Information Technology Use Policy Flashcards
When is your test
2 april 2024
When may personal use of the City’s ICT be allowed?
a) Personal use is always permitted without restriction.
b) Personal use is allowed only with prior written approval from the CIO.
c) Personal use is permitted as long as it does not interfere with work responsibilities.
d) Personal use is prohibited under all circumstances.
C
What is the primary guideline regarding the use of the City’s ICT?
a) Users must abide by the guidelines set forth by their direct supervisor.
b) Personal use of the City’s ICT is strictly prohibited.
c) ICT usage should align with legislation, City policies, and related SOPs.
d) Users are encouraged to use the City’s ICT for recreational purposes.
C
Who has the authority to monitor and audit equipment, systems, and electronic communication?
a) Any qualified staff member within the City’s IT department.
b) The Chief Information Officer (CIO) or authorized delegates.
c) The direct supervisor of the user in question.
d) Third-party contractors hired by individual City departments.
B
What is the process for requesting an exception to the Policy?
a) An email request to the IT Service Desk is sufficient.
b) Approval from the requestor’s Divisional Head is not required.
c) An “Exception to Policy Request” must be submitted with business justification and Divisional Head approvals.
d) Exceptions to the Policy are not permitted under any circumstances.
C
How may unauthorized software or hardware be dealt with?
a) It may be used at the discretion of individual users.
b) It will be disabled, disconnected, or confiscated without notice.
c) Users may report it to their direct supervisor.
d) Unauthorized software or hardware is allowed as long as it does not interfere with City operations.
B
What is a user’s responsibility regarding the security of their account(s)?
a) Sharing account(s) and password information with colleagues for collaboration.
b) Keeping passwords secured and being responsible for the security of account(s).
c) Allowing access to account(s) to anyone who requests it.
d) Ignoring password security measures to streamline access.
B
What is prohibited regarding the storage of City-owned information?
a) Storing City-owned information on any personal devices.
b) Sharing City-owned information with colleagues for collaboration.
c) Storing City-owned information on unauthorized devices.
d) Sharing City-owned information on social media platforms.
C
Which of the following activities is not permitted regarding the use of City ICT?
a) Downloading or introducing inappropriate content or software.
b) Using City ICT for non-business activities such as gaming or downloading media.
c) Disrupting service to City ICT for any reason.
d) Granting access to ICT and/or accounts without proper authorization.
D and All the above
What must users do if they manage generic system accounts?
a) Share these accounts with others for better collaboration.
b) Use these accounts to hide their identity when needed.
c) Safeguard the use of such accounts and refrain from impersonating others.
d) Store sensitive information on these accounts for easy access.
C
What is the overarching principle regarding user activities not explicitly stated in the Policy?
a) Users can engage in any activity as long as it doesn’t explicitly violate the Policy.
b) Users must follow the Policy strictly and any other reasonable directives.
c) Users can interpret the Policy as they see fit for their convenience.
d) Users must report any activity they think may be questionable to their supervisor.
B
What is a user’s responsibility regarding marking messages in electronic communication?
a) Users should mark all messages as “confidential” to ensure privacy.
b) Users should mark messages as “important” to prioritize them.
c) Users should not mark messages with sensitivity classifications from the Cloud Policy or Government of Canada classifications.
d) Users should mark all messages as “private” to limit access.
C
Which of the following activities is strictly prohibited in electronic communication?
a) Marking messages as “important” without justification.
b) Using electronic communication for non-business-related activities.
c) Sending spam or unsolicited commercial electronic messaging.
d) Sharing personal contact information with colleagues.
C
What should users do if they encounter unauthorized use of electronic communication?
a) Ignore it and continue with their own tasks.
b) Report it to their direct supervisor or the IT Service Desk.
c) Confront the individual directly.
d) Share it with colleagues for awareness.
B
Under what circumstances must usage of a Mobile Device outside of regular working hours be approved?
a) It does not require approval.
b) It requires approval from the IT Service Desk.
c) It requires approval from the User’s supervisor and adherence to overtime policies.
d) It requires approval from the City’s BYOD Program administrator.
C
What should employees do if their Mobile Device is lost, stolen, or compromised?
a) Keep it a secret to avoid repercussions.
b) Notify their manager/supervisor and the IT Service Desk as soon as possible.
c) Attempt to recover it themselves before reporting it.
d) Do nothing, as the City is not liable for any loss.
B
What must users be aware of and comply with regarding City Issued Mobile Devices?
a) City’s SOP for Mobile Communications
b) City’s BYOD Program
c) City’s SOP for Personal Technology Use
d) City’s SOP for Social Media Use
A
When can users use City Issued Mobile Devices for personal purposes?
a) Only during lunch breaks
b) At any time during working hours
c) After receiving explicit permission from the IT Service Desk
d) During working hours, but usage should be limited and not interfere with productivity
D
Who may be held responsible for costs related to repairs or replacement of damaged City Issued Mobile Devices?
a) The City’s IT department
b) The user’s direct supervisor
c) Users, as a result of their reckless or negligent actions
d) The City’s finance department
C
Under what act might users be subjected to discovery requests regarding City Issued Mobile Devices?
a) Consumer Protection Act
b) Mobile Device Protection Act
c) Municipal Freedom of Information and Protection of Privacy Act (MFIPPA)
d) Information Technology Act
C