I am not understanding the unauthorized use of IT systems questions.
What about a person who creates a personal email account under a name similar to someone else’s name for a personal reason? For example, to send an email to a medical clinic to get information about forms that may affect both parties?
What about a person who creates a pseudonymous email address under a fake name to send information concerning fraud, some of which information is CI material, to the government, without fear of retaliation were the true identity of the reported to be discovered?
Both potential incidents would have intent to protect something- in the first case, reproductive materials, and in the second- national security interest.
Consider that the reporter of the CI material was acting in good faith and was an untrained reporter of such material doing this on a volunteer basis.
Do these have to be reported under this section?
No government systems were accessed or altered. No software/hardware/hacking, none of that stuff. In the case of the reproductive materials owned by both parties, the attempt to get information resulted in no information received and no change to the status of the reproductive materials- they are safe and sound and the subject of a protective order in an appeals court.
Are you a cleared employee? We get training on this annually so you should know the answer. The regs are very broad for good reason. Basically it boils down to: you can only access IT systems you are approved to access and you can only use the IT system for its specific purpose. Any other use (at all) is a violation. So yeah, all your scenarios would be unauthorized use of government IT systems. Also, any personal device you use for government work may fall under that umbrella as well.
So what exactly are these questions about unauthorized use of IT systems asking? What is an IT system? Are they talking about IT systems owned by employers? IT systems owned by the government? Is a person’s personal laptop or computer an IT system? I don’t understand the question.
Great question. NO, the person in question is not a cleared employee, only an applicant to federal jobs. The applicant did not have access to any government IT systems at that time. The applicant did not have any personal device used for government work because they were not employed by the government.
Well then you couldn’t have violated any gov IT systems. Did you ever fiddle with an employers computers/servers/email in a way you weren’t supposed to? If you’re still not sure, have a look at this link or just reach out to the security officer handling your application. That’s what they’re there for.
No, the applicant never did that. The applicant always followed their employers rules about computers, servers, and email and was very careful to never do anything unauthorized.