Personal tools

Acceptable Use


The ethical and allowable use of mobile computing devices at DOE. These acceptable use rules are in place to protect customers, business partners, and employees of DOE. Insecure practices and malicious acts expose DOE, customers, business partners, and employees to risks including, but not limited to, virus attacks, compromise of network systems and services, and loss of data or sensitive information. Security breaches could result in legal action for individuals or DOE. In addition, security breaches damage the DOE’s reputation and could result in loss of services.

No items have been linked to this term.
  • Human Resources
  • Information Technology
  • Security

Document Actions