Laserfiche WebLink
(2) After being provided with a prioritized list of departmental network sites by the <br />City, the Consultant will continue the needs analysis based thereon. <br />(3) The Consultant understands that an increase (or decrease) in the pace of <br />specific project timelines may occur due to network and/or facilities access, <br />hardware/software availability, City -mandated issues or access to key City <br />individuals. The Consultant will identify specific requirements for City <br />participation and notify the appropriate City manager. The Consultant will make <br />every effort to adjust resources and scheduling as necessary to achieve <br />Consultant/City-developed milestones. Major issues that effect the duration of <br />the project will be identified to the City Information Services Manager by the <br />assigned Consultant technical staff member; <br />(4) Inclusion of a survey and general assessment of the security aspects of the <br />existing network infrastructure in use or planned within the City, including: <br />remote access service (RAS), fax server, encryption, moderns, fax back, <br />Internet, and Intranet; <br />(5) Identification of current and potential security risks; and <br />(6) Recommendations (including potential tools and/or 3rd party service providers) <br />for mitigating security risks identified as a result of the security needs analysis. <br />E. The Consultant will provide the City with a Network Security Analyst (NSA) on -site at <br />the City's location. This NSA will be skilled in and have access to technical <br />information in the following areas: <br />(1) Network security analysis <br />(2) Data security policy development <br />(3) WAN/LAN technology <br />(4) Firewall technology/integration <br />(5) Competency in multiple network protocols <br />(6) Documentation development <br />(7) Communications with end -users <br />F. Deliverables to be provided include: <br />(1) Written draft of security procedures and guidelines; and <br />(2) A written document which accomplishes the following: <br />(a) Outlines the security needs analysis' structured approach; <br />(b) Identifies the areas/topichnfrastructure surveyed and assessed; <br />2 <br />