0524041.10 COMMISSIONERS' COURT AGENDA REQUEST PLEASE FURNISH ONE ORIGINAL AND NINE COPIES OF TffiS REQUEST AND DOCUMENTS TO BE REVIEWED BY THE COURT. MADE BY: William H. Williams OFFICE: Commissioner, Pct. 2 MEETING DATE: May 24, 2004 TIME PREFERRED: SUBJECT: (Please be specific) Consider, discuss and take appropriate action on Kerr County Information Technology Policies. EXECUTIVE SESSION REQUESTED: NAME OF FERSON(S} ADDRESSING THE COURT: Commissioner Williams. ESTIMATED LENGTH OF PRESENTATION: 10 Minutes IF PERSONNEL MATTER-NAME OF EMPLOYEE: Time for submitting this request far Court to assure that the matter is posted in accordance with Titie 5, Chapter 551 and 552, Government Code, is as follows: Meeting scheduled for Mondays: 5:00 P.M. previous Tuesday THIS REQUEST RECEIVED BY: THIS REQUEST RECEIVED ON: All Agenda Requests will be screened by the County Judge's Office to determine if adequate information has been prepared for the Court's formal consideration and action at time of Court meetings. Your cooperation is appreciated and contributes toward your request being addressed at the earliest opportunity. See Agenda Request Rule adopted by Commissioners Court. Backus for Agenda Item Attached is copy of revised KC Information/Technology policies. A "red-lined" version has been provided detailing all changes made to the original draft that were suggested in the workshop meeting February 23. A corrected copy is likewise included, and is ready for Commissioners' Court action. WHW c"~~ h~"` r~~~"~ a ~„ ° `~ Cam' 1. Policy It is the policy of Kerr County to provide an atmosphere that encourages the free exchange of ideas and sharing of information to benefit the conduct of official Ken County business. Access to this environment and Kerr County's information technology resources is a privilege and must be treated with the highest standard of ethics. Kerr County expects all individuals to use the computing and information technology resources in a legal, ethical, and responsible manner; respecting the public trust through which these resources have been provided, the rights and privacy of others, the integrity of facilities and controls, and all pertinent laws and Kerr County policies and standards. Electronic mail and Internet access is provided to Kerr County representatives such as elected officials, department heads, employees, interns, temporary agency employees and volunteers as business communications tools. Kerr County representatives may have access to one or more forms of electronic media and services (computers, a-mail, telephones, voice mail, fax machines, copying machines, external electronic bulletin boards, wire services, on-line services, the Internet and the World Wide Web). The following procedures apply to all electronic media and services, which are: • Accessed on or from Kerr County premises; • Accessed using Kerr County computer or other equipment, or via • Kerr County-paid access methods, and/or used in a manner which identifies the individual with Kerr County. By using or accessing any such electronic media in the manner described, the employee shall be deemed to have agreed to be bound by these procedures. ~- ~- Tci-ii=ri-rm-irL~-I' (`.....,r.,'`, ~,1:L~~c,..,,-,-1;.,.. rl,., .,:'c-iii: iicct-*~r~rc'~~1'-EYtiti:-E~H(~ C,~r +:,.-rh rh,, ~ .,I;,.~h:l;r,.~,+ rh;~ .-..,1:, - r., ., 1,,.1._, X11 ;.-..7;.-:,-1,..,1.- „+:.,.. k'~„-.• (`~,,,,~r, ~.,.a . k'.,,•.• (`.,,~.,r. '., „ram„- .,.,,1 ..ter„ ...-1 €° ~ „r,,.- r.,.,,.,.,.-.,.-~ .-.I,,,-., ,1-., .,r.-.,,.r,~...- „ „-1 ,,i-cir'ric('i'S-'.-El-#-iE- 2. Terminology 2.1 Chain Letter A letter sent to a number of people asking each recipient to send copies with the same request to a specified number of others. The circulation of a chain letter increases in geometrical progression as long as the instructions are followed by all recipients. 2.2 Client Is one end of a network protocol that provides a user interface to the server. 2.3 Computing Ethics A set of accepted manners to be observed while using information technology resources. 2.4 E-Mail Electronic mail is a means of sending messages between computers using a computer network or over a modem connected to a telephone line. 2.5 Hack An individual who uses programming skills to gain illegal access to a computer network or file. 2.6 Internet The Internet is a network of computer networks through which information or electronic mail may travel. Computer users can use the Internet like a telephone or fax to exchange information quickly and efficiently. 2.7 Hoax Message Any message used to deceive by a story or a trick, for sport or mischief. 2.8 Home Page The starting point for most organizations to place links to other parts of the web. 2.9 Intellectual Property An original computer program is regarded by law as the intellectual property of the person or company which created the work. Computer programs are protected under copyright law, which provides that any unauthorized copying of such works is illegal 2.10 Network A collection of two or more computers and associated devices that are linked together with communications equipment. 2.11 Processes Apart of a running software program or other computing operation that does a single task. 2.12 Server A computer that provides information or programs to client computers on a network, whether it be an in-house server or an Internet server. 2.13 Shareware Software available on the Internet for downloading so you can try it before buying it. This software is copyrighted and distributed on a "free-will donation" basis, either via the Internet or by being passed along by satisfied customers. Users who continue to use the program after a trial period are expected to pay a registration fee. In return, they get documentation, technical support, and access to updated versions. 2.14 Software License Agreement: A software license agreement states the terms of usage, as permitted by the copyright owner, for the specific software product to which it pertains. The license agreement accompanying software is stated explicitly in the software documentation or on the computer screen when the program is started. The price of software covers the legal acquisition of the software license and binds the purchaser to use the software only according to the terms and agreements stated in the license. 2.15 Software Piracy Software piracy is the term used to describe the unauthorized copying or use of a computer program in any manner other than what is permitted by copyright law or by the author as stated in the software licensing agreement. Any person who engages in software piracy commits an illegal act under general copyright law. 2.16 Unauthorized Copying The manufacturer's license agreement should be followed when making back up copies of the software. Unless otherwise stated, the purchase of a software license allows the purchaser to make a "back-up" copy, to be used in case the original software disk malfunctions or is destroyed. 2.17 Virus A computer program that replicates on computer systems by incorporating itself into shared programs. ~.~2.18 World Wide Web (WNNV or the Web) The part of the Internet which provides a way for organizations or individuals to publish information which is then available to a world wide audience. The World Wide Web currently uses an Internet protocol called HTTP or Hyper Text Transfer Protocol and sends files written in a language called HTML or Hyper Text Markup Language. An HTTP server provides Web pages to client programs called browsers which retrieve and display the information stored on the Web server. 2.19 Web Page A single page displayed by a Web browser. 2.20 Worm Known primarily as a virus, it is a computer program that can replicate itself. 3. Use of Kerr County Information Technology 3.1 Prohibited actions include but are not limited to: • Personal use. • Use of unauthorized resources; • Access applications, files, data or processes without appropriate authorization. • Intent to research or exploit security flaws to gain system or data access; • Connecting any hardware to the network or PC without prior approval from the Information Technology Department. • Alter or destroy information with the intent to cause harm or injury to Kerr County or an employee of Kerr County. • Attempt to deliberately degrade performance or deny service. • Installation of any software without prior approval of the Information Technology Department. • Sending bomb threats or "hoax" messages. • Use of computing or network resources for advertising or com{m,,e~rcilal purposes. -~,~.`i~cl~Cil-i'Hti-tl~'f~i~-}l~H~~t~~a•, r,, ~„rl~.~r .~ ,~~~ ,,4..,,•,~ rl,., .. .. ~ ~,~ p~~: c .i~c)T• •,~-~rHrc~~~=c}r orc b ~~`ic-ir~~" .. .,r,. „1,'4,'r.~,a I,-.+~„-.-.,.,r:,,,~ T'~..h.,.J,,,,, ..t.,l'f t,.,...~ ~h~..- .;h;l;~. „F.z,.,;,,r.,;,-,;,~,. ~. ;r„ ~.+~rl„~ „t. .mot., ,-I- 3.2 Electronic Mail and Internet Use Kerr County elected officials, department heads and employees shall not knowingly send, receive, store, or access sites that are deemed by Kerr County to promote, encourage, or endorse discrimination on the basis of race, color, national origin, age, sex, political affiliation, religion, disability, or sexual orientation; Electronic media may not be used for knowingly transmitting, retrieving or storage of any communications including but not limited to: • Those of a discriminatory or harassing nature; • Those that are derogatory to any individual or group • Those that are obscene or of a pornographic nature; • Those that are of a defamatory or threatening nature; • Chain letters; • Bomb threats or "hoax messages;" • E-mail bombs that may cause network problems and disrupt service for other users; • Those which attempt to hide the identity of the sender, or represent the sender as someone else or from another source; • Those for advertising or other commercial purposes; or • Are for any other purpose which is illegal or against Kerr County policy or contrary to Kerr County's interest. • ~uper~~isors ma~~ authorize limited use of electronic mail for personal purposes so long as producti~~it~- is not ad~-erselti~ impacted. 3.3 Network Operability Kerr County employees and/or representatives may not.attempt to read, "hack" into other systems or other people's logins, or "crack" passwords, breach computer or network security measures, or monitor electronic files or communications of other employees or third parties except by explicit direction of the_~'^~~~•~~~:~:~~^ .~ ~'^~~r*.de~artment head. Kerr County employees and/or representatives may not share user logon and passwords, access or copy another user's electronic mail, data, programs, or other file(s) without prior approval of the elected official or department head for whom the employee directly works. Electronic media and services should not be used in a manner that will likely cause network congestion or significantly hamper the ability of other people to access and use the system, such as distributing computer worms or viruses. Kerr County employees and/or representatives may not alter or destroy information with the intent to cause harm or injury to Kerr County or any other employee or Kerr County. Kerr County employees and/or representatives may not tap a phone line or run a network sniffer without authorization. 4.43.4 Personal Use Electronic media and services are ~-i~c~clusi~el~~ for Kerr County business use. Limited, occasional or incidental use of electronic media (sending or receiving) for personal, non-business purposes °~*^~'° 1,^~=~°~~~~- *"°ma~~ he authorized b~~ a super isor. The use of streaming audio or video for personal use is prohibited. Tha. 1;,,,;r.~,l ,-. .,I ..6,.11 ,.~ ;.-.rte,.-4:~,-.~ , ~rh ;.,L, .„„-+'..,-,,,.~.,,.~, ~- 3.5 Right to Privacy Kerr County reserves the right for elected ufiicers and%or departl~ient heads to monitor, access, review, copy or delete each employee's access or use of the Internet and Electronic Mail including but not limited to a-mail, word processing, utility programs, spreadsheets, voicemail, telephones, Internet/BBS access, and to block access to areas of the Internet which have not value to Kerr County. Kerr County employees and/or representatives have no legitimate expectation of privacy in their use of the Internet or Electronic Mail. Use of Kerr County's systems and hardware constitutes consent to having Internet and Electronic Mail usage monitored. All documents are the property of Kerr County, and are not to be removed from Kerr County premises or copied to removable media without the approval of the Elected Official and/or the Department Head for whom the employee/representative/volunteer works. Kerr County reserves the right to purge electronic message(s) and/or documents to include attachments order than four (4) months. Messages and/or documents to include attachments sent and/or received via electronic mail which must be retained for greater that four (4) months must be filed in "My Documents" on the user's hard drive or on a network shared drive where applicable. L',~,-,. (`,.,,,,r.; ~I~.,r~~a ,.4f;.,;~1~. ,1~.,.,,-r,,,.~.,r h~,.,,a~. .-.I.~.,,~~~. r„I %,,,. th~, hr „r h, ~ I,... rrr~E-N-i=rt'~--~~ti(~~k- 4~irc i-'r'rf,rcr~ct'~ET-i~;=rc i-i3f~-H^~Fi~~-'_; ~'iii-c'r'r'rc~l~"circ~=ric-+}t~tF1=Hl~~~., 1~1-~~~r:•~r~-nc~tii:£1T_ •,,, I;,,,~ , ~.h,,,,I,l 6,.~ .,,,r.~,l rh.,r rho„-., . „l,a ~-r;ll h:, , ,.r;.~„ :rL, 4'.~r,• (`,,,..,r, ::' All Kerr County employees and/or representatives have the obligation to report suspected violations of this policy to their elected official, department head, or in the alternative Commissioners Court. 3.6 Broadcast Messages Permission for County-wide broadcasting of messages must be obtained from either the elected official or department head for which the employee and/or representative works. 3.7 Disciplinary Action Any employee found to be abusing the privilege of Kerr County-facilitated access to electronic media or services will be subject to disciplinary action up to and including termination of employment and/or risk having the privilege removed him/herself and possibly other employees. 3.8 Confidential Data lnformation Technolo~w staff shall be responsible for ~t~aintainin~ the inte~~rit~~ and contidcntialit~~ of information ~-ie~~~ed durin~~ trouhleshootin~~ and monitorinc of the counri's net~~ork. 4. Software 4.1 Copyrighted Software Itierr Count~~ elected officials, denartment heeds. employees and/or representati~'es obtaining electronic access to other companies or individuals' materials must respect all copyri~hts and may not co~~. retrie~-e. modit~~. or for~yard cop~~righted materials except as permitted b~~ the copyright o~~ ner. Kerr County employees and/or representatives shall abide by applicable laws and Kerr County policies and respect the copyrights and intellectual property laws of others, including the legal use of copyrighted software. Unauthorized software copies are a violation of the law and unauthorized copying of software will not be tolerated under any circumstances. Kerr County employees and/or representatives must comply with all license or purchase terms regulating the use of software. 4.2 Software Approval Approval must be obtained from the Kerr County Information Technology Department prior to using any publicly available software package, download of demo software, or software on preview. (A Software Approval Form is available for this purpose). Software that may be marked as "free," "public domain," and "public use" may be free for personal use but not corporate and/or governmental use. In downloading software from the Internet, use of this software can violate copyright or licensing requirements, thus subject Kerr County to unnecessary and expensive litigation. 4.3 Software Purchases Only copyrighted software, authorized for use and/or purchased in compliance with Kerr County's software procurement policies, will be eligible for payment. Only original manufacturer's copyrighted software will be eligible for purchase and payment. The Kerr County Information Technology Department is responsible for safekeeping of all software purchased including licenses and media. License agreements will be kept as the property of Kerr County. A copy of the license agreement may be kept by an elected official or department head. .4 Unauthorized Purchases All software purchased must have prior approval. Any software purchased without an approved request and purchase order issued by the Information Technology Department will be considered an unauthorized purchase and will become the financial responsibility of the employee who made the purchase. "Shareware" is not eligible for purchase and any "shareware" purchased will become the financial responsibility of the employee making the purchase. The use of software, free or otherwise not authorized or purchased by Kerr County is prohibited. Employees not adhering to this policy may be subject to disciplinary action up to and including termination of employment. 4.5 Damaged Software It is the responsibility of the Information Technology Department to return any damaged software to the vendor and seek the appropriate credit or refund, if paid. 4.6 Software Accounting Kerr County Information Technology Department will take inventory of each desktop or laptop computer's software on a periodic basis. Departments must allow access to all directories, disks, and documentation upon request by ITD personnel. 4.7 Software DocumentationlRecord Keeping All copyrighted software must include proper documentation (license agreement). Only under the following circumstances may Kerr County employees/representatives copy software: • Prior authorization must be obtained from the Information Technology Department. • Back-up copies will be permitted if allowed in the softwaze license agreement. • Back-up copies are labeled as such and become the property of Kerr County. 5. Kerr County's Home Page Kerr County's Home Page will contain the official County Seal, information about county activities, meetings, and public hearings. Likewise, information on how to contact all elected officials or departments by e-mail, by regular mail, or by fax or telephone will be included. Confidential information shall not be release via the Internet. Release of information that might compromise public safety should be avoided at all times. Kerr County's Home Page will be coordinated and produced by the Information Technology Department. No modifications or additional including links to other sites can be made to Kerr County's Home Page without prior approval of the Information Technology Department. 6. Computer Ethics Kerr County is a political subdivision of the State of Texas. Elected Officials, employees and/or representatives of Kerr County have a responsibility to conduct themselves in an ethical manner. Electronic mail should be treated as privileged in the same manner as first class U.S. mail. Any system weaknesses should be reported to the Information Technology Department immediately. Data obtained inappropriately (i.e., proprietary) should not be used. cwt Tia,- 4t, ,, r, ~,a 4„ : .~41, :,. I VlI1C 7. Etiquette Each network/system (e.g., Law Enforcement, District Clerk, County Clerk, Auditing, Treasurer, Tax Assessor, etc.) has its own set of policies, practices and procedures. Actions which are routinely allowed on one network/system may be controlled or even forbidden on other networks/systems. It is the user's responsibility to abide by the policies, practices and procedures of all network/systems with which they may communicate. rr r , t. ` ., ~'L, r„r I „4 t „ri ;r; ~„-tom„r F r~ f" ,t rl 1" 4 ~, ~ Liiii y „1-:, .0 , ~+ rh ~ r Ill f'°~[i-'x'1"+i'TV~ „I .:,ate, r:rl t., ~r .- .,.I ~ ~ , fix'...-„ . , 1.~.-~. ~,+ ., ~~l ia:t~.,„nT .-. •• C1111 leU