Laserfiche WebLink
P. Information Technology Policy <br /> Producing,exchanging,and retrieving information electronically by taking advantage of computer technology <br /> present valuable opportunities for the City of Batesville. While employees are encouraged to use this technology, <br /> its use carries important responsibilities. <br /> Hardware(including but not limited to computers,computer systems, laptop computers,and electronic media <br /> equipment,printers, networking equipment,fax or facsimile machines, monitors,phone and VOIP equipment, <br /> etc.),software(including but not limited to computer accounts,voice mail,networks,electronic mail(E-mail), <br /> Internet and World Wide Web access connections,etc.)at the City of Batesville are provided for business related <br /> use by the city employees. It is the responsibility of the employees to see that these Information Technology and <br /> Internet of Things(IoT)systems are used in an efficient,ethical,and lawful manner. <br /> The use of information Technology systems is a privilege extended by the City of Batesville and may be withdrawn <br /> at any time. An employee's use of these systems may be suspended immediately upon the discovery of a possible <br /> violation of these policies. <br /> Information Technology Access Control Policy <br /> The City of Batesville maintains access control both physically and digitally for employees and users,including <br /> vendors,based on access level,duty requirement,job function,or responsibilities. This access control is audited <br /> regularly for employee and user changes to preserve and protect the integrity and security of the City of Batesville. <br /> Potential physical access control systems might include,but are not limited to,security gate or pin pad door locks <br /> including keypad entry systems. <br /> New employees will be set up with Human Resources and Payroll and subsequent access control accounts will be <br /> created through the Information Technology department. Once the user has left employment or has been <br /> terminated,the access control account will be disabled. <br /> Potential digital access control systems might include,but are not limited to any user account with password. <br /> Privileged or elevated access can only be provided by the Information Technology department and if only if the <br /> digital access control allows it. The Information Technology department can revoke this administrator access <br /> when privileged access is no longer necessary. <br /> Password sharing and reuse/overuse is a security risk and not recommended. Any password that does not meet <br /> complexity requirements is insecure. Any password that is reused or used on another account is insecure,no <br /> matter how complex it is. By reusing or sharing passwords,you allow others the ability to access your account(s) <br /> whether onsite or off. This also increases the chance for account compromise and vulnerability for a cyberattack. <br /> Ultimately,you may potentially lose control of or access to any and/or all accounts associated with that password. <br /> Information Technology Continuity Policy <br /> The purpose of the Information Technology Continuity Policy is to plan for continuation of the city's Information <br /> Technology in the event of a disruption or a disaster. This policy will be amended and expanded on as it is <br /> reviewed on an annual basis. For complete details on the current Information Technology Continuity Policy, please <br /> see the Information Technology department for an up-to-date document. <br />