V. Policy violation
<br />c. Personnel shall not purposely engage in activities that may:
<br />i. Harass, threaten, impersonate, or abuse others; or
<br />ii. Degrade the performance of County information technology resources; or
<br />iii. Deprive authorized County personnel access to a County information
<br />technology resource; or
<br />iv. Obtain additional information technology resources beyond those which have
<br />been allocated; or
<br />V. Circumvent County computer security measures.
<br />d. Personnel shall not download, install, or run applications or utilities that reveal or
<br />exploit weakness in the security of a County information technology resource. For
<br />example, County personnel shall not run password cracking programs, packet sniffers,
<br />port scanners, or any other non -approved programs on any County information
<br />technology resource.
<br />e. Personnel are expected to respect and comply with all legal protections provided by
<br />patents, copyrights, trademarks, and intellectual property rights for any software and/or
<br />materials viewed, used, or obtained using County information technology resources.
<br />Software products that are not appropriately licensed for use by the County shall not be
<br />installed on County information technology resources.
<br />f. All work products, intellectual property, and proprietary information, including reports,
<br />drawings, blueprints, software codes, computer programs, data, writings, and technical
<br />information, created or developed using County information technology resources are
<br />the property of the County.
<br />g. Use of encryption shall be managed in a manner that allows designated County
<br />personnel to promptly access all data.
<br />h. County information technology resources are provided to facilitate County business and
<br />shall not be used for personal financial gain.
<br />L Personnel are expected to cooperate with incident investigations, including any federal
<br />or state investigations.
<br />Page 13
<br />[*1
<br />SECTION
<br />NUMBER
<br />EFFECTIVE DATE
<br />Information
<br />ADMINISTRATIVE
<br />Technology
<br />AM -1200.21
<br />4/22/2025
<br />POLICY MANUAL
<br />SUBJECT
<br />PAGE
<br />Acceptable Use
<br />Page 3 of 18
<br />V. Policy violation
<br />c. Personnel shall not purposely engage in activities that may:
<br />i. Harass, threaten, impersonate, or abuse others; or
<br />ii. Degrade the performance of County information technology resources; or
<br />iii. Deprive authorized County personnel access to a County information
<br />technology resource; or
<br />iv. Obtain additional information technology resources beyond those which have
<br />been allocated; or
<br />V. Circumvent County computer security measures.
<br />d. Personnel shall not download, install, or run applications or utilities that reveal or
<br />exploit weakness in the security of a County information technology resource. For
<br />example, County personnel shall not run password cracking programs, packet sniffers,
<br />port scanners, or any other non -approved programs on any County information
<br />technology resource.
<br />e. Personnel are expected to respect and comply with all legal protections provided by
<br />patents, copyrights, trademarks, and intellectual property rights for any software and/or
<br />materials viewed, used, or obtained using County information technology resources.
<br />Software products that are not appropriately licensed for use by the County shall not be
<br />installed on County information technology resources.
<br />f. All work products, intellectual property, and proprietary information, including reports,
<br />drawings, blueprints, software codes, computer programs, data, writings, and technical
<br />information, created or developed using County information technology resources are
<br />the property of the County.
<br />g. Use of encryption shall be managed in a manner that allows designated County
<br />personnel to promptly access all data.
<br />h. County information technology resources are provided to facilitate County business and
<br />shall not be used for personal financial gain.
<br />L Personnel are expected to cooperate with incident investigations, including any federal
<br />or state investigations.
<br />Page 13
<br />[*1
<br />
|