Page 221 - Personnel Policy and Procedures Manual
P. 221
• Posting anything, make sure that you know how [?] it in case you subsequently
discover that it is [?] or misinformed. In addition, before posting in to Usenet
newsgroup, read the appropriate guidelines, Usenet users, and read some of the
messages already there so you can be sure you have not misjudged the
newsgroup’s subject or purpose.
• Always assume that everyone in the entire world can read what you are posting,
that permanent copies will be kept at several sites, and that you will be expected
to take full responsibility for everything you say. Do not post anything that you
would not want to see quoted in a major newspaper.
• Remember that newsgroups are not confined to the United States. You will
sometimes see postings from other countries in their native languages, and you
will sometimes see postings from senior professionals in their fields.
Q. Users shall not utilize any electronic mail services other than those maintained by Augusta,
Georgia’s Information Technology Department.
1. You are prohibited from using other mail services such as AOL, Yahoo, Hot Mail, Mail
City, MSN, etc. These types of servers cause several problems including (but not limited
to): a lack of security and increased bandwidth usage. Interacting with a single piece of
email on a remote mail service can take up as much as seven (7) times the normal bandwidth
used by interacting with the local mail server(s). This means the network traffic could be
slowed down unnecessarily.
R. Data which is exempted from disclosure under the Freedom of Information Act (Public Law
93-502) or whose disclosure is forbidden by the Privacy Act (Public Law 93-579) will not be
transmitted over the Internet network unless encrypted.
1. Logon IDs and passwords are frequently classified as sensitive information.
S. Firewall compromise would be potentially disastrous to subnet security. For this reason,
Augusta, Georgia will, as far as is practical, adhere to the below listed stipulations when
configuring and using firewalls:
1. Limit firewall accounts to only those absolutely necessary, such as the administrator. If
practical, disable network logins.
2. Use smartcard or authentication tokens to provide a much higher degree of security than
that provided by simple passwords. Challenge-response and one-time password cards are
easily integrated with most popular systems.
3. Remove compilers, editors, and other program development tools from the firewall
system(s) that could enable a cracker to install Trojan horse software or backdoors.
4. Do not run any vulnerable protocols on the firewall such as TFTP, NIS, NFS, UUCP.
5. Consider disabling finger command. The finger command can be used to leak valuable user
information.
6. Consider not using the e-mail gateway commands (EXPN and VFRY) which can be used
by crackers to probe for user addresses.
7. Do not permit loopholes in firewall systems to allow friendly systems or users special
entrance access. The firewall should not view any attempt to gain access to the computers
behind the firewall as friendly.
8. Disable any feature of the firewall that is not needed, including other network access, user
shells, applications, and so forth.
9. Turn on full logging at the firewall and read the logs weekly at a minimum.
Section 1200.002 Two-Way Radios
A. Two-way radios (“Radios”) will be utilized for Official Business Only.
B. No profanity will be transmitted on any radio.
All Rights Reserved – As approved by the Commission on 05-07-2019 220 | P a g e