Browse
Search
P-0340 - Personal Computer Policy 04-04-1996
OrangeCountyNC
>
BOCC Archives
>
Policies
>
P-0340 - Personal Computer Policy 04-04-1996
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/15/2009 11:40:00 AM
Creation date
1/15/2009 11:39:59 AM
Metadata
Fields
Template:
BOCC
Date
4/4/1996
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
15
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
3.1.1. Each department is encouraged to have swell-defined process for ensuring that: <br />• a. authorized users have access only to the systems/functions that are <br />necessary to carry out the duties of their position; and <br />b. a written record is maintained of each user who has access to a system/fiinction; <br />and <br />c. passwords/IDs are immediately deleted for any user who leaves <br />employment; and <br />d. passwords/IDs for new users are added; and <br />e. passwords/IDs are changed periodically and when an user's duties change; and <br />3.1.2 Each department should appoint a primary security officer and a secondary <br />security officer responsible for assigning, deleting passwords/IDs; maintaining the list of users by <br />system/fimction access; keeping users apprised of responsibilities with respect to security policies <br />and other duties as assigned. <br />3.1.3 Each department should appoint a primary and secondary network coordinator <br />(may be the same person as s security officer) responsible for principle liaison with DP, initial <br />trouble-shooting within the department and other duties as assigned. <br />3.1.4 Each department is encouraged to provide training on security procedures to all <br />.. users, including at least a yearly reminder of the importance of security. This may be a <br />responsibility of the security officer. <br />3.1.5 Each de artment should have policies for the checkout and use of portable <br />P <br />equipment such as laptops, portable printers. Only portable equipment is available for checkout <br />and use outside the office. Any exception requires the advance written approval of the <br />Department Head and Information Systems Director with notification to the Purchasing/ Central <br />Services Director. <br />3.2 User responsibility <br />3.2.1 Users will not share information obtained through computer access with other <br />individuals and/or agencies unless permitted by policy and law. <br />3.2.2 Users will use only those systems/functions which they are authorized to use. <br />3.2.3 Users will ensure that whenever a terminal is not being used, it will be secured to <br />avoid use by unauthorized personnel. <br />3.2.4 Users will not share their passwords/IDs with others or use another user's <br />password/ID. Users will ensure that their passwordslIDs are not left out in the open where they <br />could be found and used by other individuals. Users who are not authorized for a particular <br />system/fimction will not seek access to that system/fimction through another user. <br />• <br />4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.