Laserfiche WebLink
V. Policy violation <br />c. Personnel shall not purposely engage in activities that may: <br />i. Harass, threaten, impersonate, or abuse others; or <br />ii. Degrade the performance of County information technology resources; or <br />iii. Deprive authorized County personnel access to a County information <br />technology resource; or <br />iv. Obtain additional information technology resources beyond those which have <br />been allocated; or <br />V. Circumvent County computer security measures. <br />d. Personnel shall not download, install, or run applications or utilities that reveal or <br />exploit weakness in the security of a County information technology resource. For <br />example, County personnel shall not run password cracking programs, packet sniffers, <br />port scanners, or any other non -approved programs on any County information <br />technology resource. <br />e. Personnel are expected to respect and comply with all legal protections provided by <br />patents, copyrights, trademarks, and intellectual property rights for any software and/or <br />materials viewed, used, or obtained using County information technology resources. <br />Software products that are not appropriately licensed for use by the County shall not be <br />installed on County information technology resources. <br />f. All work products, intellectual property, and proprietary information, including reports, <br />drawings, blueprints, software codes, computer programs, data, writings, and technical <br />information, created or developed using County information technology resources are <br />the property of the County. <br />g. Use of encryption shall be managed in a manner that allows designated County <br />personnel to promptly access all data. <br />h. County information technology resources are provided to facilitate County business and <br />shall not be used for personal financial gain. <br />L Personnel are expected to cooperate with incident investigations, including any federal <br />or state investigations. <br />Page 13 <br />[*1 <br />SECTION <br />NUMBER <br />EFFECTIVE DATE <br />Information <br />ADMINISTRATIVE <br />Technology <br />AM -1200.21 <br />4/22/2025 <br />POLICY MANUAL <br />SUBJECT <br />PAGE <br />Acceptable Use <br />Page 3 of 18 <br />V. Policy violation <br />c. Personnel shall not purposely engage in activities that may: <br />i. Harass, threaten, impersonate, or abuse others; or <br />ii. Degrade the performance of County information technology resources; or <br />iii. Deprive authorized County personnel access to a County information <br />technology resource; or <br />iv. Obtain additional information technology resources beyond those which have <br />been allocated; or <br />V. Circumvent County computer security measures. <br />d. Personnel shall not download, install, or run applications or utilities that reveal or <br />exploit weakness in the security of a County information technology resource. For <br />example, County personnel shall not run password cracking programs, packet sniffers, <br />port scanners, or any other non -approved programs on any County information <br />technology resource. <br />e. Personnel are expected to respect and comply with all legal protections provided by <br />patents, copyrights, trademarks, and intellectual property rights for any software and/or <br />materials viewed, used, or obtained using County information technology resources. <br />Software products that are not appropriately licensed for use by the County shall not be <br />installed on County information technology resources. <br />f. All work products, intellectual property, and proprietary information, including reports, <br />drawings, blueprints, software codes, computer programs, data, writings, and technical <br />information, created or developed using County information technology resources are <br />the property of the County. <br />g. Use of encryption shall be managed in a manner that allows designated County <br />personnel to promptly access all data. <br />h. County information technology resources are provided to facilitate County business and <br />shall not be used for personal financial gain. <br />L Personnel are expected to cooperate with incident investigations, including any federal <br />or state investigations. <br />Page 13 <br />[*1 <br />