns. It is also the department head’s responsibility to ensure that any required reimbursement to the County is done on a timely basis and in accordance with the requirements set forth herein. Laptops, cell phones, and other electronic devices in vehicles must be stored in a secure location or otherwise out of sight. Devices should never be left in vehicles overnight. To the degree possible, technology resources should be protected from theft and/or vandalism, fire or other damage including natural environmental hazards. Devices damaged or stolen must be reported to department head and CIO immediately. Landline Phones The use of telephones is a necessary part of the day-to-day operation for many County employees. Unfortunately, inappropriate telephone use may also be a source of distraction that cause lower productivity and, in some instances, may present a safety hazard. Personal calls may be allowed on County landline phones, however, employees are expected to be good stewards of County resources and time, and therefore, personal calls should be limited and not affect job performance or duties. If personal misuse is determined, employee may be restricted to only business use or other disciplinary actions may occur. The County may monitor and/or record phone calls made or received using the County phone systems and may access and review call logs and voicemail recordings to ensure compliance with this and other County policies. Users have no expectation of privacy when using County owned phone systems. HCBOC 112922 ws Pg. 205 T e c h n o l o g y U s e P o l i c y 17 | P a g e Cellular Phones & Smartphones The County may provide employees with mobile phones, smartphones, or wireless Internet devices. These devices must be used primarily for business use. Personal calls and use may be allowed on County devices, however, employees are expected to be good stewards of available data. If personal misuse is determined, employee may be restricted to only business use or privileges may be revoked. All Smartphone devices shall use passwords and must adhere to the same password standards as previously defined. It is the user’s responsibility to ensure devices are property secured. All smartphone devices shall contain County management software/profile. Removal or attempt to bypass this software/profile will be in strict violation of this policy. The County reserves the right to inspect all files stored on smartphones that are the property of the County to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter created, received, stored in, or sent from any County issued smartphone. Issued smartphones and all County purchased accessories must be returned to the IT Department when the user’s service has ended. When the smartphone is returned, the County will conduct any appropriate backup of files in accordance with the Public Records and Retention laws. The smartphone will then be wiped clean of all information. iPads and Tablets The County has recognized that mobile devices, including iPads and tablets, may provide a benefit in the efficient performance of County duties and thereby improve service to the public. County issued devices will be managed under a Harnett County email. Users should not log into the device using their personal accounts. All tablets are enrolled in the County Mobile Device Management to allow applications to be installed. Users are responsible for the general care of the mobile device issued by the County. Mobile devices that are broken or fail to work properly must be taken to the IT Department for an evaluation. Mobile devices that have been lost, stolen or damaged from misuse, neglect or are accidentally damaged, in the sole and exclusive judgment of the County Manager in consultation with the County Attorney and CIO, will be replaced or repaired by the County, with the cost borne by the issued user. Mobile devices should remain free of any writing, drawing, stickers or labels that are not the property of the County. Software and applications installed by the County must remain on the mobile device in usable condition and be readily accessible at all times. From time to time, the County may add or upgrade software applications for use by the user such that users may be required to check in their mobile devices with the IT Department for periodic updates and synchronizing. All software purchased by the County is property of the County and may not be transferred to any other individual. Personal software purchased and installed on County mobile devices are at the risk of the user/purchaser. The County offers no guarantee, warranty or support for HCBOC 112922 ws Pg. 206 T e c h n o l o g y U s e P o l i c y 18 | P a g e personal software purchased and installed on County mobile devices nor will the County refund any purchases for personal software installed on County mobile devices. All of the County's computer systems and devices, including iPads and tablets, are considered to be public property. All documents, files and email messages created, received, stored in, or sent from any County mobile device is considered public record, subject to disclosure to the public pursuant to the North Carolina Public Records laws (with only limited exceptions as provided by law). Users shall not use the mobile device, computer or communication devices in any way as to violate the Open Meetings law requirements, applicable governing laws, or ethical conduct and principles of an elected public official. Issued iPads, tablets and all County purchased accessories must be returned to the department head or IT Department when the user’s term or service has ended. When the mobile device is returned, the County will conduct any appropriate backup of files in accordance with the Public Records and Retention laws. The mobile devices will then be wiped clean of any and all information. The County reserves the right to inspect any and all files stored on mobile devices that are the property of the County in order to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter created, received, stored in, or sent from any County issued mobile device. Mobile Data Terminals (MDTs) – Public Safety The security of the County's computer system is of paramount importance in maintaining an efficient and well-guarded database for referencing computerized information. Users will strictly adhere to the following guidelines on the usage of MDTs, regardless of type, make, or manufacturer and associated software to ensure compliance with federal copyright laws and protection against computer viruses. Any and all policies contained within the County’s Technology Use Policy shall apply to MDTs. MDTs, regardless of type, make, or manufacturer, have been installed in public safety vehicles to assist personnel in the execution of efficient public safety functions and to reduce the amount of radio traffic necessary to conduct public safety operations. Prior to use, personnel will be trained in the use and care of MDTs and are expected to use this equipment in accordance with instructions provided. MDTs are designed and have been programmed to provide information from State and National computer files on persons, vehicles and other property. Employees shall use the MDTs to check information on persons, vehicles, and other property and shall not request these types of transactions be conducted by Dispatch. The only exceptions will be when an officer needs a printout of the information for inclusion with other reports or does not have an MDT or the MDT is not functioning properly. If the unit is not functioning properly, users are expected to request repairs as soon as possible during the normal working hours of the IT Department. HCBOC 112922 ws Pg. 207 T e c h n o l o g y U s e P o l i c y 19 | P a g e MDTs may be programmed to allow for communication of official public safety business between public safety vehicles and between field units and Dispatch. No vulgar, obscene, or derogatory messages, racially and/or sexually derogatory remarks shall be transmitted via the MDT nor shall any private, non-public safety business conversations be conducted between units through the MDT. All transmissions may be logged and maintained for future reference and to provide education and training as deemed necessary. Employees shall log on with their designated username and password. Employees shall never use another employee’s credentials. At the end of shift, personnel shall log off the MDT system. All Internet policies must be followed when using MDT devices even if they are not connected to County Internet sources. The use of the Internet is not a private matter and the County reserves the right to monitor all uses without notification to the member; periodic audits may be conducted by the IT Department. The County reserves the right to inspect any and all files stored on MDTs that are the property of the County in order to ensure compliance with this policy. Users should not presume to have any expectation of privacy in any matter that is created, received, stored in, or sent from any County issued MDT. All MDT devices shall contain County management software/profile. Removal or attempt to bypass this software/profile will be in strict violation of this policy. DESTRUCTION OF PUBLIC RECORDS No public records shall be destroyed, sold, loaned or otherwise disposed of, unless in compliance with the NC Department of Cultural Resources and in accordance with G.S. 121-5. COMPLIANCE The CIO, department head and County Manager will review reported and perceived violations of this policy and may impose restrictions, suspend or terminate technology access, or remove technology equipment during or as a result of an investigation. The County Manager or CIO may, at any time, inspect or request to inspect any County equipment issued to any department or to any user. The user shall, immediately produce item for inspection. Failure to produce equipment within a reasonable time may result in disciplinary action. Other appropriate action in response to abuse or misuse of technology resources may include, but not be limited to: • Reimbursement to the County for resources consumed • Legal action, including action to recover damages • Disciplinary actions, including suspension, demotion, or dismissal pursuant to the County’s Personnel Policy HCBOC 112922 ws Pg. 208 T e c h n o l o g y U s e P o l i c y 20 | P a g e Department heads will be responsible for the enforcement of the County’s Technology Use Policy. MISCELLANEOUS • Procuring, leasing, receiving, maintaining, and installing hardware or software for or on County networks shall be done only by or under the direction of the CIO. • Due to technology systems constantly evolving, it is recommended that this policy be reviewed by County IT Department on a yearly basis. HCBOC 112922 ws Pg. 209 T e c h n o l o g y U s e P o l i c y 21 | P a g e HARNETT COUNTY TECHNOLOGY USE POLICY UNDERSTANDING AND ACCEPTANCE OF POLICY I , have received/had an opportunity to review a copy of the Harnett County Cellular Device Usage Policy. I have read the policy in its entirety and have been provided the opportunity to ask questions about it. Furthermore, I fully understand and agree to comply with this policy. I also accept that it is my responsibility to seek clarification from my supervisor or HR staff if at any time I am unclear about the policy’s requirements. I fully understand that failure to comply with this policy could result in disciplinary action, up to and including dismissal. Employee’s (Legal) Printed Name Employee’s Signature Date HCBOC 112922 ws Pg. 210 HARNETT COUNTY INFORMATION TECHNOLOGY DEPARTMENT PO Box 1405 201 West Front Street Lillington, North Carolina 27546 Phone: (910) 814-6388 HCBOC 112922 ws Pg. 211 Item 8 HCBOC 112922 ws Pg. 212 C:\Users\afouts\Desktop\ARPA\compliance\HC policies\Agenda Item.docx Page 1 of 1 Board Meeting Agenda Item MEETING DATE: December 5, 2022 TO: HARNETT COUNTY BOARD OF COMMISSIONERS SUBJECT: ARPA/CSLFRF Grant Project Ordinance Amendments REQUESTED BY: County Manager's Office/Finance (Ally Fouts) REQUEST: County Administration requests the adoption of two more Amendments to the ARPA/CSLFRF Grant Project Ordinance, which was created to establish a budget for projects utilizing American Rescue Plan Act/Coronavirus State and Local Fiscal Recovery Fund (ARPA/CSLFRF) funds. The first of these two Amendments will allocate $6,003,877 to the purchase of Motorola VIPER Radios for County Emergency Response Staff and local fire departments. The second will allocate $560,000 to premium pay for full-time employees of Harnett County Emergency Medical Services. FINANCE OFFICER’S RECOMMENDATION: COUNTY MANAGER’S RECOMMENDATION: Item 10 HCBOC 112922 ws Pg. 213 COUNTY OF HARNETT GRANT PROJECT ORDINANCE AMENDMENT BE IT ORDAINED by the Board of Commissioners of Harnett County, North Carolina, sitting as the governing board for Harnett County that, pursuant to Section 13.2 of Chapter 159 of the General Statutes of North Carolina, the following grant project ordinance is hereby adopted. Section 1. This ordinance is to establish a budget for projects to be funded by the Coronavirus State and Local Fiscal Recovery Funds of H.R. 1319 American Rescue Plan Act of 2021 (CSLFRF). The County of Harnett has received a total allocation of $26,411,744 of CSLFRF funds. These funds may be used for the following categories of expenditures, to the extent authorized by state law. 1. Support public health expenditures, by funding COVID-19 mitigation efforts, medical expenses, behavioral healthcare, and certain public health and safety staff; 2. Address negative economic impacts caused by the public health emergency, including economic harms to workers, households, small businesses, impact ed industries, and the public sector; 3. Replace lost public sector revenue, using this funding to provide government services to the extent of the reduction in revenue experienced due to the pandemic; 4. Provide premium pay for essential workers, offering additional support to those who have borne and will bear the greatest health risks because of their service in critical infrastructure sectors; and, 5. Invest in water, sewer, and broadband infrastructure, making necessary investments to improve access to clean drinking water, support vital wastewater and stormwater infrastructure, and to expand access to broadband internet. Section 2. The County has elected, as authorized by 31 CFR Part 35.6(b), to expend a portion of its ARP/CSLFRF funds for the purchase of emergency response radio systems to aid COVID-19 mitigation efforts. Section 3. The following amounts are appropriated for the project and authorized for expenditure: Original Ordinance Adjustment Amended Ordinance CSLFRF Project 16,411,744$ (6,003,877)$ 10,407,867$ Revenue Replacement Project 10,000,000 10,000,000 Emergency Radio Replacement Project - 6,003,877 6,003,877 Total 26,411,744$ -$ 26,411,744$ Section 4. The following revenues are anticipated to be available to complete the project: Original Ordinance Adjustment Amended Ordinance CSLFRF Funds 26,411,744$ -$ 26,411,744$ Total 26,411,744$ -$ 26,411,744$ Section 5. The Finance Officer is hereby directed to maintain sufficient specific detailed accounting records to satisfy the requirements of the grantor agency and the grant agreements, including HCBOC 112922 ws Pg. 214 payroll documentation and effort certifications, in accordance with 2 CFR 200.430 & 2 CFR 200.431 and the County’s Uniform Guidance Allowable Costs and Cost Principles Policy. Section 5. The Finance Officer is hereby directed to report the financial status of the project to the governing board on a quarterly basis. Section 6. Copies of this grant project ordinance amendment shall be furnished to the Budget Officer, the Finance Officer and to the Clerk to Board. Section 7. This grant project ordinance amendment expires on December 31, 2026, or when all the CSLFRF funds have been obligated and expended by the county, whichever occurs sooner. Duly adopted this 5th day of December , 2022. _________________________________ Lewis W. Weatherspoon, Chairman Harnett County Board of Commissioners ATTEST: _________________________________ Melissa Capps, Clerk to the Board HCBOC 112922 ws Pg. 215 COUNTY OF HARNETT GRANT PROJECT ORDINANCE AMENDMENT BE IT ORDAINED by the Board of Commissioners of Harnett County, North Carolina, sitting as the governing board for Harnett County that, pursuant to Section 13.2 of Chapter 159 of the General Statutes of North Carolina, the following grant project ordinance is hereby adopted. Section 1. This ordinance is to establish a budget for projects to be funded by the Coronavirus State and Local Fiscal Recovery Funds of H.R. 1319 American Rescue Plan Act of 2021 (CSLFRF). The County of Harnett has received a total allocation of $26,411,744 of CSLFRF funds. These funds may be used for the following categories of expenditures, to the extent authorized by state law. 1. Support public health expenditures, by funding COVID-19 mitigation efforts, medical expenses, behavioral healthcare, and certain public health and safety staff; 2. Address negative economic impacts caused by the public health emergency, including economic harms to workers, households, small businesses, impact ed industries, and the public sector; 3. Replace lost public sector revenue, using this funding to provide government services to the extent of the reduction in revenue experienced due to the pandemic; 4. Provide premium pay for essential workers, offering additional support to those who have borne and will bear the greatest health risks because of their service in critical infrastructure sectors; and, 5. Invest in water, sewer, and broadband infrastructure, making necessary investments to improve access to clean drinking water, support vital wastewater and stormwater infrastructure, and to expand access to broadband internet. Section 2. The County has elected, as authorized by 31 CFR Part 35.6(c), to expend a portion of its ARP/CSLFRF funds to provide premium pay to Emergency Medical Services employees who perform essential work. Section 3. The following amounts are appropriated for the project and authorized for expenditure: Original Ordinance Adjustment Amended Ordinance CSLFRF Project 10,407,867$ (560,000)$ 9,847,867$ Revenue Replacement Project 10,000,000 10,000,000 Emergency Radio Replacement Project 6,003,877 6,003,877 EMS Premium Pay Project - 560,000 560,000 Total 26,411,744$ -$ 26,411,744$ Section 4. The following revenues are anticipated to be available to complete the project: Original Ordinance Adjustment Amended Ordinance CSLFRF Funds 26,411,744$ -$ 26,411,744$ Total 26,411,744$ -$ 26,411,744$ Section 5. The Finance Officer is hereby directed to maintain sufficient specific detailed accounting records to satisfy the requirements of the grantor agency and the grant agreements, including HCBOC 112922 ws Pg. 216 payroll documentation and effort certifications, in accordance with 2 CFR 200.430 & 2 CFR 200.431 and the County’s Uniform Guidance Allowable Costs and Cost Principles Policy. Section 5. The Finance Officer is hereby directed to report the financial status of the project to the governing board on a quarterly basis. Section 6. Copies of this grant project ordinance amendment shall be furnished to the Budget Officer, the Finance Officer and to the Clerk to Board. Section 7. This grant project ordinance amendment expires on December 31, 2026, or when all the CSLFRF funds have been obligated and expended by the county, whichever occurs sooner. Duly adopted this 5th day of December , 2022. _________________________________ Lewis W. Weatherspoon, Chairman Harnett County Board of Commissioners ATTEST: _________________________________ Melissa Capps, Clerk to the Board HCBOC 112922 ws Pg. 217 A RESOLUTION TO ADOPT THE 2023 SCHEDULE OF MEETINGS HARNETT COUNTY BOARD OF COMMISSIONERS THAT WHEREAS, the Harnett County Board of Commissioners adopted on September 19, 1994 certain Rules of Procedure by which the Board would conduct its meetings; and WHEREAS, Rule 6 of the Rules of Procedure concerning “Regular and Special Meetings” states that the Board shall hold regular meetings the first Monday of each month at 9 a.m. and the third Monday of each month at 6 p.m. It also states if a regular meeting day is a holiday on which county offices are closed, the meeting shall be held on the next business and the Board may schedule regular work sessions. NOW, THEREFORE, BE IT RESOLVED, by the Board of Commissioners of Harnett County that the Board shall hold the following regular meetings and work sessions in 2023: Tuesday January 3 9:00 am Board Meeting Tuesday January 10 9:00 am Work Session Tuesday January 17 6:00 pm Board Meeting Tuesday January 24 9:00 am Planning Retreat Tuesday January 31 9:00 am Work Session Monday February 6 9:00 am Board Meeting Monday February 6 11:45 am Legislative Luncheon Tuesday February 14 9:00 am Work Session Monday February 20 6:00 pm Board Meeting Tuesday February 28 9:00 am Work Session Monday March 6 9:00 am Board Meeting Tuesday March 14 9:00 am Work Session Monday March 20 6:00 pm Board Meeting Tuesday March 28 9:00 am Work Session Monday April 3 9:00 am Board Meeting Tuesday April 11 9:00 am Work Session Monday April 17 6:00 pm Board Meeting Tuesday April 25 9:00 am Work Session Monday May 1 9:00 am Board Meeting Tuesday May 9 9:00 am Work Session Monday May 15 6:00 pm Board Meeting (Budget Public Hearing) Tuesday May 30 9:00 am Work Session Monday June 5 9:00 am Board Meeting Tuesday June 13 9:00 am Work Session Monday June 19 6:00 pm Board Meeting Tuesday June 27 9:00 am Work Session Monday July 3 9:00 am Board Meeting Tuesday July 11 9:00 am Work Session Monday July 17 6:00 pm Board Meeting Tuesday August 1 9:00 am Work Session Monday August 7 9:00 am Board Meeting Tuesday August 15 9:00 am Work Session Monday August 21 6:00 pm Board Meeting Tuesday August 29 9:00 am Work Session Tuesday September 5 9:00 am Board Meeting Tuesday September 12 9:00 am Work Session Monday September 18 6:00 pm Board Meeting Item 12 HCBOC 112922 ws Pg. 218 Tuesday September 26 9:00 am Work Session Monday October 2 9:00 am Board Meeting Tuesday October 10 9:00 am Work Session Monday October 16 6:00 pm Board Meeting Tuesday October 31 9:00 am Work Session Monday November 6 9:00 am Board Meeting Tuesday November 14 9:00 am Work Session Monday November 20 6:00 pm Board Meeting Tuesday November 28 9:00 am Work Session Monday December 4 9:00 am Board Meeting Tuesday December 12 9:00 am Work Session Monday December 18 6:00 pm Board Meeting Thursday December 28 9:00 am Work Session (closed for Christmas 25- 27th) Tuesday January 2 9:00 am Board Meeting Adopted by the Harnett County Board of Commissioners in regular session, this ___ day of ______ 2022. HARNETT COUNTY BOARD OF COMMISSIONERS By: ___________________________________________ Lewis W. Weatherspoon, Chairman Attest: _____________________________________ Melissa D. Capps, Clerk HCBOC 112922 ws Pg. 219 Item 13 HCBOC 112922 ws Pg. 220 HCBOC 112922 ws Pg. 221 HCBOC 112922 ws Pg. 222 HCBOC 112922 ws Pg. 223 HCBOC 112922 ws Pg. 224 HCBOC 112922 ws Pg. 225 HCBOC 112922 ws Pg. 226 HCBOC 112922 ws Pg. 227 HCBOC 112922 ws Pg. 228 HCBOC 112922 ws Pg. 229 HCBOC 112922 ws Pg. 230 HCBOC 112922 ws Pg. 231