Sheriff's Policy Manual 15.5 PDF
Document Details
Uploaded by SelfSufficientPanFlute
null
2012
Tags
Related
- Computer Security Risks & Etiquettes - Notes PDF
- Kansas City Missouri Police Department Personnel Policy 260 - Computer Use and Security 2021 PDF
- Access Lists Workbook PDF
- Hướng dẫn tập huấn UDCNTT (Bổ sung) - PDF
- Computer Security & Viruses PDF
- CC0002 Notes Summary (without additional readings) PDF
Summary
This document outlines the computer usage policy for Broward County Sheriff's Office employees. It covers topics such as safeguarding login credentials, avoiding unauthorized access or use of software, and respecting computer resource limits. Compliance with this policy is imperative to maintain the effective and secure operation of the office's computer systems.
Full Transcript
SHERIFF’S POLICY MANUAL 15.5 COMPUTER USAGE: A. Users must safeguard their logon ID and password from disclosure to unauthorized users. Users may not access a computer account belonging to another employee or component (except by an authorized ITD member or...
SHERIFF’S POLICY MANUAL 15.5 COMPUTER USAGE: A. Users must safeguard their logon ID and password from disclosure to unauthorized users. Users may not access a computer account belonging to another employee or component (except by an authorized ITD member or upon authorization). Users are responsible for all activity on their logon ID and must report any known or suspected compromise of their logon ID to ITD. B. Users will be responsible for safeguarding their logon ID and password. Users must make every reasonable effort to safeguard their logon ID and passwords from unauthorized users. For example, users will not tape the logon ID and/or password to the monitor or keyboard. C. Users will not attempt to circumvent data security schemes; identify or exploit security weaknesses; or decrypt secure data. D. Users will not attempt to monitor, read, copy, change, delete, or tamper with another employee's electronic communications, files, or software without the express authorization of the user. Users will not use the BSO network to gain unauthorized access to any computer system. Authorization may be given by the Sheriff or designee. E. Users will not forge the source of electronic communications, alter system data used to identify the source of messages, or otherwise obscure the origination of communications. F. Users will not disclose or transmit information to any unauthorized persons. G. Users will not use their computers in a manner that violates federal, state, or local law or regulation. H. Users will not knowingly or recklessly interfere with the normal operation of computers, peripherals, or networks. I. Users will not install equipment or software on their BSO computer or the BSO network without first obtaining authorization from ITD. J. Users will not deliberately waste computer resources including bandwidth, disk space, and printer paper. 15.5 09/27/2012 SHERIFF’S POLICY MANUAL K. Users will not run or install unlicensed or unauthorized software (including games) on BSO computers without first obtaining authorization from ITD. L. Users will not use BSO's computer systems for any use deemed to diminish BSO's image. M. Users do not have the right to privacy while using BSO computer equipment and systems. 15.5 09/27/2012