Comprehensive Discrepancy System - Welcome to CDS
NASA logo By accessing and using this information system, you acknowledge and consent to the following: You are accessing a U.S. Government information system, which includes: (1) this computer; (2) this computer network; (3) all computers connected to this network including end user systems; (4) all devices and storage media attached to this network or to any computer on this network; and (5) cloud and remote information services. This information system is provided for U.S. Government-authorized use only. You have no reasonable expectation of privacy regarding any communication transmitted through or data stored on this information system. At any time, and for any lawful purpose, the U.S. Government may monitor, intercept, search, and seize any communication or data transiting, stored on, or traveling to or from this information system. You are NOT authorized to process classified information on this information system. Unauthorized or improper use of this system may result in suspension or loss of access privileges, disciplinary action, and civil and/or criminal penalties.

CDS Rules of Behavior

You understand that:

  1. Your IT resource account is established only for official use in the conduct of your assigned duties.
  2. You must protect all software on the IT resource in accordance with NASA and Federal Government security and control procedures. You must use licensed software in accordance with the license.
  3. You consent to monitoring and security testing to ensure proper security procedures and appropriate usage are being observed.
  4. You must not use the IT resources for fraudulent, harassment or obscene messages and/or materials.
  5. When you no longer need access to the IT resources, you must notify the appropriate responsible parties and make no further attempt to access these IT resources.
  6. You are not permitted to transmit X-terminal displays.
  7. You must not remove any IT resource from the facility without a property pass from the appropriate authority.
  8. You must erase fixed media prior to transferring the IT resources or designating the IT resources for excess.
  9. You are prohibited from tampering with another user's account, files or processes without the other user's express permission.
  10. You are prohibited from using the system resources for personal purposes or any unauthorized activities.
  11. You are prohibited to transfer or share Login IDs and passwords for any reason.
  12. You must not leave active logons unattended. Workstations must be paused when unattended even for short periods of time (less than 30 minutes).
  13. You must not logon to more than one workstation/terminal unless they are under your constant surveillance.
  14. You understand that all accounts on the IT resources require passwords.
  15. Your passwords:
    • Must be a minimum of 8 characters consisting of 3 out of 4 of the following: lowercase alpha, numeric, uppercase alpha, and special character
    • Must be changed at least every 90 days, 30 days for root/privileged user
    • Must not appear in an English or foreign-language dictionary
    • Must be memorized and not written down
    • Must not be stored in keyboard macros or .bat files
    • Must not consist of personal or easily guessed information
  16. You must challenge anyone in the facility that does not have the appropriate badge displayed.
  17. The IT resource must be in locked rooms/buildings except when such workstations or terminals are located in continuously staffed operational area.
  18. You are not allowed Internet or modem access to the IT resource.
  19. You are prohibited from remotely controlling any device that you have not been trained on or given permission to use.
  20. You must notify the System Administrator if you notice any unused service or port that has not been disabled on the IT resource.
  21. You may not install any personal or downloaded software without prior management approval.
  22. You must not enter any classified nor sensitive but unclassified (SBU) information into the IT resources.
  23. You are not allowed to use E-mail, anonymous FTP, or telnet sessions on the Closed IONet.
  24. You must report promptly any unauthorized penetration attempt, unauthorized system use, or virus activity to the security official.
  25. You must protect all system IP Addresses and special use port numbers as sensitive information.

Return to CDS