Skip to code content (skip section selection)
Compare to:
Loading...
§ 36.077 PRIVACY.
   Although employees may use passwords to access electronic communication systems, these communications should not be considered private. Employees should always assume that any communications, whether business-related or personal, created, sent, received or stored on the county’s electronic communication systems may be read or heard by someone other than the intended recipient.
(1980 Code, § 36.72) (Res. 01-164, passed 4-19-2001)
§ 36.078 RIGHT TO MONITOR.
   (A)   The county reserves the right to monitor, intercept, access and disclose all information created, sent, received or stored on its electronic communication systems at any time, with or without employee notice. The contents of computers, e-mail and other electronic communications will be inspected when there are allegations that there have been violations of law, breaches of confidentiality or security, violations of this subchapter. These inspections will also be conducted when it is necessary to locate substantive information that is not more readily available by less intrusive means.
   (B)   Before initiation of monitoring of stored electronic communications such as e-mail messages, written authorization will be requited from the elected official for their respective area.
   (C)   Internet use will be monitored in the same manner as other electronic communications. However, in addition, the county will regularly monitor and maintain a log of employees’ internet access. Department heads will have access to this log upon request.
   (D)   Information obtained through monitoring may be used as a basis for employee discipline up to and including termination.
(1980 Code, § 36.73) (Res. 01-164, passed 4-19-2001)
§ 36.079 PROHIBITED ACTIVITIES.
   (A)   Employees may not, without their department head’s authorization, upload, download or otherwise access and/or transmit copyrighted, trademarked or patented material, trade secrets or confidential, private or proprietary information or materials. Employees may not upload, download or otherwise transmit any illegal information or materials. Employees may not use the county’s electronic communication systems to gain unauthorized access to remote computers or other systems or to damage, alter or disrupt the computers or systems in any way, nor may employees, without authorization from their department head, use someone else’s code or password or disclose anyone’s code or password including their own. Passwords can be released to Information Technology technicians for problem solving.
   (B)   It is a violation of this policy for employees to intentionally intercept, eavesdrop, record or alter another person’s internet and e-mail messages. Employees may not enable unauthorized individuals to have access to or use the county’s electronic communication systems, or otherwise permit any use which would jeopardize the security of the county’s electronic communication systems.
   (C)   Employees must use their real names when sending e-mail messages or other electronic communications and may not misrepresent, obscure or in any way attempt to subvert the information necessary to identify the real person responsible for the electronic communication. Likewise, using another users account or login ID constitutes a violation of this policy.
(1980 Code, § 36.74) (Res. 01-164, passed 4-19-2001)
§ 36.080 LICENSING FEES.
   (A)   Employees may not install any software, for which the county has not paid the appropriate licensing fee. Additional licensing fees may be incurred every time software is installed for a new user. Consequently, before software is installed on their computer, employees have a duty to ensure that all appropriate licensing fees have been paid. Employees should notify their department head if they discover unlicensed software in their department.
   (B)   Employees may not copy software for distribution to any third party or for home use unless the copying is permitted by the software’s license agreement.
   (C)   The installation of software for trial periods authorized by the vendor would not be a violation of this policy.
(1980 Code, § 36.75) (Res. 01-164, passed 4-19-2001)
§ 36.081 PASSWORDS.
   The use of passwords can be used to control access or encrypt data with prior authorization of their department head. When an employee uses passwords these passwords must be given to his or her department head.
(1980 Code, § 36.76) (Res. 01-164, passed 4-19-2001)
§ 36.082 VIRUSES AND TAMPERING.
   Any personal computer that has access to the internet or e-mail must have anti-virus software installed on that computer. This software would be the software recommended by the Information Technology Department. The intentional introduction of viruses, attempts to breach system security, or other malicious tampering with any of the county’s electronic communications systems are expressly prohibited. Employees must immediately report any viruses, tampering or other system breaches to their department head.
(1980 Code, § 36.77) (Res. 01-164, passed 4-19-2001)
§ 36.083 USE OF THE INTERNET.
   The county is not responsible for material viewed or downloaded by users from the internet. The internet provides access to a significant amount of information, some of which contains offensive, sexually explicit and inappropriate material. It is difficult to avoid contact with this material, therefore users of the internet do so at their own risk.
(1980 Code, § 36.78) (Res. 01-164, passed 4-19-2001)
Loading...