Information Security Awareness Training and Rules of Behavior
U.S. Antarctic Program - IT Comms Section United States Antarctic Program United States Antarctic Program Logo National Science Foundation Logo
 

According to federal laws and regulations, all United States Antarctic Program (USAP) participants who have access to USAP information resources must do the following:

Awareness Training

All USAP participants are required to complete information security awareness training on an annual basis. USAP Information Security Awareness Training must be completed one of the following ways:

Online Learning Center Information Security Awareness Course

Most USAP participants must meet training requirements by completing the Security Awareness Course through the USAP Online Learning Center (OLC), as instructed in your deployment packet.

If for some reason you cannot take the training via the OLC, you must send an email to den-it-securityawareness@usap.gov with a justification. Information Security emails you indicating whether your justification is approved or disapproved.

Offline Information Security Awareness Course and Quiz

If USAP participants are en route or do not have access to the Online Learning Center (for example, people deployed on the vessels), they must read the offline Information Security Awareness Course and Quiz. A facilitator notifies you if it is appropriate for you to complete training via this option. If so, the facilitator also provides you with paper or electronic forms to sign for acknowledgement of training.

Information Security Awareness Course

Acknowledgement of USAP Information Security Policies and Permission for Use

Users of USAP information resources should understand what their responsibilities are regarding use and behavior on USAP network and systems. This includes system operators, maintainers, and general users of USAP information systems. Most notable of the Information Security Policies is the Enterprise Rules of Behavior.

Users should read, print, and sign the Acknowledgement of Information Security Policies form, and return it to the ASC following the instructions in your deployment packet.

Share on Facebook Share on Twitter Share on Google Plus Share This Site on Pinterest Subscribe to USAP RSS Feeds Share Via Email
Curator: Jeffrey Scharf, Antarctic Support Contract   |   NSF Official: Patrick Smith/Benjamin Bergerson, Division of Polar Programs