Acceptable Use Policy
Examples of unacceptable use include but are not limited to:
- Using the Department systems to encourage any illegal, fraudulent, abusive, or other activities that materially interfere with the business or activities of the Department or the public.
- Attempting to bypass or break any security mechanism on any of the Department systems or using the Department systems in any other manner that poses a material security or service risk to the Department or the public.
- Allowing any other organization or individual to use the granted user ID and password for accessing any Department system in any way.
- Using another organization or individual’s user ID and password to access any Department system in any way.
- Reverse-engineering the Department systems in order to find limitations, vulnerabilities, or evade filtering capabilities.
- Launching or facilitating, whether intentionally or unintentionally, a denial of service attack on any of the Department systems or any other conduct that materially and adversely impacts the availability, reliability, or stability of the Department systems.
- Transmitting any material that contains viruses, Trojan horses, spyware, worms or any other malicious, harmful, or deleterious programs.
- Using the Department systems to harvest or otherwise collect information about individuals, including email addresses or phone numbers, without their explicit consent or under false pretenses.
- Using the Department systems in connection with fraudulent activity.
- Accessing data, a server or an account for any purpose other than conducting authorized business.
- Violating or facilitating the violation of any local, state, federal, or foreign law or regulation, including, but not limited to, laws and regulations regarding the transmission of data or software communications.