Police Department Policy

10-08_Use of Department Computers and Network_472-12262019

Sacramento County Sheriff

Policy Text
10/8 (REV 7/00) Use of Department Computers and Network Purpose of Order This order is to establish a polic y for department computers an d network systems to include the:  Use of computer equipment  Use of department data  Use of the department network  Access of department computers  Access of de partment networks Policy It is the policy of thi s department that all computer equipment networks and applications will only be used f or official business except for the exem ptions provided b y law. Computer equipment & applications Computer Equipment include s but is not limited to:  Computers  Monitors  Modems & phone lines  Network cards  Network wiring  Support equipment  Printers  Peripherals  Software This order applies to all applications accessed using departmen t computers including:  all department networks  databases  CLETS / NCIC  CJIS  NLETS  LEDS  DMV  KPF, JIMS & BLS  the intranet  internet access using department equipment and/or accounts  Megan’s Law Database  VINE Property rights of the Sheriff’s Department All programs and data on department computers or networks, incl uding e-mail, shall be the property of the Sheriff’s Department and m ay be reviewed at an y time with or without further notice to the em ployee. Continued on next page 10/8 (REV 7/00) 2Use of Department Computers and Network, Continued Employee responsibilities Employees will only access the co mputers, data, information and networks that they are authorized to use. Employees will promptly change t heir password if given to anoth er employee except for technical services computer staff. Employees will use the department e-mail system primarily for o fficial business directly related to the duties of the employee or as d irected and authorized b y their immediate su pervisor. Activities prohibited Employees will not perform or do any of the following:  Give their password for departme nt accounts to other employees without the approval of a supervis or or Technical Services comp uter staff.  Give any department informati on, data or data accessed through department networks to any pers on not entitled by law to have o r possess the information or data.  Give department informati on, data or data accessed through department networks without veri fying the person’s identity.  Repair department computer eq uipment or install computer equipment without authorization f rom Technical Ser vices compute r support staff (this does not apply to rou tine maintenance such as cleaning, replacing tone r cartridges, etc.).  Load software or software update s without the approval of a supervisor and Technical Serv ices computer support staff.  Run e-mail attachments unless th ey are department related and scanned for viruses by departmen t virus scanning software.  Load department software on pers onal computers without the approval of their supervisor a nd Technical Services computer support staff.  Use computer equipment for commercial proposes.  Copy data or take data from any de partment facility without the approval of the facility manager (This does not apply to normal department approved back-ups).  Send bulk e-mails (SPAM) unless it is directly related to their specific department job duties (Bulk e-mail is defined as e-mail sent to two (2) or more recipients).  Shall not access, nor cause t o be accessed, nor allow any priva tely owned electronic equipment with in their custody or control to b e used to access, any of the depart ment computer networks or e-ma il systems except for official depa rtment business as described he rein or authorized by an immediate supervisor.  Use Department equipment or acc ounts to access internet sites o r otherwise access materials that are pornographic or sexually ex plicit.  Use the department e-mail to dist ribute material that will viol ate department policy and/or county policy.  Use department equipment or acc ounts to access internet sites o r dial-up computer sites that are unr elated to legitimate departm ent business. Except for:  an authorized research project criminal investi gations Continued on next page 10/8 (REV 7/00) 3Use of Department Computers and Network, Continued Criminal statutes that apply Employees shall be aware the cri minal statutes can be applied i f improper use or possession of department c omputer equipment occurs. The statutes include but ar e not limited to the followin g: Code Section Literal Penal 502 Com puter Access / Use / Destructio n Penal 11105 State Criminal Histor y Information Penal 111140-111143 Persons authorized b y law to Receive a Recor d Penal 13301-13304 Definitions for PC 11140-11143 Penal 488 / 487 Theft of Pro perty Penal 496 Possession of Stolen Pro perty Penal 594 Vandalis m Penal 182 Cons piracy Vehicle 1808.45 Unauthorized disclosure of DMV Records Supervisors  responsibilities The supervisors shall ensure tha t each employee has read, under stands and is in compliance with this General Order. Supervisors will: �

Why Attorneys Choose FlawFinder

Side-by-side with Westlaw and LexisNexis

FeatureWestlawLexisNexis
Monthly price$19 - $99$133 - $646$153 - $399
ContractNone1-3 year min1-6 year min
Hidden fees$0, alwaysUp to $469/search$25/mo + per-doc
Police SOPs✓ 310+ departments
Zero-hallucination AI✓ CitationGuard
CancelOne clickTermination feesNo option to cancel
FlawFinder provides legal information, not legal advice. Consult an attorney for specific legal guidance.