I. Purpose
<br />The purpose of the Indian River County Acceptable Use Policy is to establish acceptable
<br />practices regarding the use of Indian River County information technology resources to protect
<br />the confidentiality, integrity, and availability of information created, collected, and maintained.
<br />II. Scope
<br />This policy applies to all personnel which are defined as staff, contractors, and consultants that
<br />are employed or contracted with the divisions of the Indian River Board of County
<br />Commissioners, including its officers, Departments, Divisions, and special dependent districts.
<br />III. Definitions
<br />Credentials — Pieces of information (i.e. username, pin, password) used to verify the identity of
<br />an individual or entity accessing a system, application, or network.
<br />Content — Any type of digital information, files, or documents that users upload, create, store, or
<br />share.
<br />Data Incident — Any potential loss, theft, or compromise of County information.
<br />Door Propping — Intentionally keep a door open or partially opening by using an object to
<br />prevent the door from fully closing.
<br />Facility Security Incident — Any damage or potentially unauthorized access to a County owned,
<br />leased, or managed facility.
<br />Firmware — A type of software which is embedded into hardware devices to control their
<br />functionality.
<br />Identity and Access Management Information — Data and tools that assist in controlling access
<br />within a network.
<br />Information Technology Resources — Any electronic equipment, hardware, software, or services
<br />that are assigned and available for employees to use in the course of their employment.
<br />These resources include, but are not limited to, the following: computer workstations
<br />and servers, laptops, printers, copy machines, scanners, cellular phones, tablets, fax
<br />machines, software applications, internet access, voicemail, and e-mail.
<br />Page 1 1
<br />64
<br />SECTION
<br />NUMBER
<br />EFFECTIVE DATE
<br />Information
<br />ADMINISTRATIVE
<br />Technology
<br />AM -1200.21
<br />4/22/2025
<br />POLICY MANUAL
<br />SUBJECT
<br />PAGE
<br />Acceptable Use
<br />Page 1 of 18
<br />I. Purpose
<br />The purpose of the Indian River County Acceptable Use Policy is to establish acceptable
<br />practices regarding the use of Indian River County information technology resources to protect
<br />the confidentiality, integrity, and availability of information created, collected, and maintained.
<br />II. Scope
<br />This policy applies to all personnel which are defined as staff, contractors, and consultants that
<br />are employed or contracted with the divisions of the Indian River Board of County
<br />Commissioners, including its officers, Departments, Divisions, and special dependent districts.
<br />III. Definitions
<br />Credentials — Pieces of information (i.e. username, pin, password) used to verify the identity of
<br />an individual or entity accessing a system, application, or network.
<br />Content — Any type of digital information, files, or documents that users upload, create, store, or
<br />share.
<br />Data Incident — Any potential loss, theft, or compromise of County information.
<br />Door Propping — Intentionally keep a door open or partially opening by using an object to
<br />prevent the door from fully closing.
<br />Facility Security Incident — Any damage or potentially unauthorized access to a County owned,
<br />leased, or managed facility.
<br />Firmware — A type of software which is embedded into hardware devices to control their
<br />functionality.
<br />Identity and Access Management Information — Data and tools that assist in controlling access
<br />within a network.
<br />Information Technology Resources — Any electronic equipment, hardware, software, or services
<br />that are assigned and available for employees to use in the course of their employment.
<br />These resources include, but are not limited to, the following: computer workstations
<br />and servers, laptops, printers, copy machines, scanners, cellular phones, tablets, fax
<br />machines, software applications, internet access, voicemail, and e-mail.
<br />Page 1 1
<br />64
<br />
|