System Use Notification
JBS International, Inc. (JBS), under contract with the Children's Bureau, U.S. Department of Health and Human Services (HHS), actively monitors this system and activity to maintain system security and availability, and to ensure appropriate and legitimate usage. Any individual who intentionally accesses a federal computer or system without authorization, and who alters, damages, makes unauthorized modifications to, or destroys information in any federal-interest computer, or exceeds authorized access, is in violation of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Any evidence of possible violations of proper use or applicable laws found as a result of this monitoring may be turned over to the Children's Bureau, HHS, and law enforcement. Any individual found to be in violation of the system's proper use rules or law could be punished with loss of system access, fines, and/or imprisonment. By proceeding, you hereby acknowledge your agreement with these terms and the system's rules of behavior and consent to such monitoring and information retrieval for law enforcement and other official purposes.
Confidentiality Agreement
All data and reports on the Child and Family Services Reviews (CFSR) Online Monitoring System (OMS) are confidential, may contain sensitive information, and are intended for authorized users. JBS does not accept liability for the contents herein.
Rules of Behavior
POLICY FOR USE OF OMS RESOURCES FOR THE CFSR MUST BE FOLLOWED.
- As a user of the CFSR OMS, you are required to be aware of, and comply with, all applicable policies and guidelines on authorized use and security of the OMS computer resources and data.
- You must inform OMS management and/or JBS if you are departing your position or organization and should no longer have access to the OMS.
YOU ARE RESPONSIBLE FOR ALL ACTIONS PERFORMED WITH YOUR PERSONAL USER ID.
- User IDs and passwords are for your individual use only and, as confidential information, are not to be shared.
- You must not disclose your password to anyone, and you must take necessary steps to prevent anyone from gaining knowledge of your password.
- As an OMS user, you will be expected to employ good password management practices as defined and enforced by system management prompts dictated by the system.
POLICY, STANDARDS, AND PROCEDURES MUST BE FOLLOWED.
- Use of OMS computer resources is restricted in accordance with federal policy and guidelines.
- Violations of the "Computer Fraud and Abuse Act of 1986" (Public Law 99-474), the Privacy Act, the Trade Secrets Act (18 U.S.C. § 905), and other federal regulations applying to unauthorized use of federal computer systems, files, records, and data, are punishable by law.
- Be aware that all OMS computer resources used and accessed by authorized OMS users are subject to periodic testing, review, monitoring, and auditing. Any evidence of security violations or illegal activity will be immediately turned over to OMS management or law enforcement for action. Penalties could include loss of access, fines, and/or imprisonment.
ACCESS TO INFORMATION MUST BE CONTROLLED.
- Access only the information for which you have been authorized and have a "need to know/access."
- Do not leave computers logged on to OMS and unattended. Log off at the end of each session or use access control software (for example, a screen saver with password) during unattended use.
- If you know that another person has used or is using your credentials, you must report the incident immediately to OMS management and JBS.
- Take steps necessary to maintain security of computer files and reports containing OMS information.
- Do not email personally identifiable information (PII) such as case names, names of children and families, or demographic information that may be identifiable. If you need to email case information, use descriptions that do not contain PII such as the reviewer, site, and/or case status. This includes email within your organization, as well as with the Help Desk.