araphoe county logo
File #: 21-586    Version: 1
Type: Presentation Status: Agenda Ready
File created: 8/12/2021 In control: Board of County Commissioners Business Meeting
On agenda: 8/30/2021 Final action:
Title: Updated Computer Usage Policy, renamed Acceptable Use Policy for Computers and Related Technology
Attachments: 1. Board Summary Report, 2. Acceptable Use Policy for Computers and Related Technology - August 2021
Date Ver.Action ByActionResultAction DetailsMeeting DetailsAudio/Video
No records to display.
To: Board of County Commissioners

Through: N/A

Prepared By:
prepared
David Bessen, Director, Information Technology
end

presenter
Presenter: David Bessen, Information Technology
end

Subject:
title
Updated Computer Usage Policy, renamed Acceptable Use Policy for Computers and Related Technology
end

Purpose and Request:
recommended action
The purpose of this Board Summary Report is to present to the Board of County Commissioners for their approval an updated Computer Usage Policy, now renamed to the Acceptable Use Policy for Computers and Related Technology (AUP).
end

Background and Discussion: The current Computer Usage Policy was developed in 2008 and amended in April 2011. Since The development of the current policy, technology has changed, technology vendors' business models have changed, regulations about privacy have been created, and cybersecurity has become a greater concern to computer users and the County. Information Technology has worked over the past year to update the computer policy, removing references to mainframe computing, terminals, pages, and the like. The policy has been updated to reflect the needs of technology and computer in 2021. These changes include definitive statements about the ownership and usage of County Computing Resources and requirements for securing cell phones and computers. The new policy also discusses unacceptable uses as well as prohibited uses for computing resources with the overall goal of making sure that staff understand why they have been issued County Computing Resources and how they are to be properly used and secured. The policy also discusses data retention and how data, especially data containing Personal Identifying Information, is to be deleted from devices when it is no longer needed or when the retention period has expired, whichever comes first. Finally, as technology has evolved in the past decade and technology investments by the County are of significant proportions, the policy di...

Click here for full text