I acknowledge, as an Authorized Individual ("User") requiring access to... USAID UNCLASSIFIED AUTOMATED INFORMATION SYSTEMS ACCESS REQUEST ACKNOWLEDGEMENT

advertisement
USAID UNCLASSIFIED AUTOMATED INFORMATION SYSTEMS
ACCESS REQUEST ACKNOWLEDGEMENT
I acknowledge, as an Authorized Individual ("User") requiring access to USAID automated information
systems, that:
1. I am required to comply with USAID regulations, policies, procedures, and guidelines regarding the
protection of USAID automated information systems from misuse, abuse, loss, or unauthorized access. I
understand that any violation of those regulations may result in administrative action, civil or criminal
prosecution, or termination of employment.
2. I can process only Unclassified information on systems designated for unclassified use. I can
process CLASSIFIED information only on systems specifically indicated for classified processing.
3. I must protect my password and application user codes (if any). Should I suspect a compromise of
my password or application user codes, I must report suspected compromise to my supervisor and
designated system administrator. I understand that my password will be changed immediately upon
suspicion of compromise.
4. I can not share my userids, passwords, or application user codes. I can not write down my password
or application user codes where others might easily find it. I can store my password or application users
codes in an approved locking container or safe or otherwise protect its detection through the use of
approved encryption technology.
5. I can not enter my password or application user code in a file or record maintained in any automated
system for the purpose of effecting an "autologin" feature for my convenience, unless the feature has
been approved for use by the ISSO for USAID.
6. I must use/create a password consisting of a MINIMUM of six alphanumeric characters that are not
easily guessable or found in a standard dictionary. I am required to change my password at the interval
prescribed for the system. I understand that USAID reserves the right to change my password or
terminate my access at any time.
7. I must LOG OFF or use a password protected screen saver at any time that I leave my terminal
unattended. I must LOG OFF when my terminal will remain unattended for more than two hours.
8. I am required to immediately notify the system administrator for my system when there is a change in
my employment status and/or when my access to the system is no longer required.
9. I can access only those applications for which access authorization by the system administrator has
been granted and use government equipment only for approved purposes.
10. I am prohibited from using information acquired from access via a Federal computer system for
personal gain, profit, or publication without the prior written approval of my supervisor.
PRINTED NAME
ACKNOWLEDGEMENT
SIGNATURE
OFFICE SYMBOL
BUSINESS ADDRESS
PHONE NUMBER
DATE
__________________________________________________________________
AID 545-1 (01/2000)
Supplementary Reference:
545
File Name:
545saf_040600
Last Revised:
04/07/2000
Synopsis of Security Practices for Users
This brief synopsis of security practices for users of unclassified automated information systems (AISs) is
provided to assist in understanding guidance provided in ADS 545. This document is not all-inclusive; for
additional assistance on security matters relating to processing unclassified data, contact your
Information System Security Officer (ISSO.)
1. Read, understand and implement/execute:
a. AIS security policies.
{Automated Directives System (ADS), State Department Guidance etc.}
b. AIS security forms.
{Authorized Access List, Fax Cover Sheet, USAID Computer System
Access & Termination Request, USAID Sensitive Data Nondisclosure
Agreement, USAID Unclassified Automated Information Systems Access
Request Acknowledgement, Visitor's Log etc.}
2. Make your password(s) unique and hard to guess or "crack."
3. Use current anti-virus software to scan data (especially new data.)
4. Log off your workstation when you leave your area.
5. Back up your files.
6. Follow the Agency's rules of behavior; some user rules of behavior are:
a. Access only data you are authorized to use:
(1) Don't use or change any account, file, record, or
application (software program) not required to perform your
official duties or officially authorized activities.
(2) Don't access someone else's account or files without
formal authorization from your supervisor.
(3) Remember not to access or disclose sensitive or personal
data unless necessary to perform official duties.
b. Work with others to administer necessary safeguards and controls:
(1) Cooperate with inspectors and evaluators.
(2) Assist in completion of the automated information system
certification/approval to operate process, and contingency
planning for information resources.
(3) Participate in AIS security training and awareness programs.
c. Be careful with AIS resources (software, hardware, communications
means, etc.)
(1) Don't move equipment or exchange components without
authorization from the appropriate Information Technology (IT)
Systems support element.
(2) Protect AIS resources from physical hazards such as
liquids, food, smoke, staples, paper clips, etc.
(3) Don't install or use unauthorized software on AIS.
(4) Comply with all software licensing agreements; don't violate
Federal copyright laws.
(5) Don't overload systems with extraneous matter (e.g., keep
email attachments small, avoid excessive graphics on web pages,
limit length of facsimile transmissions etc.)
7. Report AIS security incidents (see diagram on the next page.)
IRM Security Personnel
will investigate the
incident and document
all relevant information.
Copies of the final
Incident Report will
be forwarded to the
USAID ISSO.
Outside resources
will be used when
needed. IRM Security
will also notify the
USAID ISSO and the
Office of Security.
Notice
From
Requester
Requester notifies either
the Help Desk, or, if they
cannot contact the Help
Desk, IRM security of the
possible incident.
YES
Emergency
action
needed?
NO
USAID Help Desk
RRB: 202-712-1234
USAID IRM
Security Team
TAC Manager:
703-465-7008
NO
YES
YES
Internal
Security
procedures
followed.
If external
Notify
appropriate
entities.
Procedures
Adequate?
ISSO informs USAID
IRM Management of
incident activity.
IRM
Director
Help Desk
procedures
followed.
Is
this a
Security
Incident?
If internal
Internal or External
Action?
Other
resources
as needed.
Help Desk logs request
and forwards the information
to the IRM Security office.
Prime
Mgmt.
USAID ISSO
CIO &
USAID ADM.
USAID
SECUIRTY
Write and file Security
Incident Report.
NO
Update processes
USAID Office of Security (SEC) will
conduct an investigation, either
separately or in conjunction with
IRM Security. SEC will also contact
any outside
agencies
needed.
Other
Agencies
as needed.
Download