- January 19, 2020
- Posted by: Security Clearance Advisors
- Category: Adjudicative Guideline - Misuse of Information Technology Systems, Adjudicative Guidelines
(a) The concern. Noncompliance with rules, procedures, guidelines, or regulations pertaining to information technology systems may raise security concerns about an individual’s trustworthiness, willingness, and ability to properly protect classified systems, networks, and information. Information Technology Systems include all related equipment used for the communication, transmission, processing, manipulation and storage of classified or sensitive information.
(b) Conditions that may be considered a misuse of information systems and could raise a security concern and may be disqualifying include:
(1) Illegal or unauthorized entry into any information technology system;
(2) Illegal or unauthorized modification, destruction, manipulation or denial of access to information residing on an information technology system;
(3) Removal (or use) of hardware, software, or media from any information technology system without authorization, when specifically prohibited by rules, procedures, guidelines or regulations;
(4) Introduction of hardware, software, or media into any information technology system without authorization, when specifically prohibited by rules, procedures, guidelines or regulations.
An example of this type of behavior is downloading pirating software onto your employer’s computer. Even something as innocuous as a music player may pose serious security risks.