Acceptable Use
The ethical and allowable use of mobile computing devices at DOE. These acceptable use rules are in place to protect customers, business partners, and employees of DOE. Insecure practices and malicious acts expose DOE, customers, business partners, and employees to risks including, but not limited to, virus attacks, compromise of network systems and services, and loss of data or sensitive information. Security breaches could result in legal action for individuals or DOE. In addition, security breaches damage the DOE’s reputation and could result in loss of services.
- Human Resources
- Information Technology
- Security
Document Actions