Laserfiche WebLink
i <br />489828v3 DTA MU125-11 <br />City of Mounds View <br />Data Practices Procedures <br />Table of Contents <br />1.0 Introduction ..........................................................................................................................1 <br />2.0 Responsible Authority .........................................................................................................1 <br />3.0 Access to Public Data ..........................................................................................................1 <br />3.1 People Entitled to Access.........................................................................................3 <br />3.2. Form of Request .......................................................................................................3 <br />3.3 Identification of Requesting Party ...........................................................................3 <br />3.4 Form of Copies ........................................................................................................4 <br />3.5 Time Limits ..............................................................................................................4 <br />3.6 Fees ..........................................................................................................................4 <br />4.0 Access to Private and Confidential Data on Individuals .....................................................4 <br />4.1 Persons Entitled to Access .......................................................................................4 <br />4.2 Form of Request .......................................................................................................5 <br />4.3 Identification of Requesting Party ...........................................................................5 <br />4.4 Time Limits ..............................................................................................................5 <br />4.5 Fees ..........................................................................................................................5 <br />4.6 Summary Data .........................................................................................................6 <br />4.7 Records of Minors and Incapacitated Persons .........................................................6 <br />5.0 Access to Private and Confidential Data on Decedents .......................................................7 <br />6.0 Access to Data not on Individuals .......................................................................................8 <br />6.1 People Entitled to Access.........................................................................................8 <br />6.2 Form of Request .......................................................................................................9 <br />6.3 Identification of Requesting Party ...........................................................................9 <br />6.4 Time Limits ..............................................................................................................9 <br />6.5 Fees ..........................................................................................................................9 <br />6.6 Accessibility of Records ..........................................................................................9 <br />7.0 Temporary Classification .....................................................................................................9 <br />8.0 Denial of Access ................................................................................................................10 <br />9.0 Collection of Data on Individuals ......................................................................................10 <br />9.1 Tennessen Warning ................................................................................................10 <br />9.2. Data Quality Procedures ........................................................................................11 <br />10.0 Challenge to Data Accuracy or Completeness ...................................................................12 <br />11.0 Data Protection...................................................................................................................12 <br />11.1 Accuracy and Currency of Data .............................................................................12 <br />11.2 Data Safeguards .....................................................................................................12