400-13 Acceptable use of Computer Systems Flashcards
Access to and use of the department’s computer systems is strictly controlled. Except as provided by this General Order, all computers owned, leased, rented, or under the control of the department shall be used for _____, and any data created (whether on- or off-site) on a department owned or controlled computer or computer system is the property of the department.
business purposes in serving the interests of the city
Employees shall not provide information about or a list of department employees to any party outside the department without the express direction of the _____, _____, or _____.
All outside requests for information shall be carefully considered in light of the _____ of the Texas Civil Statutes and departmental resources. When appropriate, such requests for information shall be directed to the proper authority, as required by General Order 800-10, Police Records.
1) Office of Planning & Data Governance
2) Open Records Unit
3) other authorized department entity
4) Open Records Act
Employees shall not use a computer to:
a. _______. This includes, but is not limited to, the installation or distribution of “pirated” materials or other software products that are not appropriately licensed for use by the department. The department purchases licenses for the
use of software from a variety of outside companies. Employees shall use all software according to the applicable software license agreement.
Violate the rights of any person or company protected by copyright, trade secret, patent or other intellectual property laws, or similar laws or regulations.
Employees shall not use a computer to:
b. _____ including, but not limited to, digitization and distribution of photographs, music, or literary works that are not authorized. This also includes the installation of any copyrighted software for which the department or the end user does not have an active license.
Copy or use copyrighted material
Employees shall not use a computer to:
c. Export software, technical information, or encryption software or technology that is _____. The appropriate level of management shall be consulted prior to exporting any material in question.
not authorized
Employees shall not use a computer to:
d. Intentionally introduce _____ into the network or server.
malicious programs
Employees shall not use a computer to:
e. Procure or transmit material that is in violation of sexual harassment or hostile workplace laws, or harass any person via email, telephone, or any type of paging or communication device, including through language, frequency, or size of messages, as prohibited by _____
General Order 300-11, Discrimination, Harassment, and Other Prohibited Conduct.
Employees shall not use a computer to:
f. Make fraudulent offers of products, items, or services originating from any department account, or make statements about warranty, expressed or implied, unless _____.
it is within the scope of assigned duties
Employees shall not use a computer to:
g. Commit _____ such as accessing data the employee is not intended to receive, logging into a computer, server, or account the employee is not expressly authorized to access, or disrupting network communication through methods such as network sniffing, ping floods, packet spoofing, denial of service, and forged routing information, unless these activities are within the scope of assigned duties.
security breaches
Employees shall not use a computer to:
h. Conduct port scans or security scans unless authorized by the _____.
Office of Technology Services (OTS)
Employees shall not use a computer to:
i. Execute any form of _____ that intercepts data not intended for the employee’s host unless it is within the scope of assigned duties.
network monitoring
Employees shall not use a computer to:
j. Circumvent_____ or security of any host, network, or account.
user authentication
Employees shall not use a computer to:
k. Interfere with or deny service to any user other than the ____ (e.g., denial of service attack).
employee’s host
Employees shall not use a computer to:
I. Send messages or use any program, script, or command of any kind with the intent to _____, via any means.
interfere with or disable a user’s terminal session
Employees shall not use a computer to:
m. Send_____ or other advertising material including sales solicitations of any type to individuals who did not specifically request such material.
junk mail, spam,