This term refers to a portable computing device, often with internet access and applications.
What is a smartphone?
Users must report any damage, loss, or theft of ICT devices to whom
Who is the department supervisor/manager or the IT Department?
The Authority's internet and email systems should primarily be used for what purpose?
What is executing the Authority's business?
Users must use what to secure access to information on assigned equipment?
What are passwords?
Violations of this policy may result in disciplinary action up to and including what?
What is termination of employment?
This term refers to the Authority’s internal communications network which uses the Internet technology.
What is the Intranet?
Users are responsible for securing their login information by doing this when leaving a device unattended.
What is logging off?
Users should not have any expectation of what regarding their internet usage?
What is privacy?
The Authority's desktop configurations may only be changed by whom
Who are IT Department staff?
This type of action will be treated very seriously and is likely to result in summary dismissal.
What is ICT Policy Violation?
This refers to an unauthorized email that is sent to a large group, typically containing junk information.
What is spam?
Users must change their passwords at least every how many days?
What is ninety days?
Personal use of the internet is permitted but should normally be limited to when?
What is non-working hours?
This type of malware is designed to damage files on a device.
What is a virus?
Users may face this when found engaging in illegal activities with the Authority's resources
What is facing law enforcement?
This term is used for misleading information shared online, often disguised as credible news.
What is fake news?
This action will be taken by by the IT Department if unauthorized software is discovered on a user's device.
What is immediate removal?
This type of content is strictly prohibited from being distributed via the Authority’s email
What are obscene or offensive materials?
Remote access to the Authority's information system requires this from the Manager, Information Technology.
What is authorization?
What document must be adhered to regarding the use of ICT resources at the Authority?
What is the ICT usage policy?
This refers to a computer system or set of components for collecting and processing electronic files
What is an information system?
Users are prohibited from using this type of access for any illegal activities or outside business interests.
What is remote access?
This must be included in all emails sent from the Authority to provide necessary legal protection.
What is an email disclaimer?
Biometric and this method may be provided as optional login credentials by the IT Department. .
What is multi-factor authentication?
Any downloaded software falls under the control of whom?
Who is the Authority?