My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
05-27-2015 Council Packet
>
City Council Packets
>
2010-2019
>
2015
>
05-27-2015 Council Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
5/27/2015 1:36:49 PM
Creation date
5/27/2015 1:25:07 PM
Metadata
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
156
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
comments from the public when they come across discussions about the Air Force on social <br />media sites,3 <br />6. Security <br />Governments are working to develop best practices to ensure the security of their data and <br />technical infrastructure in light of the new uses, users, and technologies related to social <br />media use, <br />Some of the reviewed policies deal explicitly with security concerns for social media, while <br />others are more general, For instance, the City of Hampton's policy simply points to <br />existing IT security policies by stating, "Where appropriate, City IT security policies shall <br />apply to all social networking sites and articles." Other policies target specific security <br />concerns; two types generally found in the policies analyzed and discussed in the <br />interviews were technical and behavioral concerns, <br />The technology concerns addressed in the policies focused on password security, <br />functionality, authentication of identity using public key infrastructures, and virus scans. <br />Fifteen of the policies included specific requirements such as requiring users to maintain <br />complex passwords, A few policies required a designated official to hold all username and <br />passwords for social media accounts. <br />Sample language outlining the technical concerns and processes to follow: <br />Agency 1T Administrators shall: <br />1, Limit Internet access Social Media web sites according to the agency's acceptable use policy, while <br />allowing authorized Users to reach content necessary to fulfill the business requirements, <br />Limitations may include:.,,, <br />b, Allowing Internet access to Users who are specifically authorized, <br />c, Preventing unnecessary functionality within Social Media web sites, such as instant <br />messaging (IM) or file exchange, <br />d. Minimizing and/or eliminating the addition of web links to other web sites, such as <br />"friends", to minimize the risk of exposing a government user to a link that leads to <br />inappropriate or unauthorized material, <br />2. Enable technical risk mitigation controls to the extent possible, These controls may include: <br />a. Filtering and monitoring of all Social Media web site content posted and/or viewed, <br />b, Scanning any and all files exchanged with the Social Media web sites, <br />State of California <br />The Department of the Navy memo on social media specifically mentions following the <br />Department of Defense's Public Key Infrastructure procedures and restricts the posting of <br />classified information to protected sites only. Two policies detail how attachments should <br />be scanned using antivirus tools before they can be posted on behalf of the government. <br />3 http://www,wired,com/imagesY,blogs/photos/uncategorized/2009/01./06/air„force,.blog,.char,ipg <br />10 <br />
The URL can be used to link to this page
Your browser does not support the video tag.