New Mexico Administrative Code
Title 1 - GENERAL GOVERNMENT ADMINISTRATION
Chapter 12 - INFORMATION TECHNOLOGY
Part 10 - INTERNET, INTRANET, EMAIL AND DIGITAL NETWORK USAGE
Section 1.12.10.9 - PROHIBITED INTERNET USE

Universal Citation: 1 NM Admin Code 1.12.10.9

Current through Register Vol. 35, No. 18, September 24, 2024

State IT resources shall not be used for anything other than official state business unless otherwise specifically allowed by the agency head or as permitted under Section 1.12.10.10 NMAC.

A. No software licensed to the state nor data owned or licensed by the state shall be uploaded or otherwise transferred out of the state's control without explicit authorization from the agency head.

B. IT resources shall not be used to reveal confidential or sensitive information, client data, or any other information covered by existing state or federal privacy or confidentiality laws, regulations, rules, policies, procedures, or contract terms. Users who engage in the unauthorized release of confidential information via the state's IT resources, including but not limited to newsgroups or chat rooms, will be subject to sanctions in existing policies and procedures associated with unauthorized release of such information.

C. Users shall respect the copyrights, software, licensing rules, property rights, privacy, and prerogatives of others, as in any other business dealings.

D. Users shall not download executable software, including freeware and shareware, unless it is required to complete their job responsibilities.

E. Users shall not use state IT resources to download or distribute pirated software or data, including music or video files.

F. Users shall not use state IT resources to deliberately propagate any malicious code.

G. Users shall not use state IT resources to intentionally disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of the state's IT resources.

H. Unauthorized dial-up access to the internet is prohibited from any device that is attached to any part of the state's network. The state's IT resources shall not be used to establish connections to non-state internet service providers without prior authorization in writing by the office of the chief information officer or the state chief information technology security officer.

I. Users shall not access, store, display, distribute, edit, or record sexually explicit or extremist material using state IT resources.

(1) In agencies or offices where the display or use of sexually explicit or extremist materials falls within legitimate job responsibilities, an agency head may exempt a user in writing from the requirements of this subsection. The agency issuing the exemption letter shall keep the letter on file for as long as the user is employed by, has a contract with, or otherwise provides services to the agency.

(2) The incidental and unsolicited receipt of sexually explicit or extremist material, such as might be received through email, shall not constitute a violation of this section, provided that the material is promptly deleted and neither stored nor forwarded to other parties.

J. Users are prohibited from accessing or attempting to access IT resources for which they do not have explicit authorization by means of user accounts, valid passwords, file permissions or other legitimate access and authentication methods.

K. Users shall not use state IT resources to override or circumvent any security mechanism belonging to the state or any other government agency, organization or company.

L. Users shall not use state IT resources for illegal activity, gambling, or to intentionally violate the laws or regulations of the United States, any state or local jurisdiction, or any other nation.

Disclaimer: These regulations may not be the most recent version. New Mexico may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.