Podcast
Questions and Answers
What is required of each user to access the SFD computer system?
What is required of each user to access the SFD computer system?
Who should a user disclose their password to?
Who should a user disclose their password to?
What right does SFD have regarding e-mail and internet activities?
What right does SFD have regarding e-mail and internet activities?
What can happen if a user violates the SFD computer and internet policies?
What can happen if a user violates the SFD computer and internet policies?
Signup and view all the answers
Is email privacy guaranteed for SFD employees?
Is email privacy guaranteed for SFD employees?
Signup and view all the answers
What type of e-mail transmissions are prohibited using SFD facilities?
What type of e-mail transmissions are prohibited using SFD facilities?
Signup and view all the answers
How frequently can SFD policies be updated?
How frequently can SFD policies be updated?
Signup and view all the answers
Who is responsible for reviewing and ensuring the accuracy of SFD policies?
Who is responsible for reviewing and ensuring the accuracy of SFD policies?
Signup and view all the answers
What is required before sending or receiving any software on a computer?
What is required before sending or receiving any software on a computer?
Signup and view all the answers
What should an employee do if they need licensed software for their job?
What should an employee do if they need licensed software for their job?
Signup and view all the answers
What may happen if an employee unauthorizedly duplicates licensed software?
What may happen if an employee unauthorizedly duplicates licensed software?
Signup and view all the answers
What is the policy regarding the home use of software purchased by SFD?
What is the policy regarding the home use of software purchased by SFD?
Signup and view all the answers
Who has the right to examine the content of computers or equipment at SFD?
Who has the right to examine the content of computers or equipment at SFD?
Signup and view all the answers
Before duplicating software, what must be ensured?
Before duplicating software, what must be ensured?
Signup and view all the answers
Which of the following actions is not permitted for employees regarding computers?
Which of the following actions is not permitted for employees regarding computers?
Signup and view all the answers
What should employees do if they perceive information is appropriate to access in another medium?
What should employees do if they perceive information is appropriate to access in another medium?
Signup and view all the answers
What is the primary reason for the Department to monitor data on its systems?
What is the primary reason for the Department to monitor data on its systems?
Signup and view all the answers
Which statement regarding password protection is true?
Which statement regarding password protection is true?
Signup and view all the answers
What consequence may result from abusing access privileges to the Department's systems?
What consequence may result from abusing access privileges to the Department's systems?
Signup and view all the answers
What happens if illegal conduct is detected through system monitoring?
What happens if illegal conduct is detected through system monitoring?
Signup and view all the answers
Which of the following is NOT mentioned as a reason for monitoring the Department’s systems?
Which of the following is NOT mentioned as a reason for monitoring the Department’s systems?
Signup and view all the answers
What should an employee do if they inadvertently access an inappropriate site?
What should an employee do if they inadvertently access an inappropriate site?
Signup and view all the answers
Who must approve public statements about SFD made by employees online?
Who must approve public statements about SFD made by employees online?
Signup and view all the answers
Which of the following actions is prohibited without permission from the IT Department?
Which of the following actions is prohibited without permission from the IT Department?
Signup and view all the answers
Who is responsible for unauthorized costs incurred by an employee?
Who is responsible for unauthorized costs incurred by an employee?
Signup and view all the answers
What is required before dialing in for remote access?
What is required before dialing in for remote access?
Signup and view all the answers
What guarantees does SFD provide regarding internet performance and reliability?
What guarantees does SFD provide regarding internet performance and reliability?
Signup and view all the answers
While connected to the network, which policies apply to employees?
While connected to the network, which policies apply to employees?
Signup and view all the answers
Which of the following is acceptable for employees to perform on computers?
Which of the following is acceptable for employees to perform on computers?
Signup and view all the answers
What is the primary purpose of the Internet, Computer, and Email Policy SFD.021?
What is the primary purpose of the Internet, Computer, and Email Policy SFD.021?
Signup and view all the answers
Who is required to report any security weaknesses according to the SFD policy?
Who is required to report any security weaknesses according to the SFD policy?
Signup and view all the answers
What does SFD reserve the right to do regarding the system’s data?
What does SFD reserve the right to do regarding the system’s data?
Signup and view all the answers
Is personal use of the Department's email allowed according to the policy?
Is personal use of the Department's email allowed according to the policy?
Signup and view all the answers
What can be inferred about the privacy of communications over the Department's system?
What can be inferred about the privacy of communications over the Department's system?
Signup and view all the answers
What is the consequence of using Department email for personal business?
What is the consequence of using Department email for personal business?
Signup and view all the answers
Which of the following is true regarding access to the Department’s email system?
Which of the following is true regarding access to the Department’s email system?
Signup and view all the answers
What should employees do if they have questions about the policies and guidelines?
What should employees do if they have questions about the policies and guidelines?
Signup and view all the answers
Study Notes
Spring Fire Department Computer & Internet Policy
- Computers and internet access are the property of the SFD and must be used for official departmental business only.
- Each user is required to use a password and change their password as soon as possible. Passwords are private and should only be shared with the user's supervisor or a member of the IT department.
- SFD monitors and audits all internal and external emails sent by members and employees without further notice.
- SFD also monitors and audits all internet activities, including web pages accessed, on SFD computers without further notice.
- E-mail privacy is not guaranteed. Users have no protected privacy interests in emails sent or received on department equipment.
- Downloading content that does not pertain to SFD business is prohibited.
- Do not transmit any software or files without prior approval from the IT Department.
- Don't duplicate licensed software that SFD has purchased without permission from the IT Department.
- SFD software is for official use and may not be taken home or loaded on a personal computer without permission from the IT Department.
- Home Use of Software: Software purchased by SFD is for official use and may not be taken home or loaded on a member or employee’s personal computer without permission from the IT Department.
- SFD has the right to examine the content of any computer or equipment at any time and without notice. This allows IT personnel to optimize, upgrade, or troubleshoot computer systems, including replacing components as needed.
- If you inadvertently access an inappropriate site, exit the site immediately and do not visit it again. If the problem persists, contact your supervisor.
- Posting messages to or participation in non-business related newsgroups or chat rooms using computers is prohibited without permission from the IT Department.
- Dial-in access from other locations or remote stations is provided on a case-by-case basis. Approval from the IT Department is required before service is authorized.
- SFD cannot guarantee the performance and reliability of internet services.
- All members and employees are asked to report any security weaknesses, especially computer viruses, regardless of whether the source is internal or external.
- The Department reserves the right to monitor both internal and external emails.
- Members and employees only use department email for department-related business and are prohibited from personal use. The use of personal devices using department email is also prohibited.
- Any individual who is given access to the system is hereby given notice that the Department will exercise this right periodically, without prior notice and without the prior consent of the member.
- Use of passwords does not create a right or expectation of privacy.
- Any member who abuses the privilege of access to the Department’s system will be subject to corrective action, up to and including termination of membership.
- The Department will advise law enforcement officials of any illegal conduct.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of the Spring Fire Department's Computer and Internet Policy. This quiz covers essential guidelines regarding the use of departmental computers, passwords, email privacy, and monitoring of internet activities. Make sure to familiarize yourself with the rules to ensure compliance.