Employee Manual 2023 - Flipbook - Page 130
A. Policy
a. City Resources are for City Business: City-owned technology resources shall serve the
business needs of the City of Plymouth.
b. Confidentiality: City-held information on the constituents of the City of Plymouth may
not be disclosed without a clear business need, or public disclosure request.
c. Limited Personal Use: City-owned technology resources may be used for personal
purposes on a limited basis, providing the following requirements are met:
• No marginal cost to the City
• No interference with work responsibilities
• No disruption to the workplace
• No impact on technology performance for the City
• No expectation of privacy
d. Limited use of external e-mail services: The limited use of an external e-mail service is
allowed, providing that the service applies anti-malware controls in a manner equivalent
to that provided by the City.
e. Music/Video: City computers must not be used to store music/audio/video files for
personal use.
f. Specific Prohibitions and Limitations: City policies regarding acceptable behavior and
communication will apply to use of the internet and messaging. Specifically prohibited
use includes but is not limited to:
• Conducting a private business or doing work for another employer;
• Political campaigning;
• Accessing sites which promote exclusivity, hatred, or positions which
are contrary to the City’s policy of embracing cultural diversity;
• Accessing inappropriate sites including adult content, online
gambling, and dating services;
• Accessing sites that promote illegal activity, copyright violation, or
activity that violates the City’s ethical standards;
• Using the internet to obtain or disseminate language or material
which would normally by prohibited in the workplace (such as
sexually explicit material);
• Using encryption technology that has not been approved for use by
the City;
• The use of personally owned technology for conducting City business,
where official City records are created but not maintained by the City;
• Making unauthorized general message distributions to all users
(everyone);
• Installing any software that has not been approved by the City;
• Sharing or storing unlicensed software or audio/video files;
• Using security exploit tools (hacking tools) to attempt to elevate user
privileges or access unauthorized resources;
• Using a City e-mail address when posting personal messages to public
forums (e.g. blogs, social media sites, wikis, and discussion lists);
City of Plymouth Employee manual - Page 130 – March 2023