NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE

Similar documents
Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Electronic Network Acceptable Use Policy

University Policies and Procedures ELECTRONIC MAIL POLICY

Internet, , and Computer Usage Policy

Acceptable Use Policy

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

ELECTRONIC MAIL POLICY

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

Acceptable Use Policy

Springfield, Illinois Police Department

Communication and Usage of Internet and Policy

Policies & Regulations

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

II.C.4. Policy: Southeastern Technical College Computer Use

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Acceptable Use Policy

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

13. Acceptable Use Policy

FERPA & Student Data Communication Systems

Cellular Site Simulator Usage and Privacy

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Acceptable Use Policy

LifeWays Operating Procedures

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

Information Security Policy

Acceptable Use Policy (AUP)

Healthfirst Website Privacy Policy

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

UCL Policy on Electronic Mail ( )

ACCEPTABLE USE POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Acceptable Use Policy

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Acceptable Use Policy

Cleveland State University General Policy for University Information and Technology Resources

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Magna5 reserves the right to make modifications to this policy at any time.

IT ACCEPTABLE USE POLICY

BERKELEY COLLEGE Social Media Policy

Commonwealth of Pennsylvania Governor's Office

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

GM Information Security Controls

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

Employee Security Awareness Training Program

UTAH VALLEY UNIVERSITY Policies and Procedures

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

SUBJECT: Effective Date: Policy Number: Florida Public Records Act: Scope and

Information Security Incident Response and Reporting

Red Flags/Identity Theft Prevention Policy: Purpose

Guest Wireless Policy

RMU-IT-SEC-01 Acceptable Use Policy

On-Officer Body Camera Program

Department of Public Health O F S A N F R A N C I S C O

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Computer Use and File Sharing Policy

Acceptable Use Policy

Acceptable Use and Publishing Policy

ACCEPTABLE USE POLICY

Subject: University Information Technology Resource Security Policy: OUTDATED

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Freedom of Information and Protection of Privacy (FOIPOP)

Breckenridge Financial Supplies Website Use Policy

SPRING-FORD AREA SCHOOL DISTRICT

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

Information Technology Acceptable Use Policy

SECURITY & PRIVACY DOCUMENTATION

Cognizant Careers Portal Privacy Policy ( Policy )

Southington Public Schools

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

You may contact The Translation Network by at You may also call The Translation Network at

THE CORPORATION OF THE CITY OF WINDSOR POLICY

TELEPHONE AND MOBILE USE POLICY

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

Acceptable Use Policy

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Community Use Agreement

Site Impact Policies for Website Use

This Policy applies to all staff and other authorised users in St Therese School.

ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

DRAFT. Amendment to Chapter 102 Taxation Article I In General, by adding a new Section titled Omitted Real Property Assessments.

Service Specific Terms & Conditions

PayThankYou LLC Privacy Policy

Signature: Signed by GNT Date Signed: 5/26/2015

Computer, Communication, and Network Technology Acceptable Use

Enterprise Income Verification (EIV) System User Access Authorization Form

NebraskaLink Acceptable Use Policy

Horry County IT /GIS Policy Acce table Use Com uter S stems

Transcription:

TITLE: NUMBER: 3-10-12 EFFECTIVE: July 25, 2012 NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE Electronic Communications Protocols CFA STANDARD: CFA Chapter 34.12 AMENDS: 3-10-08 DATE FOR REVIEW: As Required REVIEW BY: Staff DATE REVISED: June 1, 2012 PURPOSE... 1 DISCUSSION... 1 POLICY... 2 DEFINITIONS... 2 INFORMATION TECHNOLOGY MANAGER... 3 COMPUTER UTILIZATION... 3 SOFTWARE POLICY... 4 REQUESTS FOR HARDWARE/SOFTWARE... 5 SECURITY... 5 MOBILE COMPUTER TERMINALS... 5 FCIC/NCIC USE... 6 ELECTRONIC E-MAIL... 6 BLOGS*, WEB POSTING, CHAT ROOMS... 7 RETENTION OF E-MAIL... 7 INTERNET/INTRANET USE... 8 POWER DATA MANAGEMENT SYSTEMS (DMS)... 8 VOICE MAIL... 8 COMPLIANCE PROCEDURES... 9 VIOLATION PENALTIES... 9 LEGAL DISCLAIMER INTRANET E-MAIL... 9 PURPOSE The purpose of this Directive is to establish guidelines and regulations governing security and utilization of computer hardware and software used on New Smyrna Beach Police Department owned, purchased or leased computer equipment. It is also to establish guidelines in the creation, maintenance, use, and disposition of information contained in various electronic communication systems within the New Smyrna Beach Police Department. Various communications systems may be utilized by, or provided to Police Department members. They include both contemporaneous and pre-record communications. Some of these are: Telephones and tele-facsimile (Fax) devices Electronic mail (e-mail) systems Internet/Intranet Systems Radio and Paging Systems Electronic and paper documents Power DMS DISCUSSION As a law enforcement agency, it is imperative that the New Smyrna Beach Police Department diligently strives to maintain lawful adherence to all state and federal laws. Compliance with copyright and software licensing laws can be difficult due to the ease with which these products can be copied. Often the individual involved is not aware of the prohibitions involved or the possible consequences of their actions. This Directive, in part, is designed to Electronic Communications Protocol Page 1 of 10

familiarize all members of the Department with the general content of these laws and the procedures necessary to ensure compliance. POLICY It is the policy of the New Smyrna Beach Police Department to provide electronic communications as a method of expediting business communication, eliminating paperwork, and automating routine office tasks in a cost-effective manner. In utilizing this expeditious and efficient forum of communication, members of the New Smyrna Beach Police Department must be cognizant of the fact that their work is subject to public and media scrutiny. Within this context, the use of electronic communications by Police Department members is encouraged as a method of conducting official business. This policy is applicable to all computer software and hardware currently installed and all future installations. Members of the New Smyrna Beach Police Department shall abide by all software copyright and licensing agreements. It is the Police Department s policy that the provided resources are not to be used for private or nonofficial use. Computer hardware and software owned or operated by the City shall be used for official business purposes only. Ordinarily, members should not access communications intended solely for another member or person unless requested to do so by the intended recipient, or directed to do so by a management representative. Unless the other party does not speak or read the language, all communications shall be in English, and no encryption program(s) shall be used without approval of the Chief of Police or designee. Members are advised that they do NOT have a reasonable expectation of privacy when members use a computer or any type of communications system that is authorized or provided by the NSB Police Department. All Internet/Intranet access, mail messages, programs, or documents sent to or by members, including the deciphering of encrypted text will be monitored. Additionally, management has the right to inspect or remove any document or program housed on a department-approved system. The New Smyrna Beach Police Department has taken the necessary steps to provide Internet access to members of the Department. This document outlines the policies on access to and acceptable use of the Internet by Police Department members. These policies may also be extended to outsourced vendors/contractors. Any member eligible for and desiring access to the Internet will be provided access under the terms and conditions of this policy. Violation of this policy may be grounds for having access to Internet services restricted or revoked and may be grounds for other appropriate actions. DEFINITIONS AUTHORIZED SOFTWARE: Is computer software that has been authorized by the Chief of Police with the recommendation of the Information Technology Manager. BLOG: A blog (short for web-log) is a personal online journal that is frequently updated and intended for general public consumption. Blogs are defined by their format: a series of entries posted to a single page in reversechronological order. COPYRIGHT: The right granted by law to an author, publisher, or distributor, for exclusive production, sale, or distribution of specific computer software or a computer software package. COPY OF RECORD: The printed copy of electronic mail messages or a copy kept in electronic form, which must be retained as per established retention requirements. Both the sender and the recipient's copy of e-mail will be designated as the agency's Copy of Record, and it will be the sender's responsibility to meet established retention requirements. ELECTRONIC MAIL (E-MAIL): Electronic Mail is the electronic transfer of information typically in the form of electronic messages, memoranda, and attached documents from a sending party to one or more receiving parties by means of an intermediate telecommunications system. E-Mail that is created or received by an agency in connection with official business is a record that is subject to Access and Records Management laws and regulations. Electronic Communications Protocol Page 2 of 10

EXTERNAL ELECTRONIC MAIL: Electronic mail received from an outside agency or the public. INFORMATION TECHNOLOGY MANAGER: Is a departmental member who has been assigned the responsibility and authority to oversee the computer hardware, software, and communications system within the agency by the Chief of Police. NON-PUBLIC RECORDS: E-Mail messages are not subject to the provisions of the "Public Records Act", Chapter 119, FSS when they consist of non-circulated materials and are not intended to serve as final evidence of the knowledge to be recorded. This includes internal and external personal communications or announcements of a non-business nature and personal notes intended for one s personal use. As an example: A draft of a written directive can be e-mailed to all Division personnel for preview and editing. The draft is not subject to the "Public Records Act. Once the draft has been staffed and approved by the Chief of Police, it is an official policy and becomes public record, and the transitory messages may be deleted. PUBLIC RECORDS: Electronic mail messages are public records when they are created or received in the transaction of official business and retained as evidence of official policies, actions, decisions, or transactions. E- Mail messages that are kept because they contain valuable information are also public records. E-Mail messages, which constitute public records, must be identified, accessible, and retained just like records in other formats. POWER DMS (Document Management Software): DMS is a paperless distribution, organization, and maintenance of written directives, and Policies and Procedures. TRANSITORY MESSAGES: Do not set policy, establish guidelines or procedures; certify a transaction, or become a receipt. Transitory messages are those records created for the informal communication of information and might be compared to a telephone conversation, written telephone messages, post-it notes, or verbal communications in an office hallway. They are not designed for the perpetuation or formalization of knowledge. These records are subject to public inspection. NON-TRANSITORY MESSAGES: Are those records, which document or set official policies, actions, decisions, or transactions and are for the perpetuation or formalization of knowledge. These records are subject to public inspection. VOICE MAIL: An interactive computerized system for answering and routing telephone calls, for recording, saving, and relaying messages. INFORMATION TECHNOLOGY MANAGER (ITM) 3-10.01 The Information Technology Manager is a departmental member who has been assigned the responsibility and authority to oversee the computer hardware, software, and communications system within the agency by the Chief of Police. The ITM is responsible to ensure that the system(s) utilized by the agency continues to operate in the most efficient and effective manner utilizing current and appropriate soft/hardware. 3-10.02 Duties include, but are not limited to: acting as the liaison with the City of New Smyrna Beach Network Administrator; Volusia County Operations; software/hardware vendors; or any other entity, person, or organization regarding the utilization of hardware, software, and electronic communications utilized by the agency and members. COMPUTER UTILIZATION Hardware and software owned or operated by the New Smyrna Beach Police Department shall be used for official business purposes only. No City member or any other individual or organization is authorized to utilize any city computer hardware, software, or related facilities and supplies for other than official city business without the expressed written approval of the Chief of Police. 3-10.03 Authorized software must meet following criteria: Approved by New Smyrna Beach Police Department Information Systems as a department standard after being screened and approved by Information Technology Manager for authorized use, Purchased utilizing the purchasing process after approval by the Chief of Police, Developed by New Smyrna Beach Police Department staff or authorized agents for business. Electronic Communications Protocol Page 3 of 10

3-10.04 Resources covered by this directive include but are not limited to: Minicomputers and their peripherals Personal computers and their peripherals Printers Plotters and similar devices Computer workstations Data capture devices such as scanners, card readers, barcode readers, and similar devices Communication services such as leased, dial up or private line circuits used for data transmission Modems, multiplexers, channel/data service units, or their equivalent 3-10.05 Software programs covered by this directive include but are not limited to: Utility programs Operating systems Application programs from any source such as Power DMS or OSSI Control procedures and/or command procedures Documentation related to any of the above Computer paper and forms Magnetic or optical storage media such as magnetic tapes, tape cartridges, optical disks, or magnetic disk packs and diskettes 3-10.06 Police department members and/or independent contractors may utilize any of the approved resources after being authorized by the Information Technology Manager. 3-10.07 Formal demonstrations of software or hardware, programming activities, and dissemination of data and/or documentation to any individual or organization within or outside of the City control is prohibited without prior approval from the Chief of Police, the Information Technology Manager or designee. Division Commanding Officers, however, may authorize demonstrations of their user applications for visitors or for training purposes when such exercises are carried out with reasonable precautions against release of sensitive or proprietary information. 3-10.08 Computer generated data files or reports must be approved by the Chief of Police, or designee, prior to being distributed to persons or organizations external to City of New Smyrna Beach government. 3-10.09 No devices of any kind may be attached to any City computer equipment without the authorization of the Chief of Police or the Information Technology Manager. 3-10.10 No member shall install any software on a City owned or operated computer system unless it is authorized and approved by the Information Technology Manager. The use of proprietary software without an approved license agreement is strictly prohibited. CFA 34.12 (D) 3-10.11 No member shall bypass or modify any installed security systems or menu interfaces without the expressed permission of the Chief of Police or designee. COMPUTER SOFTWARE POLICY The New Smyrna Beach Police Department recognizes and supports the legitimate interests of copyright holders, and prohibits its members and contractors from violating the rights of copyright holders. 3-10.12 Members are prohibited from using software on any machine other than the one for which a license was obtained, unless the license clearly provides the right to copy the software or to use it on another machine. Questions regarding license agreements shall be directed to the New Smyrna Beach Police Department Information Technology Manager. 3-10.13 Only authorized computer software may be used on any computer owned, purchased, or leased by the New Smyrna Beach Police Department. 3-10.14 To prevent the introduction of unlicensed software and computer viruses, all personal computers are configured with security software. These measures ensure that the Information Technology Manager or designee is authorized to perform software installations. CFA 34.12 (E) Electronic Communications Protocol Page 4 of 10

3-10.15 Mobile Data Computer users may only use disks obtained from Police Department personnel that have been scanned for viruses. CFA 34.12 (E) REQUESTS FOR COMPUTER HARDWARE OR SOFTWARE All requests for purchase of computer hardware or software shall be forwarded to the Information Technology Manager through the normal chain of command using the standard property request/approval form. 3-10.16 The ITM shall review the request to ensure that it complies with established department hardware and software standards. If a discrepancy is encountered, the ITM shall contact the Chief of Police and discuss the request with him/her. 3-10.17 No computer software or hardware shall be ordered or purchased independent of the New Smyrna Beach Police Department Information Technology Manager. 3-10.18 If the Chief of Police approves the request, the request shall be forwarded to purchasing for action and ordering. SECURITY 3-10.19 Only those persons authorized by the Chief of Police or his/her designee and issued a password shall be authorized to utilize the departmentally approved software and hardware. CFA 34.12 (G) 3-10.20 Members shall not disclose codes, passwords, or any other information obtained through the software programs that are only available to department members through the performance of their assigned duties. 3-10.21 Members, who disclose any information or violate the confidentiality of information known only to them by the virtue of their position, shall be subject to disciplinary action up to termination of employment. 3-10.22 Employees are prohibited from using unauthorized codes, passwords or other means to gain access to e-mail addressed to others, personal or business related. CFA 34.12 (F) 3-10.23 Members are prohibited from using unauthorized means to gain access to e-mail addressed to others. Members shall not disclose passwords to others. All electronic mail is subject to review by the Chief of Police or designee. MOBILE COMPUTER TERMINALS CFA 34.12 (C) Mobile Computers Terminal (MCT) shall be used only for official department business. 3-10.24 MOUNTING OF THE MCT: The MCT has been mounted with an airbag cut off switch. When the airbag is off, the switch light is on. Passengers must be informed that the airbag has been deactivated. It is critical that the mount not be adjusted without the approval of the fleet manager. 3-10.25 USE WHILE VEHICLE IN MOTION: Due to safety considerations, it is recommended that the MCT be used only while the vehicle is stopped. 3-10.26 RADIO TRAFFIC: All call-related information from both Communications and officers will be made by voice transmission over the radio system. When dispatching a call for service, Communications will first dispatch it by voice radio and then forward the call information to the MCT of the affected field unit for reference. Officers will use the voice radio to acknowledge the call as well as for other call related information such as requests for clarification. This will ensure that all units are aware of the activity of other units. 3-10.27 TERMINAL MESSAGES: The use of terminal messages must be restricted. Terminal messages are designed for car-to-car transitory information and shall not be directed to Telecommunicators. On the rare occasion when a terminal message must be sent to Communications, it will be addressed to the appropriate terminal ID, not to an individual Telecommunicator. Electronic Communications Protocol Page 5 of 10

Do not use a terminal message to make any type of official request for which action will need to be taken. Often, the message is not read immediately, the screen has been cleared, or a personnel change has taken place. All requests will be made by voice radio transmission so that they are time stamped for logging purposes. Requests for Medical Examiner, wreckers, and other services must be done by voice radio transmission or telephone. Terminal messages are not private. They are public records. 3-10.28 Use of terminal messages will be closely monitored by supervisors who will take appropriate action to curtail excessive transmissions FCIC/NCIC UTILIZATION 3-10.29 All procedures, confidentiality, requirements, and certifications shall be in compliance with the Florida Crime Information Center policies and procedures. 3-10.30 All members utilizing the criminal justice information system terminals shall be required to successfully complete the Florida Department of Law Enforcement s initial FCIC/NCIC training and recertify every two (2) years. 3-10.31 All communications sent or received via FCIC/NCIC shall be considered confidential and for law enforcement utilization or purposes only. 3-10.32 FCIC/NCIC checks for vehicle registrations, driver s licenses and warrants may be performed via MCT. 3-10.33 Anytime a hit is received, the officer must immediately notify Communications by voice radio transmission. Communications must then perform the FCIC/NCIC check again for confirmation purposes. 3-10.34 Officers shall make FCIC/NCIC check requests by voice radio transmission anytime officer safety is an issue. ELECTRONIC MAIL (E-MAIL) CFA 34.12 (A) 3-10.35 E-Mail messages should be considered transitory messages and shall be considered as a means of informal communications, information that is short lived, or has no administrative value. 3-10.36 The electronic mail (E-Mail) system and all messages created therein are property of the New Smyrna Beach Police Department. 3-10.37 Only members authorized by the Chief of Police shall use e-mail. 3-10.38 MANDATORY CHECKS: All department employees must check and read e-mail and their attachments sent through the department s internal e-mail system. This shall be done at the beginning and end of each shift/work day. 3-10.39 AUTHORIZED USE: E-Mail is authorized for business communications. It is intended to replace communications that previously may have been handled by phone calls. This includes scheduling requests for information and responses to requests for information. 3-10.40 Reasonable personal use of e-mail by members is permitted, but such use should not interfere or conflict with business use. Members should exercise good judgment regarding the reasonableness of personal use. 3-10.41 UNAUTHORIZED USE: E-Mail is not to be used for certain personal and business matters. 3-10.42 PROHIBITED PERSONAL USE: includes, but is not limited to: Solicitation Charitable requests Membership drives Political & Religious causes Pornography Electronic Communications Protocol Page 6 of 10

Anything in violation of State Statute(s) Any other causes or matters unrelated as directed by the Chief of Police or his/her designee 3-10.43 PROHIBITED BUSINESS USE: includes, but is not limited to: Sharing of sensitive or confidential information (i.e., evaluations, counseling statements, and personnel information); Communications that establish Policy and Procedures or guidelines; Communications intended to formalize or perpetuate knowledge; Communication certifying a transaction or intended to serve as a receipt; No e-mail shall contain any language that is obscene, suggestive messages; offensive, graphical images, (except where authorized) or contains racial, religious, ethnic, or sexual slurs; Illegal activities; Threats, harassment, intimidation, slander, or defamation; Political endorsements; Commercial activities or solicitations; Chain letters; Misrepresenting one s identity while using e-mail except in bona fide undercover investigations Intercepting, disrupting, or altering electronic communications; The use of electronic mail system to compromise the integrity of the Police Department by spreading rumors or gossip; The use of the electronic mail system for moonlighting, job searches, or the advertisement of personal business outside the realm of approved Department Bulletin Board Systems; and Sensitive or confidential information. USE OF BLOGS*, WEB POSTINGS, CHAT ROOMS A blog (short for web-log) is a personal online journal that is frequently updated and intended for general public consumption. Blogs are defined by their format: a series of entries posted to a single page in reverse-chronological order. Blogs generally represent the personality of the author or reflect the purpose of the Website that hosts the blog. Topics sometimes include brief philosophical musings, commentary on Internet and other social issues, and links to other sites the author favors, especially those that support a point being made on a post. 3-10.44 As an employee of the New Smyrna Beach Police Department, the use and application of good judgment, decency and common sense is expected both on and off duty. 3-10.45 This expectation also applies while engaged in various computer activities both on and off duty. 3-10.46 Participation in World Wide Web/internet services such as Web postings, blogs, chat rooms, dating services, etc., should be carefully considered for proper personal conduct. 3-10.47 Employees are not to use, or cause/authorize to use, any official information, photographs, speech, or writings that identify them as a member of the New Smyrna Beach Police Department. Employees shall guard themselves accordingly and shall not participate in any conduct that is likely to have an adverse effect on the reputation of the New Smyrna Beach Police Department. RETENTION OF E-MAIL E-Mail messages of a transitory nature as authorized by this Policy and Procedure, must be retained by any means that assures safe maintenance and public accessibility throughout the appropriate retention period in accordance with Florida State Statute 119. 3-10.48 TRANSITORY MESSAGES: Electronic and printed hard copy will be retained by the sender until obsolete, superseded, or administrative value is lost and may be deleted on a daily basis. 3-10.49 NON-TRANSITORY MESSAGES: The Copy of Record will be retained as per established Department of State retention guidelines either by printing and filing, maintaining an electronic copy or by storing on a disk medium until scheduled for disposal. Electronic Communications Protocol Page 7 of 10

3-10.50 Both the sender and receiver of e-mail will be responsible for meeting established retention requirements. INTERNET/INTRANET USE SPECIFIC PROVISIONS CFA 34.12 (B) Internet access can provide significant business benefit for the New Smyrna Beach Police Department members. However, there is also significant legal, security, and productivity issues related to how the Internet is used. Because of the security, legal, and productivity issues, each Internet user within the Police Department network has the following responsibilities: Examples of such issues are viruses, spending significant work time on non-productive activities, breaches of data security, confidentiality, and intellectual property rights. 3-10.51 To be aware of the purpose and nature of any information contained in data files or correspondence and to not exchange information deemed personal or outside the scope of City business. 3-10.52 Under no circumstances should data ever be transported, which if intercepted, would place the city in violation of any law. 3-10.53 The content of anything exchanged via Internet access (regardless of its state of encryption) must be appropriate and consistent with Police Department policy, subject to the same restrictions as any other correspondence. 3-10.54 Any member receiving disk images or programs via the Internet must conduct a virus check on them before executing or distributing them. 3-10.55 Members granted access to any Internet connected resource shall use that access in a way, which is consistent with their job function, regardless of whether the access is off-hours, or on the member's time. It is the Police Department s policy that the provided resources are not to be used for private or nonofficial use. 3-10.56 The Internet shall not be used to send (upload) or receive (download) copyrighted materials, trade secrets, proprietary financial information, or similar materials without prior authorization from the Chief of Police or designee. 3-10.57 For investigative and intelligence purposes, specific authorized members may access Internet sites containing pornography. 3-10.58 Use of Internet resources provided by or through the Police Department may be subject to monitoring for security and/or network management reasons. Users of these services are therefore advised of this potential monitoring. POWER DATA MANAGEMENT SYSTEMS (DMS) 3-10.59 POWER DMS: The New Smyrna Beach Police Department s document management software will be used to meet proof of distribution requirements (sign off sheets). The items distributed will be directives, policies and procedures, revisions, updates and reviews, training, and other information of importance. An event log is recorded from this system on individual employees. 3-10.60 MANDATORY DMS CHECK IN: All Department members must check, read and sign any documents sent through Power DMS. This shall be done at the beginning of each shift or workday. VOICE MAIL 3-10.61 DESIGNATED WORK AREA TELEPHONES: Members of the Police Department have a 7-digit phone extension number that is assigned. This specific phone number is designated through the Department s voice mail system as an individual voice mail. Each member must check his/her individual voice mail and/or employee number at a minimum of once per shift/work day. Electronic Communications Protocol Page 8 of 10

3-10.62 CELL PHONES: Members authorized to have issued departmental cell phones shall be required to return all phone messages 30 minutes within receipt, unless otherwise authorized by the Divisional Commanding Officer. 3-10.63 EXIGENT CIRCUMSTANCES: All Departmental members must have access to a telephone, cell phone, or other facsimile and shall be required to call in, respond to, or return all phone calls received from the Department during a time that the member knows of, or should have known, that a threat of a natural and/or man-made disaster (or other unusual event) that can or will impact the safety or welfare of the citizens of the City of New Smyrna Beach. COMPLIANCE PROCEDURES 3-10.64 All users of computers, telephones, or other like equipment owned, leased, purchased outright or through a grant process, by the New Smyrna Beach Police Department are to adhere to this policy and any related security safeguards. 3-10.65 The Information Technology Manager or designee shall conduct periodic inspections of the Department equipment to ensure compliance with this policy. VIOLATION PENALTIES 3-10.66 Any violation of this directive, including but not limited to; failure to abide to check in procedures, misuse of email, misuse intra/internet privileges, MCTs, or software/hardware requirements may result in disciplinary action. 3-10.67 Copyright laws do not preclude the imposition of liability for copyright infringements on governmental agencies and/or their staff. According to Title 17, United States Code, Section 101 et seq., the federal copyright act protects the interests of persons who have developed original works of authorship, including computer software. Illegal reproduction of software can be subject to civil damages and criminal penalties, including fines and imprisonment. LEGAL DISCLAIMER INTRANET E-MAIL 3-10.68 The New Smyrna Beach Police Department disclaims all responsibility and accepts no liability (including negligence) for the consequences of any person acting, or refraining from acting, on any information prior to the receipt by those of subsequent written confirmation. 3-10.69 The following are samples of legal disclaimers, one of which shall be attached to all e-mail that is sent from or about the Police Department that is business in nature: ~~Mail is intended for work preparation purposes only. No legal definite promise. This document should only be read by those persons to whom it is addressed and it is not intended to be relied upon by any person without subsequent written confirmation of its contents. ~~Florida has a very broad public records law. Most written communications to or from government employees regarding government business are public records available to the public and media upon request. Your e-mail communications may, therefore, be subject to public disclosure. ~~This e-mail communication and any attachments may contain privileged information for the sole use of the designated recipients named above. Any unauthorized review; use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~~If you have received this e-mail message in error, please notify us immediately by telephone. Please also destroy and delete the message from your computer. New Smyrna Beach Police Department, 246 Industrial Park Avenue, New Smyrna Beach, Florida 32168. Any form of reproduction, dissemination, copying, disclosure, modification, distribution and/or publication of this e- mail is strictly prohibited. Electronic Communications Protocol Page 9 of 10

MB 9/00; LBA; 09/04Lba; 10/16/07lba ;05/23/2008lba/; 6/1/12wad APPROVED: Chief Ronald P. Pagano DATE: 06 / 26 /_12 Written Directive 3-10-12 Electronic Communications Protocol Electronic Communications Protocol Page 10 of 10