The Information Technology Services is a customer service based team that advances the county’s delivery of cost-effective and innovative public services through coordinated application of information technology planning, services, education, and security.
Within the framework of our Mission Statement, the Information Technology Services Department of Pender County, as a customer service based team, has the following broad responsibilities:
- Developing strategic and operational planning related to technology and its use by the county. This is provided primarily through the preparation and development of a continuously updated five-year Information Technology (IT) Strategic Plan.
- Providing an efficient and stable technology infrastructure for the county’s information and telecommunication needs. This includes the selection, acquisition, maintenance, and support of the county’s Local Area Networks (LAN) and Wide Area Networks (WAN) equipment and cabling, as well as all the attached computers and their peripherals.
- Supplying the assorted Departments of the county with reliable, high-speed Internet access and email services.
- Facilitating the construction and maintenance of the county’s website(s).
- Delivering and maintaining a dependable telecommunication system which includes the county’s telephones and video conferencing, as well as all dial-up and VPN connections to our Network.
- Administering the county’s various IT initiatives, including preparation of Requests for Proposals (RFPs), vendor selection, acquisition, installation and infrastructure support.
- Installing and maintaining the standardized core software applications of the county including Operating Systems, Network Operating Systems, Database Systems, and Office Suites.
- Providing applicable computer training to county staff on all core applications.
- Assisting the various county Departments with cooperative ventures, information sharing, common program development, and other integration/interface issues.
- Securing the county’s information through proper establishment and administration of security policies and procedures. This involves such items as effective backup and restoration procedures, disaster recovery, physical security for all IT equipment, enforced adherence to the county’s security policy, appropriate password control systems, accurately configured firewalls, correctly administered authority rights, robust and redundant virus protection systems, high-level data encryption schemes, intrusion detection systems, etc.