Misuse of IT Systems and Security Clearances

You had to have that latest U2 or Bruce Springsteen album. Maybe it wasn’t offered on iTunes or maybe you didn’t love enough to pay for it. So, you used a P2P Network and downloaded it for free…and now you’re filling out your SF86. Questions?

Perhaps the greatest concern, regarding the use of information technology systems, to many clearance applicants is the potentially disqualifying condition of “introduction, removal, or duplication of hardware, firmware, software, or media to or from any information technology system without authorization, when prohibited by rules, procedures, guidelines or regulations.” This condition can apply to cases where applicants violate copyright laws using a computer…read more.

Leave a Comment

Leave a comment

Leave a Reply