Acceptable Use Technology Flashcards
Why the police provide access to systems equipment and information?
To make our job easier and to enable me to improve our services
How must police systems equipment and information be used?
Responsibly and in a manner which reinforces our professional image and reputation
This chapter provides instruction and guidance on the appropriate use of what?
Police device and computer systems social networking
personal computers
What are some of the employee principles?
Clue: PREMES
P - no expectations of PRIVACY R - RESPONSIBLE use E - EMBRACE the policy M - not MISUSE E - police ENTITLED to access S - SELF test and CoC any usage
What does responsible use mean?
Use that reinforces a professional police image and reputation
Use must not compromise or detract from the employees official duties, be excessive in cost, space , time or resources or affect the ability of the police ICT systems to operate efficiently
What is information access based on?
Trust, balanced by increased monitoring and compliance.
What happens in cases of misuse of police devices and computer systems?
Disciplinary action
prosecution
Limited on duty personal use is subject to what?
Meeting your responsibilities
Accepting that personal use is a privilege not a right
What are the conditions for limited personal use on duty?
Consistent with police Own time Not interfere with other resources No downloads Not involve poor behaviour Minimal Trivial
Limited personal use is not what?
Lengthy or long-distance calls Group emails Use that affects your productivity For sending attachments Conducting business not related to police
What can you do if you’re unsure whether personal usage is appropriate?
Apply the self test and
Ask myself:
- is there work I could be doing?
- am I comfortable for my supervisor knowing about my usage
Must all users report inappropriate use or loss or damage of equipment or information?
Yes
What does reporting inappropriate use assist with?
Eliminating or minimising risk
Who provides advice on sensitive incidents?
The chief information security officer ICT service Centre
What should employees do in cases of inadvertent misuse?
Report immediately to their own supervisors or managers