My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Res 2025-175 approving an updated Council Technology Acquisition Policy, Council Member Electronic Use Policy, and a Council Policy Acknowledgment form that provides guidelines, expectations and responsibilities for the procurement and use of technology
San-Marcos
>
City Clerk
>
03 Resolutions
>
2020's
>
2025
>
Res 2025-175 approving an updated Council Technology Acquisition Policy, Council Member Electronic Use Policy, and a Council Policy Acknowledgment form that provides guidelines, expectations and responsibilities for the procurement and use of technology
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
9/25/2025 11:39:27 PM
Creation date
9/25/2025 11:39:11 PM
Metadata
Fields
Template:
City Clerk
City Clerk - Document
Resolutions
City Clerk - Type
Approving
Number
2025-175
Date
9/16/2025
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
10
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Show annotations
View images
View plain text
CO.POL.01 Council Member Electronic Use Policy <br /> Effective Date: 05/11/2021 <br /> Purpose <br /> This policy defines how to minimize liability and the risk of damage to data,technology, and <br /> information; protect the integrity, availability and confidentiality of technology entrusted to the City of <br /> San Marcos(COSM); and protects Council Members from the effects of unauthorized or improper use of <br /> technology. <br /> Applicability <br /> Mayor and Council Members during their term on City Council. <br /> Policy Statement <br /> Access <br /> General Access <br /> Access to technology will be granted upon receipt of a written request from the City Clerk's Office. <br /> Elected officials are given access to technology through their assigned accounts. Access is controlled <br /> and limited only to those systems specifically required to perform job functions. All machines accessing <br /> the network must run a supported, up-to-date version of an operating system and anti-virus software. <br /> Unauthorized Access <br /> Council Member may not attempt to gain, or enable another to gain, access to technology for which <br /> they have not been approved to use. Council Member may only use their assigned account and are <br /> responsible for all activities performed under their account. A Council Member may not share <br /> passwords or make their account available to others. A Council Member may not attempt to gain <br /> unauthorized access to another user's information. Council Members are not permitted to create local <br /> user accounts. <br /> Use <br /> Appropriate Use <br /> Council Member will use technology for the purpose of fulfilling their public services duties and <br /> responsibilities. Appropriate use applies to proper care and maintenance of technology as well as <br /> following best practice security measures relating to technology use. Limited, occasional or incidental <br /> use of the City's technology by Council Members for personal, non-business reasons are acceptable. <br /> However, Council Members shall not use City technology to transmit, retrieve, or store any information <br /> or communication that is discriminatory, harassing, derogatory to any individual groups, obscene, <br /> defamatory or threatening, illegal or otherwise contrary to the City's interest. <br /> Inappropriate Use <br /> Council Member shall not purposefully or negligently cause security breaches which include, but are not <br /> limited to: circumventing or attempting to avoid the user authentication or security of any City account; <br /> performing any form of unauthorized network monitoring to intercept electronic data not intended for <br /> the authorized user; modifying system configurations; introducing unauthorized devices (e.g., rogue <br /> access points, hubs, switches, routers, etc., for both hardware and software) into the network to provide <br /> unauthorized access to network resources. <br />
The URL can be used to link to this page
Your browser does not support the video tag.