On this page you can find links to Travis County technology policies, standards, and guidelines. Each document’s name appears below, along with its hyperlink and a short description of its purpose.

For guidance on information security & privacy, see the list of controls on the Information Security office’s page.

Document Categories

Policies

A policy is a set of rules, not instructions, that guide decisions and achieve specific outcomes. They help inform standards and guidelines. Policies are used when establishing an overarching direction or stance on specific matters.

While each policy may include individual roles and responsibilities, the Accountability & Responsibility section applies to all the policies listed below.

 

Policy #Name & LinkDescription
N/A Acceptable Use Displays Chapter 110. Travis County Personnel Benefits Guidelines and Procedures Manual for All Travis County Employees.
105 Assigned Security Responsibility – HIPAA Identifies the HIPAA security official who is responsible for the development and implementation of the required policies and procedures.
110 Audit Controls Implements hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use sensitive information.
115 Business Associate Agreements – HIPAA Requires satisfactory assurances that the business associate will appropriately safeguard all sensitive information in accordance with applicable regulations.
120 Change Management Implements a change management process that enables the organization to manage change and reduce the risk associated with deploying change.
125 Continuity of Operations Determines criticality of specific applications and data, establishes and implements procedures to enable business continuity for protecting sensitive information while operating in an emergency mode, and provides for data recovery.
130 Data Backup Establishes and implements procedures to create and maintain sensitive information and ensure secure storage in the event of equipment failure or damage.
135 Data Breach Management Assists employees in defining and identifying potential security breaches, minimizing the loss and destruction of data, mitigating weakness, and restoring impacted services.
137 Data Center and MDF/IDF Access Controls Safeguards and limits physical access to Travis County’s information systems and facilities, ensures authorized access is allowed, and prevents tampering and theft.
315 Data Classification Establishes a vocabulary to describe the data Travis County creates, receives, maintains, or transmits; quantifies the amount of protection that Travis County must apply to each type of data.
226 Data Loss Prevention Establishes the principles by which Travis County will identify, detect, protect, and respond to the unauthorized disclosure of Protected Information.
206 Device & Media Controls, Reuse & Disposal Outlines the receipt, movement, and removal of hardware and electronic media containing ePHI.
150 Documentation Requires Travis County to create, make available, retain, and update documentation required by the HIPAA Security Rule.
155 Email Security Protects the confidentiality and integrity of sensitive information that may be sent or received via email.
160 Encryption Implements a security measure to encrypt sensitive information in transit whenever appropriate.
166 Identity & Access Control Requires the creation of a unique name/number for identifying and tracking users and for authorizing, granting, validating, terminating, and documenting information access.
175 Information System Activity Review Requires identification of critical systems that process sensitive information and implementation of procedures to regularly review the records of system activity.
180 Integrity Protects sensitive information from improper alteration or destruction.
185 Mobile Devices Addresses the protection of sensitive electronic information when it is stored, transferred, or accessed on mobile devices.
186 Multi-Factor Authentication Defines the requirements for multi-factor authentication.
190 Network Security Requires evaluation of the need for secure communication on all networks used to transmit sensitive information.
200 Password Management Requires that workers create, regularly update, and secure passwords; requires evaluation of authentication mechanisms.
300 Payment Card Acceptance Provides information to ensure compliance with Payment Card Brand Rules, which include Payment Card Industry Data Security Standards.
205 Policies & Procedures Evaluation Requires regular evaluation of security policies and procedures.
210 Remote Access Defines how Travis County controls remote access to its information systems and networks to prevent unauthorized use.
215 Risk Analysis Requires an accurate and thorough assessment of the risks and vulnerabilities to the confidentiality, integrity, and availability of sensitive information held by the organization.
217 Risk Assessment Empowers Travis County to perform information security risk assessments to determine vulnerabilities and to initiate remediation.
225 Sanction Requires disciplinary action (sanction) of workers who do not comply with policies for safeguarding sensitive information.
230 Secure Text Message Requires that the risk of text messaging sensitive information is managed to safeguard the privacy and security of the information.
245 Security Incident Procedures Requires Travis County to identify, respond to, and document security incidents and mitigate their harmful effects.
308 Social Media Requires workers to use effective electronic communications consistent with Travis County’s beliefs and workforce standards.
255 Vulnerability Management Defines the roles and responsibilities of ITS employees and requirements for notification, testing, and installation of security-related patches on devices.
260 Wireless Security Requires secure operation of wireless networks to ensure the confidentiality, integrity, and availability of transmitted sensitive information.
317 DLP Insider Threat Policy Requires implementation of security measures to reduce risks and vulnerabilities; requires compliance with regulations.
320 Information Security Program Defines the Travis County Information Security Program along with its associated roles and responsibilities and to review the foundational disciplines that will appropriately protect the County’s Information Resources (IR).
323 Security Awareness and Training Establishes the policy and standard operating procedures (SOP) adhering to the principles by which Travis County will address security awareness and training.
324 NIST System Authorization Establishes the standards and procedures for obtaining and maintaining authorization to operate for the County's information systems. Authority To Operate (ATO) is a formal authorization by Travis County to operate an information system. The ATO process includes a comprehensive evaluation of the system's security posture and a determination of the system's risk to the company's information and operations.
329 Risk Management Policy Requires implementation of security measures to reduce risks and vulnerabilities; requires compliance with regulations.


Standards

A standard is a document that establishes uniform criteria, methods, processes, or practices. A standard defines mandatory technical or quality requirements, procedures, or criteria that ensure consistency.

Name & LinkDescription
Change Management Guide Establishes standardized change management procedures that can be used for managing all changes on ITS-managed resources.
Encryption Standards Requires the use of crytographic modules that meet FIPS standards; requires CJI protection via a crytographic mechanism; establishes passphrase management requirements; and outlines the process for registering to receive a public key certificate.
HIPAA Sec Officer Appt Letter Designates the HIPAA Security Officer for Travis County.
HIPAA Sec Officer Job Desc Details the goal, requirements, and responsibilities for the position of HIPAA Security Officer.
Log-In Monitoring Standards Sets technical standards for log-in monitoring.
Password Management Standards Sets password management standards.
Secure Wireless Access Point (AP) Standard Establishes a standard for wireless access points that provide access to any portion of the Travis County infrastructure.
Technology Standards Identifies the technical standards for information systems.
Unique User Identification Standards Details standards for unique user identification.


Guidelines

A guideline is a recommendation or best practice that is not mandatory but is suggested as an effective method of achieving something. A guideline offers best practices, suggested approaches, or methods that allow flexibility based on specific situations or preferences.

Name & LinkDescription
AI Guidelines Aids in protecting the confidentiality, integrity, and availability of Travis County’s information technology resources and data.
PDF Guidelines Provides PDF best practices. PDF management includes making files accessible and understanding the distinction between uploading PDFs and building a new webpage.