Ask Reggi Your Question Now
Can I use third-party file sharing tools that collect personal information in Mississippi? What are the requirements?
Based on the information provided in the context documents, it is not recommended to use third-party file sharing tools that collect personal information in Mississippi. The use of such tools may pose a risk to the security of the State Network and may not be permitted [2.1]. Additionally, any documents containing confidential commercial or financial information subject to the protection of any applicable law or court decision shall be clearly designated as such by the filer on its face and accompanying cover letter at the time of filing and shall be placed in an envelope other than white. Each page of each document shall be marked CONFIDENTIAL [3.1]. Therefore, it is important to ensure that any personal information shared through file sharing tools is properly protected and designated as confidential.
As for the requirements, each agency must develop a policy that defines the use of personal devices (i.e. mobile devices, minis, laptops, personal computers) on state systems. At minimum, this policy must require those devices to be subject to the same security requirements as state-owned devices. It is recommended that the agency personal device policy include information describing how personal devices may be monitored and agency expectations regarding user cooperation in the investigation of a security breach, related to state information, where the personal device is a potential source for the breach. Additionally, it is recommended that the agency require the user to sign a letter or agreement acknowledging that they agree and understand the agency personal device policy [2.2].
In summary, it is not recommended to use third-party file sharing tools that collect personal information in Mississippi due to potential security risks. If such tools are used, it is important to ensure that any personal information shared is properly protected and designated as confidential. Additionally, agencies must develop a policy that defines the use of personal devices on state systems and require users to acknowledge and understand the policy [2.1][3.1][2.2].
Source(s):
- [2.1] Applications that pose a risk to the security of the State Network will not be permitted, including file transfer within Internet chat and peer to peer (P2P) file sharing programs.
- [3.1] Third Party Information
- [2.2] Each agency must develop a policy that defines the use of personal devices (i.
Jurisdiction
Mississippi