Laserfiche WebLink
<br />people's accounts, or "crack" passwords, or breach computer or network security <br />measures, or monitor electronic files or communications of other Employees or <br />third parties except by explicit direction of City management. <br /> <br />22.6 Copyrights <br /> <br />General: Anyone obtaining electronic access to other companies' or individuals' <br />materials must-respect all copyrights and-may not copy, retrieve, modify or forward <br />copyrighted materials except as permitted by the copyright owner. Also, network <br />users shall not delete, examine, copy or modify files and/or data belonging to other <br />users, without their prior consent. <br /> <br />22.7 Passwords / Security <br /> <br />General: The City Administrator reserves the right to override passwords and codes <br />at any time. If the City Administrator requests an Employee's password(s), then the <br />password(s) must be disclosed. Any password used on the system shall be used for <br />the protection of the City of Centerville, not the Employee, and as such will not <br />preclude the City, as the operator of the network, from rightfully entering the <br />network or any other messaging system at any time to review, copy or delete any file <br />or disclose any such file to others. <br /> <br />Responsibility: No email or other electronic communications (including facsimile <br />messages) may be sent which attempt to hide the identity of the sender, or represent <br />the sender as someone else or from another organization. Employees are <br />responsible for all electronic messages originating from a computer operating under <br />his/her password. <br /> <br />22.8 Excessive Usage <br /> <br />General: Electronic media and services should not be used in a manner that is likely <br />to cause network congestion or significandy hamper the ability of other people to <br />access and use the system. Continued impedance of other users through mass <br />consumption of system resources, after receipt of a request to cease such activity, is <br />prohibited. The willful or careless introduction of programs known as computer <br />viruses, Trojan Horses and worms into the City's network or into any external <br />networks or computers can cause such excessive computer usage or even damage a <br />system and so would be a violation of this policy. <br /> <br />22.9 Data Retention <br /> <br />Records Retention Schedule: Generally, electronic messages are temporary <br />communication which are non-vital and may be discarded routinely in accordance <br />with the City's record retention policy. However, depending on the content of the <br />email message, it may be considered a more formal record and should be retained <br />pursuant to a department's record retention schedules. Examples of messages of <br />this nature are: Policy, decision-making, or other memoranda of specific public <br />business. As such, these email messages are similar to printed communication and <br />should be written with the same formality. <br /> <br />Page 40 of 46 <br />Adopted 11-09-2005 <br />