You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C § 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to: Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State. If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel. Rules of Behavior-User Responsibilities The Impact Aid Grants System (IAGS) is a Department of Education (ED) information system and is to be used for official use only. Users must read, understand, and comply with these Rules of Behavior. Failure to comply with the IAGS Rules of Behavior may result in revocation of your IAGS account privileges, or criminal prosecution. IAGS users are responsible for notifying their IAGS User Administrator when they no longer require access to IAGS. This may occur when a user is designated new responsibilities that do not include a need to access IAGS or when the user is appointed to another job or position. • Handle personally identifiable information (PII) with care. Unless explicitly requested for an official government authorized purpose, PII shall not be uploaded, transmitted or stored in IAGS. • You are prohibited from sharing your account information with anyone and must take the appropriate action to ensure your account information is stored in a secure manner. • All IAGS Users will be given access to information based on a need to know. • You must work within the confines of the access allowed, and you must not attempt to access information for which you do not have a need to know. • Do not leave computers logged on and unattended. Log off at the end of each session, or use access control software (i.e., screen saver with password) or configure auto-lock for unattended use. • The confidentiality and integrity of information must be maintained. Therefore, information in any form shall be appropriately protected. You must not maliciously delete, modify, destroy or otherwise misuse any Department data or information • User accounts are disabled after three (3) consecutive invalid attempts are made to supply a password. • Do not disclose IAGS information to any individual without a "need-to-know" for the information in the course of their business. • Do not be a victim of shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. An example of shoulder surfing is when a person looks over someone else's shoulder while they are entering a password for a system to covertly acquire that password. • Be aware of suspicious contact to gain IAGS account information or social engineering attempts - Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. • Virus Scanning - Scan documents or files downloaded to your computer from the Internet for viruses and other malicious code. Virus scanning software should also be used on attachments before uploading to IAGS.