Podcast
Questions and Answers
What type of devices will BSO provide software for?
What type of devices will BSO provide software for?
What is included in the repair and maintenance of BSO devices?
What is included in the repair and maintenance of BSO devices?
When is a laptop computer or portable or mobile data device considered to be in safe use?
When is a laptop computer or portable or mobile data device considered to be in safe use?
Why should employees maintain situational awareness when using a laptop computer or portable or mobile data device?
Why should employees maintain situational awareness when using a laptop computer or portable or mobile data device?
Signup and view all the answers
What should be done with laptops and portable or mobile data devices when the vehicle is not in service?
What should be done with laptops and portable or mobile data devices when the vehicle is not in service?
Signup and view all the answers
Why should laptops and portable or mobile data devices be stored in a secure location?
Why should laptops and portable or mobile data devices be stored in a secure location?
Signup and view all the answers
Where can laptops and portable or mobile data devices be secured in the absence of another secure location?
Where can laptops and portable or mobile data devices be secured in the absence of another secure location?
Signup and view all the answers
What is the primary purpose of the BSO policy on laptop computers and portable or mobile data devices?
What is the primary purpose of the BSO policy on laptop computers and portable or mobile data devices?
Signup and view all the answers
What is the primary purpose of the laptop computer policy?
What is the primary purpose of the laptop computer policy?
Signup and view all the answers
What is considered as accessory equipment according to the policy?
What is considered as accessory equipment according to the policy?
Signup and view all the answers
What is the definition of software according to the policy?
What is the definition of software according to the policy?
Signup and view all the answers
What is the consequence of deviating from this policy?
What is the consequence of deviating from this policy?
Signup and view all the answers
What is the responsibility of employees assigned a BSO laptop computer?
What is the responsibility of employees assigned a BSO laptop computer?
Signup and view all the answers
What is a terminal mount according to the policy?
What is a terminal mount according to the policy?
Signup and view all the answers
What is considered as hardware according to the policy?
What is considered as hardware according to the policy?
Signup and view all the answers
What is not allowed to be installed or attached to BSO laptop computers?
What is not allowed to be installed or attached to BSO laptop computers?
Signup and view all the answers
What happens when unauthorized software is found on a BSO laptop computer?
What happens when unauthorized software is found on a BSO laptop computer?
Signup and view all the answers
Where will Fire Rescue vehicles have their devices secured when not in service?
Where will Fire Rescue vehicles have their devices secured when not in service?
Signup and view all the answers
Why are all messages sent through mobile-data software official use only?
Why are all messages sent through mobile-data software official use only?
Signup and view all the answers
Who can alter software or hardware configurations on a BSO laptop computer?
Who can alter software or hardware configurations on a BSO laptop computer?
Signup and view all the answers
What is done with unauthorized software and related files on a BSO laptop computer?
What is done with unauthorized software and related files on a BSO laptop computer?
Signup and view all the answers
What is the purpose of the Information Technology Division help desk?
What is the purpose of the Information Technology Division help desk?
Signup and view all the answers
Who is notified in writing when unauthorized software is found on a BSO laptop computer?
Who is notified in writing when unauthorized software is found on a BSO laptop computer?
Signup and view all the answers
What is performed on the BSO network when unauthorized software is found on a BSO laptop computer?
What is performed on the BSO network when unauthorized software is found on a BSO laptop computer?
Signup and view all the answers
What is a criterion for determining authorized software?
What is a criterion for determining authorized software?
Signup and view all the answers
What is an example of unauthorized software?
What is an example of unauthorized software?
Signup and view all the answers
What happens to the laptop computer after unauthorized software is removed?
What happens to the laptop computer after unauthorized software is removed?
Signup and view all the answers
What should an employee do if their BSO laptop computer malfunctions?
What should an employee do if their BSO laptop computer malfunctions?
Signup and view all the answers
What is the purpose of mobile-data software installed on BSO laptop computers?
What is the purpose of mobile-data software installed on BSO laptop computers?
Signup and view all the answers
Why is it important to only use authorized software on a BSO laptop computer?
Why is it important to only use authorized software on a BSO laptop computer?
Signup and view all the answers
What are BSO laptop computers not to be used for?
What are BSO laptop computers not to be used for?
Signup and view all the answers
What is the role of the Information Technology Division Chief in determining authorized software?
What is the role of the Information Technology Division Chief in determining authorized software?
Signup and view all the answers
Study Notes
Laptop Computer Policy
- The purpose of the policy is to ensure all laptop computers and BSO-owned accessory equipment are maintained in a high state of readiness and properly accounted for at all times.
Definitions
- Accessory Equipment: items used to support operations, such as printers, cables, carrying cases, or any device attaching to or enhancing the use and capability of the laptop computer.
- Hardware: a computer and associated physical equipment directly involved in the performance of communications or data-processing functions.
- Laptop Computer: a portable or mobile electronic device used to process and/or store information through electronic medium or by printing.
- Software: written or printed data, such as programs, routines, and symbolic languages, essential to the operation of computers.
- Terminal Mount: a device installed in a vehicle specifically designed to secure a laptop computer or other portable or mobile-data device.
Policy and Procedure
- BSO provides laptop computers and accessory equipment to employees to increase their efficiency and effectiveness.
- Employees are responsible for the proper use and maintenance of assigned laptop computers and/or portable or mobile data devices.
- Laptop computers and accessory equipment must be used in accordance with written directives and for authorized purposes only.
- No unauthorized software or peripheral devices will be installed or attached.
- BSO will provide software only for BSO-owned computers and portable or mobile data devices.
Safe Use and Maintenance
- Laptop computers and portable or mobile data devices will be used in a safe manner at all times.
- Examples of safe use include:
- Maintaining the mount out of air bag deployment zones when a vehicle is in motion.
- Operating the vehicle in a safe and consistent manner when using a laptop computer or portable or mobile data device.
- Continuously maintaining situational awareness of surroundings when using a laptop computer or portable or mobile data device.
- Laptop computers and portable or mobile data devices will be removed from the mount and placed in a secure location when the vehicle is not in service.
- Employees will read the warranty information and follow all maintenance and operating instructions provided by manufacturers.
Reporting Malfunctions and Unauthorized Software
- Laptop computer malfunctions will be reported to the Information Technology Division help desk.
- Only authorized software will be utilized on a BSO laptop computer.
- Criteria for determining authorized software include:
- Licensed through a BSO Purchase Order.
- Approved for use by the Information Technology Division Chief Information Officer.
- Installed by the Information Technology Division.
- Unauthorized software can fall into one or both of the following categories:
- Illegal: Due to lack of a license to use the software.
- Improper: Software may be licensed, but not approved for use on BSO laptop computers.
- Under no circumstance will unauthorized software be installed on a BSO laptop computer.
Consequences of Unauthorized Software
- Employees may be subject to disciplinary action if they install unauthorized software into their BSO laptop computer.
- If unauthorized software is found on a BSO laptop computer, the following will occur:
- The employee assigned the laptop computer will be notified immediately.
- The laptop computer will remain in the custody of the Information Technology Division and another laptop computer will be temporarily issued to the employee.
- The employee's chain of command will be notified in writing.
- A check for security violations will be performed on the BSO network.
- Unauthorized software and any related files will be removed.
- The laptop computer will be returned to the employee pending written authorization from the employee's chain of command.
Mobile-Data Software
- Mobile-data software installed on BSO laptop computers will enable the use of car-to-car messaging.
- All employees utilizing mobile-data software will note the following:
- All messages will be for official use only.
- All messages will be the property of BSO.
- All messages will be subject to FS 119 and are public record.
Personal Use
- Employees will not utilize BSO laptop computers for personal inappropriate subject matter.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the policy on laptop computers and accessory equipment in a sheriff's department, ensuring they are maintained and accounted for at all times.