Acceptable-Use Policy
Acceptable-Use Policy
Republic of Botswana
Security Division
Computer Equipment Acceptable Use Policy
Version 1.0
Date: 2010/02/01
Document Control
Revision History
Document Approvals
Table of Contents
1.0 Overview ..........................................................................................................................1
2.0 Purpose ............................................................................................................................1
3.0 Scope ...............................................................................................................................1
4.0 Definitions........................................................................................................................1
5.0 Policy ...............................................................................................................................2
5.1 General Use and Ownership ..........................................................................................2
5.2 Security and Proprietary Information ............................................................................2
5.3 Unacceptable Use..........................................................................................................3
5.3.1 System and Network Activities ..............................................................................3
5.3.2 Email and Communications Activities ...................................................................5
5.3.3 Blogging ................................................................................................................5
6.0 Accountability ..................................................................................................................6
7.0 Violations .........................................................................................................................7
8.0 Associated Policies ...........................................................................................................7
9.0 Policy Governance ...........................................................................................................8
10.0 Review and Revision ........................................................................................................8
11.0 Enforcement queries and comments ..................................................................................8
12.0 Exceptions ........................................................................................................................9
Effective security is a team effort involving the participation and support of every government of
Botswana employee and affiliate who deals with information and government infrastructure
and/or information systems. It is the responsibility of every computer user to know these
guidelines, and to conduct their activities accordingly.
2.0 Purpose
The purpose of this policy is to outline the acceptable use of computer equipment on the GDN.
These rules are in place to protect the employee and government. Inappropriate use exposes the
GDN to risks including virus attacks, compromise of network systems and services, and denial of
services, not forgetting poor service delivery to the nation at large.
3.0 Scope
This policy applies to employees, contractors, consultants, temporaries, and other workers of the
government of Botswana, including all personnel affiliated with third parties. This policy applies
to all equipment that is owned or leased by the government of Botswana.
4.0 Definitions
Term Definition
Blogging Writing a blog. A blog (short for weblog) is a personal online journal that
is frequently updated and intended for general public consumption.
Chain letters Consists of a message that attempts to induce the recipient to make a
number of copies of the letter and then pass them on to as many recipients
as possible
5.0 Policy
a) While GDN administration desires to provide a reasonable level of privacy, users should
be aware that the data they create on the government systems remains the property of the
government of Botswana. Management cannot guarantee the confidentiality of
information stored on any network device belonging to the government of Botswana;
hence government’s secrets and confidential information should NEVER be sent over the
network.
b) Employees are responsible for exercising good judgment regarding the reasonableness of
personal use. Individual departments are responsible for creating guidelines concerning
personal use of Internet/Intranet/Extranet systems. In the absence of such policies,
employees should be guided by their departmental policies on personal use, and if there is
any uncertainty, employees should consult their supervisor or manager.
c) DIT recommends that any information that users consider sensitive or vulnerable be
encrypted. Refer to Data Encryption Policy
d) For security and network maintenance purposes, authorized individuals within the GDN
may monitor equipment, systems and network traffic at any time.
e) Government of Botswana reserves the right to audit networks and systems on a periodic
basis to ensure compliance with this policy.
b) In order to control unauthorized users to use network devices and applications, users
are advised to abide to the password policy and systems use best practices.
g) All hosts used by the employee that are connected to the government internet,
intranet, whether owned by the employee or government of Botswana, shall be
continually executing approved virus-scanning software with a current virus database
unless overridden by departmental or group policy.
Employees must use extreme caution when opening e-mail attachments received from unknown
senders, which may contain viruses, e-mail bombs, or Trojan horse code.
The lists below are by no means exhaustive, but attempt to provide a framework for activities
which fall into the category of unacceptable use.
m) Interfering with or denying service to any user other than the employee's host (for
example, denial of service attack).
a) Sending unsolicited email messages, including the sending of "junk mail" or other
advertising material to individuals who did not specifically request such material
(email spam).
f) Use of unsolicited email originating from within the GDN of other internet or
intranet service providers on behalf of, or to advertise, any service hosted by
government of Botswana or connected via the GDN.
5.3.3 Blogging
a) Blogging by employees, whether using the GDN property and systems or personal
computer systems, is also subject to the terms and restrictions set forth in this Policy.
Limited and occasional use of GDN systems to engage in blogging is acceptable,
c) Employees shall not engage in any blogging that may harm or tarnish the image,
reputation and/or goodwill of the government of Botswana and/or any of its employees.
Employees are also prohibited from making any discriminatory, disparaging, defamatory
or harassing comments when blogging or otherwise engaging in any conduct prohibited
by the government of Botswana’s Non-Discrimination and Anti-Harassment policy.
d) Employees may also not attribute personal statements, opinions or beliefs to the
government of Botswana when engaged in blogging. If an employee is expressing his or
her beliefs and/or opinions in blogs, the employee may not, expressly or implicitly,
represent themselves as an employee or representative of the government of Botswana.
Employees assume any and all risk associated with blogging.
e) Apart from following all laws pertaining to the handling and disclosure of copyrighted or
export controlled materials, the government of Botswana’s trademarks, logos and any
other government intellectual property may also not be used in connection with any
blogging activity.
6.0 Accountability
This policy applies to all government equipment operational and administered by the any IT Unit
within the Government Data Network. It is the responsibility of each IT manager or supervisors
to enforce this policy. Employees who do not comply with this policy shall be subject to
disciplinary action and vulnerable equipments which do not follow the methods defined above
will not be allowed to run on the Government Data Network. An assurance from the IT manger
will be requested upon request to re connect the equipment on the GDN. For applications, no
application will be registered for name resolution (DNS) without the approval of the security
division.
Before hosting or allowing applications to run in the GDN, DIT might perform penetration tests
that verify the operation of custom security policy requirements, including authentication,
session management, access control, and any other security check. In fact, the security team will
have verified and documented how they will perform the penetration tests or any other
verification tool used.
It’s worth noting that, the overall computer usage and appliance’s Security, Standard compliance
and information security are not one-time events. Organizations and users must work diligently
and consistently to ensure that appliance and applications weaknesses are found and threats are
defended against as quickly as possible and the right people use the right equipments.
7.0 Violations
These regulations apply subject to and in addition to the law. Any violation of these regulations
may also be subject to penalties under civil or criminal law (Cybercrime and Computer Related
Crimes Act, 2007) and such law may be invoked by DIT. Use of the government’s systems may
be logged to permit the detection and investigation of infringement of Policies. Monitoring of
emails, internet usage, telephone calls and other Information and Communications Technology
may be carried out in some situations, for the purposes of;
Applicable policies include those listed below. This list is not exhaustive and will be subject to
change. Below are some of the applicable policies;
Responsible – the person(s) responsible for developing and implementing the policy.
Accountable – the person who has ultimate accountability and authority for the policy.
Consulted – the person(s) or groups to be consulted prior to final policy implementation
or amendment.
Informed – the person(s) or groups to be informed after policy implementation or
amendment.
12.0 Exceptions
Any exceptions to this policy will require written authorization. Exceptions granted will be issued a
policy waiver for a defined period of time. Requests for exceptions to this policy should be addressed
to the Director of the Department of Information Technology (DIT).