EMPLOYEE HANDBOOK

Agency-owned devices. Agency monitoring is to ensure compliance with the terms and conditions of this AUP as well as for network and device maintenance. 7. Any employee, upon learning of an inappropriate use or a compromise (a breach, unauthorized access, suspected unauthorized changes, deletions, additions, or viewing) of one or more of the Agency's Systems or the Agency network has potentially occurred, shall immediately notify his or her supervisor who shall notify the Information Technology Manager. B. CYBER SECURITY 1. Wi-Fi and Network passwords should only be given to authorized staff. If an employee suspects a breach in the Wi-Fi or Network passwords, he or she is to report the breach to his supervisor who will then notify the appropriate Information Technology Manager. 2. Wi-Fi passwords are to be signed out with the Administrative Assistant. Logins and Network credentials constitute the employee's digital fingerprint/footprint. Each user is expected to log-off his or her account when finishing a session on any Agency device. Employees shall not allow others to use their login or network credentials. 3. No use of the Agency's systems or technology resources shall serve to disrupt the use of the network by others. Hardware and/or software shall not be destroyed or abused in any way. Modifications to system configurations shall not be made without written authorization from the Information Technology Manager. 4. PLUGGING ANY WIRELESS ACCESS POINTS OR OTHER DEVICES INTO THE NETWORK WITHOUT APPROVAL OR AUTHORIZATION BY TECHNOLOGY SERVICES IS PROHIBITED. 5. Using personal or non-Agency computers or printers on the network without written authorization from the Information Technology Manager is prohibited. All computers connected to the network must have virus protection software which meets the Agency standards. C. DOWNLOADING OF FILES AND SOFTWARE FROM THE INTERNET, FLASH DRIVES, CDs, OR DVDs The unauthorized installation of any software, including shareware and freeware, for use on Agency devices is prohibited. 1. Contact the Information Technology Manager in advance for authorization. 2. Use of the network or personal electronic devices to intentionally access or process files dangerous to the integrity of the local area network is prohibited. 3. The Agency network may not be used for downloading entertainment software, music, videos or other files not related to the mission and objectives of the Agency. This prohibition pertains to freeware, shareware, copyrighted commercial and non commercial software, and all other forms of software and files not directly related to the instructional and administrative purposes of the Agency. 4. The Agency is not responsible for any personal materials downloaded on the Agency computers.

D. AVSTA AGENCY EMAIL USAGE POLICY This policy applies to all employees, vendors, and partners who are assigned (or given

Page | 57

Revised 8/9/2023

Made with FlippingBook flipbook maker