Please note: The U.S. Department of Labor (DOL) uses Monster Government Solutions (MGS) Hiring Management Enterprise recruitment system. DOL has named the system Department of Labor Online Opportunities Recruitment System (DOORS). These are the Rules of Behavior for DOORS/Monster Hiring Management Enterprise System users.
As a privileged user of the DOORS system, I understand that I am personally responsible and accountable for my system privileges and any misuse of my system rights. I understand that by managing a U.S. government information system I must comply with the following requirements:
- The DOORS system is intended for official government use only. I understand that my system privileges are granted to me for the sole purpose of managing the system in accordance with DOL and OASAM policies and SHALL NOT engage in any action that violates DOL or OASAM policies such as using the system for commercial purposes, for financial gain, or in support of "for profit" non-government activities.
- In the exercise of my system privileges, I understand that certain information accessed or obtained via the DOORS system SHALL NOT be divulged outside of government channels without the express permission of the data owner.
- Any remote access to the network to access data in this system must be made through a VPN using
- two-factor authentication if the data you are accessing is other than your own. Two-factor authentication is where one of the factors is provided by a device separate from the computer gaining access.
- As a privileged user, I SHALL NOT alter system configuration, including installing software or peripherals, on government equipment unless authorized. Software will be deployed using Active Directory Service or other approved methods either by manual or automated installation.
- I SHALL NOT reproduce, for any user or for myself, any computer software nor distribute any controlled information including computer software and data, that includes privacy information, copyrighted, proprietary data, trademarked or material with other intellectual property rights (beyond fair use).
- Devices connected to the DOORS system must be certified by OCIO before they can be granted access to the DOORS system. I SHALL MAKE NO exception for any user (including myself), any system, any service or any application regarding this required preauthorization.
- I SHALL ensure that any Government-Furnished Equipment (GFE) under my purview is protected against unauthorized access, data theft, and device theft.
- With my system privileges, I understand that I SHALL NOT help any user or myself to:
- Knowingly access an information system without authorization, or exceed authorized access, and obtain information that requires protection against unauthorized disclosure.
- Knowingly introduce a security vulnerability to the DOL network instead of making the security of the DOL network a priority in the exercise of daily functions.
- Cover up any infraction by not reporting it to the appropriate federal management.
- Intentionally, without authorization, access a government information system and impact government operations, including availability of that system.
- Intentionally access a government information system without authorization, and alter, damage or destroy information therein, e.g. system logs, audit logs, etc.
- Install programs that modify operating system files or install system services.
- Create or manage local user accounts and groups.
- Stop and start system services which are not started by default.
- Configure power options without prior authorization. Prevent authorized use of the system or access a government information system without authorization, or exceed authorized access, and obtain anything of value.
- Connect unauthorized non-GFE to the DOL network.
- Change any hardware configuration settings on DOL network resources without prior authorization.
- Tamper with GFE, such as laptops or hand-held devices by removing any government- authorized security software or modifying the security settings on them.
- The Wireless Use ROB focuses on DOL GFE that has an approved and certified Evolution Data-Only, also known as Evolution Data-Optimized, (EV-DO) wireless communications capability for connectivity to department or agency information systems. Specific requirements are as follows:
- I SHALL ONLY access the DOL network using the approved EV-DO wireless device on preapproved and issued GFE.
- I SHALL ensure the security of the GFE and EV-DO equipment used to access the DOL network including:
- Periodically connect the laptop to the DOL network via the secure remote access capability, thus allowing the laptop to receive the necessary software patches and upgrades. It is essential that users connect their laptops to the DOL network at least once every 30 calendar days in order to receive patches and updates.
- Prevent loss or theft by physically protecting the GFE as though it were your own personal equipment. Use a laptop locking device (cable) when appropriate.
- Not leaving the GFE laptop and EV-DO card unattended for extended periods of time.
- Reporting the loss or theft of GFE devices to the Enterprise Service Desk at 1-855-LABOR-IT (1-855-522-6748) or Enterprise Service Desk@dol.gov within thirty minutes of noticing the loss or theft.
- Not allowing unauthorized individuals to access the internet or the DOL network using the GFE.
- I SHALL NOT disable or circumvent security implementations installed on the furnished GFE, or wireless device used to access the DOL network.
- I SHALL NOT allow the GFE device to be dual homed at any time. Dual-homed is when the GFE has more than one active network connection and communicating on these connections. Therefore, when using the GFE on a wired network connection, the wireless device (EV-DO) should be removed from the GFE. The opposite also applies, when using the wireless device (EV-DO) the GFE must not be connected to a wired network (i.e. home network, DOL network, or other).
- As a privileged user, I SHALL NOT browse Internet websites from any DOL network system (file servers, workstation, and/or laptop, either physical or virtual), with the exception of DOL network approved vendor websites. Such actions increase the possibility of an attack on a server by malicious websites.
- As a privileged user, I SHALL NOT enable and use the peer-to-peer technology in the environment unless explicitly permitted to do so.
- As a privileged user, I SHALL review and comply with the policies, procedures, and standards for incident response, protection of Personally Identifiable Information (PII), and breach notification. I SHALL be responsible for informing the Information Security Officer (ISO) of the detection or discovery of suspected or confirmed security incidents involving PII.
- I SHALL protect data according to the sensitivity, security, privacy and compliance laws, regulations, and guidelines.
- I SHALL provide immediate notification to supervisory personnel when a decision is made to retire, resign, transfer, or otherwise change the basis for which access to the system has been granted.
- My work produced SHALL remain accessible after my having separated from the Agency.
- I SHALL retrieve, browse, modify, copy, or delete only those files that I created or otherwise control and SHALL be especially cautious before deleting files.
- I SHALL ensure that I will save files in appropriate directories as misfiling an electronic copy can be as disruptive as misfiling a paper document.
- Any activity that violates federal or state laws for information protection (e.g. hacking, posting to social media sites, spamming, etc.) is not permitted. I understand that social media includes, but is not limited to, Networking sites, Public, Websites, Photo Sharing, Mailing Lists, Public Forums, Public Chat Rooms, File Sharing Services, Public Clouds, and so forth.
- I SHALL manually log off and turn off system for which I have accessed using my privileged user account to prevent access to sensitive data when leaving a workstation unattended and at the end of each day, especially with any Internet, e-mail, or major application running.
Acknowledgment of Rules of BehaviorI have read the DOORS security rules and understand and accept the security requirements of the information systems and/or applications described on this form. I understand disciplinary action, removal from the Production system(s) and/or criminal prosecution may be taken based on violation of these rules. Please contact your servicing HR Specialist for the DOORS Access Form to certify the agreement to abide by the Rules of Behavior for Monster/DOORS System Access. For Questions contact Helpdesk DOL-HRIS-HelpDesk or Maria R Martinez at martinez.maria.r@dol.gov or Mona Thorpe at Thorpe.mona@dol.gov. |