DCIS Rules of Behavior

 

1.1      Users

DCIS users are responsible for:

 

2.     Expected Behavior

 

DCIS takes full advantage of the security controls implemented on the OS Network.Individuals accessing DCIS are expected to be familiar with the OS Network�s Rules of Behavior, including email, Internet usage, off-site computing, etc.

2.1      System Access Privileges

DCIS access will be issued, and used only by, authorized individuals.DCIS access is granted based on an official request from an authorizing official.Each DCIS user is given access to DCIS based on a need to perform specific work.Users are to work within the confines of the access allowed and are not to attempt access to which access has not been authorized.

 

2.2      Password Guidance

DCIS users are to use passwords of a mix of eight (8) alpha, numeric and special characters, with at least one uppercase letter, one lower case letter, and one number.Users will be required to change their passwords every 90 days.Users should keep their passwords confidential and not share them with anyone.

 

2.3      Individual Accountability

Each DCIS user will be held accountable for their actions on DCIS.Care should be taken to ensure the integrity of DCIS data created, accessed, or modified.

 

Each DCIS user should apply the necessary safeguards to protect DCIS data from unauthorized disclosure, alteration, and/or loss, including the protection of DCIS hard copy documents.

 

2.4      Protection of Copyright Licenses (Software)

The DCIS System Owner and the DCIS System Administrator comply with the DCIS copyright license requirements.DCIS users and supervisors are also responsible for complying with these requirements.

 

DCIS software will not be modified without the approval of the DCIS System Owner.DCIS users are not to download DCIS software, or deactivate DCIS security features or controls.Audit logs will be reviewed to determine whether unauthorized activity has been attempted.