Loading...
The URL can be used to link to this page
Your browser does not support the video tag.
Browse
Search
Address Info: 1150 O Street, P.O. Box 758, Greeley, CO 80632 | Phone:
(970) 400-4225
| Fax: (970) 336-7233 | Email:
egesick@weld.gov
| Official: Esther Gesick -
Clerk to the Board
Privacy Statement and Disclaimer
|
Accessibility and ADA Information
|
Social Media Commenting Policy
Home
My WebLink
About
20023285
NOTICE OF FINAL READING OF ORDINANCE Pursuant to the Weld County Home Rule Charter, Ordinance Number 2002-12 was introduced on first reading on November 13, 2002, and a public hearing and second reading was held on December 2, 2002. A public hearing and final reading was completed on December 23, 2002, with changes being made as listed below, and on motion duly made and seconded, was adopted. Effective date of said Ordinance is listed below. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners, located in the Weld County Centennial Center, 915 10th Street, Third Floor, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be accessed through the Weld County Web Page (www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. ORDINANCE NO. 2002-12 ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 2 ADMINISTRATION, CHAPTER 3 PERSONNEL, AND CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE EFFECTIVE DATE: January 1, 2003 BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: December 19, 2002 PUBLISHED: December 25, 2002, in the Tri-Town Farmer and Miner CHANGES MADE TO CODE ORDINANCE#2002-12 ON FINAL READING Amend Section 3-5-20.A.3. 3. When An who is required to care for a.rill member4 of the immediate family as r 44600:1**1,.wi#oi,ajr 'IL may use accumulated sick leave up to forty (40) hour3 !primly one (1,) illne33 or injury a maximum of`40 hours totalper 'Os' 4 ; I; ert la ✓ Cia 2002-3285 Affidavit of Publication NOTICE Of FINAL READING OF STATE OF COLORADO CImIRANCE County of Weld SS. Home ibRuleel Cho er. Ordinance Momber 2W2-I2 was introduced on first I A. Winkler Riesel of said County of Weld reading on November 13, being duly sworn,say that I am publisher of 2882,and a public hearing and second reading was held on December 2 2102. FARMER&MINER A public hearing and end reading was completed on that the same is a weekly newspaper of general December 23, 2002, with circulation was printed and published in the listed and oonomotion town of duly made and seconded. wasadopted.Effectwedate of said Ordinance k ested FREDERICK below. in said county and state that the notice of Any backup material. advertisement, of which the annexed is a true exhibits or information presdouslysubmitted copy has been published in said weekly Board oCounty newspaper for ONE consecutive weeks: that Commissioners concerning the notice was published in the regular and in me ante of the to g in the peen of ee Clerk d entire issue of every number of said newspaper the Board of County during theperiod and time ofpublication of said Commissioners, located e of CoWeltlCneory centennial in notice and in the newspaper proper and not in a Center.91510O3 Street.Third Floor, Greeley. Colorado. supplement thereof: that the first publication of between the hours of 8:X said notice was contained in the issue of said o.m.and 5.00 p.m..Menlo thru Friday, or may be newspaper bearing the date of DECFMBF,$ accessed through tnewelc 25th 2002. and the last publication thereof, in County Web Page (www co.wekr.co.u0.E-Ma the issue of said newspaper, bearing date, the messages sent to or day 25th DECEMBER.2002 that the said IndiNdualCornrriernermay not be Included In the case file. To verve reason of FARMER &MINER your E4Aolcous cadence intotheclNelN,please send has been published continuously and a copy to uninterruptedly during the period of at least charding@coweid.co.us. fifty-two consecutive weeks next prior to the ORDINANCE Na 2 .12 first issue thereof containing said notice or ORDINANCE TIRE: R1 THE advertisement above referred to: and that said MATTER OF REPEALING AND newspaper was at the time of each of the REENACTING. WITH AMENDMENTS CHAPTER 2 publications of said notice duly qualified for ADMINISTRATION.CwwER3 that purpose within the meaning of an act PERS O TEL AND CHAPTER entitled. "An Act Concerning Legal Notices, 9 THEwEL TION SERVICES 9 THEWELDCOUMVCODE Advertisements and Publications and the Fees of Printers and Publishers thereof,and to Repeal �DAMy 1.all Acts and Parts of Acts in Conflict with the BOARD OF COUNTY Provisions of this Act" approved April 7, 1921, CC•AMISMONERS and all amendments thereof,and particularly as NEID COI.LORADORAD ' O amended by an act approved, March 30, 1923, DATED:December 19.2032 - and an act approved May 13, 1931. CHANGES MADE TO CODE ORDINANCE E20D2-12 ON FINAL READING m r* f g Amend Sectbn 3-S20.A.3. 3. re der Mrpoyee Publiyhet emembes sMetre bran �:•� errenbenatMtmtmaate ramify as wooed under Subscribed and sworn to before me this FMtA)versa Or a e may tee 2Sh,day of DECEMBER,A,D..2002 eeeunyeterfeele etrw bfen,NRNmN.w'vrvere a 6 (� leave. a O nags bra I per yevaceamsealededs 4.3. �l. / Notary lernre. Public Published in The Former& Feiner Decade:en 2rp2-- P.O.BOX 125 FT.LUPTON. CO 80621 NOTICE OF SECOND READING OF ORDINANCE Pursuant to the Weld County Home Rule Charter, Ordinance Number 2002-12 was introduced on first reading on November 13, 2002, and a public hearing and second reading was held on December 2, 2002, with no change being made to the text of said Ordinance. A public hearing and third reading is scheduled to be held in the Chambers of the Board, First Floor Hearing Room, 915 10th Street, Greeley, Colorado 80631 on December 23, 2002. All persons in any manner interested in the next reading of said Ordinance are requested to attend and may be heard. Please contact the Clerk to the Board's Office at phone (970) 336-7215, Extension 4225, or fax (970) 352-0242, prior to the day of the hearing if, as a result of a disability, you require reasonable accommodations in order to participate in this hearing. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners, located in the Weld County Centennial Center, 915 10th Street, Third Floor, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be accessed through the Weld County Web Page (www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. ORDINANCE NO. 2002-12 ORDINANCE TITLE: IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 2 ADMINISTRATION, CHAPTER 3 PERSONNEL, AND CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE DATE OF NEXT READING: December 23, 2002, at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: December 6, 2002 PUBLISHED: December 11, 2002, in the Tri-Town Farmer and Miner Affidavit of Publication SE CO F OF O,D.MPC STATE OF COLORADO PuaucsCounty of Weld SS. Ho y au eWeldCoor etr Ortllnance Number 2002-12. I A. Winkler Riesel of said County of Weld being was introduced on first duly sworn,say that I am publisher of rearing on November 13. 2002 and a public hearing second reading was FARMER&MINER and at December 2 2002 that the same is a weekly newspaper of general wnhnochangebWtgmpde circulation was printed and published in the town of tottwleiart hewing A A art hewing and third reading IS actkettled FREDERICK t�,thecr ams in said county and state that the notice of advertisement,of Board. First Floor Hearing which the annexed is a true copy has been published in said Room. 915 10th Street, weekly newspaper for ONE consecutive weeks: that the December 23, 280631 on Darsons In 2ma Aler notice was sid published in the during and rioo issue i every f persons In any manner number of said newspaper in the the period and time of oferldtlnr ore publication pl ofm said notice and it the l proper and not re sold t Ordinance o and in a supplement the in that the first a news publication af said i may be to attend and notice was contained in the issue of said newspaper bearing may be head. the date of DECEMBER 11th 2002 and the last publication thereof,in the issue of said newspaper,bearing Please contact the Clerk to the Brad's Office t phone date,the day 11th DECEMBER.2002 that the said (970) 33°-7215, Extension 4225, or fox(970352-0242 paato the dty<f the hearing FARMER &MINER If.ce o result of a deObtllN. has been published continuously and uninterruptedly you require reasonable during the period of at least fifty-two consecutive Penick:ate bnsnadxfo ntlnt weeks next prior to the first issue thereof containing aten this heanq. said notice or advertisement above referred to: and My backup material, that said newspaper was at the time of each of the exhibits or information publications of said notice duly qualified for that Previously strained to the purpose within the meaning of an act entitled. "An Board of County ng Act Concerning Legal Notices, Advertisements and Mw Commissioners be Icy Publications and the Fees of Printers and Publishers In the office of the Clerk to thereof, and to Repeal all Acts and Parts of Acts in the Board of County Conflict with the Provisions of this Act" approved Commissioners,booted in April 7, 1921, and all amendments thereof, and the WeldCougq,Cettenuld Center.9151 TNra gppyy�((iiiic larly as amended by anact approved, March FI004 Greeley. 2 ,an an act a v May 1931 beta el nary a KO //// amo Friday.d Or Wade/ <i� thru Friday. Or may be (� County ce row the Weld age Publisher (vn w.eawec,coas).E-Mel messages sent to on n not clCjded N,prermay Subscribed and sworn to before me this 11th be dude In the case Net To ensure inclusion of day of DECEMBER, A,D- 2002 ��Maocar ps ire easeaerso o copy to a tl. a2@,.o.weld.co.us. OeBMANCB NO. 200212 ORDINANCE TIRE: IN THE Notary Public MATTER OF REPEALING AND REENACTING. WITH AMENDMENTS CHAPTER 2 ADMYel91RAliOt4 CHAPIER3 P.O.BOX 125 9 NP FE TI Sc�S, OF THE WELD COUNN CODE FT.LUPTON. CO 80621 DATE of NEXT READING: a December 21 2002 of 9:00 BMRDOF COUMYCOMMSSIONERS MELD COUPON'. v I[- COLORADO y d; Watt DecMbit&2002 JtRUMS In Ihe Pons 111 V'. . ; Ws December II.2032. ) —q-ou WELD COUNTY CODE ORDINANCE 2002-12 IN THE MATTER OF REPEALING AND REENACTING, WITH AMENDMENTS, CHAPTER 2 ADMINISTRATION, CHAPTER 3 PERSONNEL, AND CHAPTER 9 INFORMATION SERVICES, OF THE WELD COUNTY CODE BE IT ORDAINED BY THE BOARD OF COUNTY COMMISSIONERS OF THE COUNTY OF WELD, STATE OF COLORADO: WHEREAS, the Board of County Commissioners of the County of Weld, State of Colorado, pursuant to Colorado statute and the Weld County Home Rule Charter, is vested with the authority of administering the affairs of Weld County, Colorado, and WHEREAS, the Board of County Commissioners, on December 28, 2000, adopted Weld County Code Ordinance 2000-1, enacting a comprehensive Code for the County of Weld, including the codification of all previously adopted ordinances of a general and permanent nature enacted on or before said date of adoption, and WHEREAS, the Weld County Code is in need of revision and clarification with regard to procedures, terms, and requirements therein. NOW, THEREFORE, BE IT ORDAINED by the Board of County Commissioners of the County of Weld, State of Colorado, that certain existing chapters of the Weld County Code be, and hereby are, repealed and re-enacted, with amendments, and the various chapters are revised to read as follows. CHAPTER 2 ADMINISTRATION Add Section 2-2-140. Diversity Policy. A. Weld County Government will provide a welcoming environment where all individuals are respected, appreciated, included, and valued. Weld County recognizes the unique perspective and wide range of knowledge diversity affords us. Weld County is committed to learn from each other and understand that similarities and differences are what create a strong organization and community. B. Diversity is an inclusive term that includes all the differences which distinguish individuals and groups from each other. The mosaic of the people of Weld County brings a variety of backgrounds, style, perspectives, values, and beliefs as assets to the community. To appreciate diversity is to recognize that the sum of the different groups and individuals is a richer whole than the parts alone. Diversity includes, but is not limited to, race, color, age, disability, creed, religion, cultural background and experience. Diversity is integral to our success as an organization and community which will add to the splendor and desirability of Weld County as a place to live and work. C. Weld County expectations. 1. County employees and volunteers will understand and strive to follow stated County organizational values and mission statement. 2. The County workforce, public advisory boards, and committees will strive to have diverse representation. 3. County internal systems and policies will reflect commitment to diversity. Examples include hiring practices, selection criteria, recruitment processes, training, etc. 4. The County work place will be free from all illegal and inappropriate discrimination or harassment. 5. All County departments and offices will provide services to citizens and clients in a manner that is respectful and free from illegal or inappropriate discrimination or harassment. D. If Weld County's expectations as listed above are not met, the following procedures will apply. 1. Employee reports the problem to a responsible County official, such as a supervisor, elected official, department head, or the Director of Personnel/General Services. 2. The official receiving the report documents all information received and persons spoken to and notifies the Department of Personnel within twenty-four(24) hours of the alleged incident. 3. In cooperation with the requesting department, the Department of Personnel investigates, develops and retains documentation of all allegations and insures that appropriate corrective actions are taken, including disciplinary measures by the appropriate person when justified, to remedy all violations of this policy. 4. The Department of Personnel follows up within thirty (30) days to assure no further violations of the policy have occurred. E. County policies and internal systems will be monitored by all elected officials and department heads for compliance to this policy. F. Retaliation of any kind will not be tolerated. Add Section 2-5-30. Authorize Use of County-owned Heavy Equipment. A. Due to recent dry weather conditions and a mild, dry winter, prairie lands located in Weld County have become a high fire danger, emphasizing the need for a cooperative approach among citizens and private and public entities, to fight prairie fires which may occur on public and/or private lands. B. Because of the extreme danger to public and/or private lives and property, the Board of County Commissioners, by Resolution #2002-1582, approved June 17, 2002, authorized the use of Weld County motor graders or other heavy equipment operated by Weld County personnel to fight prairie fires on public or private lands in Weld County. 1. Use of the equipment shall be deemed necessary by the on-scene fire commander. 2. Weld County personnel necessary to operate the motor graders or heavy equipment shall be under the supervision and direction of the on-scene fire commander. Amend Section 2-12-10. Private use of County property. A. All personal property and computer software owned or leased by the County is to be used for job-related purposes only. Personal property includes, but is not limited to, motor vehicles, computers, telephones, copiers and facsimile machines. Employees who privately use personal property or computer software owned or leased by the County are subject to disciplinary action, up to and including discharge. To ensure that the use of personal property owned or leased by the County is consistent with this policy, authorized representatives of the County may monitor the use from time to time. B. All communications, digitally stored documents, and other forms of information transmitted by, created by, received by or sorted in electronic and/or telephonic communications systems owned or leased by the County are the property of the County. Employees do not have a right to privacy in such communications and information even if the information resides on privately owned devices. Delete Section 2-12-20. Electronic mail. (Incorporated into Chapter 9) CHAPTER 3 PERSONNEL Amend Section 3-3-10.A.3. Negligent or willful damage or waste of public property. This includes misuse of County property, equipment, vehicles or other materials for private gain, use or convenience and unauthorized use, possession or storage of County property. Amend Section 3-12-10. Confidential information. Because of the nature of County business, employees may have access to information of a confidential nature. This information should not be discussed except with authorized personnel. If any situation arises concerning confidential information in which an employee has a question, the employee should discuss it with his or her supervisor immediately. Misuse or disclosure of confidential information obtained in the course of County employment could result in personal legal liability and disciplinary action, up to and including termination from employment. Documents and copies generated in the course of County employment are the exclusive property of the County and are not to be used for personal use or retained in the possession of an employee. CHAPTER 9 INFORMATION SERVICES Repeal Article 3, Internet Acceptable Use Policy, in its entirety, and replace with the following: Section 9-3-10. General provisions. A. The Department of Information Services, in conjunction with the Information Services Governance Committee (ISGC), has taken the necessary steps to provide an Internet Acceptable Use Policy (IAUP) on acceptable use of the Internet by County agencies and departments. Any County agency or department eligible for, and having funding for, the Weld County network or the Internet will be provided with access under the terms and conditions of this policy. B. The objective of this policy is to minimize the risks to business functions and government-owned assets, and to assure adherence to regulatory and legal requirements and enterprise policies when County resources are used to access public networks. C. Violation of this policy may be grounds for having access to the Weld County network and/or Internet services revoked. Continued abuse of this policy could lead to employee disciplinary actions including termination of employment. D. This policy applies to any activity performed from a Weld County owned asset and to all Weld County employees or contracted agents of Weld County performing work activities on behalf of Weld County. Work activities conducted from remote devices or even personally owned devices are subject to this policy except that this policy does not apply to an employee performing activities solely as a member of the public and without the use of County-owned assets. The policy applies to electronic communications on Weld County Networks and public networks including, but not limited to, the following: 1. Electronic Communications: a. E-mail. b. File transfer. c. Remote login. d. Remote control software. e. Discussion groups/bulletin boards. f. World Wide Web, Gopher, web servers, wide area information servers (WAIS). g. Personal computing devices. h. Digital type devices that can communicate with personal computers or public networks. 2. Public Networks: a. Internet. b. America Online, CompuServe, Prodigy, etc. c. Online search services such as Dialog, Paperchase, etc. d. Dialup bulletin board systems. e. Weld County network. Sec. 9-3-20. Introduction. Weld County network access and Internet access can provide significant business benefits for County government agencies. However, there are also significant legal, security and productivity issues related to how the Internet is used. Examples of such issues are listed below. A. The potential to receive computer viruses from Internet information sources. B. The potential for someone to eavesdrop on data or correspondence which is exchanged via the Internet. C. The potential for a County government employee, through the content of his or her Internet exchanges, to impugn the reputation of local government officials and thereby invite civil liabilities. D. The potential for County government employees to be enticed by the vast social and informational forums of the Internet into spending significant work time on nonproductive activities. E. If County government agencies or any person using an Internet connection sufficiently upsets other Internet users, the connection could be flooded with traffic in protest, thus negatively impacting the availability of the service for true business purposes. F. Outside access to local databases can overwhelm the processing power of the local network. Sec. 9-3-30. Definitions. The following words, when used herein, shall have the definitions contained below: Data custodian means an owner or person responsible for the data. Electronic mail (E-mail) means a widely used network application in which mail messages are transmitted electronically between end users over various types of networks using various network protocols. Gopher or Internet gopher means a distributed document delivery service. It lets users access various types of data residing on multiple hosts. This is done by presenting the user menu documents and by using a client-server communications model. HTTP means Hyper Text Transport Protocol. Internet means the world's largest internetwork, connecting thousands of networks worldwide and having a "culture" that focuses on simplicity, research and standardization based on real- life use. IP means Internet Protocol, the network layer for the TCP/IP Protocol Suite. It is a connectionless, best-effort switching protocol that offers a common layer over dissimilar networks. Public Network means commercial, private or Weld County owned networks which establish the technical infrastructure that allow computer-type devices to communicate with one another and share data and peripheral devices. These networks usually provide access to the Internet. Usenet means the thousands of topically named newsgroups, the computer which run them and the people who read and submit Usenet news. Wide Area Information Servers means a distributed information service that offers natural language input and indexed searching, and lets the results of initial searches influence future searches. W W W means the World Wide Web, a project that merges information retrieval and hypertext to make an easy-to-use, powerful, global, academic information system. Section 9-3-40. Guidelines. The purpose of the following is to provide a short checklist of procedures which should be followed while accessing public networks through company resources. These guidelines govern both County employees, contractors and anyone working via County direction. For more specific and detailed policy statements, refer to the Sections that follow in this Article. A. Use of County resources for accessing public networks is for work-related purposes only. B. Users shall act responsibly when participating in discussions over a public network. They shall be polite and not get abusive in their messages to others. Users should remember that defamation can occur due to malicious use of the Internet. C. Users shall not use public networks inappropriately. The use may be monitored and access may be revoked at any time for inappropriate conduct. D. Users shall determine and abide by the policies and procedures of any external network accessed. Each user is expected to be a responsible network citizen (Netiquette). E. Downloading of any software programs or applications including, but not limited to, shareware, freeware, demo's, etc., is strictly prohibited. All such requests must go through the Department of Information Services. F. When downloading non-application software, the user shall check for copyright or licensing agreements. If there is any doubt, the user shall not copy the software. If a licensing agreement exists or the user must pay for the information, it must first be approved by the Information Services Governance Committee. G. To minimize network traffic, no automatic requests for information on the Internet and applications that generate constant network traffic, e.g., Internet radio stations, channels, music sharing services, etc. should always be avoided. H. The generation of excessive Internet e-mail shall be avoided. I. The target directory must be scanned with anti-virus software before and after downloading any files from the Internet. As most downloads are in a "zipped" format, scanning the files after"unzipping" is necessary. It is the user's responsibility to ensure that the downloaded files are free from known viruses. J. Users shall not use software (network "probes") which attempts to discover properties about the public network or computing resources connected to that network. K. Users should be aware that any data transferred via the Internet is prone to be monitored and/or intercepted by unintended destinations. L. All County e-mail is a public record and may be subject to public inspection. M. Even if software allows configuration changes to networks, computers, and other hardware or software, actual changes should only be made by members of the Information Services Department. Section 9-3-50. Roles and responsibilities. A. The role of the Department of Information Services is as follows: 1. Establish Internet Acceptable Use Guidelines. 2. Apprize elected officials/department heads of any continued abuse. It is specifically NOT the role of the Department of Information Services to act as the "Net Police." The Department of Information Services cannot be held responsible for nonprofessional usage, improper humor or the moderation and monitoring of e-mail or Usenet groups. Disciplinary actions for sexual harassment and hostile work environment violations and for use of County property for personal purposes are defined by the County policy contained in Chapter 2 of this Code. B. The role of the Information Services Governance Committee is as follows. 1. Review and approve Internet Acceptable Use Guidelines. 2. Advocate adherence to the policy. C. The role of the County departments and agencies is as follows. 1. Act as the authorizing agent that allows access to the Internet. 2. Ensure guidelines are followed 3. Provide for training of employees who need access. 4. Budget for service and associated training, if needed. 5. Establish its own data sensitivity policy. Section 9-3-60. Protection of proprietary information. A. Data sensitivity. Persons transmitting enterprise data over public networks should ensure that the data is processed according to its level of sensitivity by using the definitions and guidelines which follow. After having read the following sections, if the user is unsure of how to properly handle specific data, he or she should contact the information asset owner (data custodian)for guidance. B. Data sensitivity definitions. 1. Confidential data. a. Shows specific strategies and major directions. b. Confidential information as defined by local, state or federal laws, rules or regulations, e.g., Social Services data. c. Data of other businesses/persons with respect to which the enterprise is under an obligation of confidentiality. 2. Restricted data. a. Working files not completed for public dissemination. b. Is of such a nature that unauthorized disclosure would be against the best interest of the County. c. Personnel data. d. Data with restricted use or access per local, state or federal laws, rules or regulations, e.g., criminal justice data. 3. Proprietary data: All enterprise-related information requiring baseline security protection, but failing to meet specified criteria for higher classifications. a. Organizational policies and procedures that are internal by nature. b. Internal announcements. 4. Unclassified data: Information which requires no security protection. a. Public information. b. Public announcements. c. Internal correspondence and documentation which do not merit a security classification. C. Data sensitivity processing guidelines. Table 9.1 reflects the guidelines to be used in processing sensitive data: Table 9.1 Data Sensitivity Processing Guidelines Confidential Restricted Proprietary Unclassified Encrypted Encrypted Owner defines High volume permissions Use other alternatives (mail carrier) Owner Owner defines High volume defines permissions Use other permissions alternatives (mail carrier) Marked High volume confidential Use other alternatives (mail carrier) High volume Use other alternatives (mail carrier) Section 9-3-70. Security. A. Internet growth over the last several years has increased greatly. There are millions of pages of Internet information and billions of publicly available files. It is impossible to monitor every available site to determine if the site has material which violates policy. Even if a specific item is in violation of County standards, blocking access will not prevent access to the material, as many sites are either mirrored at other locations, or changes its name and Internet Protocol number regularly to avoid prosecution. B. Information Services may, without notice, restrict access of any individual to the Internet or the County network, as a whole or in part, in order to protect the security of Weld County's network and its infrastructure and stored data. Restrictions may be placed on workstations and personal computing devices to restrict configurations changes to those devices or to the operating systems to ensure the efficient transfer of network traffic and to minimize network or computer downtime. C. The following modem/Internet security guidelines shall be followed. 1. When utilizing a modem for remote access to another computer, a user shall be aware of and follow the Acceptable Use Policy, if any, regarding the remote public/private system. 2. There is no such thing as a one hundred percent secure system; the human element is always the weakest link in system security. 3. The user shall make sure that any related passwords are secure, and shall not share the passwords or write passwords on paper. Also, it is recommended that a password consists of letters and numbers. 4. Within the software which controls the modem, it is recommended that the "answer off' (if applicable) mechanism is exercised in all situations, unless approved by the Department of Information Services. 5. If a user elects to download nonapplication software, the download directory MUST be scanned with an anti-virus program immediately following the download. The Department of Information Services will be happy to train the end-user on utilizing the anti-virus program. The user should be aware that if he or she has a modem and is on the County network, it is possible for a virus to attack any or all networked computers. 6. The user shall not distribute the phone number of the shared or dedicated modem line unless it is absolutely required. 7. If the phone number to the remote system is long-distance, the call shall be kept to a minimum length. 8. If the modem is external, it shall be turned off when not in use. Section 9-3-80. Acceptable use guidelines. A. Purpose. This Section represents a guide to the acceptable use of the Internet and Weld County's own network for County employees. In those cases where data communications are carried across other regional networks or public networks, network users are advised that acceptable use policies of those other networks apply and may limit use. B. General. 1. Participating agencies assume responsibility for providing reasonable publicity and enforcement for this "Internet Acceptable Use Policy". Ultimate responsibility for traffic that does not conform to this policy lies with the individual end user. It is the responsibility of the County agency to monitor and rectify the behavior of its users who disregard this policy. 2. It is also the responsibility of each County agency to provide adequate training for its users to ensure appropriate network use. 3. The Department of Information Services and the County accept no responsibility for the traffic which they transport and which violates the Acceptable Use Policy of any connected networks, beyond informing the County agency if and when a violation is brought to the attention of the Information Services Governance Committee. 4. All use of the network must be consistent with the goals and purposes of the network and within the spirit of this Section. The guidelines listed herein are provided to make clear the categories of use which are consistent with the purposes of the Internet or public network. The intent is not to exhaustively enumerate all such possible uses or misuses. 5. Internet computing resources are world-wide, and all users are urged to exercise common sense and decency with regard to these shared resources. Particular attention should be paid to policies developed for various Internet services by Internet users, such as Usenet policies. 6. Because of the diversity of resources on the Internet and other public networks, it is impossible to list all the do's and don'ts. In general, common sense should be used to judge situations. The following are some guidelines to start with. a. Computing resources should be used only for County related business in the support of the administrative, instructional, research, and public service objectives of the County. b. Appropriate use of resources is limited to the official work of the agencies. Examples of inappropriate use of resources include, but are not limited to: 1) Any traffic that violates state/local and federal laws. 2) Any traffic that is unethical in nature. 3) Distribution of unsolicited advertising. 4) Propagation of computer worms and/or viruses. 5) Distribution of chain letters. 6) Attempts to make unauthorized entry to another network node. 7) Use for recreational games. 8) Personal use. 9) Sexually offensive material. 10) Running applications that generate constant unnecessary network traffic. 7. The Information Services Governance Committee endorses the following guidelines concerning computing resources. a. Users shall respect the privacy of others. They shall not seek information about, obtain copies of, or modify electronic information belonging to, other users unless explicitly authorized to do so by those users. b. Users shall not share passwords with others or use passwords not belonging to them. c. Users shall respect appropriate laws and copyrights. The distribution of programs, databases and other electronic information resources is controlled by copyright laws, licensing agreements, and trade secret laws. These shall be observed. 8. All County agencies must accept these guidelines and understand that network traffic originating from its location is to be consistent with this policy. The Department of Information Services can not police the network but may refer to the appropriate Elected Official or Department Head for disciplinary action any agency that appears to be in persistent and/or serious abuse of this policy. Questions pertaining to the policy or interpretation of the policy should be submitted to the Internal Services Governance Committee. 9. The Department of Information Services may at any time make a determination that particular uses are not consistent with the purposes of the network connection. Such determinations will be reported to the agency's Elected Official or Department Head, as appropriate, for information and possible imposition of sanctions. Persistent and/or serious violation of the policy may result in withdrawal of approval to use the Internet and other public networks or other penalties. C. Participation in discussion groups. 1. There should be a good business reason for participating in any discussion group over the Internet. 2. The user must be aware that the information he or she puts out on the Internet will be perceived as the official County position unless specifically identified as personal opinion, even in a discussion. If the user is offering his or her own opinion, he or she shall be sure it is clearly identified as such. Also, if you would be embarrassed to have someone read it on a postcard, do not say it on the Internet or in any e-mail. 3. All rules which apply to other forms of written correspondence apply here, even though the style is more casual. D. Classes of mail allowed. Setting the standards for both casual and official correspondence is the responsibility of the individual department and is the same for the Internet as for other forms of written correspondence. E. Qualifications for access authority. Before the Department of Information Services approves a user for Internet or County network access, a Weld County Computer Security Request Form must be properly filled out and processed according to the normal procurement process. Section 9-3-90. Web server guidelines. A. Review. The Department of Information Services and the Governance Committee will review all Web access proposals to ensure that the project adheres to all guidelines set forth in this Section. B. Initial approval. Any proposed Web access must be submitted to the Information Services Governance Committee for initial approval of the proposed project. The following information must be provided to the Department of Information Services for it to review and assist in submitting the initial request to the Governance Committee. 1. State the general purpose of the project and how it relates to County business. 2. Define the scope of the project, including what information is going to be made available, to whom it will be available, and who the targeted user is. 3. Provide initial design documentation, which includes a rough page layout, applets, links images, etc. 4. Identify any County data accessed not located on the Web server and how the data will be used. 5. Identify the designated contact person within the department for this project, who will be responsible for maintaining current information. 6. Identify the security requirements of the project. C. Guidelines. If initial approval is granted for the project, the following guidelines must be followed during the development: 1. The Department of Information Services must establish and maintain a fully functioning firewall for Web access projects to be operating in production. 2. The Department of Information Services will monitor applications and network activity and set restrictions as needed to prevent problems with County data or internal network processing. 3. The Department of Information Services will maintain appropriate security levels. 4. The Department of Information Services will approve and allocate resource requirements. 5. To help ensure compatibility between applications, development tools as defined by the Department of Information Services and approved by the Information Services Governance Committee will be used. 6. The Department of Information Services must review and approve the proposed location of the data and Web page access, Web server and network access points. 7. All development and/or enhancements to a project must be performed and tested on a designated test Web server. 8. After testing is completed and the project is reviewed by the Department of Information Services, the project will be transferred to the production Web server. Only the Department of Information Services will have development access on the production Web server. 9. The Department of Information Services' main priority is to maintain the integrity of the County data and in-house network processing capabilities. If at any time, the web page and/or associated links/controls do not adhere to the set standards or cause a problem for whatever reason, the web page may be terminated without notification. 10. Contents of Web pages should be approved by Department Head/Elected Official or his or her designee. Section 9-3-100. Use of electronic mail. A. Electronic mail (e-mail) is defined as any message that is transmitted electronically between two (2) or more computers or terminals, whether stored digitally or converted to hard (paper) copy. Under Part 2, Article 72, Title 24, C.R.S., e-mail messages may be considered public records and may be subject to public inspection, pursuant to Section 24-72-203, C.R.S. All computer-related information, including e-mail messages and/or digitally stored documents, are the property of the County and are considered the County's records even if the information resides on privately owned devices. Section 9-3-110. Employee access to e-mail. A. All County employees with a need will be assigned a user address by the Department of Information Services. These addresses may be used to send and receive e-mail messages to/from other County employees. Conduct for use of these e-mail systems is detailed in the following Sections. B. Elected officials and department heads may also request an e-mail address that is Internet-accessible. At the request of the department head or elected official, employees will be provided Internet-accessible e-mail addresses for conducting County business. Employees will be provided such e-mail addresses, pending County technology capabilities and availability. Continued access to Internet-accessible e-mail will be contingent upon the employee's conduct, as outlined previously in this Article and reviewed below. Costs associated with e-mail access will be evaluated annually and determined through the County's budget process. Section 9-3-120. Employee conduct with e-mail. A. As with any County property or equipment, e-mail should be used for official County business only. Incidental and occasional personal use of e-mail is permitted. However, strictly forbidden e-mail usage includes use for personal profit or gain; transmission of political messages; solicitation of funds for political or other purposes; or sending of harassing messages. Section 9-3-130. Monitoring e-mail. A. Because e-mail is County property, the County has the right to inspect and review any e-mail or other data stored on County computers and equipment or on privately owned devices if used in the course of County business. Information Services' staff is responsible for monitoring electronic mail through regular computer network maintenance. Additionally, County officials may inspect and copy e-mail and computer records when there are indications of impropriety by an employee, when substantive information must be located and no other means are readily available, or when necessary for conducting County business. Supervisors may review the contents of an employee's electronic mail without the employee's consent. Section 9-3-140. Retention, archiving and destruction of e-mail. A. E-mail messages that concern policies, decision-making, specific case files, contracts or other information that should be kept as part of the official records of County business should be retained by the recipients of such e-mail. Therefore, employees are responsible for retaining and archiving electronic mail messages as official records of County business. E-mail messages that are intended to be retained as public records should be stored on the County's network drives in order to be included in the centralized back-up process. B. The Director of Information Services is the official custodian of electronically/digitally stored information, including e-mail. The Department of Information Services is responsible for monitoring and retrieving archived data/information. C. Users (employees) are responsible for archiving e-mail messages. After forty-five (45) days, employees should delete e-mail messages to minimize storage requirements. The Department of Information Services is responsible for long-term storage of electronic mail and will retain/destroy e-mail records in accordance with the records retention schedules established for records by the State, pursuant to Part 1 of Article 17 of Title 6, C.R.S. Section 9-3-150. Public requests for e-mail. A. Public requests for e-mail that is a public record should be submitted to the elected official or department head. Public requests for public records will be handled in compliance with the Public Records Act. If a request is made to inspect e-mail, County staff shall, prior to release, consult the Elected Official or Department Head prior to allowing inspection of the correspondence, for the purpose of determining whether the correspondence is a public record. B. Members of the public who request public e-mail records will be charged for the costs of providing those records, in accordance with the County fee schedule. Add Article VIII Personal Computing Devices, as follows. Section 9-8-10. Need for Policy. A. This policy is intended to provide guidance to departments who are utilizing personal computing device technology and to help minimize the risk to business functions and government owned assets. This policy also extends the County's right to data ownership and its right to review data on computing devices to areas of new technology. Section 9-8-20. Definitions. A. Workstation. End-user computing device. Usually this device is a desktop computer at an employee's desk linked to Weld County's network. B. Personal Computing Device. Hardware designed to be very portable that contains a computer chip to allow the device to communicate with the Weld County network or share/store information with a device already connected to the network. Examples are Pocket PCs, Palm PCs, PDAs, Palm phones, Smart phones, wearable computers, e-mail devices, etc. C. Personal Digital Assistant(PDA). See "Personal Computing Device" above. D. End User. A person utilizing any computing or communication device to perform daily activities related to Weld County business. E. Synchronization Software. Software installed on a workstation that enables it to share/transfer information to and from the personal computing device. F. Support Staff. Individuals employed and trained to support computer software and hardware. G. Information Services Governance Committee (ISGC). Reviews information technology issues or projects and provides recommendations to the Board of Weld County Commissioners concerning information technology policy at Weld County. Section 9-8-30. Statement of Policy. A. With the growing need for instantaneous communication and data access, Weld County recognizes the need to incorporate new technology to facilitate business related functions by allowing personal computing devices to share data or communicate with the Weld County network. Employees using any form of mobile computing or personal computing technology that synchronizes information, transfers information, or communicates with Weld County Government's network infrastructure or data must be knowledgeable of and operate within these guidelines. B. This policy applies to any activity performed from a County-owned asset and to all Weld County employees or contracted agents of Weld County performing work activities on behalf of Weld County. Work activities conducted from remote devices or even personally-owned devices are subject to this policy. However, this policy does not apply to an employee performing activities solely as a member of the public and without the use of County-owned assets. C. Guidelines. 1. This policy applies to any county-owned device or any personally-owned device the owner wants to link to or communicate with the County's network or data. 2. The personal computing device is not considered a secure computing device. Being a small and very mobile device, it has a higher chance of being misplaced or stolen. Under no circumstances should lists of passwords be maintained on a personal computing device, and the password protection feature should be enabled. 3. Data transferred to, created, or updated on the personal computing device is not backed up by the County's normal data backup procedures. It is the user's responsibility to ensure a recoverable version of any data that is the property of Weld County. 4. To be considered for approval of linking or communicating with the Weld County network, the personal computing device must meet County hardware and software standards established by the Information Services Governance Committee. Requests failing to meet Weld County standards will result in denial of access to the Weld County network. 5. If the device is used to synchronize or communicate with the Weld County network or its data, the county business related information remains the property of Weld County. Weld County reserves the right to inspect the device and its contents at any time and/or request the removal of the data or software. Failure to comply with the request will be in violation of this policy. 6. Even though the personal computing device is a mobile device, by using the device in association with the Weld County network, the employee agrees that the use of the device and its contents is still governed by Weld County's Internet Acceptable Use Policy. 7. The elected official or department head must ensure there is a justified business need to approve the employee's use of the personal computing device that links with the Weld County network. The elected official or department head is responsible for the type of data that will be contained on the personal computing device. 8. At the end of employment with Weld County, the County-owned device will be returned to Information Services with any personal information removed. If the employee was using a personally-owned device, the employee promises to ensure all Weld County related information is copied back to the Weld County network and the elected official or department head is informed as to where it is stored on the network. The information and all backups of the information will then be deleted from the personally-owned device. 9. All software on County-owned devices must be legally licensed for the device on which it is installed. Requests for new hardware or software (synchronization software or regular application software) may be made through the normal governance approval process. 10. Information Services will support only the Weld County standard synchronization software that facilitates the link with GroupWise calendaring. All devices must be compatible with that standardized software to be considered for linking or communicating with the Weld County network. In addition, personally owned devices must be in full operational order prior to requesting the installation of synchronization software on the user's desktop personal computer. 11. If an employee is planning to purchase a personal computing device and wants to synchronize/link it with the Weld County network, it is the employee's responsibility to meet Weld County standards for hardware and software, receive approval from the Elected Official or Department Head approval, and confirm any Weld County funding of any additional required hardware and/or synchronization software. Approvals should be obtained prior to any purchase. 12. Weld County reserves the right to discontinue authorization for linking personal computing devices to the network at any time because of any perceived threat to the stability of the Weld County network infrastructure. In addition, Weld County may, at any time, require additional and/or different software be used on the desktop or the personal computing device to safeguard the network or to maintain compatibility with other applications. 13. Personal computing type devices, i.e., PDA's, palm phones, e-mail devices, projectors, digital cameras, etc. are not included in the normal Information technology repair costs. Repairs are the responsibility of the individual owner or the County department. 14. For an employee to synchronize or link personal computing devices with the Weld County network, the user and personal computing device must be registered as a user with the Information Services Department. 15. Weld County does not guarantee continued compatibility with any hardware device or software being utilized in this environment and is not liable for personal expenses incurred. 16. Weld County or ACS is not responsible for any damage to personally owned hardware or software that may be incurred while supporting the personal computing device or related software. 17. Abuse of this policy can result in removal of authorization to have personal computing device link or communicate with the Weld County network. Continued abuse of this policy could lead to employee disciplinary actions including termination of employment. Section 9-8-40. Procedure. A. Any purchased hardware must meet Weld County standards. B. Any Weld County employee wishing to synchronize a personal computing device with a desktop personal computer or link it with the Weld County network, must first have it approved by their Elected Official or Department Head. There must be a clear business need to approve the request. 1. Requesting user must be an authorized user of the Weld County network. 2. All related hardware and software purchases must be approved by the Information Services Governance Committee. 3. Requesting user must sign the Personal Computing Device Acknowledgment form explaining Weld County's right to review any information contained on the device. The Personal Computing Device Acknowledgment form is available from the Information Services Department. Along with the user's signature, the employee's full name, device make and model, operating system, and serial number shall be provided. C. Information Services will review the information on the Personal Computing Device Acknowledgment form to ensure the hardware and software meet Weld County standards. 1. Information Services will inform the employee of approval or denial. 2. Information Services will maintain a log of all users who synchronize or link a personal computing device with the Weld County network. D. If hardware or software purchases are involved, purchases will be made after the Information Services Governance Committee approvals have been obtained. 1. Information Services will process approved requests by ordering and receiving regular PDA type devices. 2. Phone Services and/or the Weld County Purchasing Department will process approved requests for other types of personal computing devices, i.e., palmphones, LCD projectors, digital cameras, digital video cameras, etc. a. Prior to any purchase, the requesting department should obtain Information Services approval on any digital device that will link or communicate with personal computers or the Weld County network. Information Services will ensure compatibility with existing standards and plan network resource availability and/or capacity. b. The response from Information Services will include the detailed items that have been approved. E. Any application software that will reside on the personal computing device should be treated as a regular application software request to be reviewed by Information Services and approved by the Information Services Governance Committee prior to being purchased or implemented. 1. Any application software residing on the personal computing device must output data in a format compatible with existing desktop application software standards. F. If data related to Weld County business is created or updated on the personal computing device, it is the user's responsibility to provide a backup of modified data or ensure that it is copied back to their M: network drive where it is included in the centralized backup process. Data on a desktop personal computer's local drive is not backed up in the centralized backup process. G. Personal Computing Device Standards 1. PDA type devices. a. Devices running the Palm Operating system, which must also be compatible with designated synchronization software. 1. Documents To Go software may be necessary to provide compatibility with Microsoft Word and Excel. b. Devices running the Microsoft Windows Pocket PC operating system, which must also be compatible with designated synchronization software. 2. Software to synchronize GroupWise calendar. a. IntelliSync version 5.x and higher, manufacturer Puma Technology. 3. Network client software must be compatible with currently established Weld County network versions and protocols (when available). a. Check with Information Services Department for current requirements. Section 9-8-50. Exceptions. The authority to approve exceptions to this Policy is delegated to the Director of Information Services Department Section 9-8-60. Interpretation Contact. Director of Information Services. BE IT FURTHER ORDAINED by the Board that the Clerk to the Board be, and hereby is, directed to arrange for Colorado Code Publishing to supplement the Weld County Code with the amendments contained herein, to coincide with chapters, articles, divisions, sections, and sub-sections as they currently exist within said Code; and to resolve any inconsistencies regarding capitalization, grammar, and numbering or placement of chapters, articles, divisions, sections, and sub-sections in said Code. BE IT FURTHER ORDAINED by the Board if any section, subsection, paragraph, sentence, clause, or phrase of this Ordinance is for any reason held or decided to be unconstitutional, such decision shall not affect the validity of the remaining portions hereof. The Board of County Commissioners hereby declares that it would have enacted this Ordinance in each and every section, subsection, paragraph, sentence, clause, and phrase thereof irrespective of the fact that any one or more sections, subsections, paragraphs, sentences, clauses, or phrases might be declared to be unconstitutional or invalid. NOTICE PURSUANT to the Weld County Home Rule Charter, Ordinance Number 2002-12 published above, was introduced and, on motion duly made and seconded, approved upon first reading on November 13, 2002. A public hearing and second reading is scheduled to be held in the Chambers of the Board, First Floor Hearing Room, 915 10th Street, Greeley, Colorado 80631, on December 2, 2002. All persons in any manner interested in the reading of said Ordinance are requested to attend and may be heard. Please contact the Clerk to the Board's office at phone (970) 336-7215, Extension 4225, or fax (970) 352-0242, prior to the day of the hearing if, as the result of a disability, you require reasonable accommodations in order to participate in this hearing. Any backup material, exhibits or information previously submitted to the Board of County Commissioners concerning this matter may be examined in the office of the Clerk to the Board of County Commissioners, located in the Weld County Centennial Center, Third Floor, 915 10th Street, Greeley, Colorado, between the hours of 8:00 a.m. and 5:00 p.m., Monday thru Friday, or may be accessed through the Weld County Web Page (www.co.weld.co.us). E-Mail messages sent to an individual Commissioner may not be included in the case file. To ensure inclusion of your E-Mail correspondence into the case file, please send a copy to charding@co.weld.co.us. SECOND READING: December 2, 2002, at 9:00 a.m. THIRD READING: December 23, 2002, at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO DATED: November 15, 2002 PUBLISHED: November 20, 2002, in the Tri-Town Farmer and Miner WELD COUNTY C. Weld County B. Because of the extreme CODE ORDINANCE 2002-I2 expectations. danger to public and/Or Because si sin nature of PeralAND IN E ATTEROFREP WITH t I.v Coney elle understand the Board lives and Property, may Nha> access to Affidavit of Publication ADMINISTRATION,AMEDS. HAPTER 2 TER 2 and strive to follow stated Commissioners aproved une natyResoUtion ure T of h soinformation fl PERSONNEL AND CHAPTER County organizational 17,2002 authorized the use should not be discussed 9 INFORMATION SERVICES, statement.values and mission of Weld County motor except with authorized STATE OF COLORADO OFTHE WELDCOUNncoDE graders or other heavy personnel. If any situation County Of Weld SS. BE IT ORDAINED BY THE 2' the County workforce, equipment operated by arises concerning public advisory boards,and tight t1' Personnel to confidential information in I A. Winkler Riesel of said County of Weld being BOARD OF COUNTY commttepresentati tohwe - g «doe tlresonpublic or which an employee has a duly sworn,say that I am publisher of COMMISSIONERS OF THE diverse representation. Pnvorelondsh Weld Comiy. question, the employee COUNTY OF WELD,STATE OF should discuss it with his or . Count internal systems 1 Use of the equipment her supervisor immediately. COLORADO. 3 y 'n shall be deemed necessary FARMER&MINER WHEREAS, the Board of ce or disclosure of ommitment policcies wito Il diversity.reflect by the on-scene fir contidentiall information that the same is a weekly newspaper of general CouotyCommssionersofthe P commander. Examples include hiring obtained In the course of circulation was printed and published in the town of County of Weld, State of practices.selection criteria. County employment could Colorado, pursuant to recruitment processes, n. Weld Countypat the reWthpiplina yegdodGN FREDERICK Colorado statute and the training,etc. necessary to rs or heavy m Orttl dspiplidng action, up Weld County Home Rule motor graders or t°antl Including termination in said county and state that the notice of advertisement,of Charter, is vested with the 4 The County equipmentshorbeunder the from employment. which the annexed is a tole copy has been published in said auth«ityofodmnlsrenng the will be free from all place illegal supervision and direction of Dments and copies weekly newspaper for ONE consecutive weeks: that the affairs of Weld County, and inappropriate the on-scene fire generated in the course of notice was published in the regular and entire issue of every Colorado,and discrimination«harassment. commander. County employmentteethe number of said newspaper during the period and time of WHEREAS, the Board of Amend Section 2-I2-Ill, exclusive property of the publication of said notice and in the newspaper proper and not County Commissioners, on a. All County iii provide private use of County County and are to be in a supplement thereof: that the first publication of saidand offices will provide used for personal use or December 28,- 2000, i property retained in the possession of notice was contained in the issue of said newspaper bearinge in a manner thansoespectful the date of NOVEMBER 20th 2002,and the last OdPOnoe B120oR.enactiinng indfree manner thatis respectful or computer ers software owned an employee. publication thereof,in the issue of said newspaper,bearin o comprehensive Code for and free from illegal or owned CHAPTER g the County of Weld. iO°harass tent. cnminotion or leased by the County is to INFORMATION SERVICES date,the day 20th NOVEMBER.2002 that the said c or harassment. including the codification at be used for job-related all previously adapted D. If Weld County's -purposes only, Personal Repeal Article 3. Internet ordnanviouslgenardoed expecia Weld istCtlab°ve property Includes,but is not Acceptable Use Policy,in its FARMER &MINER permanent nature enacted are not met, the following limited to, . telephones, l peonies, following: epoceemme has been published continuously and uninterruptedlyon or before said date orcopiers and, relep simile faowi adoption,and procedures will apply. facsimile during the period of at least fifty-two consecutive machines. Emuse Personal who weeks nextprior to the first issue thereof containing 1. Employee reports theSection 9-3-10. General wee notice r advertisementt above referred and WHEREiAS,s the he d Weld at Creounty problem to a responsible privotely roerrt or e computer provisions- weeks of that said newspaper was at the time of each of the and clarificationwlrh regard County oftielecal. such as a software owned subject leased Information The Deportment Se in publications of said notice duly qualified for that to procedures, terms, and supervisor, elected oracle, by the County are subject to Services. in within the meaning of an act entitled. "An requirements therein. department head. or the including conjunction with the purpose Director of Personnel/ including discharge. To information Services Act Concerning Legal Notices, Advertisements and NOW, THEREFORE. BE IT General services. ensure that the use of Publications and the Fees of Printers and Publishers ORDAINED by the Board or 2. The officiolreceNYng me personal property owned or Governance Committee thereof,and to Repeal all Acts and Parts of Acts in report documents all leased by the County necessary(ISGC), has token the Coun Commssenersofthe information received and is steps to bleprovide s Conflict with the Provisions of this Act" approved County of weld. State of consistent with this policy. on Internet UP)aneptode Use April 7, 1921, and all amendments thereof, and persons spoken to and outhorpedrepreseniotiorthe use off p)pa acceptable articular) as amended by an act approved, March Colorado, that certain notifies the Department of the County may iris_dor the use of theInternetbyCounty particularly PP ewstlnt chapters of me Weld Personnel within twenty-four use from time to tint. Ogenclesondy departments. 3O, 1923,and an act approved May 1 1991♦ County Code be. and (24) hours of the alleged Any County agency or /. V hereby ore, repealed and inciden!. B. All o documents, s, having eligible fa,and �!/X(/7,/V/ re-enacted. with digitally stored focuments, having funding for.Me Weld amendments, and the and Other forms of County network or the a chapters are revised 3. In cooperation with the Information transmitted by, access)will beprovlre with P fisher to read as follows. requesting department the created by,received by or under the terms and Deportment of Personnel sorted in electronic and/or conditions of this policy. CHAPTEADMINISTRATION investigates. develops and telephsownedmunications ADMINISTRATION retains documentation d all systems owned or leased by B. The objective of this Subscribed and sworn to before me this 20th allegations and Insures that the County are the property policy is to minimize the risks day of NOVEMBER, A.D. 2002 Add Section 2-2-140. appropriate corrective of the County Employees to business functions and Diversity Policy. cottons onmdry e taken.IncludIncludingconothoveanght topnvacy governrnentowned assets, disciplinary by the In such communications°nd and to assure adherence to A. Weld County appropriate person when information even if the regulatory and legal 111 Government will provide a Justified, to remedy all Information resides on requirementsondenteronse ���� \� V�I welcoming environment violations of this policy. privately owned devices. Pohcie/' - 1\ where all Individuals ore re€osc5 when County respected, appreciated, 4. The Department of Delete Section 2-ty2ii resorcesoreusedtoaccess Notary Public included,and valued.Weld Personnel follows up withh pubic networks' County recognizes the thirty(30)days to assure no Electronic mail C Violation of this alit unique perspective and furihervlolotloruofihe POlcy (Incapaaetl Info Chapterpolicy may ss grounds for having wide range of knowledge have occurred. access to the weld County P.O,BOX 125 diversity affords us. Weld Countyiscommlttedtoleam E. County policies and CHAPTERS network and/or Internet from each other and internal systems will be PERSONNEL servkesrf this .Continued understand that similarities monitored by all elected abuse of this policy could FT.� ,yyfyyrr(}{y�t' C 80621 and differences are what officials and department Amend Section 3-3-1OA.3. lead to employee S\/ P(.7 `)•'• 1 createastrongorgaNzation heads for compliance to this Lem-snato or employment ' ,.\1` }4 J. and community, policy Negligent or willful damage tenrtirWnon of employment. r V (�:.•` / or waste of public properly. D. This k ••4`! F. Retaliation of any kind This Includes misuse of Policy performed s any \) B. Diversity is an inclusive will not be tolerated. County property, activity Countyowned from a f . term that Includes all the equlpment,vehiclesaother. Weld Weld County asset j BOB! j - and to all { .,O i differences which distinguish Add Section 2-5-30. mateno nvenieategah.use BOND enciviouals and groups from Authorise Use of County- or convenience and employees or contracted ir X. BOND ! y q pmeni. utanho2edue,p°ssesLm agents of weld County N r each other. The mosaic of owned New E ul performingfWeld kounty Work ,,{ the people of Weld County or storOge of County r -7 behalf of Weld County.Work V>s`.- brings a variety of A. Due to recent dry property. -"� backgrounds, style, weather contll}°tic and a activities devices conducted from t4 k.' remote or even u �Yr, perspectives, values, ontl mild tlry enter.pdrie kTtlr Amentl SectlOn 3-1210. / ( ; -y beliefs as assets to the ocatetlinWeldC are supleonally owned devices .',f,\i iredan w9 CaNldentlal lnfpmatiOn. ore except that t to this policy '- community. To appreciate become a high fire danger, this pdicy does diversity is to recognize that emphasizing the need for a the sum of the different cooperative approach C %�C groups and mdMduae is a andtg citizens and to fight l fly j v"y;ii. '9 lX, rioter whale than the ports and public entities,to fight alone.Diversity Inclutles but prairie tires which ormoy private I y� a not limited to,race,did«. On public and/or private I age, disability, creed, ions. ���fi 1 11 'Soon.cuINrd baakgrantl l� and et¢terlence,success .�i oNpd tb our success a on organizationdtolhenmuva which wfadatothes and desirability of Weld County a a place to live mad wad. not apply to on employes --'---- perfuming aotMllessdelym Data custodian means an The use may be monitored environment violations and o members the public and owners person responsible antl access may be revoked for use of County properly without the use of County- far the data. r owned assets. The policy conduct, inopproprlate for personal purposes are conduct. contone the Chan applies fo electronic Electronic mail (E-mail) Y typolaY communications On WeldthiCo e. In Chapter 2 of means or a widely used leersshthe policies and this Code.CWnNNetwa4santl public networkapplicotioninwhich abide by the and networks including,but not moil messages are procedures of any external B. The role of the limited to.the following: transmitted electronically network accessed. Each Information Services between end users over user is expected to be a Governance Committee Is I. E cctia 0 r o n i c various types of networks responsible network citizen as follows. Canusing various network (Netiquette). protocols. I. Review and a. E-mail, approve E. Downloading of any Internet Acceptable Use Gopher or Internet gopher software programs or Guidelines. b. File fronsfer, means o distributed applications Including, but document delivery service. not limited to. shareware. 2. Advocateadlerenceto c. Remote login. It lets users access various freeware, demo's. etc., d the policy. Remote controlm tti types of data residing on strictly prohibfed. All such d. d. ereultiple hosts.Thistdoneby requestsmustgothroughe C. The role of the County sopresenting the user menu Department of Information departments and agencies documents and by using a services. Is as follows. e. Discussion grouts/ client - server bulletin boards. aNmmunications model. F. Wtiendownloodngran 1. Act as the authorizing f. World Wide Web. application software, the agent that allows access to HTtP means Hyper Text user shollcheckfarcopyrlght the interns. Gopher.web servers,wide Transport Protocol. or licensing agreements. If ores information servers (WAS.). there C any doubt the user 2. Ensure guidelines are Internet means the wail's shall not copy the software, followed largest internetwork.thousa If a licensing agreement dev Personal computing connecting nds of exists a the user must pay fa 3. Provide fw training of networks worldwide and the Information.it must flat employees who need having a 'culture' that be approved by the access. h. Digital typedevicesthat focuses on simplicity, Information Services can communicate with research and Governance Committee. persaglcan'pltersaglblc standardization based on a, Budget for raisin antl networks, real-life use. associated training, If G. To minimize network needed, 2. Pudic Networks. traffic, onc reglets IP Teens Internet Protocol. for information on the 5. Establish its own data a. Internet. lhenetworklayerfa the TCP/ Internet and applications sensitivity policy, P Protocol Suite. It is a that generate constant b. America Online. connecfionlest best-effort network traffic,e.g.,Internet Secryan93•6O.Profectianof CompuServe,Prodigy,etc. switching aoto layer ottersr radio stations. Channels. proprietary Information, a common layer Over music shoring.services.etc. C. Online search SelViCe5 dissimilar networks. should always be avoided. A. Data sensitivity, persons archesDialog. serhase transmitting enterprise data Public ublic Network means H. The generation of over publicnefworks should convnercial,prlvateorWend exceeventemetenioYshW ensure that the data IS County owned networks be avoided. d. Diolup bulletin board whichestodyhf hetechNcd processed according to Its y level fi n, by systems. puaC- that allow t sconneet directory must which follow. AferAdellr computer-type devices to b9 scehnb with ndtWintt read t following After e. Weld County network. communicate with one �� software before and after read the of how 10 Sec.9-3-20. Introduction, eiptherand share s, Thea se dothe Internet. files from pro Undte ic usually wide do As most properly handle specific u networks cess h Irate provide domat, scanning amino epels nt t or she should andIntenNteaccescces access to the Internet. scanning the files contact the Information and Internet access con provide sigrficant business Usenetmeonsthethousanas after 'unzipping"theis asset owner (data benefits for County necessary. It is users custodian)for guldahce. government agencies. of topically ps. named rnedon responsibility e to ties ensure that newsgroups. the computer t from knowovedeleaehee B. Data sensitivity However,t there are also which run them and the signitkanHegol,securityrntl from known viruses. definitions. productivity issues related to people news.whor dantlwbmit how the Internet Is used. Usenet news. J. Users shall not use I. confidential data. Examples of such tissues ore sofich attempts tok'probes') listed below. Wide Area Information which attempts to discover a, dfowrecsfrategleS Servers means a ted properties about the public and mayor directions. Information service that network or computing A. The potential to receive offers natural language,Wt resources connected lethal n computer viruses from Ondindexed searching,ond b. Confidential dal,stall or Internet infamationsources. network. federal as der laws. rules or lea the results a Initial u lar laws .. Ss or B. The potential for searches influence future t Users should be aware regulations, e.g., serial someone to eavesdrop on searches. the tint tafrantfe to be service data. data or correspondence the Internet Is prone to be W W W means the World monitored and/or c. Data ofother businesses/which Is exchanged via the Wide Web. a prefect that intercepted by unintended perthe enterprise withrespecttorNn Internet. merges information retrieval destinations the en is under on and hypertext to make an obi on of confidentiality. C. The potential for a easy-to-use, powerful, L. All County e-mail is o ' County government global, academic public record and be 2. Restricted data. employee, through the information wsystem. tto blicl content of his or her Internet bled public ntpection. a. working files not exchanges, 10 imp en the Section 43-40' Guidelines. M. Even If software allows completed for public reputation of local officials and configuration changes to dissemination, government the purpose of the following networks, computers, and thereby invite toll liabilities. is to provide a short checklist other hardware ar software. b. Is of such a nature that of procedures wIch should actual changes scud only unauthorized disclosure D. The hepootential for or County ty be followed while accessing be made by membersof the would be against the best government be eatrcedby thevastsocral mp y orrs through Information Services interest dthe Cowry. and informational forums of company resources. ote the Internet into spending guidelines govern both c. Personnel data, significant work time on County employees. Section 93-W. Roles and contractors and anyone responsibilities. d. Data with restricted use nonproductive activities. wIXkirhgVipCWnly GkBCibn IXOCCBSS per local,slate E. a County-government— For more specific and A. The role of the federal laws, rules or nclewa-goveo ens tailed policy statements. Department of information regulations, e.g.. criminal age refer to the Sections that Services is os follows: an Internet connection follow in this Article. justice data. sufficiently upsets other resources Acceptable Establish Internet 3. Proprietary data: Alinternet users, the A Use at County reso Acceptable Use Guidelines. enterprise-related connection could be for accessing public eoodedwtlhtraeic In protest, networks is for work-related binaseline requiring thus negatively impacting purposes only. 2.department electedoof any baselinesto meet protection. the availablliN of the service heads of any but fading to specified for true business purposes. continued abuse. It is criteria for higher B. Userssndloct responsibly specifically NOT the role of classifications. when participating in the Department of F. Outside access to Pool discussions over a public Information Services to clot o.thde processingpowes can ro i,c lm network'They shalbepolite us the "Net Police" the procedures policies local network. and not get abusive in their Department of information internal by nature. messages to others. Users Services cannot be held should remember that responsible far b. inter n t e r n a l Sec.9-3-30. Definitions. defamation can occur due nonprofessional usage, announcements. The following words. when to malicious use of the improper humor or the Internet. of eevailion and etmonitoring used herein,stall hove the of e-mail or Usenet groups.' 4. UnCbssifled da010'. definitionscontornedbelow. C. Users shall not use public Disciplinary action for sexual no ecurCn r tich requires networks inoppropriotel no security protection. Y harassment and hostile / • .men a. Public Mfanaton. P ssetwds on nnnp a As ,It nt The Deportment eerv�seen athe games, Services and approved by Iswomcende of letters County respo^9biety of theincSwoual the Information Services b. Public announcements. pass accept no 8) Personal use department and is the same GovemanceCommitfeew,i and numbers, responsibility for the traffic for the Internet as for other be used c. I n t e r n o I which they transport and 9) Sexually offensive forms of written correspondence and . 4. Within the software which violates the material. correspondence.' a. The Department of documentation which do which controls the modem. AcceptadeUse Pokcyof any - Informanun Services must not merit a security it is recommended that the connected networks. 10)Running applications E. -y/dln,.;ations for access review and oprovA the classification. 'answer off-(it applicable) beyond informing the that generate constant authu. Before the proposed lo©,i,xt of the ' mechanism is exercised in all County agency if and when unnecessary network traffic. Department of Information aataanelWebpopeaccess, C. Data sensitivity situations. unless approved a violation is brought to the Services Web Seiler and network by the Department of attention of the information sir County user for processing guidelines.Table P J. The Information Services Internet a Coln network access prints. 9.1 reflects the guidelines to Infwmatlon Senecas. Services Governance Governance Committee access, a Weld County be used in processing Committee, endorses the following Computer Security Request J All development and/or sensitive data: 5. If a user elects to guidelines concerning Fawn must be properly filled enhancements to a project download nonappllcatiOn 4. All use of the network computing resources. - out and processed must be performed and Table 9.1 Data Sensitivity software, the download must be consistent with the according to the normal tested on a designated test Processing Guidelines directory MUST be scanned goals and purposes of the a. Users shall respect the procurement process Web server. with an anti-virus program network and within the spkit privacy of others. They shall immediately fdlovAng the ofthisSectlon.Theguidelines not seek information about, Section 9-3-90 Web server B. After testing Is download.The Deportment listed herein are provided to obtain copies of,or modify guidelines. completed and the project Section 9-3-J0. Security of information Services will make clear the categories electronic information is reviewed by the be happy to,ran the end- of use which ale consistent belonging to, other users A. Review.The Deportment Department of Information uniessexplicifly authorized to of Information Services and Services,the project will be do so by those users. the Coven ianceCorarittee transferred to the production will review all Web access web server. Only the Table Si b. Users shall not share proposals to ensure that the Deportment of Information Oetm SMMitiay Pr-ssingauideddtl passwords with others or use project adheres to all Services will have passwords not belonging t0 guidelines set forth n this development access an the them. Section. Production Web server. Confidential Retitled Prepataty Unclothed 9. The Department of Snarled Se<Iyleed � Akre* c. Users shall respect B. Initial approval. Any Information Services man appropriate lows and proposed Web access must priority is to maintain the primnuons UN ether copyrights. The distribution be submitted to the integrity of the County data ele11WVM(mad of programs.databasesand information Services and in-house network <anio7 other electronic information Governance Committee for processing capabilities.Mat Owner Oya rdefines High volume resources is controlled by initial approval of the any tone,thewebpageao/ eree Perehulene Use attar copyright laws. licensing proposed project. The a associated links/controls agreements, and trade following information must do nO1 adhere to the set permissions eSMlie secret laws. These shall be be provided to the standards or cause o (IoM curies) observed. Department of Information problem for whatever Miedred High volume Services for It to review and reason,the web page may Cotlfdesdiel UN ether 8. NiCountyagenaes must assist in submitting the initial be terminated without abernethy.(moil accept theseguidellnesand request to the Goverronce notification. I Centel) understand that network Committee. 10. Contents of Web papas High came location originating from its location is to be consistent I. State the general should be approved by UM altar with thisDepartment Head/Elected MIsfWMe Department policy.fInformation how itrelates project o County sigree ORiablorhlsor her tle imM etif i Services can not police the business. Section 9-network but may refer to the 3-100. Use of sips Sd-fi � appropriate Elected for 2. Define the scope a the electronic mail. or Department Head f for project Including what linary action any Information is going to be A. Eeelronicmall(e-enall)IS user on utilzM the purposes agency that appears to be made available.to whom h d tran anyaer cnes�a/ A. Internet growth over theganti-virus with the of the persistent and/or serious will be available,and who y last several years has program.TheusershouIdbe Internet or public network, abuse of this policy. the targeted user is. between two(2) or more increas at pagty.Thereare aware that If he or she has a The intent is not to Questions pertaining tc the computers or terminals, modemillions of tinges of Internet network it Is possible County exhaustively enumerate dl policy or shout be submitted 3. Provide initial design `Maher stored (sty a information and billions of nrus to it s possible for a wchpossibeusesormisuses. policy should be submitted u which converted Under to hard(paper) publicly available tiles. If is virus to attack any or all to the Internal Services includes a rough page copy. Part 2,e-mailide impossible to monitor every networked computers. 5. Internet computing Governance Committee. layout,caplets,links images J2 Title 24, C.R.S., a available site to determine if resources are world-wide, etcmessages may be the site has maerd which 6, The user shall not and all users are urged to 9. The Department of considered public reCpd5 violates policy. Even if a distribute Meponenumber exercineoommonegard to Information Services may at 4. Identify tlacat my data andmaytesudecttOpublIC specific hem is In violation of of the shared a dedicated deency with regard to any time make a accessed ertanatedwn the inspection, pursuant tO County n nds.pr evkirg modem fine unless It is these shared resources. del uses are not c particular with Web server and now the Section 24-72-203.C.R.S. NI access will not prevent absolutely required. Particular attention should uses are not consistent data will be used, computer-related access to the material, a be paid to policies the purposes of the network tlon,iralutlirpe-mdl nany51hesa ocatirmrrorer J. tt the phone number to developedtemets for various connection. Such 5. tact y the designated stored messages and/or digitally e at other s ns. Or the ice, system is long- Internet hasUss by akclesl determinations portedto he will be deportment nt for within the sided documents are the changes its name and distance, the call shall be USerS5ucha5Useret policies. Elected to the agency's deportment for this project, Propel of me County and Internet Protocol number kept to a minimum length. Elected Official or who will be responsible for azeconsidereethe County's regularly to avoid 6. Because of the tlNeary Department Head. as maintaining current information s even if the prceecution, B. it ate turned odem sffwhen external, of and resources on the it appropriate,for information inforrnotlan. resides on it shay be arc when other public networks it and possible imposition of privately owned devices. B. Information Services not in use. islmpossodetol;5tapehedal, sanctions. Persistent and/or 6. Identify the security may.without notice restrict and don'ts. In general, seaous violation of the policy requirements of the project. Section 9-3-110. Employee access of any individual to Section 9-3-80. Acceptable common sense should be may result in withdrawal of access to e-mail. the Internet or the County use gutlelines. used tojudge situations.The approval to use the Internet C. Guidelines. If initial inao prole inpart, following are some and other public nelworksor approval is granted for Me A. All County employees in order to protect the A. Purpose. This Section guidelines l0 start with, other penalties. protect. the following withal naafi will be asOgned security of Weld County's represents a guide to the guidelines must be followed a user address by the network and lsinfratra acceptable use of the a Computing resources C. Participation in during the development: Department of Information aooasxe placed Restrictions n Internet and Weld County's should be used only for discus5on groups. Services. These addresses may be on own network for County County related business in P may be used to send and 1. The Department of workstations and personal al employees. M thaw cases the support of the I. There should be o good Information Services must reaeivee-mall messages to/ corrling deWcestnres to where data administrative.Instructional, business reason for functioning uton shofirewatain bfully from other County configurations changes to across communications ar cornede research,and pudic service discussion in any functioning ojewall for Web employees.Co use is those devices or to the across other regional obfeciNes of the County. discussion group over the access projects to be of these e-mail systems is erceig systems to ensure networks or pudic networks Internet. operating In pieducton. detailed in the following the efficient transfer of network users are advised b. Appropriate use of Sections. network traffic and to thataccepladeucepOIMies resources Is limited to the 2. The user must be aware 2. The Deportment of minimize network or anMaeothemetwakSOPPly Exaad mples k of the agencies. that the information he or information Services will B. Elected officials and computer downtime. and may limit use. Exomdes of inappropriate but she puts out on the Internet monitor applications and repartmeniheadsmay also use of resourcesInclude,but will be perceived as the network activity and set request an e-mail address C. The following ngeem/ a General. are not Milted to: picialC identified unless restrictions as needed re ihatu neat etst ofble.At Internet security guidelines specifically identified as prevent problems with 1^e request of the shall be followed. I. Participating agencies D Any traffic that violates personal adman,even in a County data or internal depal e^t^eaderelected assume responsibility for state/localantlfedera;laws. discussion. If the user Is network processing official employees wilt be 1. When utilizing a modem Providing reasonable offering his or her own tllntddress ees5plr for computer,accessfoanohter publicity and enforcement 2 Any traffic that is opinion, le or she shall be 3. The Department of e-mail addresses for a user shall be torn'Internet Acceptable unethical In nature. sure it is clearly identified as information Services will employe swillbe busided aware of and follow the Use Policy'. Ultimate such. Also.if you would be maintain appropriate Employees will be provided Acceptable Use Policy, it responsibility for traffic that 3) Distribution of unsolicited embarrassed to have security levels. such e-mail addresses, any, regarding the remote does not conform to this advertising. someone read it on a PenangCoundtechndogy public/private system. policy lies With the individual postcard, to not soy it on 4. The Department of Continued edpro availability. amuse County reseoncbility 4) Propagation of the Internet or in any e-mail. Information Services will Continued access to 2. There is no such thing has of the agency to computer worms and/or approve and allocate Internet-accessible a-mall a one percent monitor and rectify ine viruses. 3 All rules which apply to resource requirements. employee's be contingent upon the secure system: the human behavior of its users who other forms Of written flnedp conduct,in o3 element is always the disregard this policy. 5) Distribution of chain correspondenceapply here. 5. To help ensure outlined previously in this weakest link in system letters. easual, ughlhesMe ismore compatibility between Articleandreviewedbeow security. 2. It is also the responsibility casual. applications, development Caesossociated with e-mail defined each County agency to 6) Attempts to make tools as defined by the access will be evaluated 3 The user shall make sure Provide adequate training unauthorized er entry to D. Glosses of mail allowed. Deportment of Information annually and determined that any an passwords for its users to ensure another network node. Setting thestantlortlsforbotn pv process. Cornty'sbudget are secure, and shat; not appropriate network use. casual and official prxess. ... ___. in Ilse for rise renlinnnl ,,,,,,,,,,,,,,,,,,,,,,,, ,, w- 1,a..s0a ..� ee C County skiff shill, prior to COrttmznlcates with Weld County,the COtJMy-0Mned for personal expenses communicate with personal Section 9-3-12D Employee release,consult the Elected County Government's device will be returned to incurred. computers or trio Weld conduct with e-mail. Ontiod„DepgriTBMHead network infrastructure or Ins ymotionServiceswilhany CamNnatwork.lnformpiian must be personal information 16. Weld County or ACS is Services will ensure prior to allowing inspection data knowledgeable of and removed. If the employee not responsible for any compatibility with existing A. As with any County of the aarespondence,for Mailor n beu sent for the purpose of determining operate tes. within these was using a personally- damage to personally standards and pion network proofficial ailshould oun business f r whether the g owned device, the ownedhardwareor software resource availability and/or County only. correspondence is o public employee promisestoensure that may be incurred while capaoty. Inatlentol and occasional record. B. This policy applies to any all Weld County related supporting the personal personal use of e-mail is activity performed from a Information is copied back computingdeviceorrelated b The response from permitted. However.strictly B. Members of the public County-owned asset and to to the Weld County network software. Information Services will forbidden e-mail usage who request public e-mail all Weld County employees and the elected official or includes use for personal or contracted agents of department head is Incl hove the been detailed items records will be providing those for 9 P 1]-Abuse of this policy con that approved. profit a gain;transmission of the costs of providing Weld County performing informed as to where it is result in removal of .political massages: records.In accordance with workactivities on behalf of stored on the network. The authorization to have E. An application Weld County.Work activities information and all backups personal computing device software that will reside on solicitation of funds for the County fee schedule. political or other purposes; conducted from remote of the information will then linker communicate withthe the personal computing or sending of harassing Add Article VIII Personal devices or even personally- be deleted from the Weld County network. device should be treated as messages. Computing Devices, as owned devices are subject personally-owned device. Continued abuse of this follows. to this policy. However,this policy could lead to a regular application Section 9-3-130. Monitoring policy does not apply to an 9. All software on County- Into to be e-mail. N employee disciplinary reviewed by Informatiby Section 9-8-10. Need for employee performing owned devices must be of employment. ngiermination Services and Information approved by es Policy. octivltlessoley os a member legally licensed for the of employment. the Information Services A. Bacousee-mall ISCOunN of the public and without the device on which it is installed. Governance Committee property.the County hosihe A. This policy is intended to useotCounN�wned duets Requests for new hardware Section 9-8-40. Procedure. prior to me right e-mailto inspect and review departments e guidance rto e or software(synchronization implemented.g purchased or any or other data who are C. Guidelines. software or regular A. any purchased application software) may hardware must meet Weld 1 Any application stored on County computers utilizing personal computing and equipment or on device technology and to 1. This polcyappliesto any bemadethroughthenormal County standards. software residing on the privately owned devices if help minimize the risk to countyowneddedce aany governance approval personal computing device used in the course of County business functions and personalty-owned device process. B. Any Weld County must output data in a format the owner wants to link l0 or employee wishing to ble communicate with the M. Information Services will synchronize a personal desktop or business. Information government owned assets. application Services'staff is responsible This policy also extends the for monitoringelectronic mail County's right to data County's network or data. support only the Weld computing device with a software standards . through regular computer ownership and Its right to County standard desktop personal computer network maintenance. review data on computing 2. The personalcomputlrlg synchronization software orlinkilwlMihe Weld County F. If data related to Weld mtlad^p dly.Co nlyoRiclals devices to areas of new device is not considered a that facilitates the link with network, must first have it County business is created ay opYe-marl technology. secure computing device. GroupWlse calendaring. All approved by their Elected or updated on the personal arocamputerrecordwhen Bengasmdlondvery ifll&slie devlcesmustbecorrpotible Official o Deportment Hood. computing device. it is the there are indications of Section 9-8-20. Definitions. device. it has a higher with that standardized There must be a clear useisresponsolitytoprovide impropriety byanemployee, chance of being misplaced software to be considered business need to approve a backup of modified data when substantive A. Workstation. End-user or stolen. Under no for linking or communicating the request. or ensure that it is copied information must belocated computing device. Usually circumstances should lists of with the Weld County back tothek M:network drive and no other means are this device is a desktop passwordsbemdntainedon network. In addition. 1. Requesting user must be where it is included in the a necessary tay ble, or when en computer at an employee's aevpersonaal th computing personally owned devices an authorized user of the centralizedbackupprocessreadi . y g desklinkedto WeldCounty's password must be in full operational Weld County network. Doto on a deskto County business.Supervisors network. protection feotureshouklbe order prior to requesting the Ppersonot may review the contents 0f enabled, In OAIX10f5ynchr nyatkom Computers local drive is not 2. Allrebleehordwareane backed spin ess. irolized on employee's rnployee's B. Personal Computing software on the user's software purchases must be backup process.Mall withouttheemployee"s Device.Hardware designed 3. Data transferred to. desktop personal computer. approved by thelnformation created,or updated on the Services Governance condos a computer chipto Personal computing device IT, If on employee Is Committee. D. Personal Computing consent. to be very portable that Section 9-3-140. Retention, allow the device to is not backed up by me planning to purchase a Device Standards e-mail. County's normal data personal computing device 3. Requesting user must 1. PDA type devices archiving old tlestrudbnot Canmunicate Mthehe Weld County network ashore/ backup procedures.It is the and wants to synchronize/ sign the Personal Computing store information with a use:srespanslbilllytoensure link it with the Weld County Device Acknowledgment a Devlcesn nningttlePdm A. E-mail messages that device already connected a recoverable version ofany network.it is the employee's form explaining Weld Operating system. which em policies decreed to the network. Examples data that a Me property of responsibility to meet Weld County's right to review any mustalsobeconpatiblewith concmakirig, specific case files. are Packet PCs. Palm PCs. Weld County. County standards for information contained on designated synchroNzrtion contracts or other Kim palm phones smart hardware and software, the device. The Personal software. information that should be phones, wearable 4. To be considered for receive approval from the Computing Device kept os part of the official computers e-mail devices approval of linking or Elected Official Of Acknowledgment form is 1. Documents To Go records of County business etc. communicating with the Department Head approval. available from the software may be necessary should be retained by the Weld County network. the and confirm any Weld Information Services toprovidecompallblitywith personal compufing device County funding of any Department.AlongMIT he Microsoft Word and Excel. recipients of such a-moll. C. Personal Digital Assistant musimeelCounNhartlwae additional required user's signature, the Therefore, employees are (PDA). See 'Personal resporulblefar retaining and Computing Device'above. and software standards hardware and/or employee's full name, b. Devices running the archiving electronic moll established by the synchronization software. device make and model, Microsoft Windows Pocket Information afro County as fps reEO l D. End User. A person Governance Committee. obtained should be operating system,ontl serial utilizing any computing a prior to any PC operating system which Communication device to equeshtarn eonleel Weo purchase. number shall be provided. musdesignated syn prat all M messages that are intended s R dgtl ftwareetl synChrorni[ahan to be retained as public Perform daily activities County standards will result C. Information Services will software. In denialrtrM of access to the 12. Weld County reserves review MIehforlpnpnthe retards should be stored en related to Weld County the County's network drives business Weld County network. the right to discontinue Personal Computing Device 2. Software to synchronize in order to be included in the authorization for linking Acknowledgment form to cenirdizetlbackSynchronization9 GrouPW`Ise cdentlar. +ppocess. E. 5. if the device b used to persanalcomputbgdevlces ensure Me hardware arc Software.Software installed syrnchronizea m'comuniate to the network at any time software meet Weld County a IntetlSyncversa ai n5.xd 8. The Director of onaypotarypn»w}enables with the Weld County because of any perceived standards, higher,manufacturer Puma network or Its data, the threat to the sopllty of the Tech rdgy u . Information Services 6 the it to ShareRmnster county business related Weld County network 1. Information Services will official custodian of information to and from Mre Information remains the Infrastructure In addition. inform the employee of 3. Network client software elaChatiealy/dgltaNsearetl personated-floutingdeVlee informotloninekklinge-rmoll. property of Weld County. Weld County may. at any approval or denial, must be compatible The Department of p iota with P F. tang Trained o Weld County reserves the time.erentsaddlelorolund/ currently estadlshed Weld information ervIcesmonitoring is employedortcomputer ontl it softw re right to inspect the device or different eskto ebe used 2. Information Services will Counrynetwhen av ansand responsible for archivled supportware, software and its contents at any time on the desktop or the maintain a log of di users protocols(when available). and retrieving archived and hardware. antl/a request the removal personal computing device who synchronize or link a data/information. of the data or software. to safeguard the network or personal coon Failure to camcomputing device Check MTh Informtton C. Users (employees) are G. Information ane ServCommittee es request will be violation of with others Ilco ,compatibility with the Weld County Services ents. for Governance CommitteePP network. responsible for archiving e- °req.Reviews Information this Polley. current requirements. five moir(45�)ssage s. After tarty emPlo -s techndogyissuesaaolech 6. Even thou h the 13. Personal computing D. If hardwareorsoftware Section 9gr50 Exceptions and provides 9 ype devices, i.e.. PDA's, purchases are involved. personal computing device palm phones, a-mall purchaseswilbemodeafter The authority to approve should delete e-mail recommendations to the is a mobile device,by using devices, projectors digital the Information Services exceptions to this Policy is messages to minimize Board at Weld Countythe deviceinassociatbnwth cameras, etc. are not Governance Committee delegated to the Director of storage requirements. The Commissioners concerning Deportrrsent of Infdmpilarl information technology the Weld County network, included In the normal approvals have been Information Services Services is responsible for policy at Weld County. the employee agrees that Information technology obtained, Department long-term storage of the use of the device and its repair cosh.Repairs ore the electronic electronicoy mall a and will SSeection9-8-30.Statement of Pentane Countl y's governed lan edn yt owner or ofihehdvdual 1. Information Services will Sectian9-&do interpretation process approved requests Contact in accordance with the Acceptable Use Policy. department. by ordering and receiving records retention schedules A. With the growing need regular PDA type devices. Director of Information establishedforrecordsbythe for instantaneous 7. The elected official or 14. For an employee to • Services. department head must synchronize or link personal 2. Phone Services and/Or Pursuant to Port 1 Of communication and tlafa ensure there is a justified computing devices the the WelConmNPurchasing BE IT FURTHER ORDAINED by Article 17 of Title 6.C.R.S. access. Weld County Section 9- recognizes the need to business need to approve Weld County network, the Department will process the Board that the Clerk to requests for a-150. public incorpaaterlewtechroiogy the employee's use of the user and personal approved requests to other the Board behereby and is to taciktaie business related personal computing device computing device must be typesofpersorolconputtng directed fo arrange for functions by allowing that links with the Weld registered as a userwitts Medevices, i.e., paimpnones ColorodoCocksPublIshingto A. Public requestsfore-mail persanaicornputingdevices Countynetwork.Reelected Information Services LCD projectors. digital supplement the Weld trot isa public record should to share data or official Of deportment head Department. cameras, digital video be submitted to the elected communicate with the Weld is responsible for the type of cameras.eta County Code with the official a departmentheod. Countynetwork.Employees data that will be contained 15. Weld County does notherein. to amendments contained with Public ecord spitsts ffor o public u lic computingform of mobile on device.the personal cartpulIng guarantee continued a. PMotoanyparahase,ttne chapters, articles.coincide compliance be han public Personalcompatibility with any requesting deportment section.andsub-sectlonsas Records Act. Ifpr Pubic computing technology that hordwaredeviceorsoftware should obtain information the currenti existwithlnsald request synchronizes information. 8. Ae the end of being utilized in this Services approval on any y y mode to inspect a-malt, transfers Information. or employment with Weld environmentand is not liable dgital device that will Ink or Code: and resolve any inconsistencies regarding capitalization. grammar, and numbering ngg or placement m divisions.Chapiors, an su -sco sections, saidand sub-sections in said Code. BE IT FURTHER ORDAINED by the Board If any section. subsection, paragraph. sentence,clause,or phrase of this Ordnance Is for any reason held or decided to be unconstitutional, such decision shall not affect the validity of the remaining portions hereof. The Board of County Commissioners herebydecluresthatn woultl have enacted this Ordinance in each and every section, suhwtlan. paragraph, sentence. clause,and phrase thereof irrespective of the fact that any one or mare sections, subsections, paragraphs. sentences, Clauses. Or phrases night be declared to be unconstitutional or Invalid. NOTICE PURSUANT to the Weld County Home Ride Charter, Ordinance Number 2002-12 published above. was introduced and on motion duly mode and seconded. approved upon first reading on November 13, 2002. A public hearing and second reading Is sche&ied to be held in the Chambers of the Board. First Floor Hearing Room, 915 10th Street, Greeley. Cdorodo 83631, on December 2.2002. AN persons In any manner Interested in the reading of sold Ordinance ore requested to attend and may be hea-a. Please contact the Clerk to the Board's office at phone (970) 330.7215. Extension 4225,or fax(970)3520242, piortomedaydmeheari g If,as the result of a disability, you require reasonable accommodations In order to participate In MNs hewing. Any backup material, exhibits or Information prevlotSy submitted to the Board Of County Commissioners concerning memattermaybeexarkned in the office of the Clerk to the Board of County Commisonwa located In the Weld CantyCentenNol Center.Third Floor,915 101h Street, Greeley, Colorado. between the tours of 8:00 a.m.and S.U0 p.m..Monday thru Friday, or may be accessed through she Weld County Web Page w(ww.cbweld.co.se).E-Mail messages sent to on nd8AralCamtebnemoy not be included In the case Me.' To ensure inclusion of you E-Mai correspondence Intothecosefse,pleosesend a copy ' to cha drigOco.weld.co.us. SECOND READING: December 2.2a@.at 900 a.m. THIRD READING:December 23,2702,at 9:00 a.m. BOARD OF COUNTY COMMISSIONERS WELD COUNTY, COLORADO -Thhoo:November 15.2702 PutahoOlnelenor a ar er
Hello