Computer and Mobile Device Use Directive Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is considered a mobile device according to the directive?

  • Laptop computer with Wi-Fi connection
  • Mobile phone with voice service only
  • Cell phone with text messaging and email capabilities (correct)
  • Pagers and tablets only

What is defined as an application (App) in the context of the directive?

  • Productivity software for office use
  • Software designed for the benefit of end users (correct)
  • Any software used for entertainment purposes only
  • Operating system for computers and mobile devices

What type of phone is specifically mentioned in the directive's definition of a cell phone?

  • Cellular service only phone
  • Smartphone with internet browsing capabilities
  • Mobile phone with voice service only (correct)
  • Mobile phone with text messaging and email capabilities

What equipment is included in the definition of a device according to the directive?

<p>Computers, cell phones, pagers, and tablets (B)</p> Signup and view all the answers

What is the main function of a computer according to the directive's definition?

<p>Processing and storing data in binary form (A)</p> Signup and view all the answers

What is the consequence for employees who violate written directives regarding computer usage or access to criminal justice information systems?

<p>Discipline or termination of employment (B)</p> Signup and view all the answers

How should employees handle their mobile device public records not archived by the City?

<p>Retain them (C)</p> Signup and view all the answers

Who maintains copies of all electronic messages originating within the Police Services Department?

<p>IT employees (A)</p> Signup and view all the answers

What action should employees take regarding third-party technology solutions?

<p>Seek approval before using them for official business (A)</p> Signup and view all the answers

What action should employees take when absence from the computer will create a security risk?

<p>Log-off the computer or use a password protected screen saver (A)</p> Signup and view all the answers

What is the retention requirement for mobile device public records not archived by the City?

<p>Retention is not required (C)</p> Signup and view all the answers

Who reviews the contents of electronic messages requested as part of any public records request?

<p>A designee of Chief of police (D)</p> Signup and view all the answers

What action can personnel take in relation to third-party databases or systems?

<p>Not share access with anyone outside the Department (B)</p> Signup and view all the answers

What action should employees take when using privately owned technological solutions?

<p>Seek approval before using them for official business (B)</p> Signup and view all the answers

What is the requirement for retaining electronic messages originating within the Police Services Department?

<p>Retention period not specified (C)</p> Signup and view all the answers

What is the primary function of Mobile Device Management (MDM)?

<p>Configuring and managing mobile devices (A)</p> Signup and view all the answers

According to the Computer and Mobile Device Use Directive, what is the expectation of privacy for employees using Department computers and mobile devices?

<p>Employees have no expectation of privacy when using Department computers and mobile devices. (A)</p> Signup and view all the answers

What is the purpose of the Department's interception and retrieval of material, data, and communications on computers and mobile devices?

<p>To protect sensitive information from unauthorized access (D)</p> Signup and view all the answers

What action are employees required to take if they observe violations of the City and/or Department's written directives by another employee?

<p>Report the violation to their supervisors (D)</p> Signup and view all the answers

What are employees required to do upon request regarding passwords or encryption codes on Department-issued communications and devices?

<p>Provide the passwords or encryption codes upon request (B)</p> Signup and view all the answers

Which statement accurately represents the Internet usage policy for Department employees?

<p>Employees are required to verify all work-related information obtained via the Internet. (D)</p> Signup and view all the answers

What is the presumption created when an employee views or opens an email addressed to them?

<p>The employee has read the email and all its attachments. (D)</p> Signup and view all the answers

What is the primary distinguishing feature of a Tablet compared to a Smart Phone?

<p>Primary ability to function as a phone (C)</p> Signup and view all the answers

What does the term 'Public Records' encompass according to FSS 119.011(12)?

<p>(12) All documents regardless of form or means of transmission (D)</p> Signup and view all the answers

What is the primary function of Third-Party Technology utilized by the Department?

<p>(12) To enhance communication with external databases and applications (C)</p> Signup and view all the answers

What does Text Messaging encompass?

<p>The act of composing and sending electronic messages containing text or multimedia between mobile devices. (D)</p> Signup and view all the answers

What is the employee responsible for if their devices, or related equipment, have been exposed to unauthorized access or have been damaged, misplaced, lost, or stolen?

<p>Reporting the incident to IT employees (C)</p> Signup and view all the answers

What is the responsibility of employees if they want to use new software?

<p>Request approval from an IT representative through their division commander (A)</p> Signup and view all the answers

What is prohibited while using computers, mobile devices, and/or related equipment to access electronic communication systems?

<p>Viewing, downloading, or transmitting explicit images (D)</p> Signup and view all the answers

Who is responsible for managing all devices through an MDM program?

<p>The IT Division (B)</p> Signup and view all the answers

What is prohibited in relation to City email or other messaging systems?

<p>Using another person's identity and/or password (D)</p> Signup and view all the answers

What is prohibited in relation to using computers, mobile devices, and/or related equipment?

<p>Removing hardware items from City devices (D)</p> Signup and view all the answers

What is the responsibility of employees when using Department-issued devices or related equipment?

<p>Use appropriate security measures to protect against unauthorized access (D)</p> Signup and view all the answers

What is the consequence if employees fail to comply with policy provisions?

<p>Financial responsibility for damage or loss due to negligence (C)</p> Signup and view all the answers

What should employees do if their devices have potentially been exposed to unauthorized access?

<p>Immediately notify their supervisors and IT employees (A)</p> Signup and view all the answers

What should employees do if they want to access social media sites while using Department-owned devices?

<p>Only use social media sites for work-related purposes (B)</p> Signup and view all the answers

What is prohibited in relation to forwarding phone calls and/or text messages?

<p>Allowing forwarding to personally-owned devices except in an emergency (D)</p> Signup and view all the answers

What is required when accessing information regulated by state and federal law?

<p>Adherence to security policies outlined in Departmental Standards Directive 81.200 Criminal Justice Information Systems. (A)</p> Signup and view all the answers

Flashcards

Mobile device

A cell phone with text messaging and email capabilities.

Application (App)

Software designed for the benefit of end users.

Cell phone (voice only)

Mobile phone offering only voice services.

Device (definition)

Computers, cell phones, pagers, and tablets.

Signup and view all the flashcards

Computer function

Processing and storing data in binary form.

Signup and view all the flashcards

Violation consequence

Discipline or termination of employment.

Signup and view all the flashcards

Mobile record retention

Employees must retain mobile device public records.

Signup and view all the flashcards

Electronic message copies

IT employees maintain copies.

Signup and view all the flashcards

Third-party tech

Seek approval before using them for official business.

Signup and view all the flashcards

Security risk prevention

Log-off or use password protected screensaver.

Signup and view all the flashcards

Review of electronic messages

A designee of Chief of police reviews the contents.

Signup and view all the flashcards

Third-party access

Personnel should not share access with anyone outside the Department.

Signup and view all the flashcards

Privately owned tech approval

Seek approval before using them for official business.

Signup and view all the flashcards

MDM primary function

Configuring and managing mobile devices.

Signup and view all the flashcards

Privacy expectation

Employees have no expectation of privacy.

Signup and view all the flashcards

Interception purpose

To protect sensitive information from unauthorized access.

Signup and view all the flashcards

Violation report

Report to their supervisors

Signup and view all the flashcards

Password disclosure

Provide the passwords or encryption codes upon request

Signup and view all the flashcards

Internet usage

Employees verify all work-related information.

Signup and view all the flashcards

Email presumption

The employee has read the email and attachments.

Signup and view all the flashcards

'Public Records' encompasses?

All documents regardless of form or means of transmission.

Signup and view all the flashcards

Compromised device

Reporting the incident to IT employees.

Signup and view all the flashcards

New software requests

Request approval from an IT representative through their division commander.

Signup and view all the flashcards

Prohibited content

Viewing, downloading, or transmitting explicit images.

Signup and view all the flashcards

MDM manager

The IT Division is responsible for managing all devices.

Signup and view all the flashcards

Email prohibition

Using another person's identity and/or password

Signup and view all the flashcards

Hardware prohibition

Removing hardware items from City devices

Signup and view all the flashcards

Employee responsibility

Use appropriate security measures to protect against unauthorized access.

Signup and view all the flashcards

Compliance Result

Financial responsibility for damage or loss due to negligence

Signup and view all the flashcards

Compromised Device Actions

Immediately notify their supervisors and IT employees

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser