Computer and Mobile Device Use Directive Quiz

ReplaceableBoolean avatar
ReplaceableBoolean
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which of the following is considered a mobile device according to the directive?

Cell phone with text messaging and email capabilities

What is defined as an application (App) in the context of the directive?

Software designed for the benefit of end users

What type of phone is specifically mentioned in the directive's definition of a cell phone?

Mobile phone with voice service only

What equipment is included in the definition of a device according to the directive?

<p>Computers, cell phones, pagers, and tablets</p> Signup and view all the answers

What is the main function of a computer according to the directive's definition?

<p>Processing and storing data in binary form</p> Signup and view all the answers

What is the consequence for employees who violate written directives regarding computer usage or access to criminal justice information systems?

<p>Discipline or termination of employment</p> Signup and view all the answers

How should employees handle their mobile device public records not archived by the City?

<p>Retain them</p> Signup and view all the answers

Who maintains copies of all electronic messages originating within the Police Services Department?

<p>IT employees</p> Signup and view all the answers

What action should employees take regarding third-party technology solutions?

<p>Seek approval before using them for official business</p> Signup and view all the answers

What action should employees take when absence from the computer will create a security risk?

<p>Log-off the computer or use a password protected screen saver</p> Signup and view all the answers

What is the retention requirement for mobile device public records not archived by the City?

<p>Retention is not required</p> Signup and view all the answers

Who reviews the contents of electronic messages requested as part of any public records request?

<p>A designee of Chief of police</p> Signup and view all the answers

What action can personnel take in relation to third-party databases or systems?

<p>Not share access with anyone outside the Department</p> Signup and view all the answers

What action should employees take when using privately owned technological solutions?

<p>Seek approval before using them for official business</p> Signup and view all the answers

What is the requirement for retaining electronic messages originating within the Police Services Department?

<p>Retention period not specified</p> Signup and view all the answers

What is the primary function of Mobile Device Management (MDM)?

<p>Configuring and managing mobile devices</p> Signup and view all the answers

According to the Computer and Mobile Device Use Directive, what is the expectation of privacy for employees using Department computers and mobile devices?

<p>Employees have no expectation of privacy when using Department computers and mobile devices.</p> Signup and view all the answers

What is the purpose of the Department's interception and retrieval of material, data, and communications on computers and mobile devices?

<p>To protect sensitive information from unauthorized access</p> Signup and view all the answers

What action are employees required to take if they observe violations of the City and/or Department's written directives by another employee?

<p>Report the violation to their supervisors</p> Signup and view all the answers

What are employees required to do upon request regarding passwords or encryption codes on Department-issued communications and devices?

<p>Provide the passwords or encryption codes upon request</p> Signup and view all the answers

Which statement accurately represents the Internet usage policy for Department employees?

<p>Employees are required to verify all work-related information obtained via the Internet.</p> Signup and view all the answers

What is the presumption created when an employee views or opens an email addressed to them?

<p>The employee has read the email and all its attachments.</p> Signup and view all the answers

What is the primary distinguishing feature of a Tablet compared to a Smart Phone?

<p>Primary ability to function as a phone</p> Signup and view all the answers

What does the term 'Public Records' encompass according to FSS 119.011(12)?

<p>(12) All documents regardless of form or means of transmission</p> Signup and view all the answers

What is the primary function of Third-Party Technology utilized by the Department?

<p>(12) To enhance communication with external databases and applications</p> Signup and view all the answers

What does Text Messaging encompass?

<p>The act of composing and sending electronic messages containing text or multimedia between mobile devices.</p> Signup and view all the answers

What is the employee responsible for if their devices, or related equipment, have been exposed to unauthorized access or have been damaged, misplaced, lost, or stolen?

<p>Reporting the incident to IT employees</p> Signup and view all the answers

What is the responsibility of employees if they want to use new software?

<p>Request approval from an IT representative through their division commander</p> Signup and view all the answers

What is prohibited while using computers, mobile devices, and/or related equipment to access electronic communication systems?

<p>Viewing, downloading, or transmitting explicit images</p> Signup and view all the answers

Who is responsible for managing all devices through an MDM program?

<p>The IT Division</p> Signup and view all the answers

What is prohibited in relation to City email or other messaging systems?

<p>Using another person's identity and/or password</p> Signup and view all the answers

What is prohibited in relation to using computers, mobile devices, and/or related equipment?

<p>Removing hardware items from City devices</p> Signup and view all the answers

What is the responsibility of employees when using Department-issued devices or related equipment?

<p>Use appropriate security measures to protect against unauthorized access</p> Signup and view all the answers

What is the consequence if employees fail to comply with policy provisions?

<p>Financial responsibility for damage or loss due to negligence</p> Signup and view all the answers

What should employees do if their devices have potentially been exposed to unauthorized access?

<p>Immediately notify their supervisors and IT employees</p> Signup and view all the answers

What should employees do if they want to access social media sites while using Department-owned devices?

<p>Only use social media sites for work-related purposes</p> Signup and view all the answers

What is prohibited in relation to forwarding phone calls and/or text messages?

<p>Allowing forwarding to personally-owned devices except in an emergency</p> Signup and view all the answers

What is required when accessing information regulated by state and federal law?

<p>Adherence to security policies outlined in Departmental Standards Directive 81.200 Criminal Justice Information Systems.</p> Signup and view all the answers

More Quizzes Like This

مراجعةعامة
5 questions
Health &amp; Safety
33 questions
Computer Use Policy
17 questions

Computer Use Policy

RelaxedSousaphone avatar
RelaxedSousaphone
Use Quizgecko on...
Browser
Browser