Podcast
Questions and Answers
Who is responsible for maintaining the computer network at SFD?
Who is responsible for maintaining the computer network at SFD?
- The IT Department (correct)
- The Fire Chief
- External IT vendors
- Individual employees
What must members and employees do when using personal computers on SFD property?
What must members and employees do when using personal computers on SFD property?
- Obtain special permission from the Fire Chief
- Connect to the private internet network
- Adhere to the guidelines of the policy (correct)
- Completely disregard SFD guidelines
What is the purpose of the Internet, Computer, and E-Mail Policy at SFD?
What is the purpose of the Internet, Computer, and E-Mail Policy at SFD?
- To define proper usage of computers and email (correct)
- To limit communication among members
- To promote personal use of SFD resources
- To restrict access to personal computing
Which resources are considered the property of SFD according to the policy?
Which resources are considered the property of SFD according to the policy?
What ethical expectation is placed on members and employees regarding computer use?
What ethical expectation is placed on members and employees regarding computer use?
To whom does the Director of the IT Department report?
To whom does the Director of the IT Department report?
Which of the following statements is true regarding the use of computers at SFD?
Which of the following statements is true regarding the use of computers at SFD?
Who else is included when referring to members and employees in the policy?
Who else is included when referring to members and employees in the policy?
What should members avoid doing while using the computer resources at SFD?
What should members avoid doing while using the computer resources at SFD?
Under what condition is personal use of SFD's computer resources permitted?
Under what condition is personal use of SFD's computer resources permitted?
Which of the following actions would be considered inappropriate use of SFD’s computers?
Which of the following actions would be considered inappropriate use of SFD’s computers?
What must be done before using files transmitted via email or other means on an SFD computer?
What must be done before using files transmitted via email or other means on an SFD computer?
Which of the following behaviors is prohibited in emails while using SFD’s resources?
Which of the following behaviors is prohibited in emails while using SFD’s resources?
What disciplinary action may be taken against someone violating the email and internet policy?
What disciplinary action may be taken against someone violating the email and internet policy?
What type of content is expressly forbidden to access on SFD’s systems?
What type of content is expressly forbidden to access on SFD’s systems?
Which of the following statements about using the internet at SFD is correct?
Which of the following statements about using the internet at SFD is correct?
What is the consequence of violating the SFD computer policies?
What is the consequence of violating the SFD computer policies?
What must each user do with their password after receiving it?
What must each user do with their password after receiving it?
What right does SFD have regarding monitoring e-mail and internet activities?
What right does SFD have regarding monitoring e-mail and internet activities?
Which statement regarding e-mail privacy is accurate?
Which statement regarding e-mail privacy is accurate?
Who is responsible for reviewing the SFD computer and Internet policies?
Who is responsible for reviewing the SFD computer and Internet policies?
What should not be done with a user's password?
What should not be done with a user's password?
What type of e-mails are specifically prohibited?
What type of e-mails are specifically prohibited?
What aspect of computer usage policies may change over time?
What aspect of computer usage policies may change over time?
What is one of the Department's primary interests in monitoring data?
What is one of the Department's primary interests in monitoring data?
What is explicitly stated about password protection in relation to privacy?
What is explicitly stated about password protection in relation to privacy?
What consequence may a member face for abusing access privileges?
What consequence may a member face for abusing access privileges?
Under what condition might the Department inform law enforcement officials?
Under what condition might the Department inform law enforcement officials?
What is the purpose of the Department's right to monitor electronic communications?
What is the purpose of the Department's right to monitor electronic communications?
What should a member do if they inadvertently access an inappropriate site?
What should a member do if they inadvertently access an inappropriate site?
Who must approve public statements made online regarding SFD?
Who must approve public statements made online regarding SFD?
What is required before members can participate in non-business related chat rooms?
What is required before members can participate in non-business related chat rooms?
Who is responsible for unauthorized costs incurred by a member or employee?
Who is responsible for unauthorized costs incurred by a member or employee?
What is stated about the performance and reliability of the internet as related to SFD?
What is stated about the performance and reliability of the internet as related to SFD?
What is the necessity for dial-in access from remote locations?
What is the necessity for dial-in access from remote locations?
While connected to the network, what applies to computer and internet usage?
While connected to the network, what applies to computer and internet usage?
What is the consequence of making public statements about SFD without prior approval?
What is the consequence of making public statements about SFD without prior approval?
Flashcards are hidden until you start studying
Study Notes
Internet, Computer and E-Mail Policy
- This document outlines the policy and guidelines for the Spring Fire Department (SFD) regarding internet access, computer use, and email.
- All SFD members, employees, temporaries, and contractors must adhere to this policy.
- The policy covers all computers owned by or used on SFD property, including personally owned computers used on SFD property.
- The Director of the IT Department reports directly to the Fire Chief.
- Access to the system is password protected, and passwords are to be kept confidential.
- SFD has the right to monitor all internal and external emails sent by SFD members and employees without notice.
- SFD has the right to monitor all internet activities on SFD computers, including websites visited, without notice.
- Email privacy is not guaranteed.
- The use of SFD computers and internet access is primarily for business purposes with reasonable allowance for non-business use.
- Transmission of harassing, intimidating, or annoying emails is prohibited.
- Expressing personal opinions in external emails is forbidden.
- Any files transmitted to SFD computers must be checked for viruses.
- Accessing inappropriate content like erotica, pornographic material, racist or hostile materials, and chain letters is prohibited.
- Operating a private business using SFD resources is prohibited.
- Use of vulgar language in emails is prohibited.
- Inappropriate use of SFD computers may result in disciplinary action, including termination of membership or employment.
- All members and employees are prohibited from using SFD equipment in any way that violates federal, state, or local law.
- Accessing unexpected, inappropriate websites should be avoided, and the member or employee should contact their supervisor if this becomes a recurring issue.
- Posting messages to non-business related newsgroups or chat rooms is prohibited without permission from the IT Department.
- Members and employees are responsible for any unauthorized costs incurred while using SFD equipment.
- Dial-in access from remote locations is provided on a case-by-case basis and requires approval from the IT Department.
- SFD reserves the right to monitor and intercept data on the system without prior notice.
- Password protection does not create a right to privacy.
- Any member who abuses the Department's voicemail, email, or internet system will be subject to corrective action, including termination of membership.
- All members and employees must sign a statement acknowledging their agreement to comply with the policy.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.