Springfield, Illinois Police Department

Similar documents
COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

ELECTRONIC MAIL POLICY

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

Computer Use and File Sharing Policy

Information technology security and system integrity policy.

Acceptable Use Policy

Virginia Commonwealth University School of Medicine Information Security Standard

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

SPRING-FORD AREA SCHOOL DISTRICT

Employee Security Awareness Training Program

Wireless Communication Device Policy Policy No September 2, Standard. Practice

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

UTAH VALLEY UNIVERSITY Policies and Procedures

Commonwealth of Pennsylvania Governor's Office

Cyber Security Program

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

FERPA & Student Data Communication Systems

Access to University Data Policy

Supersedes Policy previously approved by TBM

Communication and Usage of Internet and Policy

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

Acceptable Use Policy

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

SECURITY & PRIVACY DOCUMENTATION

Subject: University Information Technology Resource Security Policy: OUTDATED

Electronic Network Acceptable Use Policy

Internet, , and Computer Usage Policy

LifeWays Operating Procedures

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Access to personal accounts and lawful business monitoring

Checklist: Credit Union Information Security and Privacy Policies

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

University Policies and Procedures ELECTRONIC MAIL POLICY

RMU-IT-SEC-01 Acceptable Use Policy

Southington Public Schools

Information Security Management Criteria for Our Business Partners

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

UCL Policy on Electronic Mail ( )

Standard for Security of Information Technology Resources

Acceptable Use Policy

Freedom of Information and Protection of Privacy (FOIPOP)

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

GM Information Security Controls

Information Security Incident Response and Reporting

II.C.4. Policy: Southeastern Technical College Computer Use

Acceptable Use Policy

01.0 Policy Responsibilities and Oversight

Cleveland State University General Policy for University Information and Technology Resources

IEEE Electronic Mail Policy

1 Privacy Statement INDEX

COMPUTER & INFORMATION TECHNOLOGY CENTER. Information Transfer Policy

Data Privacy Breach Policy and Procedure

This Policy applies to all staff and other authorised users in St Therese School.

Department of Public Health O F S A N F R A N C I S C O

POLICY 8200 NETWORK SECURITY

Audio, Video or Photographic Recording Devices 5. DEFINITIONS 6 CANCELLATIONS 7. REFERENCES

Acceptable Use Policy

SECURITY POLICY FOR USER. 1.Purpose: The policy aims at providing secure and acceptable use of client systems.

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Policies & Regulations

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

Enterprise Income Verification (EIV) System User Access Authorization Form

Remote Access Policy

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) ITS Responsible Use of Telephone, Telecommunications, and Networking Resources ISUPP 2280

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

May 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems

HIPAA FOR BROKERS. revised 10/17

ICT Acceptable Use Policy (AUP)

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

The University of British Columbia Board of Governors

region16.net Acceptable Use Policy ( AUP )

Virginia Commonwealth University School of Medicine Information Security Standard

Cellular Site Simulator Usage and Privacy

Acceptable Use Policy

PRIVACY POLICY Let us summarize this for you...

BERKELEY COLLEGE Social Media Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

ACCEPTABLE USE POLICY

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com

On-Officer Body Camera Program

Bring Your Own Device Policy

The University of Tennessee. Information Technology Policy (ITP) Preamble

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

NEW SMYRNA BEACH POLICE DEPARTMENT NEW SMYRNA BEACH, FLORIDA POLICY AND PROCEDURE DIRECTIVE

Access Control Policy

Information Technology Standards

Tri-County Communications Cooperative, Inc. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Data Security and Privacy Principles IBM Cloud Services

Transcription:

Directive Number: ADM-46 01-084 Issue Date: 05/28/01 Distribution: C,E* Revision Dates: 06/01/01 Effective Date: 06/01/01 Related CALEA Standards: 82.1.7 References: CALEA Standards Manual Rescinds: ADM-46/01-015 I. Purpose Springfield, Illinois Police Department Subject: Information Systems/Computer Procedures It is the purpose of this directive is to establish policy and procedure on the proper use of personal computers and related electronic messaging systems utilized in this Department for purposes of disseminating electronic mail, utilizing services of the Internet and related electronic message transmission, recording and storage devices. II. Policy The availability and use of the personal computer within the work environment has provided many opportunities for enhancement of productivity and effectiveness. These technologies also entail the opportunity for rapid transfer and broad distribution of sensitive information that can also have damaging effects on this Department, its members, and the public if not managed properly. Therefore, it is the policy of the Springfield Police Department that all members abide by the guidelines set forth herein when using personal computers and the services of both internal and external databases and information exchange networks, the Internet, and where applicable, e- mail, voice mail, mobile data terminals/computers, facsimile machines and related electronic messaging devices. Communications sent by e-mail may be subject to disclosure under the Freedom of Information Act (5 ILCS 140/1 et seq.) or in litigation. No employee shall have any expectation of privacy with regards to any information on the computer or other Information Systems. 1

III. Definition Information Systems (IS)--For purposes of this order, information systems include: personal computers, electronic mail systems, voice mail systems, paging systems, electronic bulletin boards and Internet services, mobile data terminals/computers, facsimile (fax) machines and any other related devices. IV. Procedures A. Transmission of electronic messages and information on communications media provided for members of this Department shall be treated with the same degree of propriety, professionalism, and confidentiality as official written correspondence or public records. B. The Springfield Police Department encourages authorized and trained personnel with access to IS to utilize these devices whenever necessary. However, all these devices are the property of the City of Springfield and use of any of these devices is a privilege that is subject to revocation. C. IS and their contents are the property of this Department and the City of Springfield and are intended for use in conducting official business with limited exceptions noted elsewhere in this order. D. Members are advised that they do not maintain any right to privacy in IS equipment or its contents, to include personally owned software (if approved): 1. The Department reserves the right to access any of the records within the system at any time and to retain or dispose of those records as it deems necessary and appropriate, and may require members to provide passwords to files that have been encrypted or password protected, 2. The Department reserves the right to access, for quality control purposes and/or for violations of this policy, data, electronic and voice transmissions of members conducting business of this Department. E. Accessing or transmitting materials that involve the use of obscene language, images, jokes, sexually explicit materials, or messages that disparage the Department, any person, group, or classification of individuals is prohibited whether or not the recipient has consented to or requested such material. Exception: Officers involved in criminal investigations, during the performance of their official duties, may be required to receive, copy, download or transmit sexually explicit or other material 2

normally not allowed. Division Commanding Officers are responsible for notifying the Commanding Officer of the Administrative Services Division of officers under their command who require this authorization, and these officers must receive written permission from the Chief of Police or his designee prior to beginning to receive, copy, download or transmit this material. This permission will be renewed annually on or about January 1 of each year. In addition, the Division Commanding Officers are responsible for notifying the Commanding Officer of the Administrative Services Division of the change in status, i.e. transfer, retirement, etc., of personnel under their command who have received this authorization. F. Confidential, proprietary, or sensitive information may be disseminated (or made available through shared directories or networked systems) only to individuals with a need and a right to know and when there is sufficient assurance that appropriate security of such information will be maintained. Such information includes but is not limited to the following: 1. Transmittal of personnel information, such as: a. Salary; b. Performance reviews; c. Complaints; d. Grievances; e. Misconduct; f. Disciplinary information; g. Medical records; or h. Related employee information. 2. Criminal history information and confidential source master files, identification files, or related information, 3. Intelligence files and information containing sensitive tactical and undercover information. G. No member shall access or allow others to access any file or database unless that person has a need and a right to such information. Additionally, personal identification and access codes shall not be revealed to any unauthorized source. H. An IS is designed and intended to conduct business of this Department and is restricted to that purpose. Installation of or access to software for purely entertainment purposes is prohibited without the approval of the Chief of Police or his designee. Exceptions to business use include the following: 3

1. Infrequent personal use of these devices is permissible if limited in scope and frequency. The use must be in conformance with other elements of this order, and: a. Is not connected with a profit-making business or enterprise; b. Is not connected to the promotion of any product, service, or cause that has not received prior written approval of the Chief of Police or his designee; c. Does not interfere with or delay official Department business. 2. Personnel may make off-duty personal use of agency computers for professional and career development purposes when in keeping with other provisions of this policy and with prior approval of their supervisor. V. Importing/Downloading Information and Software A. Members will not download or install on their personal computer or network terminal any software, or other materials from the Internet or other external sources without taking prescribed steps to preclude infection by computer viruses: 1. Material will be downloaded to floppy drives and scanned for viruses prior to being entered into any personal or shared system. If the material is too large to download to a floppy drive, the material may be downloaded to the computer's local hard drive after receiving permission from the Commanding Officer of the Administrative Services Division or his designee, 2. In no case shall external materials or applications be downloaded directly to any shared (network) drive. When in doubt, members will consult the Commanding Officer of the Administrative Services Division or his designee for guidance. B. Members will observe the copyright and licensing restrictions of all software applications and shall not copy software from internal or external sources unless legally authorized: 1. Any software for which proof of licensing (original disks, original manuals and/or license) cannot be provided is subject to removal by authorized agency personnel, 2. No software, including privately owned software, will be loaded on agency computers without prior approval of the Commanding Officer of the Administrative Services Division or his designee. 4

C. Members will observe copyright restrictions of any documents, images, or sounds sent through or stored on electronic mail. D. Any hardware enhancements, software additions or any other additions to agency-owned equipment will be approved and authorized by the Commanding Officer of the Administrative Services Division or his designee prior to its installation. The Network Administrator is responsible for determining proper installation procedures. E. Members will not permit unauthorized persons to use the Department's Records Management, electronic mail or other computer systems. F. Any misuse of the IS may result in disciplinary action up to and including termination. VI. Use of Electronic Mail (E-MAIL) A. Members are not to open e-mail messages unless they are certain of the trustworthiness of the source. B. Suspect messages will be referred to the Network Administrator for virus check. C. The attachment(s) with an e-mail message are to be always saved to a disc and subjected to a virus check before opening unless the member is certain of the trustworthiness of the source. D. Members will not trust e-mail messages to be a secure and confidential means of communications since subsequent directing of the message can not be controlled. E. Members will not knowingly accept messages with inappropriate content as described in this directive, and will immediately and completely delete any such message inadvertently received. F. Members who are authorized to utilize e-mail should check their e-mail in-box at least once each day on days they are working. VII. Internet Information Concerning the Department A. Creating a web site on the Internet that has any appearance of officially representing the City of Springfield or the Springfield Police Department is prohibited without the express approval of the Chief of Police. Any information added to the official Department web page(s) or site(s) must have the approval of the Chief of Police or his designee prior to being accessible to the general public. 5

B. Using scanned images of any official Department logo, patch or badge on personal web pages is prohibited without the express written approval of the Chief of Police or his designee. Approved by: Chief of Police Springfield Police Department 800 East Monroe Street Springfield, IL 62701 Reviewed for Legal Sufficiency: Assistant Corporation Counsel Reviewed for CALEA Compliance: CALEA Manager/Coordinator Concurrences: Assistant Chief/Chief of Staff Assistant Chief/Internal Affairs Assistant Chief/Field Support Assistant Chief/Admin. Services Assistant Chief/Criminal Investigations Assistant Chief/Community Relations Assistant Chief/Field Operations Division Chief/Emer. Communications Division Chief/Technical Services Copy Police Benevolent and Protective Association Unit #5 6