Title VI, Section 461 - Logon Banners

 

PURPOSE:

A logon banner is verbiage that an end user sees at the point of access to a system which sets the right expectations for users regarding authorized and acceptable uses of a computer system and its resources, data, and network access capabilities. These include notices of authorized monitoring of users’ activities while they are using the system, and warnings of legal sanctions should any monitoring reveal evidence of illegal activities or a violation of security policy.

 

SCOPE:

This policy serves as the minimum standard to which all Departments must adhere.

 

POLICY:

All production systems that support logon banners will be required to have a banner displayed upon successful authentication to the system. This banner must be accepted by the user by responding to a prompt (“OK” or “Accept”)

 

NOTICE TO USERS

 

This computer system is the property of the County of Santa Cruz. It is for authorized use only. Users have no explicit or implicit expectation of privacy.

Any or all uses of this system may be intercepted, monitored, recorded, copied, audited and disclosed to authorized County and law enforcement personnel. By using this system, the user consents to such interception and disclosure at the discretion of the authorized personnel. All users of this system are governed by all applicable standards and policies of the County of Santa Cruz, both technical and non-technical in scope. Unauthorized or improper use of this system may result in administrative action and civil / criminal penalties. By continuing to use this system you consent to these terms and conditions of use. Please log off this system immediately if you do not agree to the conditions stated in this notice.

 

ENFORCEMENT:

County Systems Administrators shall use appropriate technology to deploy logon banners for impacted systems at the County.

 

Upon approval of this policy, all County Departments will have 90 days to bring all impacted systems into compliance.

 

EXCEPTIONS:

All exceptions to this policy must be reviewed and approved by the IS Policy committee.