Loading...
COMPUTER 6.11A TEQUESTA POLICE DEPARTMENT GENERAL ORDER TITLE: COMPUTER HARDWARE & SOFTWARE MODIFICATIONS GENERAL ORDER: 6.11A EFFECTIVE: July 10, 2009 REVISES: 6.11 PAGES: 4 CONTENTS: This order consists of the following numbered sections: I. MODIFICATION PROCEDURES II. INSTALLING SOFTWARE III. SECURITY IV. UNAUTHORIZED USE V. VIRUS PROTECTION VI. NCIC/FCICII ACCESS VII. MOBILE COMPUTING TERMINALS VIII. CENTRAL RECORDS SYSTEM IX. GLOSSARY PURPOSE: To prevent unnecessary repairs, delays and damage to agency owned computer hardware and software. Unauthorized alterations to computer hardware and software may also invalidate any agency contracts or warranties. Installation of unauthorized software may also introduce damaging computer viruses. SCOPE: This order applies to all Police Department members. POLICY: It shall be agency policy to prevent unnecessary repairs; delays and damage to agency owned computer hardware and software and to ensure alterations to computer hardware and software are made in accordance with service contracts or warranties. By regulating the installation of computer software, the agency can better prevent the introduction of computer viruses. PROCEDURE: I. MODIFICATIONS: Agency owned computer hardware and software should not be installed, relocated or in any way altered without the consent of the Chief or designee. Computer hardware/software is provided for agency business only, not for personal or other non-agency business. No service, modifications, transfer of service, installation of software or addition of options by the member will be permitted. The only exception is the replacement of printer supplies. Members needing service, installation, relocation or alterations, other than printer supplies, shall: A. Submit a computer service request to the administrative division stating the desired installations, relocations or alterations. B. The Chief, or designee, will determine if the request is feasible and can be accomplished according to agency G.O. 6.11 directives. C. The Village’s Director of IT/IS will coordinate, schedule and perform the requested changes. II. INSTALLING SOFTWARE: Only legally obtained and licensed software, with proof of licensing for each instance of use, shall be installed on agency owned computer hardware. The agency, or its’ contracted vendor, will not support or maintain any other software. A: All members should submit a memorandum, via the chain of command, reporting all instances of: 1. Installation of unlicensed or unauthorized software on agency owned equipment. 2 . Computer viruses on agency owned equipment. 3. Any alterations to agency owned hardware and software without the consent of the Chief or designee. III. SECURITY: A. It is the responsibility of each member to ensure the security of all computer hardware/software used in the performance of their duties. B. There is software implemented at each work station and on each mobile computer terminal that requires the use of a unique and individual password selected by the member to access the computer system network. Access to the system may only be gained through this procedure. Access to the system for other than business purposes is prohibited. Prior to any member being granted access to or receiving a password for use of any department’s computer, the member must read, understand and sign a Computer/Laptop Agreement. C. Members do not have a reasonable expectation of privacy when using the Tequesta Police Department computer equipment. The Chief or his designee has the right to monitor messages, inspect mail and review data or text caches, as well as inspect any software installed in the equipment at any time. All data placed into the computer becomes the sole property of the Tequesta Police Department. D. Unauthorized viewing or use of another person’s computer files, programs or data is prohibited. Members should be aware that the disclosure and/or non-disclosure of computer files may be considered public record under state and federal law. Any disclosure made must be approved by the Chief. E. Entry into a system, including the network system, by individuals not specifically authorized or attempts to circumvent the protective mechanism of any system are prohibited. Deliberate attempts to degrade system performance or capability or attempts to damage systems or software is prohibited. IV. UNAUTHORIZED USE: A. Except when incidental to an investigation or as part of an official inquiry/response or report, computers will not be used for the following: 1. To send messages that may be construed as threatening or intimidating. 2. To send images that contain nudity or to send images or words of a sexually suggestive nature, even if the recipient has consented or requested such material. 3. To send jokes or comments, which tend to disparage a person or group, because of race, ethnic background, national origin, religion, gender, sexual orientation, age, verbal accent, source of income, physical appearance or agility, mental or physical disability or occupation. 2 G.O. 6.11 4. To send messages in any other inappropriate manner. 5. To knowingly receive any images, words, cartoons, jokes, comments, etc. that contain nudity, are sexually suggestive or tend to disparage a person or group. 6. In the event an unsolicited item meeting these criteria is received, it SHALL immediately be reported to the supervisor on duty who will notify the Chief. V. VIRUS PROTECTION: A. Due to the threat of viruses, members will use care when entering web sites when utilizing a Department’s computer. Members will be aware of a virus threat when sharing data on diskettes or thumb drives produced by another computer. B. Each computer will have virus detection software installed and activated. When a virus is detected, operation of the computer will stop, until the Village’s Director of IT/IS can evaluate the threat and eradicate the virus. VI. NCIC/FCIC II ACCESS: A. Only those persons approved by the Terminal Agency Coordinator (TAC) will be allowed access to terminals capable of receiving or sending NCIC/FCIC II information. The TAC will be responsible for insuring that all persons who operate a limited or full access FCIC terminal that has access to NCIC or the Interstate Identification Index (III) are certified in accordance with FCIC policy and that terminal operators renew their certification every two (2) years as required. The TAC will insure security training is provided for those persons allowed access under NCIC/FCIC II regulations during certification training. B. All members who have completed the NCIC/FCIC II certification training will be presumed to know the security requirements and dissemination restrictions of any information acquired from the NCIC/FCIC II sources. Any operator uncertain as to their authority will immediately consult with the TAC or appropriate supervisory members before performing the questioned task. Failure to comply with NCIC/FCIC II and NLETS rules, regulations, procedures and security policies will be grounds for disciplinary action, which may include loss of access, reprimand, suspension or dismissal. The offender may also be subject to civil and/or criminal prosecution. VII. MOBILE COMPUTING TERMINALS: A. All parts of General Order 6.11 apply to all Mobile Computing Terminals issued by or controlled by the Tequesta Police Department. VIII. CENTRAL RECORDS SYSTEM: A. All computer systems with access to central records are password protected. Remote VPN connections are password protected. The central records system itself ids password protected at logon. In the event an employee with knowledge of these passwords ceases to be employed with the Village, all relevant passwords are changed and their user disabled. B. All servers housing critical data are equipped with RAID 5 or RAID 6 protected local storage with one (1) available hot spare. All critical data is included in daily and weekly disk to disk backups. These backups are stored on a Xiotech Emprise 5000 pre-scan storage device equipped with proprietary intelligent Storage Element technology. ISE technology is multi-redundant, self healing disk array with even greater level of performance, security, and reliability than any current RAID system. Periodic backups are also made to LTO-3 tapes for offsite storage. 3 G.O. 6.11 C. An audit of our Active Directory user data base to verify all password, access codes, and access violations is made as needed, or at a minimum, annually. IX. GLOSSARY: COMPUTER HARDWARE - Any computer, printer, scanner, terminal, etc. COMPUTER SOFTWARE - Any program, including operating systems, installed on agency owned computer hardware. PRINTER SUPPLIES - All supplies consumed during normal use of printing, including, but not limited to, ribbons, toner cartridges, laser maintenance kits and paper. ROUTINE MAINTENANCE - Dusting, general cleaning and non-technical upkeep of computer hardware. COMPUTER VIRUS - A computer program written exclusively to disrupt and/or damage computer software and/or hardware. INDEXING: COMPUTER MODIFICATIONS HARDWARE AND SOFTWARE MODIFICATIONS DRAFTED: DJR/JULY 2009/Filed: computer 6.11 APPROVED: Pete Pitocchelli, Chief DATE: November 05, 2011 Tequesta, Florida 4