Policy Text
ORANGE COUNTY SHERIFF'S OFFICE
GENERAL ORDER
Effective Date: October 7, 2024 Amends - GO 13.1.1 (November 7, 2016 ) Number: 13.1.1
Distribution: All Personnel Review Month: October Reviewing Authority:
Undersheriff / Information Technology
Subject: Agency Technology Equipment a nd Software Modifications
This order consists of the following:
1. Purpose
2. Policy
3. Definitions
4. Procedures
1. Purpose
The purpose of this policy is to prevent unnecessary repairs, delays and damage to
agency owned technology equipment and software. Unauthorized alterations to
technology equipment and software may also invalidate any agency contracts or
warranties. Prohibit the use of applications from foreign countries of concern on
government -issued devices. This policy aims to prevent security risks associated with
unauthorized applications, safeguard sensitive data, and maintain the integrity of
agency operations.
2. Policy
It shall be agency policy to prevent unnecessary repairs, cost, delays and damage to
agency owned technology equipment and software by verifying alterations are made in
accordance with service contracts or warranties. Installation of software will be strictly
controlled and measures are implemented to block, restrict, and remove applications to
protect against potential security threats and ensure compliance with Florida Statute s
and other applicable regulations .
3. Definitions
A. Computer Virus - A computer program intentionally written to disrupt and/or
damage computer software and/or hardware.
B. Foreign Country of Concern - The People’s Republic of China, the Russian
Federation, the Islamic Republic of Iran, the Democratic People’s Republic of
Korea , the Republic of Cuba, the Venezuelan regime of Nicolás Maduro, or the
Syrian Arab Republic, including any agency of or any other entity under
significant control of such foreign country of concern.
C. Foreign Principal - Any government or official of a for eign country of concern,
political party or member thereof, any organization or entity under such a
country’s control, or any individual domiciled in such a country and not a U.S.
citizen or lawful permanent resident.
D. Government -issued Device - Any electr onic device capable of connecting to the
13.1.1, Page 2 of 4
Internet, owned or leased by a public employer and issued for work -related
purposes.
E. Printer Supplies - all supplies consumed during normal use of printers including,
but not limited to, ribbons, toner cartridges, ink cartridges and paper.
F. Prohibited Application - An application created, maintained, or owned by a
foreign principal that poses security risks such as data collection, cyber -
espionage, surveillance, disinformation, or any other threat as determined by the
department.
G. Software – any programs, including operating systems, installed on agency
owned technology equipment.
H. Technology Equipment - any computers, servers, PCs, laptops, MDTs/MDCs,
printers, scanners, terminals, modems, speakers, monitors, personal devices,
etc.
4. Procedures
A. Agency technology equipment and software will not be installed, relocated or in
any way altered without the consent of the Chief Information Officer or designee.
The only exception is the replacement of printer supplies. Printer supplies are
the responsibility of each division. Printer ribbons, toner cartridges, ink cartridges
and similar items will be replaced by each division as necessary.
Process for requesting installation, relocation or alteratio ns, other than printer
supplies :
1. Employees shall c all or submit a request to the Service Desk, stating the
desired installations, relocations or alterations.
2. IT personnel shall determine if the reque st is feasible and can be
accomplished according to agency directives.
3. IT personnel shall obtain a cost analysis and submit the same in writing to
the requesting personnel, when new technology equipment or software
purchases are necessary to accomplish th e request per GO 13.1.3 .
4. IT personnel shall coordinate, schedule, and as necessary, perform the
requested changes. IT personnel shall keep involved agency personnel
informed as to status of the request.
B. IT personnel shall not approve or support the installation of agency owned
software on non -agency equipment unless specifically authorized by the Chief
Information Officer or designee .
C. Only legally obtained and licensed software, with proof of licensing for each
instance of use, and authorized for agency use, will be installed on agency
owned technology equipment . IT personnel shall not install, support or maintain
any other software. The Chief Information Officer shall submit a memorandum to
13.1.1, Page 3 of 4
the involved person’s Division Commander via chain of command and copied to
the Assistant Chief Information Officer , reporting all instances of:
1. Installation of unlicensed or unauthorized software on agency owned
equipment.
2. Any alterations to agency owned technology equipment and software
without the consent of IT.
D. Blocking, Restricting, Removal and Uninstallation of Prohibited Applications
1. IT personnel shall block access to all prohibited applications from public
networks and virtual private networks (VPNs) owned, operated, or
maintained by the agency.
2. IT personnel shall restrict access to any prohibited application on all
government -issued devices.
3. IT personnel shall have the ability to remotely wipe and uninstall any
prohibited application from a government -issued device suspected of
being compromised.
a. Within 15 calendar days of the Florida Department of Management
Services issuing or updating the list of prohibited applications, IT
person nel must remove, delete, or uninstall