29.06.2015 Views

Individual Use of Govt Devices and Details Resources

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Individual</strong> <strong>Use</strong> <strong>of</strong> <strong>Govt</strong> <strong>Devices</strong> <strong>and</strong> <strong>Details</strong> <strong>Resources</strong><br />

I. Purpose<br />

The objective <strong>of</strong> this U.S. Division <strong>of</strong> Education <strong>and</strong> learning (the Department) plan is to clarify the conditions under<br />

which workers may use govt gadgets <strong>and</strong> web sources for other than formal company. The Requirements <strong>of</strong> Ethical<br />

Conduct require that each worker use govt gadgets <strong>and</strong> web sources only for “authorized uses.” It is within the<br />

discretion <strong>of</strong> agency control to determine what is “authorized use” <strong>and</strong> what is not. This instruction establishes what is<br />

“authorized use” <strong>and</strong> what is “unauthorized or banned personal use” <strong>of</strong> govt gadgets <strong>and</strong> web sources.<br />

II. Authorization<br />

The permission for this instruction is 5 C.F.R. 2635.101(b)(9) <strong>and</strong> 5 U.S.C. § 301.<br />

III. Applicability<br />

This plan is applicable to all workers <strong>of</strong> the Division. The plan also is applicable to companies <strong>and</strong> workers <strong>of</strong><br />

companies executing perform for the Division to the level the signed agreement between the Division <strong>and</strong> the<br />

specialist provides that the specifications within this instruction implement to the agreement.<br />

IV. Definitions<br />

A. Department Equipment <strong>and</strong> <strong>Details</strong> <strong>Resources</strong><br />

For the objective <strong>of</strong> this instruction, Personal <strong>Use</strong> <strong>of</strong> Government Equipment <strong>and</strong> <strong>Details</strong> <strong>Resources</strong>, contains the use<br />

<strong>of</strong> gadgets <strong>and</strong> web sources as defined by OMB Circular A-130. This contains send devices, computer systems<br />

(including laptops), photocopiers, phones, photo printers, wi-fi gadgets, email, <strong>and</strong> digital solutions. This instruction<br />

does not cover HUAWEI P8 GRA mobile cellphone usage or the use <strong>of</strong> government-issued cellphone phone cards.<br />

The use <strong>of</strong> mobile phones is protected in a separate ACS Guide, OCIO-13, Guide for Telecoms. For questions not<br />

resolved in the Guide for Telecoms, please get in touch with the Director, System Services in the OCIO.<br />

For the objective <strong>of</strong> this instruction, Personal <strong>Use</strong> <strong>of</strong> Government Equipment <strong>and</strong> <strong>Details</strong> <strong>Resources</strong>, does not address<br />

the use <strong>of</strong> charge or franked email. Penalty <strong>and</strong> franked email is the topic <strong>of</strong> U.S. Rule Title 39, Chapter 32. Under no<br />

conditions may charge or franked email be used for any objective other than formal Division company.<br />

B. Electronic Services<br />

For the objective <strong>of</strong> this instruction, digital solutions contains use <strong>of</strong> email in the Division, email over the On the<br />

internet, use <strong>of</strong> computer systems, wi-fi gadgets, <strong>and</strong> other digital solutions <strong>of</strong>fered through the EDNet, solutions<br />

accessed through the On the internet such as ListServs, data file exchange protocol (ftp), or search solutions.<br />

C. Personal <strong>Use</strong><br />

For the objective <strong>of</strong> this instruction, personal use refers to activity that is conducted for reasons other than achieving<br />

formal or otherwise approved activity.<br />

V. Policy<br />

While ready accessibility current information <strong>and</strong> data is essential to achieving the Department’s objective, the<br />

Division is committed to maintaining a workplace that is free from unlawful hostility <strong>and</strong> harassment. While the On<br />

the internet is a valuable information source, it contains a wide spectrum <strong>of</strong> material on a range <strong>of</strong> subjects, some <strong>of</strong>


which are unsuitable to the workplace. In <strong>of</strong>fering Websites to workers, the Division balances these competing needs<br />

<strong>and</strong> priorities.<br />

The Division also recognizes the need for effective use <strong>of</strong> worker efforts <strong>and</strong> Division resources; therefore, the<br />

Division permits occasional personal use <strong>of</strong> govt gadgets <strong>and</strong> web sources, such as send devices, computer systems,<br />

photocopiers, phones, photo printers, wi-fi gadgets, email, <strong>and</strong> digital solutions, given that such use:<br />

• Incurs only a minimal extra cost, if any, to the Division.<br />

• Does not impede that employee’s or other employees’ ability to do their jobs.<br />

• Occurs during <strong>of</strong>f-duty time (<strong>of</strong>f-duty time are time periods when an worker is not expected to be operating, such<br />

as during a lunch hour or before <strong>and</strong> after scheduled perform hours), whenever possible; <strong>and</strong><br />

• Is not for the objective <strong>of</strong> producing earnings for the worker or another personal (i.e., the worker is not using the<br />

gadgets in relationship with an initiative designed to create money).<br />

However, under no conditions may an worker use govt gadgets <strong>and</strong> web sources to engage in any activity that is<br />

unlawful or otherwise expressly prohibited—for example, governmental activity or lobbying activity banned by law.<br />

In addition, the use <strong>of</strong> govt gadgets comprises approval to the Division's tracking <strong>of</strong> the equipment’s use.<br />

The following are illustrations <strong>of</strong> approved <strong>and</strong> unlawful personal uses <strong>of</strong> Division gadgets <strong>and</strong> web sources, such as<br />

digital solutions. This is not a comprehensive record <strong>and</strong> is designed only to demonstrate how the Department’s plan<br />

will be implemented. When conditions such as “short,” “few,” <strong>and</strong> “brief” are used in the illustrations below, they<br />

mean that any personal use <strong>of</strong> govt gadgets <strong>and</strong> web sources described has a minimal impact on the Division. Sound<br />

judgment is applicable to all such conditions.<br />

A. Examples <strong>of</strong> Authorized Personal <strong>Use</strong><br />

Each example represents that the worker is otherwise complying with this plan in that the use does not interfere with<br />

work; is done during <strong>of</strong>f-duty time, if possible; happens upon only a minimal cost to the Department; <strong>and</strong> is not for the<br />

objective <strong>of</strong> producing earnings for the worker (i.e., the worker is not using the gadgets or information source in<br />

relationship with an activity designed to create money).<br />

• Using email to ask a co-worker to join you for a social occasion.<br />

• Using the On the internet to study news stories or more information <strong>of</strong> personal attention.<br />

• Using email to ask co-workers if they can recommend a physician or plumber <strong>and</strong> to respond to a co-worker’s<br />

dem<strong>and</strong> for a recommendation.<br />

• Using email on the On the internet to correspond with an overseas buddy.<br />

• Using email to get in touch with your child’s university <strong>and</strong> arrange for a conference.<br />

• Photocopying a brief papers.<br />

• Using the publishing device to create some duplicates <strong>of</strong> your continue.<br />

• Faxing an emergency note to your child’s university.<br />

• Using the pc <strong>and</strong> publishing device to get ready a brief correspondence or continue.


• Using TDD/TTY or other gadgets to communicate with individuals with disabilities who cannot be reached by<br />

other means.<br />

• Making brief telephone HUAWEI P8 LITE cellphone calls within the regional travelling position (a regional<br />

travelling position contains the location from which the worker regularly commutes);<br />

• Using the cellphone to create brief long-distance cellphone calls that are charged to your long-distance company<br />

rather than to the govt. (It is never allowable to charge personal long-distance telephone cellphone calls to the<br />

Division.).<br />

• Using the cellphone to create substitute childcare preparations if your kid becomes ill.<br />

• Using the cellphone to inform your spouse or childcare company that you will be operating late.<br />

• Sending <strong>and</strong> getting brief emails from family <strong>and</strong> buddies.<br />

• Reviewing your Thrift Savings Plan account.<br />

• Using the On the internet to analysis products <strong>of</strong> personal attention.<br />

B. Examples <strong>of</strong> Impermissible <strong>Use</strong><br />

Each example illustrates an activity that is unlawful or impermissible.<br />

• Using LEXIS, Westlaw, or any other digital fee-per-use support, for anything other than formal company.<br />

• Installing a sport on any pc on EDNet.<br />

• Fundraising, unless the fundraising events is consistent with the Combined Federal Campaign Rules (see 5 C.F.R.<br />

Part 950).<br />

• Political activity banned by the Hatch Act (see 5 C.F.R. Parts 733 <strong>and</strong> 734).<br />

• Representing personal opinions, or engaging in another activity, that implies incorrectly that the worker is acting<br />

on part <strong>of</strong> the Division.<br />

• Distributing <strong>and</strong>/or asking to get components in breach <strong>of</strong> the trademark.<br />

• Gambling such as football pools, annoying, or other unlawful activities.<br />

• Viewing, transmitting, creating <strong>and</strong>/or causing anyone to get intimately explicit, indecent or obscene components.<br />

• Selling, marketing, or promoting products or services.<br />

• Lobbying banned by 18 U.S.C. 1913 <strong>and</strong> other laws.<br />

• Using the pc to get ready an article for which the worker will be compensated.<br />

• Using the pc <strong>and</strong> publishing device to write a book.<br />

• Using email to advertise a residence.<br />

• Using the photocopier to copy a lengthy papers, such as an entire cookbook.


• Using the publishing device to create numerous duplicates <strong>of</strong> your continue.<br />

• Using the On the internet to do analysis for your outside talking to job.<br />

• Using the EDNet fax support to invite buddies to a governmental occasion.<br />

• Using email to solicit funds for a regional charity, such as promoting Girl Scout cookies.<br />

• Incurring govt charges for long-distance telephone dem<strong>and</strong>s other than formal<br />

company.<br />

• Using email to inform anyone <strong>of</strong> your availability for talking to perform.<br />

• Using the HUAWEI P8 GRA cellphone to create or get private company cellphone calls.<br />

• Remotely accessing the Department’s network to be able to use the Department’s On the internet accessibility for<br />

non-<strong>of</strong>ficial reasons. (The Division cannot be used as an substitute to a commercial Isp.)<br />

C. Examples <strong>of</strong> Permissible <strong>Use</strong> Only During Off-Duty Hours<br />

Some uses are not unlawful or unethical but are, nevertheless, unsuitable to be done during perform time. The record<br />

<strong>of</strong> approved personal use illustrations above represents that the activities can, in most cases, to be done during <strong>of</strong>f-duty<br />

time, but in some conditions need to be done during the regular perform day <strong>and</strong> do not consume an inordinate period<br />

<strong>of</strong> your energy <strong>and</strong> effort. The illustrations cited below demonstrate activities that should not be done during perform<br />

time but are approved personal uses if done on personal time.<br />

• Playing solitaire, bridge, hearts, or any other activity on the pc.<br />

• Having a leisurely conversation with a buddy on the HUAWEI P8 LITE cellphone.<br />

• Filling out a lengthy job application.<br />

• Writing a lengthy personal correspondence using email.<br />

D. Policy to Narrow Inappropriate On the internet Material<br />

It is the plan <strong>of</strong> the Division to <strong>of</strong>fer workers with appropriate On the internet accessibility facilitate analysis, learning,<br />

<strong>and</strong> the accomplishment <strong>of</strong> the Department’s objective. In so doing, the Division exercises good judgment in<br />

identifying suitable <strong>and</strong> worthwhile material for common accessibility. Certain material contained in the On the<br />

internet, such as pornography, is not needed to achieve the agency’s objective <strong>and</strong>, moreover, could create a hostile<br />

<strong>of</strong>fices. Consequently, it is the Department’s plan to filter such material from common workplace accessibility. In<br />

those rare instances in which an worker has a true need to accessibility such material to be able to achieve the<br />

Department’s perform, approved employees from the Office <strong>of</strong> the Chief <strong>Details</strong> Official (OCIO) may disable such<br />

filters for the worker at the dem<strong>and</strong> <strong>of</strong> the Mature Official or designee for the workplace creating the dem<strong>and</strong>.<br />

E. Categories <strong>of</strong> Strained On the internet Materials.<br />

The following groups <strong>of</strong> components are filtered from personal accessibility.<br />

• Adult Material: Mature Content - Websites that display full or partial bare skin in a sex-related context, but not<br />

sex-related activity; erotica; sex-related paraphernalia; sex-oriented businesses such as groups, nightclubs, <strong>and</strong><br />

companion services; <strong>and</strong> sites supporting online purchase <strong>of</strong> such products or solutions.


• Adult Material: Lingerie <strong>and</strong> Swimsuit - Websites presenting images that include alluring or revealing attire.<br />

• Adult Material: Nudity - Websites presenting images <strong>of</strong> exposed breasts or genitalia.<br />

• Adult Material: Sex - Websites depicting or implying sex acts.<br />

• Adult Material: Sex Education <strong>and</strong> learning - Websites dealing with topics in human sexuality, such as sex-related<br />

technique, sex-related orientation, cross-dressing, transvestism, transgenderism, multiple-partner relationships, <strong>and</strong><br />

relevant issues.<br />

• B<strong>and</strong>width PG: Peer-to-Peer File Discussing – Websites that <strong>of</strong>fer client application to allow peer-to-peer data file<br />

sharing <strong>and</strong> exchange.<br />

• Gambling - Websites devoted to promotion <strong>of</strong>, or participation in, wagering, betting, casinos or lotteries.<br />

• Games - Websites devoted to activities, gaming, activity tips, activity downloads, entertaining activities, <strong>and</strong><br />

multiplayer activities.<br />

• Illegal Activities – Websites <strong>of</strong>fering instructions on executing unlawful activities or acquiring unlawful products.<br />

• Information Technology: Hacking - Websites that <strong>of</strong>fer details about or promote unlawful accessibility or use pc or<br />

interaction gadgets, application, or databases.<br />

• Information Technology: Proxies Avoidance – Websites enabling material retrieval on part <strong>of</strong> a customer with the<br />

intent <strong>of</strong> obscuring the customer's identity.<br />

• Information Technology: URL Interpretation Websites - Websites that <strong>of</strong>fer online translation <strong>of</strong> URLs. These<br />

websites accessibility the URL to be translated in a way that bypasses the proxy server, potentially enabling unlawful<br />

accessibility.<br />

• Internet Communication: Web Talk - Websites <strong>of</strong>fering entertaining interaction solutions such as Web chat or<br />

forums.<br />

• Internet Communication: Web-based Email - Websites <strong>of</strong>fering entertaining electronic-mail support.<br />

• Productivity PG: Advertisements - Websites that <strong>of</strong>fer marketing design or other ad material data files.<br />

• Productivity PG: Immediate Texting - Websites that allow instant messaging.<br />

• Racism <strong>and</strong> Hate – Websites advocating intolerance or hatred <strong>of</strong> a person or people.<br />

• Society <strong>and</strong> Lifestyles: Personal ads <strong>and</strong> Relationship – Websites devoted to personals, dating, companion<br />

solutions or catalog shopping marriages.<br />

• Security PG: Malicious Web Websites - Websites that contain code that may intentionally modify end-user<br />

techniques without their approval <strong>and</strong> cause harm.<br />

• Security PG: Spy ware - Websites or webpages that download application that, without the customer's knowledge,<br />

generates http traffic (other than simple customer recognition <strong>and</strong> validation).<br />

F. Consent to Monitoring<br />

The use <strong>of</strong> any govt gadgets <strong>and</strong>/or information source protected by this instruction comprises approval by the<br />

customer to the Division's tracking <strong>of</strong> use activity at all periods. Division pcs <strong>and</strong> relevant gadgets are designed for


the interaction, transmitting, processing, <strong>and</strong> storage space <strong>of</strong> formal United States govt or other approved information<br />

only. Division pcs are topic to tracking by OCIO to make sure appropriate executing <strong>of</strong> gadgets <strong>and</strong> techniques, such<br />

as protection gadgets <strong>and</strong> systems; to avoid unlawful use <strong>and</strong> <strong>of</strong>fenses <strong>of</strong> laws <strong>and</strong> protection regulations; to avoid<br />

legal activity; <strong>and</strong> for other identical reasons. <strong>Use</strong> may be supervised, intercepted, documented, study, duplicated,<br />

taken <strong>and</strong> revealed by appropriate authorities. There is no right to privacy for users. <strong>Use</strong> (authorized or unauthorized)<br />

<strong>of</strong> Division techniques comprises approval to tracking, interception, recording, reading, copying, capturing or<br />

disclosure by appropriate authorities.<br />

If tracking <strong>of</strong> Division pcs shows possible pro<strong>of</strong> <strong>of</strong> <strong>of</strong>fenses <strong>of</strong> legal laws, this pro<strong>of</strong> <strong>and</strong> any other relevant<br />

information, such as recognition details about the customer, may be <strong>of</strong>fered to authorities. If tracking <strong>of</strong> Division pcs<br />

shows <strong>of</strong>fenses <strong>of</strong> protection regulations or unlawful use, workers who violate protection regulations or create<br />

unlawful use <strong>of</strong> Division pcs are topic to appropriate disciplinary activity.<br />

VI. Responsibilities<br />

A. Employee Responsibilities<br />

Employees are accountable for guaranteeing that govt gadgets <strong>and</strong> web sources are used in an joyful way with an<br />

emphasis at all periods towards conserving govt residence <strong>and</strong> sources. Workers are accountable for using govt gadgets<br />

<strong>and</strong> web sources in a competent <strong>and</strong> pr<strong>of</strong>essional way. For example, huge data files <strong>and</strong> considerable amounts <strong>of</strong> email<br />

delivered over the Division's regional network <strong>and</strong> saved in shared digital storage space (servers) can burden the<br />

system <strong>and</strong> cause extra expenses to the govt, through slowed transmitting <strong>of</strong> data <strong>and</strong> by necessitating extra digital<br />

storage space features. Types <strong>of</strong> excessive personal use <strong>of</strong> govt gadgets are installing multimedia data files or saving<br />

email with huge attachments, delivering announcements with unnecessary design, photocopying several duplicates <strong>of</strong><br />

personal products, or publishing huge records for personal use. Workers are also under an responsibility not to use<br />

considerable amounts <strong>of</strong> paper, toner, or other workplace supplies online for personal use. Employees should get in<br />

touch with their managers if there is any question whether an designed use <strong>of</strong> govt gadgets is allowable.<br />

All have an responsibility to report misuse <strong>of</strong> digital solutions or govt gadgets or web sources.<br />

An worker who violates this instruction may be topic to administrative activity according to Personnel Management<br />

Instruction 751-1, Discipline <strong>and</strong> Adverse Actions, such as Appendix A: Table <strong>of</strong> Penalties for Stated Offenses.<br />

B. Supervisory Responsibilities<br />

Supervisors who become aware that an worker is using govt gadgets <strong>and</strong> web sources in a way that expenses the<br />

Division more than a “negligible” quantity (for example, publishing more than a few webpages <strong>of</strong> analysis from the<br />

Internet), or for pr<strong>of</strong>it (e.g., talking to or teaching job), have an responsibility to take necessary steps to make sure the<br />

worker complies with this instruction, such as initiating appropriate disciplinary activity <strong>and</strong>/or limiting worker<br />

accessibility the pc or to digital solutions.<br />

C. OCIO Responsibilities<br />

OCIO monitors Division pcs to make sure appropriate executing <strong>of</strong> gadgets <strong>and</strong> techniques such as protection gadgets<br />

<strong>and</strong> systems; to avoid unlawful use <strong>and</strong> <strong>of</strong>fenses <strong>of</strong> laws <strong>and</strong> protection regulations; to avoid legal activity; <strong>and</strong> for<br />

other identical reasons. <strong>Use</strong> may be supervised, intercepted, documented, study, duplicated, taken <strong>and</strong> revealed by<br />

OCIO or other appropriate authorities.<br />

D. Mature Official or his/her Designee Responsibilities<br />

If the Principal Office’s control determines that an worker needs accessibility normally filtered On the internet<br />

components to achieve a mission-related need, the Mature Official or his/her designee may dem<strong>and</strong> that accessibility<br />

for particular individual(s) along with the company justification by contacting the OCIO Help Desk at<br />

OCIO reserves the right to deny accessibility any site that is deemed to be a protection risk.


E. Contractor Obligations<br />

The Division <strong>and</strong> the<br />

specialist sign a agreement to be the lawfully executed agreement for perform to be performed for the Division. It is<br />

the expectation <strong>of</strong> the Division that a specialist using govt gadgets <strong>and</strong> web sources will comply with this instruction,<br />

to the level it is needed to do so by the provisions <strong>of</strong> the lawfully executed<br />

agreement.<br />

F. Contracting Official Responsibilities<br />

A Acquiring Official who observes or is notified that a specialist has not complied with the specifications <strong>of</strong> this<br />

instruction is accountable for informing the contractor’s corporate control <strong>and</strong> determining the appropriate remedy.<br />

VII.<br />

Procedures <strong>and</strong> Requirements<br />

If an worker or specialist misuses the Department’s technological innovation infrastructure in a way that results in<br />

interference <strong>of</strong> regular network operations, such as delivering <strong>and</strong> getting very considerable amounts <strong>of</strong> email,<br />

uploading <strong>and</strong> installing very huge data files, or installing any application or digital data files from outside the<br />

Division without guaranteeing that reasonable virus protection measures are in position, the Division can position<br />

restrictions on the user’s accessibility, or use <strong>of</strong>, govt gadgets.<br />

The same st<strong>and</strong>ards <strong>of</strong> civility <strong>and</strong> decency implement to email as to other forms <strong>of</strong> interaction. The use <strong>of</strong> pr<strong>of</strong>anity,<br />

racial or ethnic slurs, intimately annoying terminology, <strong>and</strong> any other such terminology is as unsuitable on email as it<br />

is elsewhere in the workplace <strong>and</strong> will not be tolerated. This plan is applicable to all communications made using<br />

Division equipment—regardless <strong>of</strong> whether the interaction is formal or, where permitted under this plan, personal.<br />

This is particularly essential because employees’ On the internet addresses all contain the designation ed.gov,<br />

indicating that the message is coming from a pc within the Division. Employees should remember that “deleted” digital<br />

messages may still be documented by tapes maintained by the Division <strong>and</strong> that computer systems maintain a limited<br />

record <strong>of</strong> Websites visited by anyone using that pc.<br />

Any attempt to circumvent any <strong>of</strong> the Department’s protection mechanisms, either from within or outside the<br />

Department’s features, is really a breach <strong>of</strong> its information protection guidelines. Such <strong>of</strong>fenses will be resolved<br />

depending on the Guide OCIO-01, Guide for <strong>Details</strong> Assurance Security Policy.<br />

Any suspected protection threat or breach <strong>of</strong> the Department’s automation <strong>and</strong> web sources, or any breach or<br />

attempted breach <strong>of</strong> its information protection guidelines, must be immediately reported to an employee’s supervisor<br />

or to appropriate protection employees or to a contractor’s Acquiring Officer’s Representative or the Acquiring<br />

Official, as appropriate.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!