Policy Text
10/8 (REV 7/00)
Use of Department Computers and Network
Purpose of Order This order is to establish a polic y for department computers an d network
systems to include the:
Use of computer equipment
Use of department data
Use of the department network
Access of department computers
Access of de partment networks
Policy It is the policy of thi s department that all computer equipment networks and
applications will only be used f or official business except for the
exem ptions provided b y law.
Computer
equipment & applications Computer Equipment include s but is not limited to:
Computers
Monitors
Modems & phone lines
Network cards
Network wiring
Support equipment
Printers
Peripherals
Software
This order applies to all applications accessed using departmen t computers
including:
all department networks
databases
CLETS / NCIC
CJIS
NLETS
LEDS
DMV
KPF, JIMS & BLS
the intranet
internet access using department equipment and/or accounts
Megan’s Law Database
VINE
Property rights of
the Sheriff’s Department All programs and data on department computers or networks, incl uding
e-mail, shall be the property of the Sheriff’s Department and m ay be
reviewed at an y time with or without further notice to the em ployee.
Continued on next page
10/8 (REV 7/00) 2Use of Department Computers and Network, Continued
Employee
responsibilities Employees will only access the co mputers, data, information and networks
that they are authorized to use.
Employees will promptly change t heir password if given to anoth er
employee except for technical services computer staff.
Employees will use the department e-mail system primarily for o fficial
business directly related to the duties of the employee or as d irected and
authorized b y their immediate su pervisor.
Activities
prohibited Employees will not perform or do any of the following:
Give their password for departme nt accounts to other employees
without the approval of a supervis or or Technical Services comp uter
staff.
Give any department informati on, data or data accessed through
department networks to any pers on not entitled by law to have o r
possess the information or data.
Give department informati on, data or data accessed through
department networks without veri fying the person’s identity.
Repair department computer eq uipment or install computer
equipment without authorization f rom Technical Ser vices compute r
support staff (this does not apply to rou tine maintenance such as
cleaning, replacing tone r cartridges, etc.).
Load software or software update s without the approval of a
supervisor and Technical Serv ices computer support staff.
Run e-mail attachments unless th ey are department related and
scanned for viruses by departmen t virus scanning software.
Load department software on pers onal computers without the
approval of their supervisor a nd Technical Services computer
support staff.
Use computer equipment for commercial proposes.
Copy data or take data from any de partment facility without the
approval of the facility manager (This does not apply to normal
department approved back-ups).
Send bulk e-mails (SPAM) unless it is directly related to their
specific department job duties (Bulk e-mail is defined as e-mail sent
to two (2) or more recipients).
Shall not access, nor cause t o be accessed, nor allow any priva tely
owned electronic equipment with in their custody or control to b e
used to access, any of the depart ment computer networks or e-ma il
systems except for official depa rtment business as described he rein
or authorized by an immediate supervisor.
Use Department equipment or acc ounts to access internet sites o r
otherwise access materials that are pornographic or sexually ex plicit.
Use the department e-mail to dist ribute material that will viol ate
department policy and/or county policy.
Use department equipment or acc ounts to access internet sites o r
dial-up computer sites that are unr elated to legitimate departm ent
business.
Except for:
an authorized research project
criminal investi gations
Continued on next page
10/8 (REV 7/00) 3Use of Department Computers and Network, Continued
Criminal statutes
that apply Employees shall be aware the cri minal statutes can be applied i f improper
use or possession of department c omputer equipment occurs.
The statutes include but ar e not limited to the followin
g:
Code Section Literal
Penal 502 Com puter Access / Use / Destructio n
Penal 11105 State Criminal Histor y Information
Penal 111140-111143 Persons authorized b y law to Receive a Recor d
Penal 13301-13304 Definitions for PC 11140-11143
Penal 488 / 487 Theft of Pro perty
Penal 496 Possession of Stolen Pro perty
Penal 594 Vandalis m
Penal 182 Cons piracy
Vehicle 1808.45 Unauthorized disclosure of DMV Records
Supervisors
responsibilities The supervisors shall ensure tha t each employee has read, under stands and
is in compliance with this General Order.
Supervisors will:
�