Computer Hardware, Software and Electronic Communications Flashcards
The purchase, lease, or license of all computer hardware, software and/or any peripheral device must be reviewed and approved by
the IT Operations Manager.
Can copies of software be made for personal use?
No
Electronic mail message signatures shall only contain
the member’s name, title, assigned area, phone contact numbers, agency name and agency address.
Electronic mail messages may also contain
a link to the Sheriff’s Office official website, Facebook page, Twitter Feed and/or the Sheriff’s Office vision statement.
Business related electronic mail messages are public record and subject to disclosure to the public pursuant to Florida Statute
Chapter 119
Email messages must only be retained until
such time as they become obsolete, superseded or lose their administrative value.
Cases in which e-mail communicates a message of long-term value, such as a citizens complaint or a competitive bid or functions as a master copy of a document, that e-mail message must be retained
in accordance with the appropriate records retention schedule.
Who shall perform any repairs, installations, modifications, removal or relocation of any computer hardware, software, peripherals and associated components?
No member or any person other than members of the Information Technology Bureau.
Sensitive information is lost, disclosed to unauthorized parties, or suspected of being lost or disclosed to unauthorized parties, when will the IT Bureau and the member’s COC be notified?
Immediately
Unauthorized use of information systems has taken place or is suspected of taking place, when will the IT Bureau and the member’s COC be notified?
Immediately
Passwords or other system access control mechanisms are lost, stolen or disclosed, or are suspected of being lost, stolen, or disclosed Passwords or other system access control mechanisms are lost, stolen or disclosed, or are suspected of being lost, stolen, or disclosed..
Immediately
Because it may indicate a computer virus infection or similar security problem, all unusual systems behavior such as missing files, frequent system crashes, misreported messages and the like, when will the IT Bureau and the member’s COC be notified?
Immediately