The purpose of this policy will provide the standards for connecting to any DoD networks from any host. These standards are created and designed to minimize any potential exposure to DoD network (s) from damage which may result from unauthorized user or access of DoD networks. Damages include loss of confidential or sensitive data, intellectual data, and damage to critical DoD internal systems.
This policy will apply to all DoD employees, contractors, vendors, and agents that have a DoD owned, or personal computer or workstation that is or may be used to connect to any DoD network. This policy also applies to remote access connections that may be used to do work on behalf of DoD, including the reading or sending of email, as well as viewing intranet web resources
Remote access techniques covered by this policy include, but are not limited to dial-in modem, frame relay, ISDN, DSL, VPN, SSH, and cable modems
It will be the responsibility of all DoD employee’s, contractors, vendors, and agents that have remote access privileges to any DoD network to ensure that their remote access connection is given the same considerations as DoD on site users.
All DoD remote users are responsible to ensure that any family member does not violate any DoD policy, does not perform illegal activities, and does not use the access for outside business activities
All employees will be responsible for understanding and following all security related policies and procedures.
Managers are responsible for ensuring that all employees under their supervision complete all mandatory security training.
The security officer will be responsible for, but not limited to:
Ensuring all employees understand and follow security related policies and procedures.
Maintain ongoing security awareness programs
A secure remote access must be strictly