TITLE 1 GENERAL GOVERNMENT ADMINISTRATION
CHAPTER 12 INFORMATION TECHNOLOGY
PART 10 INTERNET, INTRANET, EMAIL, AND DIGITAL NETWORK USAGE
188.8.131.52 ISSUING AGENCY. Information Technology Commission, 404 Montezuma, Santa Fe, NM 87501.
[184.108.40.206 NMAC - N, 9-15-04]
220.127.116.11 SCOPE. The policy governs the use of state of New Mexico information technology (IT) and data telecommunications resources.
[18.104.22.168 NMAC - N, 9-15-04]
22.214.171.124 STATUTORY AUTHORITY. Section 15-1C-5 NMSA 1978.
[126.96.36.199 NMAC - N, 9-15-04]
188.8.131.52 DURATION. Permanent.
[184.108.40.206 NMAC - N, 9-15-04]
220.127.116.11 EFFECTIVE DATE. September 15, 2004, unless a later date is cited at the end of a section.
[18.104.22.168 NMAC - N, 9-15-04]
22.214.171.124 OBJECTIVE. The purpose of this policy is to provide state of New Mexico staff with guidance on the proper use of the state’s information technology resources, including but not limited to the internet, the intranet, email, and the state’s digital network and supporting systems.
[126.96.36.199 NMAC - N, 9-15-04]
188.8.131.52 DEFINITIONS. As used in this policy:
A. access means the ability to read, change, or enter data using a computer or an information system;
B. equipment means computers, monitors, keyboards, mice, routers, switches, hubs, networks, or any other information technology assets;
C. freeware or shareware means software that is available free of charge and available for download from the internet. Freeware is protected by a copyright and is subject to applicable copyright laws;
D. information technology resources (IT resources) means computer hardware, software, databases, electronic message systems, communication equipment, computer networks, telecommunications circuits, and any information that is used by a state agency to support programs or operations that is generated by, transmitted within, or stored on any electronic media;
E. malicious code means any type of code intended to damage, destroy, or delete a computer system, network, file, or data;
F. pirated software means licensable software installed on a computer system for which a license has not been purchased or legally obtained;
G. security mechanism means a firewall, proxy, internet address-screening or filtering program, or other system installed to prevent the disruption or denial of services or the unauthorized use, damage, destruction, or modification of data and software;
H. sexually explicit or extremist materials means images, documents, or sounds that can reasonably be construed as:
(1) discriminatory or harassing; or
(2) defamatory or libelous; or
(3) obscene or pornographic; or
(4) threatening to an individual’s physical or mental well-being; or
(5) read or heard for any purpose that is illegal; and
I. user means any person authorized by a state agency to access state IT resources, including a state employee, officer or contractor; a user for purposes of this rule does not include a person who accesses state telecommunications resources offered by the state for use by the general public.
[184.108.40.206 NMAC - N, 9-15-04]
220.127.116.11 POLICY. The internet and other information technology resources are important assets that the state can use to gather information to improve external and internal communications and increase efficiency in business relationships. To encourage the effective and appropriate use of the state’s IT resources, the following policies govern the use of the state’s IT resources:
A. State agencies shall provide all users with a written copy of this rule.
(1) All users shall sign and date a statement indicating they have received and read this policy.
(2) Each user’s signed statement shall be kept on file for as long as the user is employed by, has a contract with or otherwise provides services to the agency.
B. For the purposes of this rule, IT resources usage includes but is not limited to all current and future internet/intranett communications services, the world wide web, state intranets, voice over IP, file transfer protocol (FTP), TELNET, email, peer-to-peer exchanges, and various proprietary data transfer protocols and other services.
C. The state of New Mexico may undertake all prudent and reasonable measures to secure the systems it uses for internet communications and the data transmitted by these systems and services, at the direction of the governor or his designee(s).
D. The state of New Mexico and/or its agencies may install software and/or hardware to monitor and record all IT resources usage, including email and web site visits. The state retains the right to record or inspect any and all files stored on state systems.
E. State IT resources shall be used solely for state business purposes (except as described in Section 18.104.22.168 NMAC) and users shall conduct themselves in a manner consistent with appropriate behavior standards as established in existing state policies. All state of New Mexico policies relating to intellectual property protection, privacy, misuse of state equipment, sexual harassment, sexually hostile work environment, data security, and confidentiality shall apply to the use of IT resources.
F. Users shall have no expectations of privacy with respect to state IT resource usage. Serious disciplinary action up to and including termination of employment or contract may result from evidence of prohibited activity obtained through monitoring or inspection of electronic messages, files, or electronic storage devices. Illegal activity involving state IT resource usage may be referred to appropriate authorities for prosecution.
[22.214.171.124 NMAC - N, 9-15-04]
126.96.36.199 PROHIBITED INTERNET USE. State IT resources shall not be used for anything other than official state business unless otherwise specifically allowed by the agency head or as permitted under Section 188.8.131.52 NMAC.
A. No software licensed to the state nor data owned or licensed by the state shall be uploaded or otherwise transferred out of the state’s control without explicit authorization from the agency head.
B. IT resources shall not be used to reveal confidential or sensitive information, client data, or any other information covered by existing state or federal privacy or confidentiality laws, regulations, rules, policies, procedures, or contract terms. Users who engage in the unauthorized release of confidential information via the state’s IT resources, including but not limited to newsgroups or chat rooms, will be subject to sanctions in existing policies and procedures associated with unauthorized release of such information.
C. Users shall respect the copyrights, software, licensing rules, property rights, privacy, and prerogatives of others, as in any other business dealings.
D. Users shall not download executable software, including freeware and shareware, unless it is required to complete their job responsibilities.
E. Users shall not use state IT resources to download or distribute pirated software or data, including music or video files.
F. Users shall not use state IT resources to deliberately propagate any malicious code.
G. Users shall not use state IT resources to intentionally disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of the state’s IT resources.
H. Unauthorized dial-up access to the internet is prohibited from any device that is attached to any part of the state’s network. The state’s IT resources shall not be used to establish connections to non-state internet service providers without prior authorization in writing by the office of the chief information officer or the state chief information technology security officer.
I. Users shall not access, store, display, distribute, edit, or record sexually explicit or extremist material using state IT resources.
(1) In agencies or offices where the display or use of sexually explicit or extremist materials falls within legitimate job responsibilities, an agency head may exempt a user in writing from the requirements of this subsection. The agency issuing the exemption letter shall keep the letter on file for as long as the user is employed by, has a contract with, or otherwise provides services to the agency.
(2) The incidental and unsolicited receipt of sexually explicit or extremist material, such as might be received through email, shall not constitute a violation of this section, provided that the material is promptly deleted and neither stored nor forwarded to other parties.
J. Users are prohibited from accessing or attempting to access IT resources for which they do not have explicit authorization by means of user accounts, valid passwords, file permissions or other legitimate access and authentication methods.
K. Users shall not use state IT resources to override or circumvent any security mechanism belonging to the state or any other government agency, organization or company.
L. Users shall not use state IT resources for illegal activity, gambling, or to intentionally violate the laws or regulations of the United States, any state or local jurisdiction, or any other nation.
[184.108.40.206 NMAC - N, 9-15-04]
220.127.116.11 PERSONAL USE OF THE INTERNET. Occasional and incidental personal use of the state’s IT resources and internet access is allowed subject to limitations. Personal use of the internet is prohibited if:
A. it materially interferes with the use of IT resources by the state or any political subdivision thereof; or
B. such use burdens the state or any political subdivision thereof with additional costs; or
C. such use interferes with the user’s employment duties or other obligations to the state or any political subdivision thereof; or
D. such personal use includes any activity that is prohibited under this rule.
[18.104.22.168 NMAC - N, 9-15-04]
22.214.171.124 AGENCY POLICIES. All agencies shall implement this policy immediately upon its effective date. At the discretion of the agency head, an agency may adopt additional agency-specific IT resources usage policies that are more restrictive than this rule, but in no case shall an agency adopt policies that are less restrictive than this rule. This rule shall control in the event of any conflict between an agency policy and this rule.
[126.96.36.199 NMAC - N, 9-15-04]
HISTORY OF 1.12.10 NMAC: [RESERVED]