Defense Logistics Agency (DLA)

General Rules of Behavior


The following DLA General Rules of Behavior delineate the responsibilities of, and expectations for, all individuals with access to DLA systems, networks, and internal web sites.

What is the purpose of the Rules of Behavior?
The DLA Rules of Behavior summarize laws and guidelines from various DLA and Department of Defense (DOD) documents.
What are Rules of Behavior?
Rules of Behavior support accomplishing a Defense-in-Depth strategy of Information Assurance (IA) initiatives. These guidelines were established to hold users accountable for their actions and responsible for information security. Rules of Behavior establish standards of actions in recognition of the fact that knowledgeable users are the foundation of a successful security program. The Rules of Behavior highlight the need for users to understand that taking personal responsibility for the security of a computer and the data it contains is an essential part of their job.
Who is covered by these rules?
These rules are to be followed by the entire DLA workforce (civilian, military, and contractor) with access to DLA systems, networks, and internal web sites. This DLA workforce should be fully aware of, and abide by, DLA security policies as well as related DOD policies.
What are the penalties for Noncompliance?
Noncompliance to these rules will be enforced through sanctions commensurate with the level of infraction. Actions may result in removal of system access.
Misuse of Privacy Act data may result in civil and criminal charges and fines.


USERS WILL: NOTE: The user is identified as a user of DLA's computer systems when logged onto the Internet.

Learn about information security to help the Information Assurance Officer (IAO) and Terminal Area Security Officer (TASO). Numbers alone make users the most important security asset. Compared to one IAO or TASO per DLA application or system, users offer many eyes and ears to detect threats to DLA information systems.