The Tarrant County Information Technology Department arranges for the acquisition, installation, maintenance, programming, and operation of data processing and data communications systems and equipment. Information Technology is one of the largest departments in Tarrant County.
Information Technology coordinates the planning of information systems for Tarrant County departments and provides data processing services for such applications as payroll, elections, motor vehicle registration and court data.
Information for the Public
FY2011 Information Technology Budget (Adobe Acrobat) (16KB)
FY2011 Information Technology Budget (Microsoft Excel) (54KB)
FY2010 Information Technology Budget (Adobe Acrobat) (16KB)
FY2010 Information Technology Budget (Microsoft Excel) (54KB)
The US Computer Emergency Readiness Team
US-CERT, a partnership between the Department of Homeland Security's National Cyber Security Division (NCSD) and the private sector, has been established to protect our nation's Internet infrastructure. It will do this through global coordination of defense against and response to cyber incidents and attacks across the United States.
A Call to Action: Be a Cyber Secure Citizen
Securing your personal computer plays a crucial role in protecting our nation's Internet infrastructure. This web site is designed to give you the information needed to secure your home or small business computer. You'll find tips on how to safeguard your system, a self-guided cyber security test, educational materials, and other Internet resources, as well as valuable information from our sponsor organizations.
CIAC Internet Hoax and Chain Letter Web Site
Interspersed among the junk mail and spam that fills our Internet e-mail boxes are dire warnings about devastating new viruses, Trojans that eat the heart out of your system, and malicious software that can steal the computer right off your desk. Added to that are messages about free money, children in trouble, and other items designed to grab you and get you to forward the message to everyone you know. Most all of these messages are hoaxes or chain letters. While hoaxes do not automatically infect systems like a virus or Trojan, they are still time consuming and costly to remove from all the systems where they exist. At CIAC, we find that we spend much more time de-bunking hoaxes than handling real virus and Trojan incidents. These pages describe some of the warnings, offers, and pleas for help that are filling our mailboxes, clogging our mailservers, and that generally do not have any basis in fact.
Press to get the Adobe Reader now.
Adobe and Acrobat are trademarks of Adobe Systems Incorporated.