COMPUTER USAGE AND NETWORK ACCESS POLICY Sample Clauses

COMPUTER USAGE AND NETWORK ACCESS POLICY. In order to comply with Ohio law and to ensure the security and integrity of AGO network resources (e.g. routers, switches, servers, workstations, printers, etc.), the User shall: Acknowledge he/she has been provided with and will comply with the provisions of this Policy; Utilize the AGO’s network resources and any information/data provided therefrom for authorized use only; Use all computer resources, including, but not limited to, equipment, hardware, software, documentation, and data solely for AGO business; Immediately notify the AGO of any proven or suspected unauthorized disclosure or exposure of any AGO data or of information or identity theft; Immediately notify the AGO if a Security Event has occurred or if suspicion of a Security Event has been identified. A Security Event includes, but is not limited to: Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, Hack attempts, Malware, Changes in security infrastructure, System failures, Compromised user accounts, and Lost/stolen laptop or media. Promptly notify the AGO of the date of separation if User leaves the employer or if access to AGO networks, applications, systems, and/or AGO data is no longer required. Access to the AGO network may be rescinded for failure to provide such notice; Take all reasonable precautions to prevent the dissemination of User’s credentials by any means, including, but not limited to, not sharing the User’s username and password, not writing down the username and password, etc.;
COMPUTER USAGE AND NETWORK ACCESS POLICY. In order to comply with Ohio law and to ensure the security and integrity of AGO network resources (e.g. routers, switches, servers, workstations, printers, etc.), the User shall: • Acknowledge he/she has been provided with and will comply with the provisions of this Policy; • Utilize the AGO’s network resources and any information/data provided therefrom for authorized use only; • Use all computer resources, including, but not limited to, equipment, hardware, software, documentation, and data solely for AGO business; • Immediately notify the AGO of any proven or suspected unauthorized disclosure or exposure of any AGO data or of information or identity theft; • Immediately notify the AGO if a Security Event has occurred or if suspicion of a Security Event has been identified. A Security Event includes, but is not limited to: o Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, o Hack attempts, o Malware, o Changes in security infrastructure, Exhibit AGO Contract #: o System failures, o Compromised user accounts, and o Lost/stolen laptop or media. • Promptly notify the AGO of the date of separation if User leaves the employer or if access to AGO networks, applications, systems, and/or AGO data is no longer required. Access to the AGO network may be rescinded for failure to provide such notice; • Take all reasonable precautions to prevent the dissemination of User’s credentials by any means, including, but not limited to, not sharing the User’s username and password, not writing down the username and password, etc.; • Create a password in compliance with the AGO password criteria set forth below. The AGO reserves the right to change the password criteria from time to time. Compliance with the AGO password criteria will be enforced via automated password authentication or public/private keys with strong pass-phrases. The AGO password criteria are as follows: o Minimum 12 characters, o Must include 3 of the 4: a-z, A-Z, 0-9, and special characters, o Passwords will require being reset based on level of access at the AGO’s discretion, o Passwords must be kept securely by the account owner, and never be shared, o Passwords must not contain sequences 01, 123, abc, etc., o Passwords must not contain properly spelled dictionary words, and o Passwords must not be directly identifiable to the user (e.g. social security number, date of birth, spouse’s name, username, etc.). Password history will...