What is the purpose of the Stockton Police Department’s information technology policy?
To provide guidelines for the proper use of department information technology resources, including computers, electronic devices, hardware, software, and systems.
Define ‘computer system’ as per the policy.
All computers (on-site and portable), electronic devices, hardware, software, and resources owned, leased, rented or licensed by the Stockton Police Department for official use.
What does ‘hardware’ include?
What is included in the definition of ‘software’?
All computer programs, systems, and applications, including shareware and firmware, excluding files created by the individual user.
What constitutes a ‘temporary file’ or ‘permanent file’?
Any electronic document, information, or data residing on the system, including spreadsheets, calendar entries, appointments, tasks, notes, letters, reports, messages, photographs, or videos.
What expectation of privacy do members have regarding department-issued technology?
Members forfeit any expectation of privacy with regard to emails, texts, or anything published, shared, transmitted, or maintained through department technology.
True or False: The Department requires members to disclose personal usernames or passwords for social media access.
False
What should members do if they encounter unauthorized access to department systems?
Report unauthorized access or use of computers, devices, software, or systems by another member to their supervisor.
Can members copy or duplicate licensed software?
No, except for a single copy for backup purposes in accordance with the software company’s copyright and license agreement.
What is the risk of installing unlicensed software on department computers?
It may expose the Department and involved members to severe civil and criminal penalties.
What is the limitation on accessing technology resources provided by the Department?
Access must be strictly limited to department-related activities.
What types of internet sites are members prohibited from accessing?
What duty do all members have regarding the computer system?
To protect the computer system and related systems and devices from physical and environmental damage.
What must members ensure when accessing sensitive or restricted systems?
Department computers and access terminals are not viewable by unauthorized persons.
What is the protocol for sharing access passwords and logon information?
Confidential information and not to be shared.
What authority do supervisors have regarding the inspection or review of computer systems?
The express authority to inspect or review the computer system, all files, and related electronic systems or devices.
List some reasons for inspection or review of the computer system.
True or False: IT staff can extract files from the department computer system without supervisor approval.
False