Which process do you need to complete? User Affirmation Agreement Please review the text below as you are subject to the provisions listed within it, and accept the acknowledge statement. Nothing in this agreement changes the fact that all uncovered employees of the State are at-will employees and serve at the pleasure of the appointing authority. In consideration for access to State information technology systems and applications, I agree to at all times abide by all applicable Arizona State statutes, rules, policies and directives, and understand that I am prohibited from violating the foregoing, which includes, but is not limited to, the following actions: Revealing data to any person or persons outside or within the agency who have not been specifically authorized to receive such data.
|Published (Last):||25 March 2018|
|PDF File Size:||5.31 Mb|
|ePub File Size:||11.85 Mb|
|Price:||Free* [*Free Regsitration Required]|
Which process do you need to complete? User Affirmation Agreement Please review the text below as you are subject to the provisions listed within it, and accept the acknowledge statement.
Nothing in this agreement changes the fact that all uncovered employees of the State are at-will employees and serve at the pleasure of the appointing authority. In consideration for access to State information technology systems and applications, I agree to at all times abide by all applicable Arizona State statutes, rules, policies and directives, and understand that I am prohibited from violating the foregoing, which includes, but is not limited to, the following actions: Revealing data to any person or persons outside or within the agency who have not been specifically authorized to receive such data.
Attempting or achieving access to data not germane to my mandated job duties. Entering, modifying, deleting, or otherwise altering data, data structures, databases, programming code or scripts without appropriate authorization. Entering, modifying, deleting, or otherwise altering data, data structures, databases, programming code or scripts for direct or indirect personal gain or advantage. Entering, modifying, deleting, or otherwise altering data, data structures, databases, programming code or scripts maliciously or in retribution for real or imagined abuse or for personal amusement.
Unauthorized access, modification or destruction of any computer, computer system, State information system, hardware appliance, network device, media device, computer program, data structure, database, or program code or script.
Unauthorized installation or connection of any computer or electronic equipment to a State network. Recklessly disrupting or causing disruption of any computer, computer system or State information system. Unauthorized use of electronic messaging or other communications.
Using State equipment or property, including equipment or property leased to the State, for other than work related purposes, unless authorized by written agency policy or other proper authorization. Using a personal device that is not protected with approved and up-to-date anti-virus software and fully patched to access any State of Arizona network. Removing sensitive data from the State network or State devices that are not fully protected with encryption.
Accessing, copying, disclosing, or deleting personally identifiable information, personal health information or other sensitive non-public information beyond that authorized by statute or specific authority of authorizing agent. Accessing, copying, or disclosing critical information technology infrastructure information without authorization.
Using software on the local area network LAN , or on any PC in any manner other than in accordance with the license agreement. Making, acquiring, using, or distributing unauthorized copies of computer software. State employees; access to internet pornography prohibited; cause for dismissal; definitions Except to the extent required in conjunction with a bona fide, agency approved research project or other agency approved undertaking, an employee of an agency shall not knowingly use agency owned or agency leased computer equipment to access, download, print or store any information infrastructure files or services that depict nudity, sexual activity, sexual excitement or ultimate sexual acts as defined in section Agency heads shall give, in writing, any agency approvals.
Agency approvals are available for public inspection pursuant to section An employee who violates this section may be subject to discipline or dismissal. All agencies shall immediately furnish their current employees with copies of this section.
All agencies shall furnish all new employees with copies of this section at the time of authorizing an employee to use an agency computer. For the purposes of this section: 1.
I agree to seek clarification before entering, modifying, deleting, altering, or disclosing data. Appropriate action will be taken, including immediate termination of access, to ensure that applicable federal and state statutes, regulations and directives governing confidentiality and security are enforced. Vendors providing services under a contract are subject to vendor performance reports, and any contract terms and warranties, including potential damages.
During all times that I have access to State information technology systems and applications, I accept responsibility for adhering to all applicable State of Arizona statutes, rules, security policies and directives and agree to abide by this agreement.
I understand that I have access to instruction on and access to applicable statutes, rules and policies. Failure to accept the terms of this agreement will mean I will not be permitted access to State of Arizona produced media, data, computer equipment and software. Powers and duties of the department; violation; classification A. Computer tampering; venue; forfeiture; classification A. Records; records management; powers and duties of director; fees; records services fund A.
National crime prevention and privacy compact [State of Arizona employees] A. State employees; access to internet pornography prohibited; cause for dismissal; definitions Statewide Policy Acceptable Use and corresponding agency policy By checking the box, I acknowledge that I have read and understand the Access Agreement and accept responsibility for adhering to all applicable laws and to the State of Arizona policies and the listed affirmations.
Please review the text below as you are subject to the provisions listed within it, and accept the acknowledge statement. Before receiving any initial systems access, all users, employees, contractors or volunteers who will have access to any DES data, systems, facilities or clients must read and acknowledge it by electronically signing the User Affirmation Agreement UAA. Any DES employee found to have violated the UAA may be subject to disciplinary action, up to and including termination of employment.
The UAA applies to all DES: Employees, contractors, consultants, temporary employees, vendors and anyone who uses the DES information systems, including any users affiliated with third parties, regardless of their work location in a DES facility, remotely telecommuting or while traveling; Proprietary information stored on electronic and computing devices whether it is owned or leased by DES, the employee or a third party, and remains the sole property of DES; and Information Technology IT resources, equipment owned or leased by DES, such as desktop computers, laptop computers or any portable electronic devices PED to access, store, receive or transmit sensitive information.
All DES information systems are to be used only for business purposes in the course of normal business operations as we do the work of the State for DES clients and partners. The following are guidelines for practicing safe computing at DES: Privacy There shall be no expectation of privacy and DES may monitor equipment, systems and network traffic, including email and internet access, at any time for any reason.
DES reserves the right to audit networks and systems on a periodic basis to ensure compliance with its policies and procedures. Connecting to the DES Network Equipment that is non-DES owned shall not be connected to the Internal Network either directly, through a virtual private network or by any wireless or Bluetooth protocol.
Vendor, contractor or end user owned equipment shall connect to the DES provided wireless access points or to the internal network allowing this equipment to receive an IP address for direct access to the internet. Protecting DES Information DES users shall: Access, use or share DES information only if authorized to do so and it is necessary to fulfill their assigned job duties; Protect sensitive information from disclosure to unauthorized persons or groups; Log off, lock workstation or device or use the password-protected screensaver any time they physically away from a device or work area, even for a short time and log off when leaving for the day.
Unlabeled data is assumed to be Public. Promptly secure any information a user is not authorized see in the course of their duties and notify a supervisor and to the extent possible, stop further access to the information and do not provide access to others until guidance is received.
Report any weaknesses in computer security or data privacy, suspicious behavior of others or any incidents of possible misuse or violation of policy to IRM via a J Form. The J outlines the information needed to conduct an investigation into the incident. Email Users must use extreme caution when opening e-mail or any attachments received from unknown senders as they could contain malware or viruses.
DO NOT open any attachments or click on links in emails from anyone not known to you and even use caution when opening attachments from anyone you do know. Confidential information may not be emailed or otherwise transmitted on the DES network unless it is encrypted in a manner specified in DES When authorized to travel with a DES-owned device, users shall; Not leave device in a vehicle, if you must leave a device in a vehicle, lock it in the trunk to keep it out of sight; Not leave a device in a hot vehicle when the outside temperature may become excessive in the vehicle, such as temperatures above 85 degrees.
Not place the device in checked luggage; Not store or check the device in an airport, a train or bus station or any public locker; Avoid leaving a device in a hotel room. If you must leave your device in a hotel room, lock it inside another piece of luggage or a hotel safe. Internet activities that inhibit the security of DES data and information systems or cause degradation of network services are prohibited. DES automatically prevents users from accessing Internet sites that are considered unproductive, illegal or inappropriate.
This list is provided as a baseline guide for unacceptable use and is not inclusive of every circumstance. Under no circumstances is an employee of DES authorized to engage in any activity that is illegal under a local, state, federal or international law while utilizing DES-owned equipment or resources.
This includes, but is not limited to: The procuring, storing, transmitting or viewing of any material that is discriminatory, defamatory, harassing, intimidating, hostile, offensive or illegal on the basis of gender, race, color, national origin, disability, sexual orientation or any other grounds. Any violation of the rights of a person or company protected by copyright, trade secret, patent, intellectual property laws or regulations, such as the installation, distribution of "pirated" software or other products not appropriately licensed for use by DES.
Knowingly or unknowingly revealing any DES data or information to someone within or outside of DES not specifically authorized to receive such data; Providing any information about DES employees, business practices or activities to unauthorized parties outside DES.
Examples include but are not limited to Internet radio, streaming music, such as ITunes, Pandora, Spotify or streaming video services, such as Netflix, Hulu, Vudo or Amazon. Introduction of malicious programs into the DES network or servers, such as viruses, worms, Trojan horses, e-mail bombs, etc.
Making fraudulent offers of products, items or services originating from any DES device or account. Making statements about warranty, expressly or implied, unless it is a part of normal job duties. Implementing security breaches or disruptions of network communications. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties.
Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service and forged routing information for malicious purposes. Circumventing user authentication or security of any host, network or account.
Introducing honeypots, honeynets, or similar technology on the DES network. Sending or forwarding unsolicited email messages, including the sending of junk mail or other advertising material to individuals who did not specifically request such material email spam. Any form of harassment via email, telephone or electronic messaging, whether through language, frequency or size of messages.
Unauthorized use, or forging, of email header information, that includes sending email that appears to originate from an account that you are not authorized to send from.
Solicitation of email for any other email address, other than that of your account, with the intent to harass or to collect replies. Creating or forwarding chain letters, Ponzi or other pyramid schemes of any type. Use of unsolicited email originating from within the DES networks of other Internet service providers on behalf of, or to advertise, any service hosted by DES or connected via the DES network.
Certain employees may be exempted from the above restrictions during the course of their legitimate job responsibilities, for example, a systems administration employee may have a business need to disable the network access of a host if that host is disrupting production services. Users with specialized access to Federal Tax Information FTI , Personally Identifying Information PII , Protected Health Information PHI or other financial information, may be subject to additional rules and required to complete additional training, acknowledgments or supplementary agreements regarding the access to the specialized information.
Users with specialized access to National Directory of New Hire NDNH information agree to obtain, use or disclose such data only in connection with the performance of official duties and solely for authorized purposes. Non-compliance to these requirements are subject to the consequences listed below. Consequences for Non-Compliance Any user of DES information systems or resources who fails to comply with established information security and privacy policies and procedures may be subject to sanctions, including referral to a law enforcement agency for appropriate action, or administrative sanctions up to and including termination.
DES employees are expected to be familiar with and adhere to the guidelines in the following policies. I agree to abide by all applicable federal and state laws and DES policies. I understand that DES will take appropriate action to ensure that applicable federal, state and local laws and DES policies governing confidentiality and security are enforced.
A violation of these requirements or misuse of DES property including computer programs, equipment, and data, may result in withdrawal of individual access privileges and prosecution in accordance with any applicable provision of law. By checking the box, I acknowledge that I have read and understand the User Affirmation Agreement and accept responsibility for adhering to all applicable laws and DES policies and the listed affirmations. Are you a new DES Employee?
YES Please enter your personal details below.
Food Stamps Application Instructions
Medicaid Application Instructions