My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
05/21/2024
CBCC
>
Meetings
>
2020's
>
2024
>
05/21/2024
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
6/24/2024 3:33:03 PM
Creation date
6/24/2024 9:27:30 AM
Metadata
Fields
Template:
Meetings
Meeting Type
BCC Regular Meeting
Document Type
Agenda Packet
Meeting Date
05/21/2024
Meeting Body
Board of County Commissioners
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
266
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
iii. Personal social media; and <br />iv. Accessing or distributing pornographic or sexually oriented materials; and <br />V. Attempting or making unauthorized entry to any network or computer <br />accessible from the Internet; and <br />vi. Any activity that would violate any other County policy. <br />c. Access to the Internet from outside the County network using a County owned <br />computer must adhere to all the same policies that apply to use from within County <br />facilities. <br />11. Mobile Devices <br />a. County does not allow personally owned mobile devices to connect to the County <br />enterprise internal network. <br />b. Mobile devices that access County email servers must have a PIN or other <br />authentication mechanism enabled. <br />c. Confidential information should only be stored on devices that are encrypted in <br />compliance with the County Encryption Standard. <br />d. County confidential information should not be stored on any personally owned mobile <br />device. <br />e. Theft or loss of any mobile device that has been used to create, store, or access <br />confidential or internal information must be reported to the County Information <br />Technology Department immediately. <br />f. All mobile devices must maintain up-to-date versions of all software and applications. <br />g. All personnel are expected to use mobile devices in an ethical manner. <br />h. In the event there is a suspected incident or breach associated with a mobile device, it <br />may be necessary to remove the device from the employee's possession as part of a <br />formal investigation. <br />Page 1 11 <br />85 <br />SECTION <br />NUMBER <br />EFFECTIVE DATE <br />Information <br />ADMINISTRATIVE <br />Technology <br />AM -1200.21 <br />5/21/2024 <br />POLICY MANUAL <br />SUBJECT <br />PAGE <br />Acceptable Use <br />Page 11 of 17 <br />iii. Personal social media; and <br />iv. Accessing or distributing pornographic or sexually oriented materials; and <br />V. Attempting or making unauthorized entry to any network or computer <br />accessible from the Internet; and <br />vi. Any activity that would violate any other County policy. <br />c. Access to the Internet from outside the County network using a County owned <br />computer must adhere to all the same policies that apply to use from within County <br />facilities. <br />11. Mobile Devices <br />a. County does not allow personally owned mobile devices to connect to the County <br />enterprise internal network. <br />b. Mobile devices that access County email servers must have a PIN or other <br />authentication mechanism enabled. <br />c. Confidential information should only be stored on devices that are encrypted in <br />compliance with the County Encryption Standard. <br />d. County confidential information should not be stored on any personally owned mobile <br />device. <br />e. Theft or loss of any mobile device that has been used to create, store, or access <br />confidential or internal information must be reported to the County Information <br />Technology Department immediately. <br />f. All mobile devices must maintain up-to-date versions of all software and applications. <br />g. All personnel are expected to use mobile devices in an ethical manner. <br />h. In the event there is a suspected incident or breach associated with a mobile device, it <br />may be necessary to remove the device from the employee's possession as part of a <br />formal investigation. <br />Page 1 11 <br />85 <br />
The URL can be used to link to this page
Your browser does not support the video tag.