Utah Administrative Code
Topic - Technology Services
Title R895 - Technology Services
Rule R895-7 - Acceptable Use of Information Technology Resources
Section R895-7-4 - Employee and Management Conduct
Universal Citation: UT Admin Code R 895-7-4
Current through Bulletin 2024-18, September 15, 2024
(1) Providing IT resources to an employee does not imply an expectation of privacy. Agency management may:
(a) View, authorize access to, and disclose
the contents of electronic files or communications, as required for legal,
audit, or legitimate state operational or management purposes;
(b) Monitor the network or email system
including the content of electronic messages, including stored files,
documents, or communications as are displayed in real-time by employees, when
required for state business and within the officially authorized scope of the
person's employment.
(2) An employee may engage in incidental and occasional personal use of IT resources provided that such use does not:
(a)
Disrupt or distract the conduct of state business due to volume, timing, or
frequency;
(b) Involve
solicitation;
(c) Involve
for-profit personal business activity;
(d) Involve actions, which are intended to
harm or otherwise disadvantage the state; or
(e) Involve illegal and/or activities
prohibited by this rule.
(3) An employee shall:
(a) comply with the Government Records Access
and Management Act, as found in Section
63G-2-101 et seq., Utah
Code, when transmitting information with state provided IT resources.
(b) Report to agency management any computer
security breaches, or the receipt of unauthorized or unintended
information.
(4) While using state provided IT resources, an employee may not:
(a) Access private, protected or controlled
records regardless of the electronic form without data owner
authorization;
(b) Divulge or make
known his/her own password(s) to another person;
(c) Distribute offensive, disparaging or
harassing statements including those that might incite violence or that are
based on race, national origin, sex, sexual orientation, age, disability or
political or religious beliefs;
(d)
Distribute information that describes or promotes the illegal use of weapons or
devices including those associated with terrorist activities;
(e) View, transmit, retrieve, save, print or
solicit sexually-oriented messages or images;
(f) Use state-provided IT resources to
violate any local, state, or federal law;
(g) Use state-provided IT resources for
commercial purposes, product advertisements or "for-profit" personal
activity;
(h) Use state-provided IT
resources for religious or political functions, including lobbying as defined
according to Section
36-11-102,
Utah Code, and rule R623-1;
(i)
Represent oneself as someone else including either a fictional or real
person;
(j) Knowingly or recklessly
spread computer viruses, including acting in a way that effectively opens file
types known to spread computer viruses particularly from unknown sources or
from sources from which the file would not be reasonably expected to be
connected with;
(k) Create and
distribute or redistribute "junk" electronic communications, such as chain
letters, advertisements, or unauthorized solicitations;
(l) Knowingly compromise the confidentiality,
integrity or availability of the State's information resources.
(5) Once agency management determines that an employee has violated this rule, they may impose disciplinary actions in accordance with the provisions of DHRM rule R477-11-1.
Disclaimer: These regulations may not be the most recent version. Utah may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google
Privacy Policy and
Terms of Service apply.