§ 74-1022. Enforcement; compliance and noncompliance  


Latest version.
  • Dallas County management personnel shall enforce user's compliance with Dallas County policies, guidelines and procedures, and shall immediately report the violation to next level chain of command, department head, elected officer, or the CIO.

    Violation of county policies, guidelines, procedures, and applicable state and federal laws may result in disciplinary actions, including cancellation of user's computer system privilege, law enforcement investigation, termination, as well as civil and criminal penalties.

    APPENDIX A
    Dallas County Computer User Access Policy Guidelines

    These policy guidelines govern the use of computers and related communication devices operated by Dallas County user for connection to the Dallas County network. The purpose of these guidelines are to help maximize the effective use of the county computer system and to permit freedom of use consistent with federal and state laws, Dallas County policy and a productive working environment.

    Dallas County users who have access and use county computer systems shall follow this list of policy guidelines, which highlights the policies and procedures in sections 74-1014 through 74-1021 as to the use, security and maintenance of computer system.

    1. User shall utilize and access the computer system for the purpose of user's job requirements.

    2. User shall not install any software, hardware, or applications for any purpose, on any county computer, network, or resource without the approval of the county office of information technology.

    3. User shall not utilize the internet in such a way that is not conducive to user's job requirements.

    4. User shall not use county computer system to send electronic information for any unauthorized or inappropriate, or malicious purpose;

    5. User shall not connect any other electronic, computer or network device to the Dallas County computer system other than those approved by the office of information technology.

    6. User shall report any inappropriate or misuse of Dallas County computer system to user's supervisors or the office of information technology.

    7. User shall not share user's password(s) with anyone unless it has been approved by user's supervisor or solely for the purpose of completing a necessary task in a Severity 1 situation.

    8. If a user suspects user's computer or workstation may be infected by any malicious or unauthorized code, especially a virus, shall notify the Dallas County Service Desk immediately;

    9. User shall log off workstation before leaving the office each day;

    10. User shall not attempt to repair or reinstall any components, application, or software on the computer system;

    11. User is responsible for storing or archiving electronic information and other important documents in case of computer or desktop failures;

    12. A county laptop or computer may be used off site to conduct county businesses. User shall adopt reasonable security precautions to protect the laptop or computer and county data, and promptly return the county resource upon cessation of business demand for such resources off-site. When traveling by borrowed or hired vehicle, plane or ship always carry the laptop with user; and NEVER leave the laptop in the trunk of the hired vehicle or check-in a laptop as baggage. When traveling in user's vehicle, user should place laptop in the trunk of user's car or store out of sight;

    13. Each laptop computer is assigned to an individual employee and should not be transferred to another employee or user without notifying the office of information technology.

    14. Certain items, such as magnetic elements, plants, and water-based items, should not be placed on or near the computer system;

    15. User understands that all the electronic information contained within the County computer system, including email, is the property of Dallas County or the departments elected official.

    16. User will lock access to user's computer by utilizing a password protected screen saver each time user's computer or workstation is unattended;

(Ord. No. 2009-0822, 5-5-2009)

(Ord. No. 2009-0822, 5-5-2009)