Laserfiche WebLink
accessible places, removable media must be kept in a secured area, and that confidential <br />data is not displayed in such a manner that unauthorized personnel can view it. <br />• All IT equipment is City property and must remain on current premises. Users may not <br />move IT equipment outside of its assigned area without prior approval from the IT <br />department. Designated portable equipment, such as projectors, laptop computers, and <br />digital cameras, may be removed from City buildings only for City business. Portable <br />equipment must be reserved and checked out only to City users. Users are expected to <br />provide appropriate "common sense" protection against theft, breakage, environmental <br />damage, and other risks. <br />• Users are required to log off computer workstations when absent for an extended time, <br />such as end of day. Users may, however, "lock" their workstation instead when absent <br />for a short period of time, such as during a meeting or over lunch. <br />Virus Protection <br />• All computer workstations, laptops, and servers must be protected from viruses using up- <br />to-date antivirus software. Users may not alter their systems configuration or take other <br />steps to defeat virus protection devices or systems. All files on removable media must be <br />scanned for viruses prior to installation onto or access from City computer equipment. <br />Any files suspected or known to contain viruses must be immediately reported to the IT <br />department for proper handling. <br />Wireless Access <br />• Unauthorized wireless access into the City"s computer network is strictly prohibited. <br />Wireless access is defined as, but not limited to, 802.11 (Wi-Fi), Bluetooth, WiMax, and <br />cellular technologies. Users may not attempt to scan, connect to, or install any wireless <br />computing device on City equipment or property. Wireless access must be authorized <br />and configured by the City"s IT department. Any authorized wireless access must utilize <br />standards -based encryption, and conform to adopted security practices as governed by <br />LOGIS and/or state and federal government guidelines. <br />Version: 2006August8 , Draft Revision December 2011 9 <br />