(A) The town provides a wide array of computing and networking resources to the supervisors and employees of the town. These resources are intended to advance the abilities and services provided to the community. This document is a list of general computer-use policies and security rules that apply to all users of the town computers and/or network resources.
(B) By accepting and/or using any town computer or network resources, the user understands and agrees to the following.
(1) Users are responsible for all use of computers and network resources provided to them by the town.
(2) Responsible use includes, choosing passwords that are not easily deduced by others. Passwords must not be shared with any other person. The password must be changed as soon as possible after an unacceptable exposure or suspected compromise.
(3) Users who suspect that their town-provided computers or network resources have been accessed without their permission are required to report the suspected activity to their supervisor.
(4) Town-provided computers and network resources may only be used by the user to whom they are assigned and the computer and/or network resources are not allowed to be utilized by persons not employed directly by the town.
(5) It is the policy of the town that the use of internet resources will be for work-related purposes, and that any personal use of the internet should be limited.
(6) Employees are responsible for the material they review and download from the internet. Users of the internet may not visit any websites that are inappropriate or offensive.
(7) The town will seek to maintain system security, but users are required to address, safeguard against, and report misuse, abuse, and criminal activities. Misuse of town resources can lead to temporary or permanent disabling of accounts, loss of computer privileges and administrative or legal actions.
(8) As part of its necessary routine operations, the town occasionally gains access to network resources and accounts and other computing services it makes directly or indirectly available to the employees. Suspected policy violations discovered during such routine operations will be reported to the Town Council or their designee, and/or law enforcement officials. All other information accessed during such routine operations will be treated as confidential, except as otherwise required by this policy or law.
(9) Users agree not to violate system security; interfere with system performance or other user’s use of the system; or access network accounts, files, or passwords intentionally and without authorization.
(10) Users may not intentionally send email or develop other electronic information inaccurately attributed to another person.
(11) Users are not to attempt to receive the unintended messages or access information by some unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, and the like), or by causing some system component to function incorrectly.
(12) Users are prohibited from changing or circumventing access controls to allow themselves or others to perform actions outside their authorized privileges.
(13) Users may not deliberately interfere with other users accessing the system resources.
(14) Computers and printers that are not part of the town’s inventory list may not be attached to the town network without explicit permission. To safeguard network security and performance, no other device or network service, such as routers, hubs, sniffers and wireless access points may be placed on the network without approval and direction from the user’s supervisor.
(15) All software used on the town computers must be appropriately acquired and used according to the appropriate licensing. Possession or use of illegally copied software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.
(16) Users are not allowed to reconstruct or recreate information or software for which they are not authorized.
(17) Users are prohibited from taking unauthorized actions to intentionally modify or delete information or programs.
(18) Users must not intentionally introduce or use malicious software such as computer viruses, Trojan horses, worms, adware, spyware or malware.
(19) Users must notify their supervisor when they become aware that any of the accounts used to access computer resources have been compromised.
(20) Supervisors will grant authorization to each user for specific software programs, internet accessibility, and other appropriate uses of computer and network resources.
(21) Users agree to use the computers and network resources only for lawful purposes, which are consistent with town policies and procedures.
(22) Unlawful use of computers or network resources and accounts includes, but is not limited to:
(a) Defamation;
(b) Obscenity;
(c) Discrimination,
(d) Violation of copyrights, trademarks and/or licenses; and/or
(e) Violation of other rights arising under the law.
(23) Computers, software, and communications systems provided by the town are to be used only for work, related to the town.
(24) The use of town computer network resources for personal or nonwork-related activity is prohibited.
(25) The use of the town’s systems is provided to users without any warranty, expressed, or implied.
(26) The town will not be held liable in the event of any system failure or loss of data.
(C) Town employees understand that violation of this policy may result suspension or termination of computer privileges, network resources, or accounts and other access and, depending upon the circumstances, may result in disciplinary action, including suspension or termination. Policy violations will be processed through normal town channels. If the activity is also unlawful, it may result in criminal prosecution.
(D) Users agree to read and abide by this policy and its administrative interpretation as they may be amended from time to time. The Clerk-Treasurer is responsible for providing administrative interpretation, which will be modified periodically in light of experience gained and legal and administrative developments. Users are responsible for reviewing this policy and its administrative interpretation on a routine basis.