HR 522 Usage of Information Technology Flashcards

1
Q

The _____ is the property of the City of Glendale.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All ________ and _________ transmitted by, or to, any person through the network, including electronic mail, is the property of the City of Glendale.

A

information, communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

No employee, _____ ______, _____ or ______ will use any City resource, including the Network, for illegal purposes or to assist in any way with illicit activities.

A

contract employee, agent, contractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Employee, contract employee, agents or contractor use of the network for personal or private purposes is at the employee, contract employee, agent or contractor’s ____ ____.

A

own risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

No employee, contract employee, agent or contractor should have any expectation of privacy when using the network for ______ _______.

A

personal reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All infrastructure devices including, but not limited to, servers, _______, network switches, _____ ______, data storage devices, telephone devices and firewalls, shall be approved through the ITD _______ ________ _______ prior to being connected to the network.

A

routers, wireless routers, Change Control Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All _____ ______, including, but not limited to computers, smart phones, cell phones or data storage devices, which connect to the network, or contain City data, must have password capabilities enabled and reasonable measures taken to secure the device at all times.

A

mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The sharing of user _____’s or ______ is prohibited.

A

ID, passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is ______ for any employee, contract employee, agent or contractor to send an email message under another persons name or user identification unless expressly authorized to do so by that other person or the sender identifies himself/herself in the message as the originator of the message.

A

prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accessing another persons email, voicemail or cellular telephone without users consent is prohibited and is subject to discipline, including _____.

A

Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is prohibited for any employee, contract employee, agent or contractor to _____ or ______ from the network and City files or materials which contain information or material considered or designated by the City to be confidential or privileged, unless expressly approved by the department head.

A

transfer, remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is prohibited for any employee, contract employee, agent or contractor to download application programs or other software from the internet without the approval of the ______ _____ or ______.

A

dept head, designee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Material on the internet that is marked or identified as being copyright protected should not be copied, downloaded or disseminated without the express authorization of the ______ ______ or _______.

A

city attorney, designee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sanctions:

An employee, contract employee, agent or contractor who violates this directive may be subject to disciplinary action stated above or other action in accordance with the _____ ____ _____ and ______.

A

Human resources policies, procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Third party access to the network must be based upon an identified and approved operational need that is appropriately documented on the ______ ___ _____ ____.

A

Request for Access Form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“A person who acts without authority or who exceeds authorization of use commits computer tampering by, recklessly disrupting or causing the disruption of computer, computer system or network services or denying of causing the denial of computer or network services to any authorized user of a computer, computer system or network” A.R.S ?

A

A.R.S 13-2316(A)(4)