Page 221 - Personnel Policy and Procedures Manual
P. 221

•  Posting anything, make sure that you know how [?] it in case you subsequently
                                 discover that it is [?] or misinformed. In addition, before posting in to Usenet
                                 newsgroup, read the appropriate guidelines, Usenet users, and read some of the
                                 messages  already  there  so  you  can  be  sure  you  have  not  misjudged  the
                                 newsgroup’s subject or purpose.
                              •  Always assume that everyone in the entire world can read what you are posting,
                                 that permanent copies will be kept at several sites, and that you will be expected
                                 to take full responsibility for everything you say. Do not post anything that you
                                 would not want to see quoted in a major newspaper.
                              •  Remember that newsgroups are not confined to the United States. You will
                                 sometimes see postings from other countries in their native languages, and you
                                 will sometimes see postings from senior professionals in their fields.
               Q.  Users shall not utilize any electronic mail services other than those maintained by Augusta,
                   Georgia’s Information Technology Department.
                  1.  You are prohibited from using other mail services such as AOL, Yahoo, Hot Mail, Mail
                      City, MSN, etc. These types of servers cause several problems including (but not limited
                      to): a lack of security and increased bandwidth usage. Interacting with a single piece of
                      email on a remote mail service can take up as much as seven (7) times the normal bandwidth
                      used by interacting with the local mail server(s). This means the network traffic could be
                      slowed down unnecessarily.
               R.  Data which is exempted from disclosure under the Freedom of Information Act (Public Law
                   93-502) or whose disclosure is forbidden by the Privacy Act (Public Law 93-579) will not be
                   transmitted over the Internet network unless encrypted.
                   1.  Logon IDs and passwords are frequently classified as sensitive information.
               S.  Firewall  compromise  would  be  potentially  disastrous  to  subnet  security.  For  this  reason,
                   Augusta,  Georgia  will,  as  far  as  is  practical,  adhere  to  the  below  listed  stipulations  when
                   configuring and using firewalls:
                   1.  Limit firewall accounts to only those absolutely necessary, such as the administrator. If
                       practical, disable network logins.
                   2.  Use smartcard or authentication tokens to provide a much higher degree of security than
                       that provided by simple passwords. Challenge-response and one-time password cards are
                       easily integrated with most popular systems.
                   3.  Remove  compilers,  editors,  and  other  program  development  tools  from  the  firewall
                       system(s) that could enable a cracker to install Trojan horse software or backdoors.
                   4.  Do not run any vulnerable protocols on the firewall such as TFTP, NIS, NFS, UUCP.
                   5.  Consider disabling finger command. The finger command can be used to leak valuable user
                       information.
                   6.  Consider not using the e-mail gateway commands (EXPN and VFRY) which can be used
                       by crackers to probe for user addresses.
                   7.  Do not permit loopholes in firewall systems to allow friendly systems or users special
                       entrance access. The firewall should not view any attempt to gain access to the computers
                       behind the firewall as friendly.
                   8.  Disable any feature of the firewall that is not needed, including other network access, user
                       shells, applications, and so forth.
                   9.  Turn on full logging at the firewall and read the logs weekly at a minimum.


            Section 1200.002  Two-Way Radios


               A.  Two-way radios (“Radios”) will be utilized for Official Business Only.
               B.  No profanity will be transmitted on any radio.



               All Rights Reserved – As approved by the Commission on 05-07-2019                   220 | P a g e
   216   217   218   219   220   221   222   223   224   225   226