Laserfiche WebLink
I. Purpose <br />The purpose of the Indian River County Acceptable Use Policy is to establish acceptable <br />practices regarding the use of Indian River County information technology resources to protect <br />the confidentiality, integrity, and availability of information created, collected, and maintained. <br />II. Scope <br />This policy applies to all personnel which are defined as staff, contractors, and consultants that <br />are employed or contracted with the divisions of the Indian River Board of County <br />Commissioners, including its officers, Departments, Divisions, and special dependent districts. <br />III. Definitions <br />Credentials — Pieces of information (i.e. username, pin, password) used to verify the identity of <br />an individual or entity accessing a system, application, or network. <br />Content — Any type of digital information, files, or documents that users upload, create, store, or <br />share. <br />Data Incident — Any potential loss, theft, or compromise of County information. <br />Door Propping — Intentionally keep a door open or partially opening by using an object to <br />prevent the door from fully closing. <br />Facility Security Incident — Any damage or potentially unauthorized access to a County owned, <br />leased, or managed facility. <br />Firmware — A type of software which is embedded into hardware devices to control their <br />functionality. <br />Identity and Access Management Information — Data and tools that assist in controlling access <br />within a network. <br />Information Technology Resources — Any electronic equipment, hardware, software, or services <br />that are assigned and available for employees to use in the course of their employment. <br />These resources include, but are not limited to, the following: computer workstations <br />and servers, laptops, printers, copy machines, scanners, cellular phones, tablets, fax <br />machines, software applications, internet access, voicemail, and e-mail. <br />Page 1 1 <br />64 <br />SECTION <br />NUMBER <br />EFFECTIVE DATE <br />Information <br />ADMINISTRATIVE <br />Technology <br />AM -1200.21 <br />4/22/2025 <br />POLICY MANUAL <br />SUBJECT <br />PAGE <br />Acceptable Use <br />Page 1 of 18 <br />I. Purpose <br />The purpose of the Indian River County Acceptable Use Policy is to establish acceptable <br />practices regarding the use of Indian River County information technology resources to protect <br />the confidentiality, integrity, and availability of information created, collected, and maintained. <br />II. Scope <br />This policy applies to all personnel which are defined as staff, contractors, and consultants that <br />are employed or contracted with the divisions of the Indian River Board of County <br />Commissioners, including its officers, Departments, Divisions, and special dependent districts. <br />III. Definitions <br />Credentials — Pieces of information (i.e. username, pin, password) used to verify the identity of <br />an individual or entity accessing a system, application, or network. <br />Content — Any type of digital information, files, or documents that users upload, create, store, or <br />share. <br />Data Incident — Any potential loss, theft, or compromise of County information. <br />Door Propping — Intentionally keep a door open or partially opening by using an object to <br />prevent the door from fully closing. <br />Facility Security Incident — Any damage or potentially unauthorized access to a County owned, <br />leased, or managed facility. <br />Firmware — A type of software which is embedded into hardware devices to control their <br />functionality. <br />Identity and Access Management Information — Data and tools that assist in controlling access <br />within a network. <br />Information Technology Resources — Any electronic equipment, hardware, software, or services <br />that are assigned and available for employees to use in the course of their employment. <br />These resources include, but are not limited to, the following: computer workstations <br />and servers, laptops, printers, copy machines, scanners, cellular phones, tablets, fax <br />machines, software applications, internet access, voicemail, and e-mail. <br />Page 1 1 <br />64 <br />