Laserfiche WebLink
<br />i <br />371276v3 SJS MU125-11 <br />City of Mounds View <br />Data Practices Procedures <br />Table of Contents <br /> <br />1.0 Introduction..........................................................................................................................1 <br />2.0 Responsible Authority .........................................................................................................1 <br />3.0 Access to Public Data..........................................................................................................1 <br /> 3.1 People Entitled to Access.........................................................................................3 <br /> 3.2. Form of Request.......................................................................................................3 <br /> 3.3 Identification of Requesting Party...........................................................................3 <br /> 3.4 Form of Copies ........................................................................................................4 <br /> 3.5 Time Limits..............................................................................................................4 <br /> 3.6 Fees..........................................................................................................................4 <br />4.0 Access to Private and Confidential Data on Individuals .....................................................4 <br /> 4.1 Persons Entitled to Access.......................................................................................4 <br />4.2 Form of Request.......................................................................................................5 <br />4.3 Identification of Requesting Party...........................................................................5 <br />4.4 Time Limits..............................................................................................................5 <br />4.5 Fees..........................................................................................................................5 <br /> 4.6 Summary Data .........................................................................................................6 <br /> 4.7 Records of Minors and Incapacitated Persons.........................................................6 <br />5.0 Access to Private and Confidential Data on Decedents.......................................................7 <br />6.0 Access to Data not on Individuals .......................................................................................8 <br /> 6.1 People Entitled to Access.........................................................................................8 <br />6.2 Form of Request.......................................................................................................9 <br />6.3 Identification of Requesting Party...........................................................................9 <br />6.4 Time Limits..............................................................................................................9 <br /> 6.5 Fees..........................................................................................................................9 <br />7.0 Temporary Classification.....................................................................................................9 <br />8.0 Denial of Access..................................................................................................................9 <br />9.0 Collection of Data on Individuals......................................................................................10 <br /> 9.1 Tennessen Warning................................................................................................10 <br /> 9.2. Data Quality Procedures........................................................................................11 <br />10.0 Challenge to Data Accuracy or Completeness...................................................................11 <br />11.0 Data Protection...................................................................................................................12 <br /> 11.1 Accuracy and Currency of Data.............................................................................12 <br /> 11.2 Data Safeguards.....................................................................................................12