EMPLOYEE HANDBOOK

a supervisor or other appropriate Agency personnel. Employees are required to undergo yearly training on Agency Acceptable Use Policies.

A. ACCEPTABLE USES 1. Exhibit exemplary behavior on the network or while using Agency electronic equipment and while using the wireless capability features of any personal electronic device. 2. Network accounts are to be used only by the authorized user of the account for authorized purposes. 3. For Agency employees provided with email, the email is considered a regular avenue of communication and should be checked by employees frequently. 4. Communications and information accessible via the network are subject to monitoring and/or review at any time and should not be assumed to be private and can be subpoenaed. 5. EMPLOYEES HAVE NO REASONABLE EXPECTATION OF PRIVACY IN DATA THAT PASSES THROUGH AGENCY NETWORK RESOURCES, INCLUDING E MAIL THAT RESIDES ON AGENCY SERVERS OR COMPUTERS. 6. The Agency reserves the right to monitor employees’ online activities that pass through the Agency Network and to access, review, copy, and store or delete any electronic communication or files which utilize Agency Network resources and/or Agency-owned devices. Agency monitoring is to ensure compliance with the terms and conditions of this AUP as well as for network and device maintenance. 7. Any employee, upon learning of an inappropriate use or a compromise (a breach, unauthorized access, suspected unauthorized changes, deletions, additions, or viewing) of one or more of the Agency's Systems or the Agency network has potentially occurred, shall immediately notify his or her supervisor who shall notify the Information Technology Manager. B. CYBER SECURITY 1. Wi-Fi and Network passwords should only be given to authorized staff. If an employee suspects a breach in the Wi-Fi or Network passwords, he or she is to report the breach to his supervisor who will then notify the appropriate Information Technology Manager. 2. Wi-Fi passwords are to be signed out with the Executive Assistant. Logins and Network credentials constitute the employee's digital fingerprint/footprint. Each user is expected to log-off his or her account when finishing a session on any Agency device. Employees shall not allow others to use their login or network credentials. 3. No use of the Agency's systems or technology resources shall serve to disrupt the use of the network by others. Hardware and/or software shall not be destroyed or abused in any way. Modifications to system configurations shall not be made without written authorization from the Information Technology Manager. 4. PLUGGING ANY WIRELESS ACCESS POINTS OR OTHER DEVICES INTO THE NETWORK WITHOUT APPROVAL OR AUTHORIZATION BY TECHNOLOGY SERVICES IS PROHIBITED. 5. Using personal or non-Agency computers or printers on the network without written authorization from the Information Technology Manager is prohibited. All

Page | 58

Revised 8/14/2024

Made with FlippingBook - professional solution for displaying marketing and sales documents online