§ 2-62.3. Computer security.  


Latest version.
  • (a)

    Security responsibilities. No one shall knowingly endanger or compromise the security of any County computer, network facility, or other computing resource or willfully interfere with others' authorized computer usage; or attempt to circumvent data protection schemes, uncover security loopholes, or decrypt secure data; or modify or reconfigure, or attempt to modify or reconfigure, any software or hardware of any County computer or network facility in any way, unless specific authorization has been obtained from the Computer Systems Department; or use County computer resources and communication facilities to attempt unauthorized access to or use of any computer or network facility, no matter where located, or to interfere with others' legitimate use of any such computing resource.

    (b)

    Problem notification process. E-mail is the preferred method of communication with the Computer Systems Department, when possible. If it is not possible to use e-mail, telephone the Help Desk and leave a message containing a detailed description of your situation.

    If sensitive information is lost or disclosed to unauthorized parties, or suspected of being lost or disclosed to unauthorized parties, the Computer Systems Administrator must be notified immediately. If any unauthorized use of the County's computer or network systems has taken place, or is suspected of taking place, the Computer Systems Administrator must likewise be notified immediately. Similarly, whenever passwords or other system access control mechanisms are lost, stolen, or disclosed, or are suspected of being lost, stolen, or disclosed, the Computer Systems Administrator must be notified immediately. Because it may indicate a computer virus infection or similar security problem, all unusual systems behavior, such as missing files, frequent system crashes, misrouted messages and the like must also be reported. The specifics of security problems should not be discussed widely but should instead be shared on a need-to-know basis.

(Ord. No. 2002-6, Arts. 1—3, 2-14-02)