Chief Information Officer: Title Slide
Chief Information Officer: Title Slide
Title slide
CHIEF INFORMATION OFFICER
DEPARTMENT OF HEALTH AND HUMAN SERVICES
• Course Introduction
• Lesson 1: Information Security Overview
• Lesson 2: Information Security Policy & Governance
• Lesson 3: Physical Access Controls
• Lesson 4: Email & Internet Security
• Lesson 5: Security Outside the Office
• Lesson 6: Privacy
• Lesson 7: Insider Threat
• Lesson 8: Incident Reporting
• Summary
• Rules of Behavior
2
COURSE INTRODUCTION
3
Cybersecurity Awareness Course
Welcome!
This course is designed to provide
Department of Health and Human Services
(HHS) employees, contractors, and others
with access to Department systems and
networks with the knowledge to protect
information systems and sensitive data from
internal and external threats.
This course fulfills the Federal Information
Security Management Act of 2002 (FISMA)
requirement for security awareness training
for users of federal information systems.
When you are ready to continue, scroll down
or use the right-arrow key on your keyboard.
4
HHS Mission
5
Course Objectives
At the end of this course, you will be able to:
• Define information systems security;
• Identify federal regulations that mandate the protection of IT assets and information;
• Describe HHS’ IT security and privacy policies, procedures, and practices;
• Define sensitive data;
• Describe your personal responsibility to protect information systems and privacy, and the
consequences for violations;
• Recognize threats to information systems and privacy;
• Identify best practices to secure IT assets and data at the office or at home;
• Define privacy and personally identifiable information (PII);
• Define encryption and determine how and when to encrypt;
• Protect PII in different contexts and formats;
• List the traits that may indicate an insider threat; and
• Identify the correct procedure to report a suspected or confirmed security or privacy
incident.
6
Course Information
7
LESSON 1:
INFORMATION SECURITY OVERVIEW
8
Information Security
9
Key Concepts
There are three elements to protecting Your bank ATM is a good example of a secure
information: information system. You expect your bank ATM
system to have confidentiality, availability, and
Confidentiality: Protecting information integrity.
from unauthorized disclosure to people or
processes.
The amount of money in your account and your
Availability: Defending information ATM personal ID number (PIN) should be
systems and resources from malicious and confidential.
unauthorized users to ensure accessibility
by authorized users. You expect that your account balance information
and cash should always be available from the ATM
Integrity: Assuring the reliability and machine.
accuracy of information and IT resources.
The account balance information displayed by the
ATM machine, and the amount of money
dispensed by the machine must be accurate. In
other words, have integrity.
.
10
Threats & Vulnerabilities
11
Security Controls
Management: Accreditation is a
management control as is having a System
Security Plan.
12
What is Sensitive Data?
14
Knowledge Check Answer
15
LESSON 2:
INFORMATION SECURITY POLICY &
GOVERNANCE
16
Federal & Departmental Guidance
There are Federal and Departmental Guidelines that provide the backbone of IT security
and privacy. Let’s take a look at the Federal Guidelines first.
National Institute of
IT Security Legislation and Privacy Legislation
Standards and Technology
Guidance
(NIST) Special Publications
E-Government Act of 2002 Privacy Act of 1974 NIST issues standards and
Clinger-Cohen Act of 1996 Paperwork Reduction Act guidelines to assist federal
agencies in implementing
Health Insurance Portability Children’s Online Privacy security and privacy
and Accountability Act of Protection Act (COPPA) regulations.
1996 (HIPAA) OMB-07-16 Special publications can be
Office of Management and found at: NIST Publications.
Budget (OMB) Circular A-
130
17
Departmental Guidance
19
Knowledge Check Answer
20
Where to Get Guidance
.
21
LESSON 3:
PHYSICAL ACCESS CONTROLS
22
Password Protection
24
Password Protection Tips
Here are some more important tips for protecting your password!
25
Knowledge Check
26
Knowledge Check Answer
27
Personal Identity Verification (PIV) Cards
28
PIV Card Protection Tips
As a PIV card holder you are required to adhere to the following guidelines in
order to safeguard and maintain your PIV card and credentials and ensure your
associated record is kept up-to-date.
• Always remove your PIV card from your computer’s card reader when leaving
your desk.
• Memorize your PIN; never write it down.
• Keep it in a secure badge holder to shield it against unauthorized reading.
• Take all required actions to maintain your PIV credentials, i.e., timely renewal
of your PIV certificates or PIV card upon receiving notice.
• Complete all mandatory training.
29
PIV Card Issues
30
Physical Security: Tailgating
• Lock your computer when it’s not in use (CTL + ALT + DELETE).
• Store and transport removable media such as CDs, DVDs, flash drives, and
external hard drives in a secure manner to prevent theft or loss.
• Don’t leave sensitive information in plain sight when visitors are present or
upon leaving your work area. Keep sensitive information in a secure safe or
locked in a desk drawer.
• Quickly retrieve faxes that are sent to you. Always confirm that the recipient
received the fax that you sent.
32
LESSON 4:
EMAIL & INTERNET SECURITY
33
Cyber Crime
34
Social Engineering
35
Social Engineering (continued)
36
Phishing Attacks
Phishing is a social engineering scam whereby intruders seek access to your personal
information or passwords by posing as a real business or organization with legitimate reason
to request information.
Phishing emails (or texts) quite often alert you to a problem with your account and asks you
to click on a link and provide information to correct the situation. These emails look real and
often contain the organization’s logo and trademark. The URL in the email resembles the
authentic web address. For example “Amazons.com”. Here is an example:
37
Phishing Attacks (continued)
39
Identity Theft
40
Identity Theft (continued)
41
Identity Theft (continued 2)
42
Malware
Combat malware
Read email in plain text and do not use the preview pane.
Scan attachments with antivirus software before downloading. Do not trust any
attachments, even those that come from recognized senders.
Delete suspicious emails without opening them.
If you believe your computer is infected, contact your HHS Computer Security Incident
Response Center (CSIRC) by email at [email protected] or phone 866-646-7514; or
contact your security POC.
43
Internet Hoaxes
Email messages that promise a free gift certificate to your favorite restaurant, plead for
financial help for a sick child, or warn of a new computer virus are typically hoaxes designed
for you to forward them to everyone you know.
Mass distribution of email messages floods computer networks with traffic slowing them
down. This is a type of distributed denial-of-service (DDoS) attack.
44
Spam
Email spam is unsolicited messages sent to numerous recipients, similar to junk mail.
Spam is dangerous because it can contain links that direct you to phishing websites or
install malware on your computer.
Studies estimate that between 70% and 95% of emails sent are spam.
Combat spam
NEVER click on links or download attachments from spam email
Only provide your email address for legitimate business purposes.
Do not sign web site guest books and limit mailing list subscriptions. Spammers access
these to obtain your email address.
Spam received in your government email account should be forwarded to [email protected]
or the security POC for your office.
45
What is Encryption?
46
Appropriate Use of Email
Employees are permitted limited personal use of email. HHS email accounts must not be used
to:
• Create personal commercial accounts for the purpose of receiving personal notifications,
set up a personal business or website, or to sign up for memberships.
Personal emails should not:
• Disrupt employee productivity, disrupt service or cause congestion on the network (e.g.,
sending spam or large media files), or to engage in inappropriate activities.
47
Peer-to-Peer Software
Peer to peer, or P2P, is typically used to download copyrighted files like music. Downloading
files in this manner is illegal, unethical and prohibited on government-owned computers and
networks.
Some P2P software may be necessary to meet a business need, in which case you may use
it, but only with permission from the OpDiv CIO. Speak to your manager for more
information.
48
Cookies
49
ActiveX
50
Knowledge Check
51
Knowledge Check Answer
52
LESSON 5:
SECURITY OUTSIDE THE OFFICE
53
Security Outside the Office
#DontBeTheBreach
54
Travel & Remote Location Tips
Here are more important tips for protecting information systems while working
outside the office!
• Ensure that the wireless security features are properly configured by using
only approved secure Virtual Private Network (VPN) ports.
• Turn off/disable wireless capability when connected via Local Area Network
(LAN) cable.
You must receive approval and satisfy HHS requirements for telework. For more
information see the:
– Rules of Behavior for Use of HHS Information Resources
– HHS-OCIO Policy for Personal Use of Information Technology Resources
– HHS Policy for Information Technology Security for Remote Access.
56
Protecting PII While Teleworking
57
Home Security
58
Knowledge Check
59
Knowledge Check Answer
60
LESSON 6:
PRIVACY
61
What is Privacy?
62
Why is Privacy Important?
1. These devices contain memory that can retain PII long after you’ve used the device.
2. OMB Memorandum M-07-16, Safeguarding Against and Responding to the Breach of
Personally Identifiable Information.
63
1. These devices contain memory that can retain PII long after you’ve used the device.
Consequences of Privacy Violations
64
Fair Information Practice Principles
HHS has long been a major force in establishing and meeting high standards for privacy. In
1973, HHS3 advanced the Code of Fair Information Practice which has served as a
foundation for future federal privacy frameworks. Shown here is an example of one of the
many frameworks developed to encompass and expand HHS’ early framework:
65
What is PII?
66
Putting Privacy Into Action
Everyday, HHS employees support these principles and the commitment they represent.
Here are the first four principles in more detail.
Framework Description Examples
Authority and HHS publically documents the purpose for which the • Privacy Act Statements
Purpose PII is collected at the time of the collection, how the • System of Records Notices in
PII will be used, and the authority that permits the Federal Register
collection of PII.
Data Quality and HHS uses PII that is accurate, relevant, timely and • PII updates records and seeks
Integrity complete for the purposes for which it is to be used. clarification from individuals (as
needed).
Data Minimization HHS collects PII that is directly relevant and necessary • Collecting minimum data on forms
and Retention to accomplish the specified purpose(s) and that PII • Redacting records
should only be retained for as long as necessary to • Truncating data elements
fulfill the specified purpose(s) and in accordance with • Records are maintained and
the National Archives and Records Administration destroyed per NARA guidance
(NARA) approved record retention schedule.
Putting Privacy Into Action (continued)
Everyday, HHS employees support these principles and the commitment they represent.
Here are the last four principles in more detail
Framework Description Examples
Individual Individuals provide HHS with consent for the • Individuals can request to review
Participation and collection, use, dissemination, and the maintenance information about them
of PII and HHS has appropriate mechanisms for maintained in a System of Record
Redress
access, correction, and redress regarding the use of • Individuals can request that errors
their PII. be corrected (redress)
Transparency HHS provides a notice to individuals regarding the • Privacy Act Statements
collection, use, dissemination, and maintenance of • Privacy policy on websites
PII. • System of Records Notices in
Federal Register
Use Limitation HHS uses PII for the purpose(s) specified in the public • PII collected for determination of
notice and data should not be disclosed, made benefits is not used for marketing
available or otherwise used for purposes other than
those compatible with the purpose(s) for with the
information was collected except with the consent of
the data subject; or by the authority of law.
PII Considerations for the Information
Life Cycle
The HHS Information Life Cycle defines how to
handle and encrypt data from inception to
disposition. Protecting PII is required during
each stage of the cycle:
• Data Collection or Creation: Gathering PII
for use.
• Data Storage: Maintaining or storing PII.
When safeguarding sensitive information,
back up all stored or transmitted
information, encrypt them, and file/archive
the encrypted backup information.
• Data Usage: Using PII to accomplish a job
function.
• Data Sharing: Disclosing or transferring PII.
• Disposition: Disposing of PII in accordance
with record management requirements and
organizational disposal policies.
69
PII Considerations for the Information
Life Cycle (cont’d)
Are you allowed to collect the PII by law?
Do you have a legitimate business need to
collect the PII?
Are you obtaining it in a safe manner so that it
cannot be overheard or seen by others?
Is the PII part of a record that falls under Did you only request the minimum amount of
the records retention schedule? PII to get the job done?
72
Protecting PII When Faxing
Sending faxes:
• Verify recipient’s fax number prior to
sending PII.
• Make sure someone authorized to receive
the PII is there to receive the fax.
• Use a fax transmittal sheet.
• Don’t leave PII on fax machines after
faxing.
Receiving faxes:
• Quickly retrieve faxes transmitted to you.
• Secure faxes that have not been retrieved.
• If you are expecting a fax and have not
received it, follow-up to ensure the sender
has the correct fax number.
73
Protecting PII When Mailing
Interoffice mail:
• Send in a confidential envelope.
• Follow-up to verify that the recipient
received the information.
Postal mail (“snail mail”):
• When possible, use a traceable delivery
service (like UPS).
• Package in an opaque envelope or
container.
Email:
• Double-check the recipient’s address
before sending.
• Encrypt email.
• Digitally sign email.
74
Protecting PII with Encryption
75
SSN Protections
76
Disposition
77
Knowledge Check
78
Knowledge Check Answer
79
Privacy Points of Contact
To learn more:
• Visit the HHS Cybersecurity Privacy page
http://intranet.hhs.gov/it/cybersecurity/privacy/index.html for
more information on protecting PII and incident response.
80
LESSON 7:
INSIDER THREAT
81
Definition of an Insider Threat
82
Why is HHS a Target?
83
Threat Indicators
84
Be Aware
85
LESSON 8:
INCIDENT REPORTING
86
Causes of Data & Privacy Incidents
87
Consequences of Data & Privacy
Incidents
Privacy and data incidents can result in:
• Inability for HHS to fulfill its mission, and
• Disruption of day-to-day operations.
88
How To Report
Please see the chart below for each OPDIV
Within HHS, users should report CSIRT contact.
all suspected computer security
incidents to their local Operating OpDiv Email
Division (OpDiv) Computer ITO [email protected]
Security (CSIRT)/ Incident
AHRQ [email protected]
Response Team (IRT) or Help Desk
ACF [email protected]
http://intranet.hhs.gov/it/cybersecurity
/docs/policies_guides/OCIO/pol-pers-
ACL [email protected]
use-it-rsrc.pdf
SAMHSA [email protected]
Contact information for each OpDiv
can be found at: CMS [email protected]
http://intranet.hhs.gov/it/cybersecurity FDA [email protected]
/hhs_csirc/ CDC/ATSDR [email protected]
IHS [email protected]
NIH [email protected]
OIG [email protected]
HRSA [email protected]
89
Reporting Incidents Tips
90
Reporting Insider Threats
Insider threats are a special type of incident. Report these incidents to the OSSI:
91
Knowledge Check
92
Knowledge Check Answer
93
SUMMARY:
94
Review of Objectives
In this course, you have learned to:
• Define information systems security;
• Locate federal regulations that mandate the protection of IT assets and information;
• Describe HHS’ IT security and privacy policies, procedures, and practices;
• Define sensitive data;
• Describe your personal responsibility to protect information systems and privacy, and the
consequences for violations;
• Recognize threats to information systems and privacy;
• Define encryption and determine how and when to encrypt;
• Perform HSS best practices to secure IT assets and data at the office or at home;
• Define privacy and personally identifiable information (PII);
• Define encryption and determine how and when to encrypt;
• Protect PII in different contexts and formats;
• Identify the traits that may indicate an insider threat; and
• Report a suspected or confirmed security or privacy incident to the proper authorities.
95
COURSE QUIZ:
96
Quiz Question 1 of 10
a. True
b. False
97
Quiz Question 1 of 10 Answer
a. True
b. False
98
Quiz Question 2 of 10
99
Quiz Question 2 of 10 Answer
100
Quiz Question 3 of 10
a. JohnnyAppleseed
b. Wanda434
c. rdCamero$$
d. TGiF23$a4Vs@87
101
Quiz Question 3 of 10 Answer
a. JohnnyAppleseed
b. Wanda434
c. rdCamero$$
d. TGiF23$a4Vs@87
102
Quiz Question 4 of 10
With regard to your PIV card you, or your federal supervisor or organization should
notify your badging office immediately if which of the following occurs?
103
Quiz Question 4 of 10 Answer
With regard to your PIV card you, or your federal supervisor or organization should
notify your badging office immediately if which of the following occurs?
104
Quiz Question 5 of 10
105
Quiz Question 5 of 10 Answer
106
Quiz Question 6 of 10
a. True
b. False
107
Quiz Question 6 of 10 Answer
a. True
b. False
108
Quiz Question 7 of 10
The number one cause of data breaches at U.S. healthcare companies is:
109
Quiz Question 7 of 10 Answer
The number one cause of data breaches at U.S. healthcare companies is:
One study estimates that 68% of all data breaches are caused
by employees losing equipment or data. Keep your laptop and
other devices with you at all times.
110
Quiz Question 8 of 10
111
Quiz Question 8 of 10 Answer
112
Quiz Question 9 of 10
HHS protecting PII, in all formats, using administrative, technical, and physical
security safeguards, is a description of which of the eight Privacy Framework
Principles?
a. Security
b. Data Minimization and Retention
c. Data Quality and Integrity
d. Transparency
113
Quiz Question 9 of 10 Answer
HHS protecting PII, in all formats, using administrative, technical, and physical
security safeguards, is a description of which of the eight Privacy Framework
Principles?
a. Security
b. Data Minimization and Retention
c. Data Quality and Integrity
d. Transparency
114
Quiz Question 10 of 10
115
Quiz Question 10 of 10 Answer
116
Congratulations
117
HHS Rules of Behavior
All new users of HHS information resources must read the HHS RoB and sign the accompanying acknowledgement form
before accessing Department data or other information, systems, and/or networks. This acknowledgement must be
completed annually thereafter, which may be done as part of annual HHS Information Systems Security Awareness
Training. By signing the form users reaffirm their knowledge of, and agreement to adhere to, the HHS RoB. The HHS RoB
may be presented to the user in hardcopy or electronically. The user’s acknowledgement may be obtained by written
signature or, if allowed per Operating Division (OpDiv) or Staff Division (StaffDiv) policy and/or procedure, by electronic
acknowledgement or signature.
118
HHS Rules of Behavior 2
The HHS RoB cannot account for every possible situation. Therefore, where the HHS RoB does not provide explicit guidance,
personnel must use their best judgment to apply the principles set forth in the standards for ethical conduct to guide their
actions.
Non-compliance with the HHS RoB may be cause for disciplinary actions. Depending on the severity of the violation and
management discretion, consequences may include one or more of the following actions: 3
HHS OpDivs may require users to acknowledge and comply with OpDiv-level policies and requirements, which may be more
restrictive than the rules prescribed herein. Supplemental rules of behavior may be created for specific systems that require
users to comply with rules beyond those contained in this document. In such cases users must also sign these supplemental
rules of behavior prior to receiving access to these systems4 and must comply with ongoing requirements of each individual
system to retain access (such as re-acknowledging the system-specific rules by signature each year). System owners must
document any additional system-specific rules of behavior and any recurring requirement to sign the respective
acknowledgement in the security plan for their systems. Each OpDiv Chief Information Officer (CIO) must implement a
process to obtain and retain the signed rules of behavior for such systems and must ensure that user access to such system
information is prohibited without a signed.
3 Refer to the Employee Standards of Conduct published by the U.S. Office of Government Ethics, available at:
https://www2.oge.gov/web/oge.nsf/Employee%20Standards%20of%20Conduct
4 National Institute of Standards and Technology (NIST) Publication (SP) 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, defines
an “information system” as: “A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.”
119
HHS Rules of Behavior 3
acknowledgement of system-specific rules and a signed acknowledgement of the HHS RoB.
National security systems, as defined by the Federal Information Security Management Act (FISMA), must independently or
collectively implement their own system-specific rules.
These HHS RoB apply to local, network, and remote use5 of HHS information (in both electronic and physical forms) and
information systems by any individual.
Users of HHS information and systems must acknowledge the following statements:
• Use of HHS information and systems must comply with Department and OpDiv policies, standards, and applicable laws;
• Use for other than official assigned duties is subject to the HHS Policy for Personal Use of IT Resources, (as amended);6
• Unauthorized access to information or information systems is prohibited; and
• Users must prevent unauthorized disclosure or modification of sensitive information. 7
5 Refer to the glossary of National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Revision 4, Security and Privacy Controls for Federal Information
Systems and Organizations for definitions of local, network, and remote access.
6 Available at: http://www.hhs.gov/ocio/policy/index.html.
7 HHS Memorandum: Updated Departmental Standard for the Definition of Sensitive Information (as amended) is available at:
http://intranet.hhs.gov/it/cybersecurity/policies/index.html.
120
HHS Rules of Behavior 4
I must:
General Security Practices
• Follow HHS security practices whether working at my primary workplace or remotely;
• Accept that I will be held accountable for my actions while accessing and using HHS information and information systems;
• Ensure that I have appropriate authorization to install and use software, including downloaded software on HHS systems
and that before doing so I will ensure that all such software is properly licensed, approved, and free of malicious code;
• Wear an identification badge (or badges, if applicable) at all times, except when they are being used for system access in
federal facilities;
• Lock workstations and remove Personal Identity Verification (PIV) cards from systems when leaving them unattended;
• Use assigned unique identification and authentication mechanisms, including PIV cards, to access HHS systems and
facilities;
• Complete security awareness training (i.e., HHS Information Systems Security Awareness Training) before accessing any
HHS system and on an annual basis thereafter and complete any specialized role-based security or privacy training, as
required by HHS policies;8
• Permit only authorized HHS users to use HHS equipment and/or software;
• Take all necessary precautions to protect HHS information assets9 (including but not limited to hardware, software,
personally identifiable information (PII), protected health information (PHI), and federal records [media neutral]) from
unauthorized access, use, modification, destruction, theft, disclosure, loss, damage, or abuse, and treat such assets in
accordance with any information handling policies;
8 HHS Memorandum: Role-Based Training (RBT) of Personnel with Significant Security Responsibilities (available at: http://intranet.hhs.gov/it/cybersecurity/policies/index.html)
of Standards and Technology (NIST) Special Publication (SP) 800-30, Revision 1, Guide for Conducting Risk Assessments.
121
HHS Rules of Behavior 5
• Immediately report to the appropriate incident response organization or help desk (pursuant to OpDiv policy and/or
procedures) all lost or stolen HHS equipment; known or suspected security incidents; 10 known or suspected information
security policy violations or compromises; or suspicious activity in accordance with OpDiv procedures;
• Notify my OpDiv/StaffDiv Personnel Security Representative (PSR) when I plan to bring government-owned equipment on
foreign travel (per requirements defined by the Office of Security and Strategic Information (OSSI)); 11
• Maintain awareness of risks involved with clicking on e-mail or text message web links; and
• Only use approved methods for accessing HHS information and HHS information systems.
Privacy
• Understand and consent to having no expectation of privacy while accessing HHS computers, networks, or e-mail;
• Collect information from members of the public only as required by my assigned duties and permitted by the Privacy Act of
1974, the Paperwork Reduction Act, and other relevant laws;
• Release information to members of the public including individuals or the media only as allowed by the scope of my duties
and the law;
• Refrain from accessing information about individuals unless specifically authorized and required as part of my assigned
duties;
• Use PII and PHI only for the purposes for which it was collected and consistent with conditions set forth by stated privacy
notices such as those provided to individuals at the point of data collection and published System of Records Notices; and
• Ensure the accuracy, relevance, timeliness, and completeness of PII, as is reasonably necessary and to the extent
possible, to assure fairness in making determinations about an individual.
10 Known or suspected security incidents involve the actual or potential loss of control or compromise, whether intentional or unintentional, of authenticator, password, or sensitive
information maintained by or in the possession of HHS or information processed by contractors and third-parties on behalf of HHS.
11 OSSI policies for foreign travel can be found at: http://intranet.hhs.gov/training/foreign-travel-security-awareness/index.html
122
HHS Rules of Behavior 6
Sensitive Information
• Treat computer, network and web application account credentials as private sensitive information and refrain from sharing
accounts;
• Secure sensitive information, regardless of media or format, when left unattended;
• Keep sensitive information out of sight when visitors are present;
• Sanitize or destroy electronic media and papers that contain sensitive data when no longer needed, in accordance with the
HHS Policy for Records Management12 and sanitization policies, or as otherwise lawfully directed by management;
• Access sensitive information only when necessary to perform job functions; and
• Properly protect (e.g., encrypt) HHS sensitive information at all times while stored or in transmission, in accordance with the
HHS Standard for Encryption of Computing Devices.13
I must not:
• Violate, direct, or encourage others to violate HHS policies or procedures;
• Circumvent security safeguards, including violating security policies or procedures or reconfiguring systems, except as
authorized;
• Use another person’s account, identity, password/passcode/PIN, or PIV card or share my password/passcode/PIN;
• Remove data or equipment from the agency premises without proper authorization;
• Use HHS information, systems, and hardware to send or post threatening, harassing, intimidating, or abusive material about
others in public or private messages or forums;
• Exceed authorized access to sensitive information;
• Share or disclose sensitive information except as authorized and with formal agreements that ensure third-parties will
adequately protect it;
123
HHS Rules of Behavior 7
• Transport, transmit, e-mail, remotely access, or download sensitive information unless such action is explicitly permitted by
the manager or owner of such information and appropriate safeguards are in place per HHS policies concerning sensitive
information;
• Use sensitive information for anything other than the purpose for which it has been authorized;
• Access information for unauthorized purposes;
• Use sensitive HHS data for private gain or to misrepresent myself or HHS or for any other unauthorized purpose;
• Store sensitive information in public folders or other insecure physical or electronic storage locations;
• Knowingly or willingly conceal, remove, mutilate, obliterate, falsify, or destroy information;
• Copy or distribute intellectual property including music, software, documentation, and other copyrighted materials without
written permission or license from the copyright owner;
• Modify or install software without prior proper approval per OpDiv procedures;
• Conduct official government business or transmit/store sensitive HHS information using non-authorized equipment or
services; or
• Use systems (either government issued or non-government) without the following protections in place to access sensitive
HHS information:
• Antivirus software with the latest updates;
• Anti-spyware and personal firewalls;
• A time-out function that requires re-authentication after no more than 30 minutes of inactivity on remote access; and
• Approved encryption14 to protect sensitive information stored on recordable media, including laptops, USB drives,
and external disks; or transmitted or downloaded via e-mail or remote connections.
14 Refer to the HHS Standard for Encryption of Computing Devices, available at: http://intranet.hhs.gov/it/cybersecurity/policies/index.html.
124
HHS Rules of Behavior 8
I must refrain from the following activities when using federal government systems, which are prohibited per the HHS Policy
for Personal Use of Information Technology Resources,15 (as amended):
125
HHS Rules of Behavior 9
ACKNOWLEDGEMENT PAGE
By completing this course, I acknowledge that I have read the HHS Rules of Behavior (HHS RoB), version HHS-OCIO-2013-
0003S,
dated July 24, 2013 (or as amended) and understand and agree to comply with its provisions. I understand that violations of
the HHS RoB or information security policies and standards may lead to disciplinary action, up to and including termination of
employment; removal or debarment from work on Federal contracts or projects; and/or revocation of access to Federal
information, information systems, and/or facilities; and may also include criminal penalties and/or imprisonment. I understand
that exceptions to the HHS RoB must be authorized in advance in writing by the OPDIV Chief Information Officer or his/her
designee. I also understand that violation of laws, such as the Privacy Act of 1974, copyright law, and 18 USC 2071, which the
HHS RoB draw upon, can result in monetary fines and/or criminal charges that may result in imprisonment.
126