Skip to code content (skip section selection)
Compare to:
Salt Lake City Overview
Salt Lake City, UT Code of Ordinances
Salt Lake City, UT Policies and Procedures Manual
POLICIES AND PROCEDURES MANUAL FOR SALT LAKE CITY, UTAH
POLICIES AND PROCEDURES COMPARISON LIST
TITLE 50 ADMINISTRATION
TITLE 51 OFFICERS, EMPLOYEES
TITLE 52 TECHNOLOGY, COMMUNICATIONS, MEDIA
TITLE 53 FINANCE, RISK MANAGEMENT
TITLE 54 SAFETY AND WORK CONDITIONS
TITLE 55 RECORDS MANAGEMENT
TITLE 56 COMPREHENSIVE SUSTAINABILITY
TITLE 57 PUBLIC PROPERTY, BUILDINGS, CONSTRUCTION
TITLE 58 PLANNING, LAND USE, DEVELOPMENT
TITLE 59 ECONOMIC DEVELOPMENT
TITLE 61 POLICE
TITLE 62 FIRE
TITLE 63 BUSINESSES
TITLE 64 THE AMERICANS WITH DISABILITIES ACT (ADA) POLICY
CHAPTER 13
TECHNOLOGY AND EQUIPMENT
ARTICLE A. INFORMATION TECHNOLOGY USAGE BY CITY EMPLOYEES
SECTION:
52-13A-1: Purpose
52-13A-2: Scope
52-13A-3: Information
52-13A-4: Access
52-13A-5: Creation Of City Network Security Team
52-13A-1: PURPOSE:
This article provides guidance regarding employees' use of City owned technology and equipment. (2019 Compilation)
52-13A-2: SCOPE:
   A.   Compliance: Use of information technology is to comply with Federal and State law. Any illegal duplication or unauthorized installation of software is prohibited. (Software Procedure, Virus Procedure.)
   B.   City Purposes: Except for de minimus personal use of City technology and equipment, the software and the data are to be used for bona fide City purposes only. It is inappropriate, under any circumstances, to use City technology and equipment for a personal business. (Standards of Conduct Policy, title 51, chapter 6 of this Manual.)
   C.   Ownership; Monitoring: Equipment and information belong to the City. Employees should assume that e-mail and internet access can be monitored. (2019 Compilation)
52-13A-3: INFORMATION:
   A.   Unauthorized Persons: Employees have a duty to keep unauthorized persons from using the City's equipment or accessing unauthorized data bases. (Notification of Suspected Loss Procedure, Disclosure of Sensitive Information Procedure, subsection 52-5-5C of this title.)
   B.   Public Information: Employees are to retain, categorize and protect public information in accordance with GRAMA. (GRAMA Policy, GRAMA Procedure, title 55 of this Manual.)
52-13A-4: ACCESS:
Employees have a duty to comply with security measures established by the City. (Password Procedures, section 52-5-6 of this title, Security Procedures, chapter 5 of this title.) (2019 Compilation)
52-13A-5: CREATION OF CITY NETWORK SECURITY TEAM:
   A.   Responsibility Of City: In response to an increasing number of well publicized threats to the integrity of computer and communication networks, the City has developed this article. Salt Lake Corporation will ensure that the City data and communication networks are secure and reliable. Salt Lake City Corporation has a responsibility for ensuring that data stored on City network servers will only be accessed by authorized employees or citizens.
   B.   Approval Required By Team: The Salt Lake City Corporation City Network/Server Security Team will approve all City modifications or changes to the data and communication network. The team will be directed by the Chief Information Officer or his designated representative.
   C.   Applicability: This article applies to all computers, servers, software, PDAs, etc., that will be connected to or used by Salt Lake City Corporation's networks. It is implemented to help meet the requirements of due diligence in safeguarding and protecting the City's networks. (2019 Compilation)
Loading...