Management Information Systems

  1. 1 ""
  2. 2 ""

Contact Us

Technology That Powers Pitt County’s Mission to Serve

The Management Information Systems (MIS) team supports County operations by managing enterprise applications, mission-critical systems, communication networks, software, and technical support. This work helps protect data integrity and ensures reliable technology services across departments. 

  • Data Accessibility: Provide expanded access to data and services for staff and the public through secure access and self-service tools.
  • Responsive & Resilient Infrastructure: Develop enhanced methods, plans, procedures, and architectures that support critical systems.
  • Security: Implement strategies minimizing exposure and impacts of potential security threats.
  • Service Delivery: Ensure appropriate allocation of resources that support County staff in the effective use of technology.
  1. Operational Focus
  2. Business Systems & Services
  3. Technical Operations & Security
  4. Honors & Recognition

Standards That Shape MIS Technology Decisions

Focusing on improving efficiency, effectiveness, and service quality, services are organized into functional areas to clarify roles, build staff expertise, and stay current with technology trends. Teamwork guides how resources are assigned, with staff collaborating as needs arise. Client satisfaction remains a key measure of success, with feedback gathered through annual service reviews, random evaluations, and reviews tied to specific projects or training activities.

  • Enterprise Value Focus

    Aim to provide maximum long-term benefits to the enterprise as a whole, while optimizing total costs of ownership and risks.
  • Fit for Purpose

    Maintain capability levels and create solutions that are fit for purpose without over-engineering them. Maintain capability levels and create solutions that are fit for purpose without overengineering them.
  • Simplicity

    Choose the simplest solutions and aim to reduce the operational complexity of the enterprise.
  • Reuse > Buy > Build

    Maximize reuse of existing assets. If we cannot reuse, we procure externally. As a last resort, we build custom solutions.
  • Controlled Technology Use

    Limit the variety of the technology platforms we use.
  • Security and Compliance

    Manage security enterprise-wide in compliance with our security policies.
  • Continuous Improvement

    MIS is committed to continuous improvement.