SS-08-001 Appropriate Use and Monitoring

Issue Date:  3/31/2008 

Revision Effective Date:  3/31/2008

Review Date: 7/1/2018 


State of Georgia information technology resources are provided to authorized users to facilitate the efficient and effective performance of their duties.  The use of such resources imposes certain responsibilities and obligations on Users and is subject to state government policies and applicable state and federal laws.  It is the responsibility of Users to ensure that such resources are not misused.


State information technology resources are to be used to conduct official state business. 

Users of state information technology resources shall assume NO expectation of personal privacy outside protections provided by the Privacy Act or 1974, HIPAA, and/or other federal, state, or local regulations.

All information created, transmitted, and stored on State information technology resources is the sole property of the state and is subject to monitoring, review, and seizure.  

Logging on to any State information system is an acknowledgement of this standard and an agreement to abide by it and all other governance regarding its use.

All Agencies shall provide notice of the right and intent to monitor by displaying an Appropriate Use Banner on all computers.


Occasional access to information or websites of the Georgia Lottery Corporation shall not constitute nor be considered inappropriate use.


The following is provided as an example banner which agencies may use or modify as they deem appropriate.  Ideally such banners would be part of standard log-on procedures; however, alternatives such as stickers or labels affixed to monitors, as well as signed and retained user acknowledgement statements may also be used.

Agencies may also use filtering software in order to better ensure and/or monitor compliance with this Policy.


Inappropriate usage includes (but is not limited to) actual or attempted usage of information technology resources for:

  • Conducting private or personal for-profit activities. This includes use for private purposes such as business transactions, private advertising of products or services, and any activity meant to foster personal gain;
  • Conducting unauthorized not-for-profit business activities;
  • Conducting any illegal activities as defined by federal, state, and local laws or
  • regulations;
  • Creation, accessing or transmitting sexually explicit, obscene, or pornographic material;
  • Creation, accessing or transmitting material that could be considered discriminatory, offensive, threatening, harassing, or intimidating;
  • Creation, accessing, or participation in online gambling;
  • Infringement of any copyright, trademark, patent or other intellectual property rights;
  • Performing any activity that could cause the loss, corruption of or prevention of rightful access to data or the degradation of system/network performance;
  • Conducting any activity or solicitation for political or religious causes;
  • Unauthorized distribution of state data and information;
  • Attempts to subvert the security of any state or other network or network
  • resources;
  • Use of another employee’s access for any reason unless explicitly authorized;
  • Attempts to modify or remove computer equipment, software, or peripherals without proper authorization.
  • Attempts to libel or otherwise defame any person

Information Technology Resources or IT Resources means hardware, software, and communications equipment, including, but not limited to:

personal computers, mainframes, wide and local area networks, servers, mobile or portable computers, peripheral equipment, telephones, wireless communications, public safety radio services, facsimile machines, technology facilities (including but not limited to: data centers, dedicated training facilities, and switching facilities), and other relevant hardware and software items as well as personnel tasked with the planning, implementation, and support of technology.


Appropriate Use of Information Technology Resources (PS-08-003)