Basic Definitions
User Responsibilities
Internet and Email Usage
Security Measures
Policy Enforcement
100

This term refers to a portable computing device, often with internet access and applications.

What is a smartphone?

100

Users must report any damage, loss, or theft of ICT devices to whom

Who is the department supervisor/manager or the IT Department?

100

The Authority's internet and email systems should primarily be used for what purpose?

What is executing the Authority's business?

100

Users must use what to secure access to information on assigned equipment?

What are passwords?

100

Violations of this policy may result in disciplinary action up to and including what?

What is termination of employment?

200

This term refers to the Authority’s internal communications network which uses the Internet technology.

What is the Intranet?

200

Users are responsible for securing their login information by doing this when leaving a device unattended.

What is logging off?

200

Users should not have any expectation of what regarding their internet usage?

What is privacy?

200

The Authority's desktop configurations may only be changed by whom

Who are IT Department staff?

200

This type of action will be treated very seriously and is likely to result in summary dismissal.

What is ICT Policy Violation?

300

This refers to an unauthorized email that is sent to a large group, typically containing junk information.

What is spam?

300

Users must change their passwords at least every how many days?

What is ninety days?

300

Personal use of the internet is permitted but should normally be limited to when?

What is non-working hours?

300

This type of malware is designed to damage files on a device.

What is a virus?

300

Users may face this when found engaging in illegal activities with the Authority's resources

What is facing law enforcement?

400

This term is used for misleading information shared online, often disguised as credible news.

What is fake news?

400

This action will be taken by by the IT Department if unauthorized software is discovered on a user's device.

What is immediate removal?

400

This type of content is strictly prohibited from being distributed via the Authority’s email

What are obscene or offensive materials?

400

Remote access to the Authority's information system requires this from the Manager, Information Technology.

What is authorization?

400

What document must be adhered to regarding the use of ICT resources at the Authority?

What is the ICT usage policy?

500

This refers to a computer system or set of components for collecting and processing electronic files

What is an information system?

500

Users are prohibited from using this type of access for any illegal activities or outside business interests.

What is remote access?

500

This must be included in all emails sent from the Authority to provide necessary legal protection.

What is an email disclaimer?

500

Biometric and this method may be provided as optional login credentials by the IT Department. .

What is multi-factor authentication?

500

Any downloaded software falls under the control of whom?

Who is the Authority?