Laserfiche WebLink
0 <br />boor I8 <br />TECHNOLOGY USE POLICY <br />1.0 PURPOSE <br />This policy covers the use of all technology resources belonging to the County of Lee. It <br />includes, but is not limited to pagers, radios, all computer systems of any size and <br />function and their attached peripherals, phones, cellular phones, faxes, voice mail <br />systems, e-mail systems, network resources and Internet resources. All technology <br />resources, owned by the County of Lee, are in place to enable the County to provide its <br />services in a timely and efficient manner. This is the primary function of these resources <br />and any activity or action that interferes with this purpose is prohibited. Because <br />technology systems are constantly evolving, the County of Lee requires its employees to <br />use a common sense approach to the rules set forth below, complying not only to the <br />letter, but also to the spirit, of this policy. <br />2.0 DEFINITIONS <br />1. E-mail: The distribution of messages, documents, files, software, or images by <br />electronic means over a phone line or a network connection. This includes internal e- <br />mail, external e-mail, and Internet e-mail. <br />2. Internet and the World Wide Web: A worldwide network of computer servers <br />connected by phone lines that allow access to the public through a special language <br />(HyperText Markup Language or HTML) and a special protocol (HyperText Transfer <br />Protocol or HTTP). <br />3.0 POLICY <br />1. Information Access and Ownership: All technology resources and all information <br />transmitted by, received from, or stored on the County of Lee systems are the property of <br />the County of Lee and as such, are subject to inspection by County officials. The County <br />reserves the right for business purposes to enter, review, and monitor the information on <br />all systems, including voice mail, electronic mail and information stored on computer <br />systems or media, without advance notice. This might include investigating theft', <br />unauthorized disclosure of confidential business or proprietary information, personal <br />abuse of the system or monitoring workflow or productivity. <br />G2G <br />