Rules of Behavior
As an external privileged user for DOT information system, you are required to follow specific Rules of Behavior when interacting with this system.
You must conduct only authorized DOT information system -related business while logged into the administrative functional area assigned to you.
You must ensure your level of access to components and networks owned by DOT information system is limited to ensure your access is no more than necessary to perform your legitimate tasks and assigned duties. If you believe you are being granted access that you should not have, you must immediately notify to the DOT’s Security Operations Center (SOC), 1-866-580-1852, Option 1 or email ReportCyber@dot.gov immediately.
You must maintain the confidentiality of your authentication credentials such as any passwords or passcodes granted to you. Do not reveal your authentication credentials to anyone; a DOT information system employee should never ask you to reveal them.
You must follow proper logon/logoff procedures. You must manually login to your session; do not store your password locally on your system or utilize any automated logon capabilities. You must promptly logout when session access is no longer needed. If a logout function is unavailable, you must close your browser. Never leave your computer unattended while logged into the DOT information system.
You must report suspected or identified cybersecurity and/or privacy incidents including unauthorized disclosures of DOT information or access to a DOT information system, as well as anti-virus, antispyware, firewall or intrusion detection software errors, or significant alert messages (security and privacy) to DOT’s Security Operations Center (SOC), 1-866-580-1852, Option 1 or email ReportCyber@dot.gov immediately.
You must not establish any unauthorized interfaces between systems, networks, and applications owned by DOT information system. You must immediately report any potential misconfigurations.
You must acknowledge that your access to systems and networks owned by DOT information system is governed by, and subject to, all federal laws, including, but not limited to, the Privacy Act, 5 U.S.C. 552a, if the DOT information system maintains individual Privacy Act information. Your access to DOT information system constitutes your consent to the retrieval and disclosure of the information within the scope of your authorized access, subject to the Privacy Act, and applicable state and federal laws.
You must safeguard all resources for which you are responsible against waste, loss, abuse, unauthorized users, and misappropriation. Thus ensure the confidentiality, integrity, availability and security of all system components commensurate with the DOT information system requirements for storing, processing, and transmitting all federal data. Commensurate security protocols are followed at all times.
You must not browse, search, or reveal information hosted by DOT information system except in accordance with that which is required to perform your legitimate tasks or assigned duties.
You must not retrieve information, or in any other way disclose nformation, for any person or process who/that does not have authority to access that information.
You must not process U.S. classified national security information on any component of DOT information system for any reason.
You must agree to contact the DOT supervisor, Information System Security Manager (ISSM), or designee via email after you have notified the DOT’s Security Operations Center (SOC), 1-866-580-1852, Option 1 or email ReportCyber@dot.gov immediately if you do not understand any of these rules.
By your signature or electronic acceptance (such as by clicking an acceptance button on the screen), you agree to these rules.
As an External Non-Privileged User, the user has general user privileges to the DOT information system and is required to minimally follow the FedRAMP security controls baseline assigned to this DOT information system, acting in this general capacity.
You must not interact with DOT information system in any way other than prescribed by the agency administrator.
You must not add additional software, hardware, or peripheral devices to DOT information system. Only designated personnel can direct the installation of hardware and peripheral devices on this system.
You must not reconfigure hardware, software, or firmware on any DOT information system components. You must report this as a finding to the IT Security Desk if reconfiguration or manipulation is in any way possible.
You must not share information with someone who does not have authority to access that information.
You must not remove computer resources without prior approval.
You must use the DOT information system for the purposes for which it is intended.
You must not circumvent the security policies configured on your device. If you determine there might be a misconfiguration, you must inform the IT Security Desk immediately.
You must follow all DOT information system wireless access policies.
You must ensure both hardcopy and electronic official records (including attachments) are stored and disposed of according to DOT information system policies and standards.
You must safeguard all resources for which you are responsible against waste, loss, abuse, unauthorized users, and misappropriation. Thus ensure the confidentiality, integrity, availability and security of all system components commensurate with the DOT information system requirements for storing, processing, and transmitting all federal data.
You understand that any person who obtains information from a computer connected to the Internet in violation of his or her employer’s computer-use restrictions is in violation of the Computer Fraud and Abuse Act.
IT Rules of Behavior (RoB) and User Agreement for General Users
By signing this document, I understand and consent to the following when I access this Department of Transportation information systems, which includes (1) computer, (2) computer network, (3) all computers connected to this network, and (4) all devices (e.g., tablet, mobile device, etc.) and storage media (e.g., thumb drive, flash drive, etc.) attached to the network or to a computer on DOT network;
I understand that anyone found to violate these policies may be is subject to disciplinary and/or legal action, including but not limited to loss or limitation of use of information resources, termination of employment, or referral for criminal prosecution.
By selecting 'Continue to Login,' I acknowledge that I have read and agree to the rules of behavior.