Laserfiche WebLink
Exhibit 2 <br />System User Agreement <br />1. <br /> <br />to use these resources in a secure, efficient, effective, ethica <br />2.The following policies, rules and conditions apply to all System Users. <br /> <br />2.1Each System User WILL: <br /> <br />2.1.1Use passwords and security devices provided at all times. <br /> <br />2.1.2Safeguard his/her password or passwords from discovery by othersSystem <br /> <br />Users are responsible for all transactions made using their pass <br />2.1.3Assist in the duty to maintain the privacy and confidentiality of Protected <br /> <br />Data. For the purposes of this Agreement, Protected Data means "not public <br />data", defined under the Minnesota Government Data Practices Act, Section <br />13.02, Subdivision 8a. <br />2.1.4Comply with all software licenses, copyrights and all other state and federal <br /> <br />laws governing intellectual property. <br />2.1.5Report any weaknesses in computer security, any incidents of pos <br /> <br />misuse or violation of this System User Agreement to the proper authorities <br />by contacting ______________ (name, phone number and email address). <br />2.2Each System User will NOT: <br /> <br />2.2.1Install or use software programs or hardware devices that attachCAD <br /> <br />System, the Mobile Data System and the AVL System that are not authorized <br />by the Party that has permitted use by the System User. <br />2.2.2Download, install or run programs or utilities that create weakn <br /> <br />security of the CAD System, the Mobile Data System and/or the AVL System. <br />2.2.3Attempt to access any data or programs contained on or accessibl <br /> <br />the CAD System, the Mobile Data System and the AVL System for which <br />he/she does not have authorization. <br />2.2.4Purposely engage in activity with the intent to: degrade the per <br /> <br />the CAD System, the Mobile Data System and the AVL System; deprive an <br />authorized System User access to a resource; obtain extra resources beyond <br />those allocated; or circumvent security measures. <br />2.2.5Knowingly create, transmit, or store destructive programs (e.g., <br /> <br />self-replicating code). <br />2.2.6Forward any communications that specifically prohibit dissemination, <br /> <br />without permission of the originator. <br />CAD and Mobile Data Agreement Ramsey County and User Members Page 42 of 48 <br /> <br />