WHITE MOUNTAIN APACHE TRIBE

 COMPUTER USE & INTERNET POLICY

 Effective September 14, 2005 by Resolution No. 09-2005-249


TABLE OF CONTENTS

 

SECTION ONE - DEFINITIONS

SECTION 1.1 COMPUTERS

SECTION 1.2 NETWORK RESOURCES
SECTION 1.3 E-MAIL
 

SECTION TWO - PURPOSE

 

SECTION THREE - COMPUTER USE POLICY

SECTION 3.1 COMPUTER USE FOR OFFICIAL BUSINESS ONLY
SECTION 3.2 PERSONAL USE IS LIMITED
SECTION 3.3 ACCESS TO NETWORK RESOURCES ONLY ON WMAT SERVERS
SECTION 3.4 APPLICATION OF POLICY
 

SECTION FOUR - INAPPROPRIATE USE OF COMPUTERS IS PROHIBITED

SECTION 4.1 DEFINITIONS OF INAPPROPRIATE USE
SECTION 4.2 COMMERCIAL SOFTWARE
 

SECTION FIVE - PERMITTED PERSONAL COMPUTER, NETWORK RESOURCE, AND E-MAIL USE

SECTION 5.1 LIMITED USE
SECTION 5.2 NO COST
SECTION 5.3 MUSIC
SECTION 5.4 WHITERIVER LIBRARY
 

SECTION SIX - THE TRIBE'S RIGHT TO INSPECT COMPUTERS

SECTION 6.1 ATTORNEY WORK PRODUCT
 

SECTION SEVEN - COMPUTER SECURITY OVERSIGHT, INVESTGATIONS AND SANCTIONS

SECTION 7.1 SECURITY OVERSIGHT
SECTION 7.2 INVESTIGATIONS
SECTION 7.3 SANCTIONS FOR INAPPROPRIATE USE OF COMPUTERS, NETWORK RESOURCES OR E-MAIL
 

SECTION EIGHT - GUIDELINES


 

 

SECTION ONE - 
DEFINITIONS.
       
 
SECTION 1.1 
Computers. The term "computers" means computer systems, operating systems, software or
    hardware purchased by and for the Tribe, and includes peripheral equipment such as printers and scanners.
       
 
SECTION 1.2 
Network Resources. The term "network resources" means Local Area Networks, other computerized
    networks or software, the Internet or world-wide web, websites, web hosting and on-line information services.
       
 
SECTION 1.3 
E-mail. The term "e-mail" means electronic mail or electronic communications software or systems.
       
SECTION TWO - 
PURPOSE. This policy sets standards and restrictions for the use of Tribal computers, network resources,
    and e-mail in order to maintain cost efficiency, increase employee productivity, and to reduce potential liability and inappropriate use. This policy shall be known as the Computer Use and Internet Policy.
     
SECTION THREE - 
COMPUTER USE POLICY.
       
 
SECTION 3.1 
Computer Use for Official Business Only. The use of the White Mountain Apache Tribe automation
    systems, including computers, fax machines, and all forms of Internet access are intended for official business purposes of the Tribe. Departmental directors shall determine and justify the extent of the availability to staff of computers, network resources and e-mail. Those purposes include:
       
    A. Improving communications and information exchange within the Nation, and to entities outside the Tribe,
      such as local, state and federal agencies, businesses and other groups, and
       
    B. Providing access to information and research resources to employees for the business of the Tribe.
       
 
SECTION 3.2 
Personal Use is Limited. Except as permitted in this policy, the Tribe's computers, network resources and
    e-mail are not to be used for entertainment, personal communications, other personal use, or illegal, harassing libelous or obscene purposes during or outside government business hours. In addition, employees shall not connect their personal computers or laptops to the Tribe = s internet access points. Permitted personal uses are described in Section 5.0 of this Policy. Personal use is a privilege and shall not interfere with official business or involve any expense to the Tribe. This privilege may be revoked or limited at any time by the Tribal Chairman, departmental directors or MIS. This policy for personal use may be applied to contractor personnel, interns and other non-government employees through incorporation by reference in contracts or memorandums of agreement as conditions for using the Tribe's computers, network resources and Internet services.
       
 
SECTION 3.3 
Access to Network Resources Only On WMAT Servers. Any and all business of the Tribe conducted by
    computer or through network resources of any kind shall be on secure servers hosted and managed by MIS.
       
 
SECTION 3.4 
Application of Policy. This policy applies to all of the Tribe's computers, network resources and e-mail and
    includes any information in digital electronic format such as e-mail, databases, clip art, digital images, voice and sound recordings or any other digitized information that may be available or developed and is stored on the Tribe's computers.
       
SECTION FOUR - 
INAPPROPRIATE USE OF COMPUTERS IS PROHIBITED. WMAT computers, network
    resources, and e-mail shall not be used inappropriately. Inappropriate use of such resources is cause for disciplinary action in accordance with the WMAT Personnel Policies Manual. Criminal investigations by the Whiteriver Police Department, or personnel investigation by any WMAT Department or MIS, of inappropriate use by any employee, do not constitute inappropriate use.
       
 
SECTION 4.1 
Definitions of Inappropriate Use. Use is defined as "excessive" if it interferes with normal job functions,
    responsiveness, or the ability to perform daily job activities. Use of Tribal computers, networks, and Internet access is a privilege granted by management and may be revoked at any time for inappropriate conduct including, but not limited to:
       
    - Seeking to gain or gaining unauthorized access to propriety information; or
       
    - Hacking or otherwise seeking unauthorized access to passwords, computers or systems of other
      employees, individuals, business, agencies or governments; or
       
    - Using or knowingly allowing another to use the Internet for personal profit, personal business, commercial
      product advertisement or partisan political purposes not related to the Tribe's official business; or
       
    - Processing, distributing, transmitting, storing or displaying electronic material which is obscene,
      pornographic, profane, sexually explicit, libelous or defamatory1; or
       
    - Sending or posting confidential electronic materials outside of the Tribe, or posting Tribal confidential
      electronic materials inside the Tribe to non-authorized personnel; or
       
    - Infringing on copyrights or other intellectual property rights, license agreements or other contracts (such as
      illegally manipulating, installing or making available copyrighted software, music or other protected intellectual property); or
       
    - Forwarding unsolicited ads, junk mail or chain mail, known as SPAM2; or
       
    - Accessing entertainment sites, such as games, movies, videos, chat rooms, music downloads; or
       
    - Creating and distributing a computer virus; or
       
    - Any other non-business use of a computer, network resource or e-mail.
       
    - Misrepresenting oneself or the Tribe;
       
    - Engaging in unlawful or malicious activities;
       
    - Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or
      private messages;
       
    - Causing congestion, disruption, disablement, alteration, or impairment of Tribal networks or systems;
       
    - Defeating or attempting to defeat security restriction on Tribal systems and applications.
       
 
SECTION 4.2 
Commercial Software. The Tribe has licensed the use of certain commercial software application programs
    for business purposes. Third parities retain the ownership and distribution rights to such software. No employee may create, use, or distribute copies of such software that are not in compliance with the license agreements for the software.
       
SECTION FIVE - 
PERMITTED PERSONAL COMPUTER, NETWORK RESOURCE, AND E-MAIL USE. Tribal
    automation systems are Tribal resources and are provided as business communications tools. Limited personal use of WMAT computers, network resources, and e-mail is permitted, subject to the following limitations.
       
 
SECTION 5.1 
Limited Use. Brief and occasional personal use of the electronic mail system or the Internet is acceptable as
    long as it is not excessive or inappropriate, occurs before or after office hours or during authorized personal time (lunch or other breaks). Use of third-party e-mail (Yahoo, Hotmail, AOL) is strictly prohibited.
       
 
SECTION 5.2 
No Cost. Personal use is permitted only for uses that do not create user charges to the Tribe.
       
 
SECTION 5.3 
Music. Streaming music is permitted so long as such use does not infringe on intellectual property rights or
    interfere with or interrupt others in an office.
       
 
SECTION 5.4 
Whiteriver Library. This Computer Use and Internet Policy does not apply to the equipment or resources of
    the Whiteriver Library, which has its own policies and procedures.
       
SECTION SIX - 
THE TRIBE'S RIGHT TO INSPECT COMPUTERS. The Tribe owns the rights to all data and files in
    any computer, network, or other information system used by the Tribe. The Tribe reserves the right to monitor computer and e-mail usage, both as it occurs and in the form of account histories and their content. The Tribe has the right to inspect any and all files stored in any areas of the network or on any types of computer storage media in order to assure compliance with this policy and state and federal laws. The Tribe will comply with reasonable requests from law enforcement and regulatory agencies for logs, diaries, archives, or files on individual computer and e-mail activities. The Tribe also reserves the right to monitor electronic mail messages and their content. Employees must be aware that the electronic mail messages sent and received using Tribal equipment are not private and are subject to viewing, downloading, inspection, release, and archiving by Tribal officials at all times. No employee may access another employee's computer, computer files, or electronic mail messages without prior authorization from either the employee or an appropriate Tribal official.
       
 
SECTION 6.1 
Attorney Work Product. Inspection of attorney work product may only be conducted with the permission of
    the supervisory attorney of the office which employs that attorney.
       
SECTION SEVEN - 
COMPUTER SECURITY OVERSIGHT, INVESTIGATIONS AND SANCTIONS.
       
 
SECTION 7.1 
Security Oversight. MIS, the Internal Auditor and other appropriate staff reserve the right to review
    employee use of computers, network resources or e-mail to determine whether such use is appropriate and conforms to this policy.
       
 
SECTION 7.2 
Investigations. MIS is charged with the responsibility of conducting general investigations of the use of
    computers, network resources or e-mail by WMAT employees on its own or by request of a Department Director. If MIS determines that an employee has committed a prohibited or inappropriate use of computers, network resources or e-mail, MIS shall report such use to the appropriate authority, including the Department Director, the Tribal Chairman or the Whiteriver Police Department.
       
    A. It is a violation of Tribal policy for any employee, including system administrators and supervisor, to
      access electronic mail and computer systems files to satisfy curiosity about the affairs of others. Employees found to have engaged in such activities will be subject to disciplinary action.
       
    B. The Tribe will comply with reasonable requests from law enforcement and regulatory agencies for logs,
      diaries, archives, or files on individual Internet activities.
       
 
SECTION 7.3 
Sanctions for Inappropriate Use of Computers, Network Resources, or E-mail. If an employee is found
    by MIS to be violating the Computer Use and Internet Policy, an employee's access to the Tribe's computers, network resources or e-mail may be revoked. In addition, appropriate disciplinary actions may be authorized in accordance with the Personnel Policies Manual, up to and including dismissal and criminal prosecution. Employees are individually liable for any and all damages incurred as a result of violating Tribal security policy, copyright, and licensing agreements.
       
SECTION EIGHT - 
GUIDELINES. MIS shall be responsible for establishing guidelines for use of computers, network
    resources and e-mail.









       
  1 NOTE: If you have received any material which is obscene, pornographic, profane, sexually explicit, libelous or defamatory, immediately contact MIS to initiate an investigation and have such material deleted.
       
  2 NOTE: Employees who inadvertently or unintentionally receive such material should delete it from their computer.