Use of Computers

  • Only the employees of the City of Dalton and other designated persons are authorized to use or access the department's computers.
  • Employees will only use computer software and related equipment in the direct performance of their assigned duties unless authorized by their department head.
  • Employees needing assistance with computer-related problems should contact the IT Department either by phone, email or submit a computer work order for all hardware or software problems and installations.
  • Use of Company computers, networks, and Internet access is a privilege granted by the administration and may be revoked at any time for inappropriate conduct carried out on such systems, including, but not limited to:
    • Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e-mail ("spam") that is unrelated to legitimate City purposes;
    • Engaging in private or personal business activities, including instant messaging and chat rooms or listening to the radio
    • Misrepresenting oneself or the City;
    • Violating the laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any way;
    • Engaging in unlawful or malicious activities;
    • Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file designed to disrupt, disable, impair, or otherwise harm either the Company's networks or systems or those of any other individual or entity;
    • Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or private messages;
    • Sending, receiving, or accessing pornographic materials;
    • Becoming involved in partisan politics;
    • Causing congestion, disruption, disablement, alteration, or impairment of the City networks or systems;
    • Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web journals, "chat rooms", or private/personal/instant messaging;
    • Failing to log off any secure, controlled-access computer or other form of electronic data system to which you are assigned, if you leave such computer or system unattended;
    • Using recreational games; and/or
    • Defeating or attempting to defeat security restrictions on company systems and applications.