System Use Notification and Rules of Behavior

System Use Notification

JBS International, Inc., under contract with the Children's Bureau, Department of Health and Human Services (HHS), actively monitors this system and activity to maintain system security and availability and to ensure appropriate and legitimate usage. Any individual who intentionally accesses a federal computer or system without authorization, and who alters, damages, makes unauthorized modifications to, or destroys information in any federal-interest computer, or exceeds authorized access, is in violation of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Any evidence of possible violations of proper use or applicable laws found as a result of this monitoring may be turned over to the Children's Bureau, HHS, and law enforcement. Any individual found to be in violation of the system's proper use rules or law could be punished with loss of system access, fines, and/or imprisonment. By proceeding, you hereby acknowledge your agreement with these terms and the system's rules of behavior and consent to such monitoring and information retrieval for law enforcement and other official purposes.


Rules of Behavior

POLICY FOR USE OF CFSR DATA MANAGEMENT SYSTEM (DMS) COMPUTER RESOURCES.

  • As a user of the CFSR DMS, you are required to be aware of, and comply with, all applicable policies and guidelines on authorized use and security of the DMS computer resources and data.


YOU ARE RESPONSIBLE FOR ALL ACTIONS PERFORMED WITH YOUR PERSONAL USER ID.

  • User IDs and passwords are for your individual use only and, as confidential information, are not to be shared.
  • You must not disclose your password to anyone, and you must take necessary steps to prevent anyone from gaining knowledge of your password.
  • As a DMS user, you will be expected to employ good password management practices as defined and enforced by system management prompts dictated by the system.


POLICY, STANDARDS, AND PROCEDURES MUST BE FOLLOWED.

  • Use of DMS computer resources is restricted in accordance with federal policy and guidelines.
  • Violations of the "Computer Fraud and Abuse Act of 1986" (Public Law 99-474), the Privacy Act, the Trade Secrets Act (18 U.S.C. § 905), and other federal regulations applying to unauthorized use of federal computer systems, files, records, and data, are punishable by law.
  • Be aware that all DMS computer resources used and accessed by authorized DMS users are subject to periodic testing, review, monitoring, and auditing. Any evidence of security violations or illegal activity will be immediately turned over to DMS management or law enforcement for action. Penalties could include loss of access, fines, and/or imprisonment.


ACCESS TO INFORMATION MUST BE CONTROLLED.

  • Access only the information for which you have been authorized and have a "need to know/access."
  • Do not leave computers logged on to DMS and unattended. Log off at the end of each session or use access control software (for example, a screen saver with password) during unattended use.
  • If you know that another person has used or is using your credentials, you must report the incident immediately to DMS management and JBS.
  • Take steps necessary to maintain security of computer files and reports containing DMS information.