Information Security Awareness Training and Rules of Behavior
U.S. Antarctic Program - IT Comms Section United States Antarctic Program United States Antarctic Program Logo National Science Foundation Logo

According to federal laws and regulations, all United States Antarctic Program (USAP) participants who have access to USAP information resources must do the following:

Awareness Training

All USAP participants are required to complete information security awareness training on an annual basis. USAP Information Security Awareness Training must be completed one of the following ways:

Online Learning Center Information Security Awareness Course

Most USAP participants must meet training requirements by completing the Security Awareness Course through the USAP Online Learning Center (OLC), as instructed in your deployment packet.

If for some reason you cannot take the training via the OLC, you must send an email to with a justification. Information Security emails you indicating whether your justification is approved or disapproved.

Offline Information Security and Privacy Awareness Course

If USAP participants are en route or do not have access to the Online Learning Center (for example, people deployed on the vessels), they must read the offline Information Security and Privacy Awareness Course Materials. A facilitator notifies you if it is appropriate for you to complete training via this option. If so, the facilitator also provides you with paper or electronic forms to sign for acknowledgement of your training.

Information Security and Privacy Awareness Course Materials Link to PDF file

Acknowledgement of USAP Information Security Policies and Permission for Use

Users of USAP information resources should understand what their responsibilities are regarding use and behavior on USAP network and systems. This includes system operators, maintainers, and general users of USAP information systems. Most notable of the Information Security Policies is the Enterprise Rules of Behavior Link to PDF file.

Users should read, print, and sign the Acknowledgement of Information Security Policies form Link to PDF file, and return it to the ASC following the instructions in your deployment packet.

Share on Facebook Share on Twitter Share on Google Plus Share This Site on Pinterest Subscribe to USAP RSS Feeds Share Via Email
Curator: Jeffrey Scharf, Antarctic Support Contract   |   NSF Official: Tim Howard, Division of Polar Programs