Understanding the Budget Process

This session will explain the budget process, the procedures that should be used in preparing the budget and the resources and tools available to assist with budget development. It will also address the requirements and options for amending the budget, and the reports necessary for successfully monitoring the budget during the year.

Justice Court Fund Reporting Changes

The Office of the State Comptroller is replacing the Justice Court Fund Internet Report (JCFIR) with a new Justice Court Fund Reporting (JCR) application to collect the monthly court activities. Come learn about the new system’s features and how to access and navigate reports.

NYSLRS Record of Activities - Elected and Appointed Officials

This webinar will explain how the New York State and Local Retirement System (NYSLRS) determines service credit for Elected and Appointed Officials. Officials, who are not in a time-keeping system, are required to keep a Record of Activities (ROA). The purpose of an ROA is to establish an Official’s service credit in NYSLRS. During this training, we will go over what is required on an ROA, as well as walk you through how to complete an ROA utilizing a template, available on the NYSLRS website.

Information Technology Governance
Local Government Management Guide

Information Technology Governance
Local Government Management Guide

Information Technology Governance
Local Government Management Guide

Area #12 – Information Technology Contingency Planning

Written IT Contingency Plan

Because no computer system can be expected to operate perfectly at all times, unplanned service disruptions are inevitable. A disruptive event could include a power outage, software failure caused by a virus or malicious software, equipment destruction, inadvertent employee action or a natural disaster, such as a flood or fire. The plans, policies, procedures and technical measures that help enable the recovery of operations after an unexpected IT disruption are collectively referred to as IT contingency planning.

Information Technology Governance
Local Government Management Guide

Area #11 – Physical Controls

Physical security controls restrict physical access to computer resources and protect those resources from intentional or unintentional harm, loss or impairment. Such controls include guards, gates and locks, and also environmental controls such as smoke detectors, fire alarms and extinguishers, protection from water damage and uninterruptible power supplies.

Information Technology Governance
Local Government Management Guide

Area #10 – Firewalls and Intrusion Detection

Networks that are connected to the Internet are physically connected to unknown networks and their users all over the world. While such connections are often useful, they also increase the vulnerability of IT systems and electronic data to access and attacks from unauthorized individuals.

Information Technology Governance
Local Government Management Guide

Area #9 – Wireless Network

Wireless networks are exposed to many of the same types of threats and vulnerabilities as wired networks, including viruses, malware, unauthorized access and data loss. However, they are considered inherently less secure than wired networks because data are transmitted into the air and can potentially be intercepted and misused by individuals with malicious intent. Also, because wireless networks are often used as extensions of wired networks, even minor IT security weaknesses on wireless networks can expose internal network resources to additional threats.