Orange County NC Website
Section 5. VOLUNTEERS <br />• <br />5.1 Volunteers using County-owned equipment <br />Any volunteer using County equipment is expected to adhere to the same rules and <br />regulations for PC use as would a County employee. It should be the responsibility of the <br />Department Head to ensure that the volunteer has sufficient expertise to carry out the assigned <br />work. This is to include the operation of the equipment, including but not limited to, the loading <br />of software, network maintenance, etc. <br />5.2 Volunteer access to confidential information <br />Access to confidential information by any volunteer will be approved by the department <br />head. Any volunteer with access to confidential information shall be given specific instruction as <br />to the handling of this information. Volunteers will follow the same standards for handling <br />confidential information as would Orange County employees. <br />Section 6. E-MAIL <br />6.1 The County's E-Mail system is provided to County employees for the purposes of carrying <br />out business for the County. The use of E-mail for personal purposes is not permitted. As noted <br />in the Purpose Statement of this policy, the County has the right to examine E-mail <br />communications at any_ time. E-mail communications are governed by the same guidelines for <br />. conduct as any other employee communications. <br />Section 7. INTERNET <br />7.1 Internet access may be provided to County employees. Internet use must be consistent <br />with County policies, ethics, values and provide business benefit. <br />7.2 Internet use, via County facilities, is restricted to County employees with approved business <br />needs. Any use of the Internet for personal purposes is not permitted. <br />7.3 "Confidential" information must be appropriately encrypted before being transmitted using <br />the Internet. <br />7.4 The License (or Usage) Agreement for all software obtained from the Internet and used on <br />County resources will be strictly followed. <br />7.5 Software, data, and information integrity should be considered questionable when obtained <br />from the Internet. <br />• s <br />