Okla. Stat. tit. 20, app I R. 5

Current through Laws 2024, c. 453.
Rule 5 - Network and Online Usage Policy

This rule is a guide for appropriate use of OCIS provided resources. Users (as defined in Rule 1) must comply with this policy and acceptable use policies of any other networks or hosts used. The following guidelines will be used to determine if a particular use of OCIS is appropriate, if remedial action pursuant to Rule 3 will be taken, and if any other supervisory action by the Chief Justice or the Oklahoma Supreme Court is appropriate.

1. Users shall not use any computing resource to:
a. create, download, store, view, exhibit, or transmit material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory, or material that is otherwise unlawful or illegal, or which infringes on the rights of any other person;
b. conduct any business or activity for commercial purposes or financial gain, including publishing material which contains any advertising or any solicitation of others to use goods or services;
c. conduct any political activity.
2. Users must respect the privacy of others; for example, users shall not intentionally seek information on, obtain copies of, or modify, files or other data belonging to another user unless expressly authorized to do so by that user.
3. Users must respect the legal protection provided by copyright and license to programs and data.
4. Users must respect the integrity of computing and network systems; for example:
a. users shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system, or network and/or damage or alter software components of a computer, computing system, or network;
b. users shall not install, or cause to be installed, a virus or malicious software program;
c. users shall not seek or gain unauthorized access to any computer system;
d. a user's ability to connect to resources does not imply a right to connect to or make use of those resources unless specifically authorized.
5. Use should be consistent with guiding ethical statements and accepted community standards.
6. OCIS may not be used in ways that violate laws, regulations, codes of professional conduct applicable to particular users, and court rules.
7. Use of OCIS and any attached network in a manner that precludes or significantly hampers its use by others is not allowed, for example:
a. making use of streaming audio or video content, such as movies, clips, or radio stations; Such content should be restricted to business need only;
b. sending mass mailings or chain letters;
c. spending excessive amounts of time on the Internet for non-business related purposes;
d. playing/downloading games, audio, video, photos, or other entertainment software for non-business related purposes;
e. engaging in online chat groups, message boards, social networking or blogs for non-business related purposes;
f. using excessive disk space for storage of personal files such as music or photographs;
g. establishing connections that create routing patterns that are inconsistent with effective shared use of OCIS.
h. Users shall not connect any personal computer systems (i.e. desktop computers, laptop or tablet computers, or storage peripherals) to the OCIS network. Contractors shall not connect devices to the OCIS network without prior approval from the MIS Director or Deputy Director.
8. Executable files shall not be downloaded from the Internet without express permission from MIS, and when downloading is allowed it shall occur under such conditions as prescribed by MIS. Software not provided by MIS shall not be installed on a user's computer without the express consent and participation of MIS.
9. Users shall not publicize or share an individually assigned OCIS password in any way, nor shall users seek information on, obtain a copy of, or modify the password of another user. Users may share an OCIS common account pursuant to OCIS parameters only when expressly authorized in writing by the MIS.
10. Passwords shall meet complexity requirements and be changed at regular intervals per requirements set forth by MIS.
11. No user shall use an OCIS account assigned to another person or entity, and all users are responsible for any and all actions performed under the logon assigned for their use, regardless of whether they were the perpetrators of said actions.
12. Users shall not intentionally attempt to harm or destroy data of another user, the Internet, or any agency or other network connected to OCIS or the Internet.
13. Users shall clear their work surfaces and computer screens of any confidential and/or proprietary information before leaving their work area for any duration. The use of a password-protected screen saver is required and shall be set with an activation time not to exceed 15 minutes.
14. Users shall ensure the physical security of any mobile computing devices provided to them by MIS. Loss or theft of any mobile computing device, including a cellular phone/PDA, removable media, or laptop computer must be immediately reported to the Information Security Officer upon discovery of such loss or theft.
15. Users shall take all reasonable care to safeguard and properly dispose of any materials downloaded onto a device accessing OCIS resources remotely. Any materials downloaded to such a device should only be retained for as long as the immediate need prescribes. Credit card data, encryption keys, or other highly confidential material shall not be accessed from or stored on such a device under any circumstances.
16. The Supreme Court or Chief Justice thereof may determine other inappropriate uses.

Okla. Stat. tit. 20, app I R. 5

Adopted by Order of the Supreme Court October 30, 1970; Amended October 8, 1981. Amended by Orders December 8, 2003, eff. 1/1/2004.