Information Technology Use Policy Flashcards

1
Q

When is your test

A

2 april 2024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When may personal use of the City’s ICT be allowed?

a) Personal use is always permitted without restriction.
b) Personal use is allowed only with prior written approval from the CIO.
c) Personal use is permitted as long as it does not interfere with work responsibilities.
d) Personal use is prohibited under all circumstances.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary guideline regarding the use of the City’s ICT?

a) Users must abide by the guidelines set forth by their direct supervisor.
b) Personal use of the City’s ICT is strictly prohibited.
c) ICT usage should align with legislation, City policies, and related SOPs.
d) Users are encouraged to use the City’s ICT for recreational purposes.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who has the authority to monitor and audit equipment, systems, and electronic communication?

a) Any qualified staff member within the City’s IT department.
b) The Chief Information Officer (CIO) or authorized delegates.
c) The direct supervisor of the user in question.
d) Third-party contractors hired by individual City departments.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process for requesting an exception to the Policy?

a) An email request to the IT Service Desk is sufficient.
b) Approval from the requestor’s Divisional Head is not required.
c) An “Exception to Policy Request” must be submitted with business justification and Divisional Head approvals.
d) Exceptions to the Policy are not permitted under any circumstances.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How may unauthorized software or hardware be dealt with?

a) It may be used at the discretion of individual users.
b) It will be disabled, disconnected, or confiscated without notice.
c) Users may report it to their direct supervisor.
d) Unauthorized software or hardware is allowed as long as it does not interfere with City operations.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a user’s responsibility regarding the security of their account(s)?

a) Sharing account(s) and password information with colleagues for collaboration.
b) Keeping passwords secured and being responsible for the security of account(s).
c) Allowing access to account(s) to anyone who requests it.
d) Ignoring password security measures to streamline access.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is prohibited regarding the storage of City-owned information?

a) Storing City-owned information on any personal devices.
b) Sharing City-owned information with colleagues for collaboration.
c) Storing City-owned information on unauthorized devices.
d) Sharing City-owned information on social media platforms.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following activities is not permitted regarding the use of City ICT?

a) Downloading or introducing inappropriate content or software.
b) Using City ICT for non-business activities such as gaming or downloading media.
c) Disrupting service to City ICT for any reason.
d) Granting access to ICT and/or accounts without proper authorization.

A

D and All the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What must users do if they manage generic system accounts?

a) Share these accounts with others for better collaboration.
b) Use these accounts to hide their identity when needed.
c) Safeguard the use of such accounts and refrain from impersonating others.
d) Store sensitive information on these accounts for easy access.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the overarching principle regarding user activities not explicitly stated in the Policy?

a) Users can engage in any activity as long as it doesn’t explicitly violate the Policy.
b) Users must follow the Policy strictly and any other reasonable directives.
c) Users can interpret the Policy as they see fit for their convenience.
d) Users must report any activity they think may be questionable to their supervisor.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a user’s responsibility regarding marking messages in electronic communication?

a) Users should mark all messages as “confidential” to ensure privacy.
b) Users should mark messages as “important” to prioritize them.
c) Users should not mark messages with sensitivity classifications from the Cloud Policy or Government of Canada classifications.
d) Users should mark all messages as “private” to limit access.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following activities is strictly prohibited in electronic communication?

a) Marking messages as “important” without justification.
b) Using electronic communication for non-business-related activities.
c) Sending spam or unsolicited commercial electronic messaging.
d) Sharing personal contact information with colleagues.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should users do if they encounter unauthorized use of electronic communication?

a) Ignore it and continue with their own tasks.
b) Report it to their direct supervisor or the IT Service Desk.
c) Confront the individual directly.
d) Share it with colleagues for awareness.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Under what circumstances must usage of a Mobile Device outside of regular working hours be approved?

a) It does not require approval.
b) It requires approval from the IT Service Desk.
c) It requires approval from the User’s supervisor and adherence to overtime policies.
d) It requires approval from the City’s BYOD Program administrator.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should employees do if their Mobile Device is lost, stolen, or compromised?

a) Keep it a secret to avoid repercussions.
b) Notify their manager/supervisor and the IT Service Desk as soon as possible.
c) Attempt to recover it themselves before reporting it.
d) Do nothing, as the City is not liable for any loss.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What must users be aware of and comply with regarding City Issued Mobile Devices?

a) City’s SOP for Mobile Communications
b) City’s BYOD Program
c) City’s SOP for Personal Technology Use
d) City’s SOP for Social Media Use

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When can users use City Issued Mobile Devices for personal purposes?

a) Only during lunch breaks
b) At any time during working hours
c) After receiving explicit permission from the IT Service Desk
d) During working hours, but usage should be limited and not interfere with productivity

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who may be held responsible for costs related to repairs or replacement of damaged City Issued Mobile Devices?

a) The City’s IT department
b) The user’s direct supervisor
c) Users, as a result of their reckless or negligent actions
d) The City’s finance department

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Under what act might users be subjected to discovery requests regarding City Issued Mobile Devices?

a) Consumer Protection Act
b) Mobile Device Protection Act
c) Municipal Freedom of Information and Protection of Privacy Act (MFIPPA)
d) Information Technology Act

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What must users do to participate in the City’s BYOD Program?

a) Notify their colleagues
b) Obtain approval from their Divisional Head and the CIO
c) Complete a training program
d) Obtain approval from the IT Service Desk

A

B

22
Q

What is included as Personal Computing Devices under the BYOD Program?

a) Monitors and printers
b) Smartphones, tablets, desktops, and laptops
c) Gaming consoles
d) Smartwatches

A

B

23
Q

What agreement do users participating in the BYOD Program agree to?

a) Permit the City to monitor their personal social media accounts
b) Permit the City to access their personal email accounts
c) Permit the City to install tools and apply reasonable controls on their Personal Computing Devices
d) Permit the City to use their Personal Computing Devices for any purpose

A

C

24
Q

What is the primary purpose of using Social Media associated with the City or during work hours?

a) Personal entertainment
b) City-related business
c) Sharing personal opinions
d) Marketing personal products

A

B

25
Q

What must users ensure regarding the use of personal Social Media during work hours?

a) Usage should only focus on City-related topics
b) Usage must not impact work productivity or interfere with work performance
c) Usage should primarily involve sharing confidential City information
d) Usage should only occur during lunch breaks

A

B

26
Q

What happens if there is excessive use of personal Social Media across the City?

a) Users will receive a warning
b) Users will be disciplined
c) Excessive use will be reported to management
d) Users will be rewarded

A

C

27
Q

How are comments and messages on the City’s social networking sites treated?

a) They are retained for an indefinite period
b) They are considered transitory records and will not be retained for any specified length of time
c) They are archived monthly
d) They are deleted immediately after posting

A

B

28
Q

What should users adhere to when using social media Accounts and websites?

a) Principles outlined in the City’s Employee Code of Conduct
b) Principles outlined in the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA)
c) Both a and b
d) Neither a nor b

A

C

29
Q

According to the policy, who owns the Information Assets?

a) Employees who created them
b) The City
c) The Department of Corporate Services
d) Third-party service providers

A

B

30
Q

What precautions must users take regarding Information Assets of the City?

a) No precautions are necessary
b) Users must protect Information Assets according to their personal preferences
c) Users must take all reasonable precautions to protect the Information Assets of the City
d) Users must rely on the IT department to protect Information Assets

A

C

31
Q

What must users with advanced system and application privileges adhere to?

a) City’s IT Managed Services Guidelines
b) City’s Records Retention By-law
c) City’s IT Security Governing Principles
d) City’s Information Management Policy

A

C

32
Q

What are Business-Technology Applications and Systems subject to?

a) City’s IT Architecture Controls and Standards
b) City’s Information Technology Cloud Policy
c) City’s Service and Operational Level Agreement(s) (SLAs)
d) City’s Personal Information Protection Policy

A

C

33
Q

What must integration of applications and systems follow?

a) City’s Records Retention By-law
b) City’s IT Security Governing Principles
c) City’s Information Technology Cloud Policy
d) City’s IT Architecture Controls and Standards

A

D

34
Q

What is the Corporate IT Business Intelligence and Integration business unit permitted to do?

a) Connect, retrieve, process, compile, and publish data and information from source systems and repositories
b) Manage city-wide events and meetings
c) Create personal reports for individual employees
d) Monitor employee productivity

A

A

35
Q

How should all electronic records and digital data be managed?

a) In accordance with the City’s IT Security Governing Principles
b) In accordance with the City’s Information Management Policy
c) In accordance with the City’s Personal Information Protection Policy
d) In accordance with the City’s Records Retention By-law

A

B

36
Q

What is essential to ensure the protection, usability, and access of electronic records and digital data?

a) Compliance with the City’s Information Technology Cloud Policy
b) Governance and management throughout its lifecycle
c) Compliance with the City’s IT Managed Services Guidelines
d) Regular backups

A

B

37
Q

What are electronic records leveraging Cloud computing services subject to?

a) City’s Records Retention By-law
b) City’s Information Management Policy
c) City’s Personal Information Protection Policy
d) City’s Information Technology Cloud Policy

A

D

38
Q

What must acquisitions of Technology and ICT adhere to?

a) City’s Printing Governing Principles
b) City’s Purchasing By-law
c) City’s Records Retention By-law
d) City’s Printing Card Policy

A

B

39
Q

What document must be attached to all technology procurement documents for full disclosure purposes?

a) City’s IT Project Management and Program Delivery Governing Principles
b) Brampton Technology Environment Architectural Standards
c) City’s Information Technology Cloud Policy
d) City’s IT Architectural Controls and Standards

A

B and all the above

40
Q

When can additional printers be issued according to the policy?

a) At any time upon request
b) Only when approved by the IT department
c) Under compelling circumstances with approval from the Head of the Departmental Business Services Office
d) Never

A

C

41
Q

What should users do to reduce paper printing and print wastage?

a) Print everything they need
b) Apply electronic records management and sharing practices
c) Print emails and website content frequently
d) Request additional printers

A

B

42
Q

What act must electronic or digital signatures (“e-Signature”) comply with?

a) Ontario’s Electronic Commerce Act, 2000
b) Ontario’s Privacy Act
c) Ontario’s Records Retention Act
d) Ontario’s Digital Signature Act

A

A

43
Q

What is an acceptable form of e-Signature according to the policy?

a) Handwritten signature
b) Verbal agreement
c) Secure digital signature certificate
d) None of the above

A

C

44
Q

What rights does the City reserve regarding e-Signatures?

a) Reject any e-Signature without providing a reason
b) Automatically accept any e-Signature received
c) Request original signature for all documents
d) None of the above

A

A

45
Q

What rights does the City reserve regarding monitoring access to its ICT?

a) Revoking or blocking access without notice
b) Allowing unrestricted access to ICT services
c) Requesting permission before monitoring access
d) None of the above

A

A

46
Q

Why does the City reserve the right to monitor access to its ICT?

a) To ensure compliance with laws and regulations
b) To invade users’ privacy
c) To restrict access to ICT services
d) To increase work productivity

A

A

47
Q

What action will be taken against users in violation of this Policy?

a) Promotions
b) Raises
c) Reporting to appropriate management levels or the CIO
d) Paid leave

A

C

48
Q

What disciplinary actions may violators of this Policy face?

a) Monetary rewards
b) Verbal warnings
c) Termination of employment or contract
d) Increased privileges

A

C

49
Q

What consequences may users face if they violate laws when using the ICT?

a) A pay raise
b) Criminal prosecution or civil actions
c) No consequences
d) Increased access to ICT resources

A

B

50
Q

What is mandatory for all new users, exiting users with material changes or updates approved, and vendors or affiliates using the City’s ICT resources?

a) Signing the IT Use Policy Acknowledgment Form
b) Completing a physical fitness test
c) Completing a trivia quiz
d) None of the above

A

A