Third-Party Access to the Department's Information Technology Systems and Notice of Criminal Penalties for Misuse of Access Devices, 50707-50709 [2021-19536]

Download as PDF Federal Register / Vol. 86, No. 173 / Friday, September 10, 2021 / Notices Contracting Activity: NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA), NATL GEOSPATIALINTELLIGENCE AGENCY The Committee finds good cause to dispense with the 30-day delay in the effective date normally required by the Administrative Procedure Act. See 5 U.S.C. 553(d). This addition to the Committee’s Procurement List is effectuated because of the expiration of the National Geospatial Agency, Document Management contract. The Federal customer contacted and has worked diligently with the AbilityOne Program to fulfill this service need under the AbilityOne Program. To avoid performance disruption, and the possibility that the National Geospatial Agency will refer its business elsewhere, this addition must be effective on September 29, 2021, ensuring timely execution for a September 30, 2021, start date while still allowing 19 days for comment. The Committee determined that no severe adverse impact exists on any current contractor, as this is new requirement never having been contracted for in the past. The Committee also published a notice of proposed Procurement List addition in the Federal Register on June 18, 2021 and did not receive any comments from any interested persons. This addition will not create a public hardship and has limited effect on the public at large, but, rather, will create new jobs for other affected parties— people with significant disabilities in the AbilityOne program who otherwise face challenges locating employment. Moreover, this addition will enable Federal customer operations to continue without interruption. jbell on DSKJLSW7X2PROD with NOTICES Deletions On 8/6/2021, the Committee for Purchase From People Who Are Blind or Severely Disabled published notice of proposed deletions from the Procurement List. This notice is published pursuant to 41 U.S.C. 8503(a)(2) and 41 CFR 51–2.3. After consideration of the relevant matter presented, the Committee has determined that the product(s) listed below are no longer suitable for procurement by the Federal Government under 41 U.S.C. 8501–8506 and 41 CFR 51–2.4. Regulatory Flexibility Act Certification I certify that the following action will not have a significant impact on a substantial number of small entities. The major factors considered for this certification were: 1. The action will not result in additional reporting, recordkeeping or other compliance requirements for small entities. 2. The action may result in authorizing small entities to furnish the product(s) to the Government. 3. There are no known regulatory alternatives which would accomplish the objectives of the Javits-WagnerO’Day Act (41 U.S.C. 8501–8506) in VerDate Sep<11>2014 18:09 Sep 09, 2021 Jkt 253001 connection with the product(s) deleted from the Procurement List. End of Certification Accordingly, the following product(s) are deleted from the Procurement List: Product(s) NSN(s)—Product Name(s): 8460–00–368– 4281—Case, Map and Photograph Contracting Activity: DLA TROOP SUPPORT, PHILADELPHIA, PA NSN(s)—Product Name(s): 8455–01–113–0062—Qualification Badge, Basic Marksman, U. S. Army 8455–01–113–0066—Qualification Badge, Basic Sharpshooter, U. S. Army Designated Source of Supply: Fontana Resources at Work, Fontana, CA Contracting Activity: DLA TROOP SUPPORT, PHILADELPHIA, PA NSN(s)—Product Name(s): 7360–00–660– 0526—Dining Packet, In-Flight, Deluxe Designated Source of Supply: Cincinnati Association for the Blind, Cincinnati, OH Contracting Activity: GSA/FSS GREATER SOUTHWEST ACQUISITI, FORT WORTH, TX NSN(s)—Product Name(s): 8520–01–303–4037—Toothpaste, 3.0 oz., Fluoride 8530–01–293–1387—Toothbrush, Adult, Assorted Colors, 6’’, Soft Bristles Designated Source of Supply: North Jersey Friendship House, Inc., Hackensack, NJ Contracting Activity: GSA/FSS GREATER SOUTHWEST ACQUISITI, FORT WORTH, TX Michael R. Jurkowski, Acting Director, Business Operations. [FR Doc. 2021–19562 Filed 9–9–21; 8:45 am] BILLING CODE 6353–01–P DEPARTMENT OF EDUCATION Third-Party Access to the Department’s Information Technology Systems and Notice of Criminal Penalties for Misuse of Access Devices Federal Student Aid, Department of Education. ACTION: Notice. AGENCY: The U.S. Department of Education (Department) outlines the requirements for third-party access to the Department’s Information Technology (IT) systems and establishes criminal penalties for misuse of access devices. Specifically, this notice sets forth the definition of an access device, the terms of service, the Code of Conduct, and information security standards, and provides notice of related criminal penalties. DATES: This notice is applicable September 10, 2021. SUMMARY: PO 00000 Frm 00014 Fmt 4703 Sfmt 4703 50707 FOR FURTHER INFORMATION CONTACT: Michael Ruggless, Federal Student Aid, 830 First Street NE, Union Center Plaza, Room 114B4, Washington, DC 20202– 5345. Telephone: (202) 377–4098. Email: Michael.Ruggless@ed.gov. Tamy Abernathy, Office of Postsecondary Education, 400 Maryland Avenue SW, 2C–129, Washington, DC 20202. Telephone: (202) 453–5970. Email: Tamy.Abernathy@ed.gov. If you use a telecommunications device for the deaf (TDD) or a text telephone (TTY), call the Federal Relay Service, toll free, at 1–800–877–8339. SUPPLEMENTARY INFORMATION: The Stop Student Debt Relief Scams Act of 2019 (STOP Act) amended sections 141, 485B, and 490 of the Higher Education Act of 1965, as amended (HEA), on December 22, 2020, to prevent and address the improper use of access devices issued by the Department and establish criminal penalties for improper use. (Pub. L. 116–251; 134 Stat. 1129–1132). Section 485B(e) of these HEA amendments includes provisions for the prevention of improper access to the Department’s systems. Section 490(e) of these HEA amendments explicitly makes unauthorized access to the Department’s IT systems and the misuse of identification devices issued by the Department a criminal act. Criminal penalties associated with the STOP Act are applicable one day after the date of publication of this notice. All other actions and information pursuant to these HEA amendments contained in this notice are applicable upon publication. The Department establishes, pursuant to section 2(b) of the STOP Act, the following definition of an access device, terms of service, information security standards, and Code of Conduct. Definition of Access Device An access device, as defined in 18 U.S.C. 1029(e)(1), means any— (a) Card; (b) Plate; (c) Code; (d) Account number; (e) Electronic serial number; (f) Mobile identification number; (g) Personal identification number; (h) Other telecommunications service, equipment, or instrument identifier; or (i) Other means of account access that can be used alone or in conjunction with another access device— (1) To obtain money, goods, services, or any other thing of value; or (2) To initiate a transfer of funds (other than a transfer originated solely by paper instrument). E:\FR\FM\10SEN1.SGM 10SEN1 50708 Federal Register / Vol. 86, No. 173 / Friday, September 10, 2021 / Notices jbell on DSKJLSW7X2PROD with NOTICES Terms of Service An authorized user must abide by the Code of Conduct and Information Security Standards for Department systems. Acceptable Use of Systems (a) A person or entity may be granted access to, and use and share, the Department’s assets, data, information resources, and information systems (collectively, the Department’s information systems) only if the person or entity is an ‘‘authorized user’’ under paragraph (b) and only to the extent otherwise authorized pursuant to this section. (b) A person or entity may be granted access to the Department’s information systems as an authorized user if the person or entity has a bona fide ‘‘need to know’’ the information or data contained in the Department’s information systems and they are— (1) A student, borrower, or parent; (2) A guaranty agency, eligible lender, eligible institution, or a third-party organization acting on behalf of a guaranty agency, eligible lender, or eligible institution that complies with Federal law and requirements applicable to the Department’s information systems; or (3) A licensed attorney representing a student, borrower, or parent, or another individual who works for a Federal, State, local, or Tribal government or agency, or for a nonprofit organization, providing financial or student loan repayment counseling to a student, borrower, or parent, if— (i) The attorney or other individual has never engaged in unfair, deceptive, or abusive practices, as determined by the Department; (ii) The attorney or other individual does not work for an entity that has engaged in unfair, deceptive, or abusive practices (including an entity that is owned or operated by a person or entity that engaged in such practices), as determined by the Department; (iii) System access is provided only through a separate point of entry issued to the attorney or other individual; and (iv) The attorney or other individual has written consent from the relevant student, borrower, or parent to access the system. (c) To access the Department’s information systems, an authorized user must— (1) Read, understand, and sign the information system-specific Rules of Behavior; (2) Have valid and current access authorization issued by the Department; (3) Access the Department’s information systems using an access VerDate Sep<11>2014 18:09 Sep 09, 2021 Jkt 253001 device issued by the Department to the authorized user, and may not use an access device issued by the Department to a student, borrower, or parent. A student, borrower, or parent, including through a power of attorney, may not authorize a third party to use their access device; and (4) Comply with the terms of service, information security standards, and Code of Conduct. (d) No person or entity may access the Department’s information systems for the purpose of assisting a student in managing loan repayment or applying for any repayment plan, consolidation loan, or other benefit authorized under title IV of the HEA, except as permitted under this ‘‘Acceptable Use of Systems.’’ Criminal Penalties Section 2 of the STOP Act, Public Law 116–251, amended section 490 of the HEA (20 U.S.C 1097), by adding paragraph (e), which makes it a crime to knowingly use an access device that was issued to another person or obtained by fraud or false statement to access Department information technology systems for commercial advantage, private financial gain, criminal activity, or wrongful act violating United States or State law. A violator is subject to criminal penalties that include a fine of not more than $20,000, imprisonment for not more than five years, or both, beginning one day after the date of publication of this notice. Code of Conduct This Code of Conduct identifies the acceptable rules of behavior for accessing the Department’s information systems. Upon accessing the Department’s information systems, all users will receive a notification warning banner similar to the following that requires them to acknowledge and agree to the Code of Conduct prior to being allowed further access: ‘‘You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes, and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the PO 00000 Frm 00015 Fmt 4703 Sfmt 4703 U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C. 1030, and other applicable statutes, which may result in fines and imprisonment. This system may contain Personally Identifiable Information (PII), as defined by the Privacy Act of 1974, or other Controlled Unclassified Information as defined by 32 CFR 2002. For purposes of this system, unauthorized access includes, but is not limited to— (a) Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and (b) Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State. If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel. These Rules of Behavior identify responsibilities and expectations for all individuals accessing Federal Student Aid (FSA) systems. By accepting, you confirm that you have reviewed, acknowledge, and agree to the following Rules of Behavior: (a) You must protect all of the Department’s information systems, including the Department’s data and information in your possession, from access by, or disclosure to, unauthorized individuals or entities. (b) Your User ID, password, and other credentials are unique and only assigned to the specified authorized user. (1) Your User ID, password, and other credentials serve as an electronic signature for signing fiduciary documents committing you to financial obligations. (2) Your User ID, password, and other credentials are for official Department business only. (c) You must never give your User ID, password, or other credentials to another person, including your supervisor(s). Any information retrieved from the Department’s information systems may be shared only with individuals expressly authorized to receive this information. (d) You must access only systems, networks, data, control information, and software for which you have been E:\FR\FM\10SEN1.SGM 10SEN1 Federal Register / Vol. 86, No. 173 / Friday, September 10, 2021 / Notices jbell on DSKJLSW7X2PROD with NOTICES authorized by the U.S. Department of Education. (e) If you are a third party representing an authorized user under paragraph (b) of the ‘‘Acceptable Use of Systems,’’ you must be issued your own unique User ID, password, or credentials; at no time is a third party authorized to use another individual’s unique User ID, password, or credentials. A user may not authorize a third party to use their User ID, password, or credentials, including through a power of attorney. (f) You are individually responsible for ensuring that data/information obtained from the Department’s information systems is not used improperly. A legitimate reason must be present to view data/information contained within the Department’s information systems. (g) You must change your password immediately and notify the appropriate security personnel if your password is compromised, or someone else knows your password. (h) You must properly encrypt (or password protect) all electronic files when transmitting data via email. Passwords must be sent separately (not in the same transmission or transmission channel). (i) All paper documents containing PII or Controlled Unclassified Information must be labeled and stored in a secure environment, to which only authorized personnel have access. (j) You must inform or contact the organization that granted initial access when access to an FSA system is no longer required or access changes because of changes in job responsibilities or termination of employment. (k) You must remain current on all required training, including security training (at least annually). (l) You must not download or store the Department’s information systems information or data on unsecure/public computers or portable devices. (m) If you have Title IV loans, they must be in good standing. If you have a loan that goes into default, your access to the Department’s information systems will be revoked.’’ Information Security Standards In addition to requirements identified in the Terms of Service and Code of Conduct, individuals accessing Department of Education information systems must comply with the following requirements: (a) A third party accessing the Department’s information systems, on behalf of an authorized user, must ensure proper control and handling of VerDate Sep<11>2014 18:09 Sep 09, 2021 Jkt 253001 Controlled Unclassified Information (CUI), which includes data commonly known as PII, Sensitive Personally Identifiable Information (SPII) and CUI, residing on their computer, on removable media, and on paper documents. (b) A third party that handles CUI must do so in accordance with Executive Order 13556, 32 CFR 2002— Controlled Unclassified Information, and the CUI Registry. (c) The third party must ensure data at rest that contains CUI is encrypted using validated FIPS 140–2 encryption in any and all third-party computing environments where data is housed and/or stored. (d) The third party must consider data at rest to include data that reside in databases, file systems, information technology systems, applications, personal computers (desktops and laptops and portable electronic devices [PEDs] and mobile electronic devices and personal data assistants [PDAs]) and other structured storage devices (USB flash drives, memory cards, external hard drives, writeable CDs, and DVDs) that are not in transit. (e) The third party must ensure the integrity and confidentiality of the information and protect against any reasonably anticipated security threats or unauthorized uses or disclosures of the information. If, at any time, CUI is provided to or viewed by unauthorized individual(s), a breach report is required by the third party. A breach report must be submitted to the Department of Education Security Operations Center (EDSOC), email to EDSOC@ed.gov. EDSOC may also be contacted by phone at (202) 245–6550. A Breach or Data Breach is an incident that includes the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where (1) a person other than an authorized user accesses or potentially accesses PII or (2) an authorized user accesses or potentially accesses PII for an unauthorized purpose OMB M–17–12, p. 9. An occurrence may be first identified as an incident, but later identified as a breach once it is determined that the incident involves PII. Breaches include cyber incidents, as well as the loss or theft of physical documents or portable electronic storage media, inadvertent disclosure of PII on a public website, an oral disclosure to a person not authorized to receive that information, or an authorized user accessing PII for an unauthorized purpose, etc. PO 00000 Frm 00016 Fmt 4703 Sfmt 4703 50709 Accessible Format: On request to one of the program contact persons listed under FOR FURTHER INFORMATION CONTACT, individuals with disabilities can obtain this document in an accessible format. The Department will provide the requestor with an accessible format that may include Rich Text Format (RTF) or text format (txt), a thumb drive, an MP3 file, braille, large print, audiotape, or compact disc, or other accessible format. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. You may access to the official edition of the Federal Register and the Code of Federal Regulations at www.govinfo.gov. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at www.federalregister.gov. Specifically, through the advanced search feature at this site, you can limit your search to documents published by the Department. Program Authority: 20 U.S.C 1001; 20 U.S.C. 1018; 20 U.S.C. 1092b; and 20 U.S.C. 1097. Richard Cordray, Chief Operating Officer, Federal Student Aid. [FR Doc. 2021–19536 Filed 9–9–21; 8:45 am] BILLING CODE 4000–01–P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings #1 Take notice that the Commission received the following electric corporate filings: Docket Numbers: EC21–125–000. Applicants: PSEG New Haven LLC, PSEG Power Connecticut LLC, PSEG Power New York LLC, Generation Bridge II, LLC. Description: Joint Application for Authorization Under Section 203 of the Federal Power Act of PSEG New Haven LLC, et al. Filed Date: 9/2/21. Accession Number: 20210902–5147. Comment Date: 5 p.m. ET 11/2/21. Docket Numbers: EC21–126–000. Applicants: Utah Solar Holdings II LLC, Enterprise Solar, LLC, Escalante E:\FR\FM\10SEN1.SGM 10SEN1

Agencies

[Federal Register Volume 86, Number 173 (Friday, September 10, 2021)]
[Notices]
[Pages 50707-50709]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-19536]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF EDUCATION


Third-Party Access to the Department's Information Technology 
Systems and Notice of Criminal Penalties for Misuse of Access Devices

AGENCY: Federal Student Aid, Department of Education.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The U.S. Department of Education (Department) outlines the 
requirements for third-party access to the Department's Information 
Technology (IT) systems and establishes criminal penalties for misuse 
of access devices. Specifically, this notice sets forth the definition 
of an access device, the terms of service, the Code of Conduct, and 
information security standards, and provides notice of related criminal 
penalties.

DATES: This notice is applicable September 10, 2021.

FOR FURTHER INFORMATION CONTACT: Michael Ruggless, Federal Student Aid, 
830 First Street NE, Union Center Plaza, Room 114B4, Washington, DC 
20202-5345. Telephone: (202) 377-4098. Email: [email protected].
    Tamy Abernathy, Office of Postsecondary Education, 400 Maryland 
Avenue SW, 2C-129, Washington, DC 20202. Telephone: (202) 453-5970. 
Email: [email protected].
    If you use a telecommunications device for the deaf (TDD) or a text 
telephone (TTY), call the Federal Relay Service, toll free, at 1-800-
877-8339.

SUPPLEMENTARY INFORMATION: The Stop Student Debt Relief Scams Act of 
2019 (STOP Act) amended sections 141, 485B, and 490 of the Higher 
Education Act of 1965, as amended (HEA), on December 22, 2020, to 
prevent and address the improper use of access devices issued by the 
Department and establish criminal penalties for improper use. (Pub. L. 
116-251; 134 Stat. 1129-1132). Section 485B(e) of these HEA amendments 
includes provisions for the prevention of improper access to the 
Department's systems. Section 490(e) of these HEA amendments explicitly 
makes unauthorized access to the Department's IT systems and the misuse 
of identification devices issued by the Department a criminal act. 
Criminal penalties associated with the STOP Act are applicable one day 
after the date of publication of this notice. All other actions and 
information pursuant to these HEA amendments contained in this notice 
are applicable upon publication.
    The Department establishes, pursuant to section 2(b) of the STOP 
Act, the following definition of an access device, terms of service, 
information security standards, and Code of Conduct.

Definition of Access Device

    An access device, as defined in 18 U.S.C. 1029(e)(1), means any--
    (a) Card;
    (b) Plate;
    (c) Code;
    (d) Account number;
    (e) Electronic serial number;
    (f) Mobile identification number;
    (g) Personal identification number;
    (h) Other telecommunications service, equipment, or instrument 
identifier; or
    (i) Other means of account access that can be used alone or in 
conjunction with another access device--
    (1) To obtain money, goods, services, or any other thing of value; 
or
    (2) To initiate a transfer of funds (other than a transfer 
originated solely by paper instrument).

[[Page 50708]]

Terms of Service

    An authorized user must abide by the Code of Conduct and 
Information Security Standards for Department systems.

Acceptable Use of Systems

    (a) A person or entity may be granted access to, and use and share, 
the Department's assets, data, information resources, and information 
systems (collectively, the Department's information systems) only if 
the person or entity is an ``authorized user'' under paragraph (b) and 
only to the extent otherwise authorized pursuant to this section.
    (b) A person or entity may be granted access to the Department's 
information systems as an authorized user if the person or entity has a 
bona fide ``need to know'' the information or data contained in the 
Department's information systems and they are--
    (1) A student, borrower, or parent;
    (2) A guaranty agency, eligible lender, eligible institution, or a 
third-party organization acting on behalf of a guaranty agency, 
eligible lender, or eligible institution that complies with Federal law 
and requirements applicable to the Department's information systems; or
    (3) A licensed attorney representing a student, borrower, or 
parent, or another individual who works for a Federal, State, local, or 
Tribal government or agency, or for a nonprofit organization, providing 
financial or student loan repayment counseling to a student, borrower, 
or parent, if--
    (i) The attorney or other individual has never engaged in unfair, 
deceptive, or abusive practices, as determined by the Department;
    (ii) The attorney or other individual does not work for an entity 
that has engaged in unfair, deceptive, or abusive practices (including 
an entity that is owned or operated by a person or entity that engaged 
in such practices), as determined by the Department;
    (iii) System access is provided only through a separate point of 
entry issued to the attorney or other individual; and
    (iv) The attorney or other individual has written consent from the 
relevant student, borrower, or parent to access the system.
    (c) To access the Department's information systems, an authorized 
user must--
    (1) Read, understand, and sign the information system-specific 
Rules of Behavior;
    (2) Have valid and current access authorization issued by the 
Department;
    (3) Access the Department's information systems using an access 
device issued by the Department to the authorized user, and may not use 
an access device issued by the Department to a student, borrower, or 
parent. A student, borrower, or parent, including through a power of 
attorney, may not authorize a third party to use their access device; 
and
    (4) Comply with the terms of service, information security 
standards, and Code of Conduct.
    (d) No person or entity may access the Department's information 
systems for the purpose of assisting a student in managing loan 
repayment or applying for any repayment plan, consolidation loan, or 
other benefit authorized under title IV of the HEA, except as permitted 
under this ``Acceptable Use of Systems.''

Criminal Penalties

    Section 2 of the STOP Act, Public Law 116-251, amended section 490 
of the HEA (20 U.S.C 1097), by adding paragraph (e), which makes it a 
crime to knowingly use an access device that was issued to another 
person or obtained by fraud or false statement to access Department 
information technology systems for commercial advantage, private 
financial gain, criminal activity, or wrongful act violating United 
States or State law. A violator is subject to criminal penalties that 
include a fine of not more than $20,000, imprisonment for not more than 
five years, or both, beginning one day after the date of publication of 
this notice.

Code of Conduct

    This Code of Conduct identifies the acceptable rules of behavior 
for accessing the Department's information systems. Upon accessing the 
Department's information systems, all users will receive a notification 
warning banner similar to the following that requires them to 
acknowledge and agree to the Code of Conduct prior to being allowed 
further access:
    ``You are accessing a U.S. Federal Government computer system 
intended to be solely accessed by individual users expressly authorized 
to access the system by the U.S. Department of Education. Usage may be 
monitored, recorded, and/or subject to audit. For security purposes, 
and in order to ensure that the system remains available to all 
expressly authorized users, the U.S. Department of Education monitors 
the system to identify unauthorized users. Anyone using this system 
expressly consents to such monitoring and recording. Unauthorized use 
of this information system is prohibited and subject to criminal and 
civil penalties. Except as expressly authorized by the U.S. Department 
of Education, unauthorized attempts to access, obtain, upload, modify, 
change, and/or delete information on this system are strictly 
prohibited and are subject to criminal prosecution under 18 U.S.C. 
1030, and other applicable statutes, which may result in fines and 
imprisonment. This system may contain Personally Identifiable 
Information (PII), as defined by the Privacy Act of 1974, or other 
Controlled Unclassified Information as defined by 32 CFR 2002.
    For purposes of this system, unauthorized access includes, but is 
not limited to--
    (a) Any access by an employee or agent of a commercial entity, or 
other third party, who is not the individual user, for purposes of 
commercial advantage or private financial gain (regardless of whether 
the commercial entity or third party is providing a service to an 
authorized user of the system); and
    (b) Any access in furtherance of any criminal or tortious act in 
violation of the Constitution or laws of the United States or any 
State.
    If system monitoring reveals information indicating possible 
criminal activity, such evidence may be provided to law enforcement 
personnel. These Rules of Behavior identify responsibilities and 
expectations for all individuals accessing Federal Student Aid (FSA) 
systems. By accepting, you confirm that you have reviewed, acknowledge, 
and agree to the following Rules of Behavior:
    (a) You must protect all of the Department's information systems, 
including the Department's data and information in your possession, 
from access by, or disclosure to, unauthorized individuals or entities.
    (b) Your User ID, password, and other credentials are unique and 
only assigned to the specified authorized user.
    (1) Your User ID, password, and other credentials serve as an 
electronic signature for signing fiduciary documents committing you to 
financial obligations.
    (2) Your User ID, password, and other credentials are for official 
Department business only.
    (c) You must never give your User ID, password, or other 
credentials to another person, including your supervisor(s). Any 
information retrieved from the Department's information systems may be 
shared only with individuals expressly authorized to receive this 
information.
    (d) You must access only systems, networks, data, control 
information, and software for which you have been

[[Page 50709]]

authorized by the U.S. Department of Education.
    (e) If you are a third party representing an authorized user under 
paragraph (b) of the ``Acceptable Use of Systems,'' you must be issued 
your own unique User ID, password, or credentials; at no time is a 
third party authorized to use another individual's unique User ID, 
password, or credentials. A user may not authorize a third party to use 
their User ID, password, or credentials, including through a power of 
attorney.
    (f) You are individually responsible for ensuring that data/
information obtained from the Department's information systems is not 
used improperly. A legitimate reason must be present to view data/
information contained within the Department's information systems.
    (g) You must change your password immediately and notify the 
appropriate security personnel if your password is compromised, or 
someone else knows your password.
    (h) You must properly encrypt (or password protect) all electronic 
files when transmitting data via email. Passwords must be sent 
separately (not in the same transmission or transmission channel).
    (i) All paper documents containing PII or Controlled Unclassified 
Information must be labeled and stored in a secure environment, to 
which only authorized personnel have access.
    (j) You must inform or contact the organization that granted 
initial access when access to an FSA system is no longer required or 
access changes because of changes in job responsibilities or 
termination of employment.
    (k) You must remain current on all required training, including 
security training (at least annually).
    (l) You must not download or store the Department's information 
systems information or data on unsecure/public computers or portable 
devices.
    (m) If you have Title IV loans, they must be in good standing. If 
you have a loan that goes into default, your access to the Department's 
information systems will be revoked.''

Information Security Standards

    In addition to requirements identified in the Terms of Service and 
Code of Conduct, individuals accessing Department of Education 
information systems must comply with the following requirements:
    (a) A third party accessing the Department's information systems, 
on behalf of an authorized user, must ensure proper control and 
handling of Controlled Unclassified Information (CUI), which includes 
data commonly known as PII, Sensitive Personally Identifiable 
Information (SPII) and CUI, residing on their computer, on removable 
media, and on paper documents.
    (b) A third party that handles CUI must do so in accordance with 
Executive Order 13556, 32 CFR 2002--Controlled Unclassified 
Information, and the CUI Registry.
    (c) The third party must ensure data at rest that contains CUI is 
encrypted using validated FIPS 140-2 encryption in any and all third-
party computing environments where data is housed and/or stored.
    (d) The third party must consider data at rest to include data that 
reside in databases, file systems, information technology systems, 
applications, personal computers (desktops and laptops and portable 
electronic devices [PEDs] and mobile electronic devices and personal 
data assistants [PDAs]) and other structured storage devices (USB flash 
drives, memory cards, external hard drives, writeable CDs, and DVDs) 
that are not in transit.
    (e) The third party must ensure the integrity and confidentiality 
of the information and protect against any reasonably anticipated 
security threats or unauthorized uses or disclosures of the 
information.
    If, at any time, CUI is provided to or viewed by unauthorized 
individual(s), a breach report is required by the third party. A breach 
report must be submitted to the Department of Education Security 
Operations Center (EDSOC), email to [email protected]. EDSOC may also be 
contacted by phone at (202) 245-6550.
    A Breach or Data Breach is an incident that includes the loss of 
control, compromise, unauthorized disclosure, unauthorized acquisition, 
or any similar occurrence where (1) a person other than an authorized 
user accesses or potentially accesses PII or (2) an authorized user 
accesses or potentially accesses PII for an unauthorized purpose OMB M-
17-12, p. 9. An occurrence may be first identified as an incident, but 
later identified as a breach once it is determined that the incident 
involves PII. Breaches include cyber incidents, as well as the loss or 
theft of physical documents or portable electronic storage media, 
inadvertent disclosure of PII on a public website, an oral disclosure 
to a person not authorized to receive that information, or an 
authorized user accessing PII for an unauthorized purpose, etc.
    Accessible Format: On request to one of the program contact persons 
listed under FOR FURTHER INFORMATION CONTACT, individuals with 
disabilities can obtain this document in an accessible format. The 
Department will provide the requestor with an accessible format that 
may include Rich Text Format (RTF) or text format (txt), a thumb drive, 
an MP3 file, braille, large print, audiotape, or compact disc, or other 
accessible format.
    Electronic Access to This Document: The official version of this 
document is the document published in the Federal Register. You may 
access to the official edition of the Federal Register and the Code of 
Federal Regulations at www.govinfo.gov. At this site you can view this 
document, as well as all other documents of this Department published 
in the Federal Register, in text or Portable Document Format (PDF). To 
use PDF you must have Adobe Acrobat Reader, which is available free at 
the site.
    You may also access documents of the Department published in the 
Federal Register by using the article search feature at 
www.federalregister.gov. Specifically, through the advanced search 
feature at this site, you can limit your search to documents published 
by the Department.
    Program Authority: 20 U.S.C 1001; 20 U.S.C. 1018; 20 U.S.C. 1092b; 
and 20 U.S.C. 1097.

Richard Cordray,
Chief Operating Officer, Federal Student Aid.
[FR Doc. 2021-19536 Filed 9-9-21; 8:45 am]
BILLING CODE 4000-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.