Computer and Mobile Device Use Directive Quiz
38 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is considered a mobile device according to the directive?

  • Laptop computer with Wi-Fi connection
  • Mobile phone with voice service only
  • Cell phone with text messaging and email capabilities (correct)
  • Pagers and tablets only
  • What is defined as an application (App) in the context of the directive?

  • Productivity software for office use
  • Software designed for the benefit of end users (correct)
  • Any software used for entertainment purposes only
  • Operating system for computers and mobile devices
  • What type of phone is specifically mentioned in the directive's definition of a cell phone?

  • Cellular service only phone
  • Smartphone with internet browsing capabilities
  • Mobile phone with voice service only (correct)
  • Mobile phone with text messaging and email capabilities
  • What equipment is included in the definition of a device according to the directive?

    <p>Computers, cell phones, pagers, and tablets</p> Signup and view all the answers

    What is the main function of a computer according to the directive's definition?

    <p>Processing and storing data in binary form</p> Signup and view all the answers

    What is the consequence for employees who violate written directives regarding computer usage or access to criminal justice information systems?

    <p>Discipline or termination of employment</p> Signup and view all the answers

    How should employees handle their mobile device public records not archived by the City?

    <p>Retain them</p> Signup and view all the answers

    Who maintains copies of all electronic messages originating within the Police Services Department?

    <p>IT employees</p> Signup and view all the answers

    What action should employees take regarding third-party technology solutions?

    <p>Seek approval before using them for official business</p> Signup and view all the answers

    What action should employees take when absence from the computer will create a security risk?

    <p>Log-off the computer or use a password protected screen saver</p> Signup and view all the answers

    What is the retention requirement for mobile device public records not archived by the City?

    <p>Retention is not required</p> Signup and view all the answers

    Who reviews the contents of electronic messages requested as part of any public records request?

    <p>A designee of Chief of police</p> Signup and view all the answers

    What action can personnel take in relation to third-party databases or systems?

    <p>Not share access with anyone outside the Department</p> Signup and view all the answers

    What action should employees take when using privately owned technological solutions?

    <p>Seek approval before using them for official business</p> Signup and view all the answers

    What is the requirement for retaining electronic messages originating within the Police Services Department?

    <p>Retention period not specified</p> Signup and view all the answers

    What is the primary function of Mobile Device Management (MDM)?

    <p>Configuring and managing mobile devices</p> Signup and view all the answers

    According to the Computer and Mobile Device Use Directive, what is the expectation of privacy for employees using Department computers and mobile devices?

    <p>Employees have no expectation of privacy when using Department computers and mobile devices.</p> Signup and view all the answers

    What is the purpose of the Department's interception and retrieval of material, data, and communications on computers and mobile devices?

    <p>To protect sensitive information from unauthorized access</p> Signup and view all the answers

    What action are employees required to take if they observe violations of the City and/or Department's written directives by another employee?

    <p>Report the violation to their supervisors</p> Signup and view all the answers

    What are employees required to do upon request regarding passwords or encryption codes on Department-issued communications and devices?

    <p>Provide the passwords or encryption codes upon request</p> Signup and view all the answers

    Which statement accurately represents the Internet usage policy for Department employees?

    <p>Employees are required to verify all work-related information obtained via the Internet.</p> Signup and view all the answers

    What is the presumption created when an employee views or opens an email addressed to them?

    <p>The employee has read the email and all its attachments.</p> Signup and view all the answers

    What is the primary distinguishing feature of a Tablet compared to a Smart Phone?

    <p>Primary ability to function as a phone</p> Signup and view all the answers

    What does the term 'Public Records' encompass according to FSS 119.011(12)?

    <p>(12) All documents regardless of form or means of transmission</p> Signup and view all the answers

    What is the primary function of Third-Party Technology utilized by the Department?

    <p>(12) To enhance communication with external databases and applications</p> Signup and view all the answers

    What does Text Messaging encompass?

    <p>The act of composing and sending electronic messages containing text or multimedia between mobile devices.</p> Signup and view all the answers

    What is the employee responsible for if their devices, or related equipment, have been exposed to unauthorized access or have been damaged, misplaced, lost, or stolen?

    <p>Reporting the incident to IT employees</p> Signup and view all the answers

    What is the responsibility of employees if they want to use new software?

    <p>Request approval from an IT representative through their division commander</p> Signup and view all the answers

    What is prohibited while using computers, mobile devices, and/or related equipment to access electronic communication systems?

    <p>Viewing, downloading, or transmitting explicit images</p> Signup and view all the answers

    Who is responsible for managing all devices through an MDM program?

    <p>The IT Division</p> Signup and view all the answers

    What is prohibited in relation to City email or other messaging systems?

    <p>Using another person's identity and/or password</p> Signup and view all the answers

    What is prohibited in relation to using computers, mobile devices, and/or related equipment?

    <p>Removing hardware items from City devices</p> Signup and view all the answers

    What is the responsibility of employees when using Department-issued devices or related equipment?

    <p>Use appropriate security measures to protect against unauthorized access</p> Signup and view all the answers

    What is the consequence if employees fail to comply with policy provisions?

    <p>Financial responsibility for damage or loss due to negligence</p> Signup and view all the answers

    What should employees do if their devices have potentially been exposed to unauthorized access?

    <p>Immediately notify their supervisors and IT employees</p> Signup and view all the answers

    What should employees do if they want to access social media sites while using Department-owned devices?

    <p>Only use social media sites for work-related purposes</p> Signup and view all the answers

    What is prohibited in relation to forwarding phone calls and/or text messages?

    <p>Allowing forwarding to personally-owned devices except in an emergency</p> Signup and view all the answers

    What is required when accessing information regulated by state and federal law?

    <p>Adherence to security policies outlined in Departmental Standards Directive 81.200 Criminal Justice Information Systems.</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser