Content block block-countyoc-content
FISCAL YEAR 20122013 Quarterly Budget Reports
First Quarter
First Quarter Budget Report
First Quarter Budget Report - Presentation To Board Of Supervisors
Second Quarter
Second Quarter Budget Report
Third Quarter
Third Quarter…
20082009 Quarterly Budget Reports
First QuarterFirst Quarter Budget Report First Quarter Budget Report - Presentation To Board Of Supervisors Second QuarterSecond Quarter Budget Report Second Quarter Budget Report -…
Fiscal Year 20212022
Budget ReportsFY 2021-22 Annual BudgetFY 2021-22 Key Budget MessageEnglishKoreanSimplified ChineseSpanishTraditional ChineseVietnameseFY 2021-22 Recommended Budget Transmittal…
Cyber Secure your House
Most workplaces have cyber security policies, processes, and technologies. You can create a more cyber-secure environment at home by implementing similar strategies.
Policies - At home, agree as a…
Strategic Plan Initiatives
COMING SOON!
This Information Technology Strategic Plan aligns with the County’s overarching goals and is a companion to the County’s Strategic Financial Plan. It outlines how technology will…
What is Identity Theft
Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume your identity, often…
Creating a Secure Password
Your password is more than just a key to your computer or online account. It is a gateway to all of your important information. If your password falls into the wrong hands, a cybercriminal can…
CIOs Corner
From the County CIO, KC RoestenbergThe ability of the County of Orange to fulfill and advance its mission is directly connected to our information technology environment.Orange County Information…
CIO Awards Success Stories Archive
The Quietest Virtual Desktop Environment: VDI at the Library
Personal computers have been fixtures in public libraries for years. But IT administrators in the private sector might assume that…