Jolly Rancher

Submitted by: Submitted by

Views: 501

Words: 1005

Pages: 5

Category: Other Topics

Date Submitted: 04/26/2011 12:53 PM

Report This Essay

PRIVILEGED-LEVEL ACCESS AGREEMENT ACCEPTABLE USE POLICY (AUP)

PRIVILEGED-LEVEL ACCESS AGREEMENT (PAA) & ACKNOWLEDGEMENT OF RESPONSIBILITIES

I understand that I have access to the Fort Stewart / Hunter Army Airfield (FS/HAAF) NIPR and/or SIPR Army Information System (IS), and that I have and will maintain the necessary clearances and authorizations for privileged-level access to the above Army Information Systems. As a privileged-level user; I will protect the root, administrator, or superuser account(s) and authenticator(s) to the highest level of data or resource it secures. I will NOT share the root, administrator, or superuser account(s) and authenticator(s) entrusted for my use. I am responsible for all actions taken under my account and understand that the exploitation of this account would have catastrophic effects to all networks for which I have access. I will ONLY use the special access or privileges granted to me to perform authorized tasks or mission related functions. I will only use my privileged account for official administrative actions. I will not attempt to “hack” the network or connected ISs, subvert data protection schemes, gain, access, share, or elevate permissions to data or ISs for which I am not authorized. I will protect and label all output generated under my account to include printed materials, magnetic tapes, external media, system disks, and downloaded files. I will immediately report any indication of computer network intrusion, unexplained degradation or interruption of system or network services, illegal or improper possession of content or files, or the actual or possible compromise of data, files, access controls, or systems to the installation Information Assurance Manager and cease usage of the information system immediately. I will NOT install, modify, or remove any hardware or software (i.e. freeware/shareware, security tools, etc.) without permission and approval from the installation Information Assurance Manager.

I...