Information Security Policies,
Procedures, Guidelines
Revised December 2017 Page 22 of 94
copyrighted materials.
(G) Attempt any unauthorized downloading of software from the Internet.
(H) Transmit personal comments or statements in a manner that may be
mistaken as the position of the State.
(I) Access, create, transmit (send or receive), print or download material
that is discriminatory, derogatory, defamatory, obscene, sexually explicit,
offensive or harassing based on gender, race, religion, national
origin, ancestry, age, disability, medical condition, sexual orientation or
any other status protected by state and federal laws.
5. Furthermore, it is the State's position that all messages sent and received,
including personal messages and all information stored on the agency's electronic
mail system, voicemail system or computer systems are State property regardless
of the content. As such, the hosting agency reserves the right to access, inspect
and monitor the usage of all of its technology resources including any files or
messages stored on those resources at any time, in its sole discretion, in order
to determine compliance with its policies, for purposes of legal proceedings, to
investigate misconduct, to locate information or for any other business purpose.
5.4 EMAIL USAGE
1. Electronic mail (email) is a highly efficient form of modern communication media.
Used appropriately, email provides people with a means to communicate thereby
facilitating business contact. However, this convenience also tempts users to
experiment or take advantage of this media, resulting in email of unwelcome
types (collectively known along with other unwelcome activity as Net Abuse). The
improper use of this email technology may jeopardize systems integrity, security
and service levels. Access to email is provided to users to assist them to perform
their work and their use of email must not jeopardize operation of the system or
the reputation and/or integrity of the State.
2. Email accounts are made available to all agency staff that require the service for
the performance of job related functions. The following statements apply:
(A) All email and associated system resources are the property of the State.
Email is subject to the same restrictions on its use and the same review
process as is any other government furnished resource provided for the use
of employees. Its use and content may be monitored.
(B) Email usage must be able to withstand public scrutiny. Users must comply
with all applicable legislation, regulations, policies and standards. This
includes complying with copyright and license provisions with respect to
both programs and data.
(C) While email is provided as a business tool to users, its reasonable,
incidental use for personal purposes is acceptable. This use must not,
however, detrimentally affect employee productivity, disrupt the system
and/or harm the government's reputation.
3. Users may not:
(A) use email for commercial solicitation or for conducting or pursuing their
own business interests or those of another organization,