System Use Notification and Rules of Behavior

System Use Notification

JBS International, Inc., under contract with the Children's Bureau, Department of Health and Human Services (HHS), actively monitors this system and activity to maintain system security and availability and to ensure appropriate and legitimate usage. Any individual who intentionally accesses a federal computer or system without authorization, and who alters, damages, makes unauthorized modifications to, or destroys information in any federal-interest computer, or exceeds authorized access, is in violation of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Any evidence of possible violations of proper use or applicable laws found as a result of this monitoring may be turned over to the Children's Bureau, HHS, and law enforcement. Any individual found to be in violation of the system's proper use rules or law could be punished with loss of system access, fines, and/or imprisonment. By proceeding, you hereby acknowledge your agreement with these terms and the system's rules of behavior and consent to such monitoring and information retrieval for law enforcement and other official purposes.

Rules of Behavior

POLICY FOR USE OF NATIONAL YOUTH IN TRANSITION DATABASE (NYTD) VIRTUAL NETWORK COMPUTER RESOURCES.

  • As a user of the NYTD Virtual Network, you are required to be aware of, and comply with, all applicable policies and guidelines on authorized use and security of the NYTD Virtual Network computer resources and data.


YOU ARE RESPONSIBLE FOR ALL ACTIONS PERFORMED WITH YOUR PERSONAL USER ID.

  • User IDs and passwords are for your individual use only and, as confidential information, are not to be shared.
  • You must not disclose your password to anyone, and you must take necessary steps to prevent anyone from gaining knowledge of your password.
  • As a NYTD Virtual Network user, you will be expected to employ good password management practices as defined and enforced by system management prompts dictated by the system.


POLICY, STANDARDS, AND PROCEDURES MUST BE FOLLOWED.

  • Use of NYTD Virtual Network computer resources is restricted in accordance with federal policy and guidelines.
  • Violations of the "Computer Fraud and Abuse Act of 1986" (Public Law 99-474), the Privacy Act, the Trade Secrets Act (18 U.S.C. ยง 905), and other federal regulations applying to unauthorized use of federal computer systems, files, records, and data, are punishable by law.
  • Be aware that all NYTD Virtual Network computer resources used and accessed by authorized NYTD Virtual Network users are subject to periodic testing, review, monitoring, and auditing. Any evidence of security violations or illegal activity will be immediately turned over to NYTD Virtual Network management or law enforcement for action. Penalties could include loss of access, fines, and/or imprisonment.


ACCESS TO INFORMATION MUST BE CONTROLLED.

  • Access only the information for which you have been authorized and have a "need to know/access."
  • Do not leave computers logged on to NYTD Virtual Network and unattended. Log off at the end of each session or use access control software (for example, a screen saver with password) during unattended use.
  • If you know that another person has used or is using your credentials, you must report the incident immediately to NYTD Virtual Network management and JBS.
  • Take steps necessary to maintain security of computer files and reports containing NYTD Virtual Network information.