11- Corp Policies - Info Tech use Flashcards
What is the main purpose of the City of Brampton’s Information and Communication Technology (ICT) policy?
a) To restrict access to ICT for specific departments
b) To encourage personal use of ICT
c) To ensure appropriate and responsible use of technology
d) To provide unlimited access to City-owned ICT
C
This policy has been established to provide governance and awareness for the acceptable use of computers, systems, mobile communication devices, electronic communication, telephones,
servers, applications, data, software tools, electronic access accounts, information assets,
technology acquisition, technology standards and processes, network resources and the overall Business-Technologies and Infrastructure, (collectively referred to as “Information and Communication Technology” or “ICT”) at the City in conjunction with its established culture of good ethical behaviour, trust, and integrity.
According to the policy, who must comply with the ICT Policy?
a) Only the Chief Information Officer (CIO)
b) Anonymous persons visiting the City’s public website
c) Users who do not have access to ICT
d) All persons or entities with access to City’s ICT
D
This Policy applies to all and any persons or entities that have access to and/or make use of the City’s ICT in any form or plan (collectively referred to as “User” or “Users”); except Anonymous persons (i.e. unidentified people who are visiting and accessing the City’s public website).
What is the scope of the ICT Policy regarding the City’s Bring Your Own Device Program (BYOD Program)?
a) BYOD is not allowed
b) BYOD is explicitly defined in the policy
c) BYOD is mentioned but not defined in the policy
d) BYOD is discouraged but not explicitly prohibited
B
This Policy applies to ICT owned or leased by the City and to ICT that are not owned or leased by the City but are certified, contracted or permitted to connect and access the ICT through approved processes, remote access tools, or programs such as the City’s Bring Your Own Device Program(“BYOD Program”)
What should Users do if they have questions about the appropriate use of ICT for personal reasons?
a) Ignore personal use of ICT
b) Ask their direct supervisor or the IT Service Desk
c) Contact the CIO directly
d) Document their personal use for auditing purposes
B
The City’s ICT is made available to City Users for business purposes. Although occasional personal use might occur, personal use should not be excessive, impact work productivity or interfere with work performance. Users are encouraged to ask their direct supervisor or the IT Service Desk if they have any question regarding the appropriate use of ICT.
Under what conditions can the Chief Information Officer (CIO) authorize exceptions to the policy?
a) Only if the User provides a valid business justification
b) Only if the User’s Divisional Head approves
c) Only if the exception is explicitly stated in the policy
d) Only if the exception involves personal use of ICT
A
Any exceptions to this Policy must be authorized in advance in writing by CIO or her/his delegate(s). An “Exception to Policy Request” must include valid business justification and documented approvals from the requestor’s Divisional Head.
What is the responsibility of Users regarding the security of their accounts?
a) Share account information for collaborative purposes
b) Keep passwords secured at all times
c) Change passwords monthly
d) Only use City-owned information assets
B
Be responsible for the security of Account(s) under their control and to keep their password secured at all times.
What is strictly prohibited regarding the storage of personal multimedia, files, and tools?
a) Storing them on City-owned file shares or shared data repositories
b) Using personal devices for work purposes
c) Sharing personal files with colleagues
d) Storing them on unauthorized devices
A
The storage and use of personal multimedia, files and/or tools on City’s file shares or
shared data repositories is prohibited. Reasonable use of, and access to, personal
devices, accessories and digital information is not restricted to City owned or leased enduser computing devices such as (Laptop, Desktop, Tablet or Smart Devices).
What is an activity that City ICT should not be used for, according to the policy?
a) Circumventing security or causing a security breach
b) Playing games during lunch breaks
c) Using personal devices for work purposes
d) Allowing unauthorized access to personal accounts
D and A
Be responsible for the security and appropriate use of City ICT under their control, which
City ICT shall not be used for any of the following:
2.6.1. Circumventing security, User’s log-in credentials (e.g. User ID and Password) or
causing a security breach;
2.6.2. Grant access to ICT and/or Accounts without proper authorization by the
requestor’s manager, division head and the CIO or his/her delegate(s);
2.6.3. Downloading or introducing inappropriate content or software including content
and/or software that can probe, scan, cause harm or loss or damage to the City’s
ICT;
What must Users do if they need to engage in an activity deemed unlawful or prohibited?
a) Users must never engage in any other activities deemed to be unlawful
b) Ignore the policy and proceed with the activity
c) Obtain written authorization from the CIO or delegate(s) in advance
d) Report the activity to their Divisional Head
A
Users must not engage in any other activity reasonably deemed to be unlawful or
prohibited even if it is not explicitly stated in this Policy.
What is the responsibility of Users managing generic system accounts?
a) Share accounts with colleagues for efficient work
b) Safeguard the use of such accounts and refrain from impersonating others
c) Use accounts to hide their identity when necessary
d) Share accounts with others for collaborative purposes
B
Users who manage and use generic system Account(s) to administer City business
processes and controls are accountable at all times to safe guard the use of such
Account(s). Such Users must refrain from impersonating others or misusing these
Account(s) to hide their identity, and they shall not share these Account(s) with others for
such purposes.
According to the policy, what is the responsibility of Users for City-owned or leased Physical Technology Assets?
a) Use them for personal purposes
b) Report any damage to the IT Service Desk
c) Follow the Care, Custody, and Control of City Assets Policy
d) Share them with colleagues for collaborative purposes
e) B and C
E
Users are responsible:
3.1. For the City owned or leased Physical Technology Assets under their control, which City Physical Technology Assets must be dealt with in accordance with the Care, Custody
and Control of City Assets Policy;
3.2. To secure and ensure the protection of assigned City Physical Technology Assets; and
3.3. To promptly report to the IT Service Desk any loss or theft of, or damage to, assigned
City Physical Technology Assets
When must Users report any loss or theft of assigned City Physical Technology Assets?
a) Within a week of the incident
b) As soon as possible to the IT Service Desk
c) Only if it interferes with their work
d) Only if the assets are leased by the City
B
According to the policy, what must Users comply with when using personally owned technology resources?
a) City’s BYOD Program
b) City’s Personal Information Protection Policy
c) IT Use Policy Acknowledgement Form
d) Care, Custody, and Control of City Assets Policy
B
Users must comply with the City’s Personal Information Protection Policy when using
personally owned technology resources to access the City’s ICT for City related business.
What is strictly prohibited in electronic communication use?
a) Marking messages as “confidential”
b) Use involving illegal activities
c) Keeping contact information current
d) Sending unsolicited commercial electronic messages
e) B&D
E
The following electronic communication use is strictly prohibited:
4.5.1. Inappropriate use of electronic communications;
4.5.2. Use involving illegal activities;
4.5.3. Procuring or transmitting material that violates laws and regulations and/or, the
City’s by-laws, policies or SOPs (e.g. Information Technology Cloud Policy, IT
Architectural Controls and Standards, Workplace Harassment Prevention and
others);
4.5.4. Use that interferes with the safeguarding of confidential or proprietary
information;
4.5.5. Sending Spam and/or other unsolicited commercial electronic messaging
(“CEM”), text messages, instant messages, voicemail, or other forms of
electronic communication; and/or
4.5.6. Forging, misrepresenting, or obscuring User identity on any electronic
communication to mislead the recipient
What should not be confused with data sensitivity classifications in the Information Technology Cloud Policy?
a) Marking messages as “confidential,” “private,” or “important”
b) Use of electronic communication resources
c) City’s Employee Code of Conduct
d) Government of Canada’s classification of information
A
Marking messages as “confidential”, “private” or “important” where appropriate is
permitted, but it should not be confused with the use of data sensitivity classifications of
the Information Technology Cloud Policy which are “Public”, “Confidential/For Internal
Use Only”, “Sensitive-Non-Personal” and “Sensitive-Personal” or the Government of
Canada’s classification of information as “confidential”, “secret” or “top secret
What is a prohibited use of electronic communication?
a) Marking messages as “important”
b) Interfering with the safeguarding of confidential information
c) Sending confidential information to authorized recipients
d) Forging User identity to mislead the recipient
e) c&d
E
The following electronic communication use is strictly prohibited:
4.5.1. Inappropriate use of electronic communications;
4.5.2. Use involving illegal activities;
4.5.3. Procuring or transmitting material that violates laws and regulations and/or, the
City’s by-laws, policies or SOPs (e.g. Information Technology Cloud Policy, IT
Architectural Controls and Standards, Workplace Harassment Prevention and
others);
4.5.4. Use that interferes with the safeguarding of confidential or proprietary
information;
4.5.5. Sending Spam and/or other unsolicited commercial electronic messaging
(“CEM”), text messages, instant messages, voicemail, or other forms of
electronic communication; and/or
4.5.6. Forging, misrepresenting, or obscuring User identity on any electronic
communication to mislead the recipient.
Who does the Mobile Communication and Computing Devices section apply to?
a) Only those issued Mobile Devices by the City
b) All Users, regardless of device ownership
c) Only those participating in the BYOD Program
d) Anonymous persons visiting the City’s public website
e) a&c
E
This section applies to Users who: (i) have been issued Mobile Communication and
Computing Device(s) (“Mobile Devices”) by the City; or (ii) participate in the City’s BYOD
Program.
When must Users seek approval to use Mobile Devices for work outside regular working hours?
a) It is never allowed
b) Approval is automatic if they own a Mobile Device
c) Approval is not required
d) Approval must be obtained from the supervisor
D
Usage of any Mobile Device to perform work outside of the User’s regular working hours
must be approved by the User’s supervisor in accordance with the City’s policies and
procedures regarding overtime work.
What must Users do in the event of a lost, stolen, or compromised City Mobile Device?
a) Report it to their Divisional Head
b) Do nothing; it is the City’s responsibility
c) Notify their manager/supervisor and the IT Service Desk as soon as possible
d) Report it to the CIO directly
C
In the event that a Mobile Device is lost, stolen, or compromised, the employee is to notify
their manager/supervisor and the IT Service Desk as soon as possible in order to suspend
the device. A data wipe will then be activated on the lost, stolen or compromised City
Mobile Device which will completely remove all information contained on the device, and
the City is not liable of loss of any personal or business data and/or tools on such devices.
What happens when a data wipe is activated on a lost, stolen, or compromised City Mobile Device?
a) The City is liable for any loss of personal or business data
b) It only removes City-owned information
c) It completely removes all information on the device
d) It is the responsibility of the User to perform the data wipe
C
In the event that a Mobile Device is lost, stolen, or compromised, the employee is to notify
their manager/supervisor and the IT Service Desk as soon as possible in order to suspend
the device. A data wipe will then be activated on the lost, stolen or compromised City
Mobile Device which will completely remove all information contained on the device, and
the City is not liable of loss of any personal or business data and/or tools on such devices.
What should users be aware of and comply with regarding City Issued Mobile Devices?**
- A) City’s BYOD Program
- B) City’s SOP for Mobile Communications
- C) City’s SOP for Use of Social Media
- D) City’s IT Security Governing Principles
B
Users who have a City Issued Mobile Devices must be aware of and comply with the
City’s SOP for Mobile Communications.