Computer Hardware, Software and Electronic Communications Flashcards

1
Q

The purchase, lease, or license of all computer hardware, software and/or any peripheral device must be reviewed and approved by

A

the IT Operations Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can copies of software be made for personal use?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electronic mail message signatures shall only contain

A

the member’s name, title, assigned area, phone contact numbers, agency name and agency address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic mail messages may also contain

A

a link to the Sheriff’s Office official website, Facebook page, Twitter Feed and/or the Sheriff’s Office vision statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business related electronic mail messages are public record and subject to disclosure to the public pursuant to Florida Statute

A

Chapter 119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Email messages must only be retained until

A

such time as they become obsolete, superseded or lose their administrative value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cases in which e-mail communicates a message of long-term value, such as a citizens complaint or a competitive bid or functions as a master copy of a document, that e-mail message must be retained

A

in accordance with the appropriate records retention schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who shall perform any repairs, installations, modifications, removal or relocation of any computer hardware, software, peripherals and associated components?

A

No member or any person other than members of the Information Technology Bureau.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sensitive information is lost, disclosed to unauthorized parties, or suspected of being lost or disclosed to unauthorized parties, when will the IT Bureau and the member’s COC be notified?

A

Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized use of information systems has taken place or is suspected of taking place, when will the IT Bureau and the member’s COC be notified?

A

Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passwords or other system access control mechanisms are lost, stolen or disclosed, or are suspected of being lost, stolen, or disclosed Passwords or other system access control mechanisms are lost, stolen or disclosed, or are suspected of being lost, stolen, or disclosed..

A

Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Because it may indicate a computer virus infection or similar security problem, all unusual systems behavior such as missing files, frequent system crashes, misreported messages and the like, when will the IT Bureau and the member’s COC be notified?

A

Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly