Laserfiche WebLink
<br />. <br /> <br />. <br /> <br />. <br /> <br />City of Arden Hills Technology Policy <br /> <br />"need to know." Likewise, e-mail to all <br />users should only be used on very <br />rare occasions when every person on <br />the system has a direct need to know. <br /> <br />C. Avoid ''forwarding'' e-mail to a third <br />parly unless necessary (see "carbon <br />copying). When forwarding, explain <br />the reason for the forwarding action <br />and edit out any potentially <br />inappropriate contents. If in doubt <br />about the appropriateness of <br />forwarding a given piece of mail, <br />check with the originator for guidance. <br /> <br />D. When sending an e-mail requiring <br />"action, " be sure to indicate which mail <br />recipient(s) is/are to take action. <br /> <br />E. Do not "say" anything in an e-mail <br />message that could prove <br />embarrassing or compromising to you, <br />the City, or others. Each employee is <br />responsible for the content of all text, <br />audio, or images they transmii. <br /> <br />F. Avoid potentially contentious <br />exchanges through e-mail. <br /> <br />G. Confidential and sensitive information <br />such as performance reviews, <br />disciplinary and/or corrective actions, <br />attorney"client privileged information, <br />personnel information, private data as <br />outlined in the Minnesota Government <br />Data Practices Act, and health or <br />medical information should not be <br />communicated via e-mail. <br /> <br />H. Communications which would be <br />inappropriate under other City policies <br />are equally unacceptable if delivered <br />via electronic communication. These <br />communications may include, but are <br />not limited to, harassing or <br />discriminatory comments, breaches of <br />confidentiality, and insubordinate <br />statements. <br /> <br />I. Use your common sense in <br />determining when to use e-mail, in <br />what is said, and to whom. <br />Remember that electronic <br />communication is not private and the <br />City resefVes the right to monitor and <br />review all communications originating <br />from or entering its computer systems. <br /> <br />SECTION V. Security and Virus <br />Protection <br /> <br />A. E-mail and/or internet access may <br />utilize passwords for security; however <br />employees should be aware that the <br />reliability of such tools for maintaining <br />confidentiality cannot be guaranteed. <br />Additionally, all passwords must be <br />made known to the City through the <br />Director of Administration, and <br />passwords not known to the City shall <br />not be used. <br /> <br />B. To prevent computer viruses from <br />being transmitted through the system, <br />employees are not permitted to <br />download or install any software onto <br />their computers or any drives in those <br />computers. When downloading a file <br />or opening an e-mail attachment, <br />users must scan all materials with City <br />provided virus protection software. <br />Additional consideration of policies <br />and communications from the City's <br />network administrator should also be <br />used in determining how to handle <br />potentially damaging e-mail or files. <br /> <br />SECTION VI. Other Technology Issues <br /> <br />Beyond the use of internet and e-mail, <br />there are several other issues to consider <br />when utilizing City-owned technology, <br />including personal computer and network <br />usage. <br /> <br />5 <br />