You are accessing a U.S. Government Information System, which includes: (1) this computer, (2) this computer network, (3) all computers connected to this network, and (4) all devices and storage media attached to this network or to a computer on this network. This information system is provided for U.S. Government-authorized use only.
-
Unauthorized or improper use of this system may result in disciplinary action, and civil and criminal penalties.
-
By using this information system, you understand and consent to the following:
-
You have no reasonable expectation of privacy regarding any communications transmitted through or data stored on this information system. At any time, the government may monitor, intercept, search and/or seize data transiting or stored on this information system.
-
Any communications transmitted through or data stored on this information system may be disclosed or used for any U.S. Government-authorized purpose.
-
Computer User Rules of Behavior
-
Prohibited Use of Computer Equipment. Certain prohibitions are associated with the use of these computer resources including:
-
Divulging sensitive government information to any person who is not authorized to have access to the information, e.g. by emailing such information.
-
Leaving sensitive government information unprotected or accessible to unauthorized persons by leaving a workstation logged onto a LAN without invoking a screen saver with password protection.
-
Removing sensitive documents (electronic media) from the workplace without proper authority.
-
Failing to secure Privacy Act Protected Information, Limited Official Use, Sensitive Information, or classified documents adequately, that are stored on electronic media.
-
Permitting or having use of a personal user ID and password issued to another person.
-
Any perceived violation should be reported to the facility's Information Security Officer.
Users who do not comply with the Rules of Behavior shall be subject to penalties that may be imposed under existing policy and regulations, the Computer Fraud and Abuse Act, and other applicable federal, state and local laws. Such penalties may include suspension of system privileges and criminal prosecution.
For further information see the DOJ Order on Use and Monitoring of Department Computer and Computer Systems.