- Understand that access if for authorized users only and access is monitored by county personnel to identify unusual usage patterns or activity.
- Have read and accept current county policies and guidelines related to information and data security, and regarding storing and distribution of confidential and sensitive information. Policies and guidelines are subject to change.
- Ensure that your device connected to county network is properly secured with current operating system patches and up-to-date antivirus software.
- Accept to immediately report to your manager AND the Information Technology Service Desk, any incident or suspected incidents of unauthorized access or disclosure of County network or data / information resources, or loss of device used for county business