10.8.27  Internal Revenue Service Policy On Limited Personal Use Of Government Information Technology Resources

Manual Transmittal

October 2, 2012

Purpose

(1) This transmits revised Internal Revenue Manual (IRM) 10.8.27, Information Technology (IT) Security, Internal Revenue Service Policy On Limited Personal Use Of Government Information Technology Resources.

Background

The expanding use of Information Technology (IT) in the workplace increasingly offers new opportunities to meet the IRS’s mission objectives, as well as agency values, not the least of which are those directed at providing a positive work-life balance and supportive environment for IRS employees. This includes, among other things, the privilege of limited personal use of Government IT resources, which conveys serious responsibilities to organizations and users to uphold the public trust, ensure the privacy and security of data, and the protection of information systems and infrastructure.

In light of the expansion of IT resources to a growing group of IRS employees and the issuance of Treasury Directive (TD) 87-04, Personal Use of Government Information Technology Resources (January 27, 2012), this policy has been developed to identify the allowable minimum standard for acceptable personal use of Government IT equipment and resources by IRS employees, contractors, vendors, and outsourcing providers.

Material Changes

(1) Effective July 1, 2012, the Modernization and Information Technology Services (MITS) organization changed its name to IRS Information Technology (IT) . All instances of MITS within this IRM have been updated to IRS Information Technology (IT) organization to reflect the change. (Link to IT website communication is: http://it.web.irs.gov/ProceduresGuidelines/ITNameChange.htm)

(2) Throughout, corrected typographical/grammatical errors.

(3) Throughout, updated TD 87-04's publication date, with most current version: January 27, 2012.

(4) The following sections have been updated/clarified with this version of policy:

  • 10.8.27.1.1, Overview

  • 10.8.27.1.2, Scope

  • 10.8.27.1.4, Authority

  • 10.8.27.2.1.1, Agency Head

  • 10.8.27.2.1.2, IRS Information Technology (IT) organization

  • 10.8.27.2.1.3, Associate Chief Information Officer (ACIO), Cybersecurity

  • 10.8.27.2.1.4, Managers

  • 10.8.27.2.1.5, Employees

  • 10.8.27.2.1.6, Contracting Officer's Representative (COR)

  • 10.8.27.3, Specific Requirements

  • Exhibit 10.8.27-1, Prohibited Uses of Government IT Resources

  • Exhibit 10.8.27-2, Glossary

  • Exhibit 10.8.27-3, References

(5) This IRM supplements IRM 10.8.1, Information Technology (IT) Security Policy and Guidance.

Effect on Other Documents

This policy incorporates and replaces the IRS Policy on Limited Personal Use of Government Information Technology Equipment/Resources (transmitted by memorandum March 3, 2008). IRM 10.8.27, dated December 16, 2011, is superseded.

Audience

This policy applies to, and shall be distributed to all individuals and organizations, including IRS employees, contractors, vendors and outsourcing providers, that use IRS equipment, resources, information, and information systems.

Effective Date

(10-02-2012)

Terence V. Milholland
Chief Technology Officer

10.8.27.1  (12-16-2011)
Purpose

  1. This policy defines the minimum standard for acceptable personal use of Government IT resources by all individuals and organizations, including IRS employees, contractors, vendors, and outsourcing providers, with access to IRS equipment, resources, information, and information systems.

  2. This policy incorporates and replaces the IRS Policy on Limited Personal Use of Government Information Technology Equipment/Resources (transmitted by memorandum March 3, 2008).

10.8.27.1.1  (10-02-2012)
Overview

  1. It is the policy of the IRS to establish and manage an Information Security Program within all its offices. This manual provides uniform policies and guidance to be used by each office.

  2. It is the policy of the IRS to protect its information resources and provide for the use, access and disclosure of information, to the extent allowed and in accordance with applicable laws, policies, federal regulations, Office of Management and Budget (OMB) Circulars, and Treasury Directives (TDs). Adequate security, as defined by OMB Circular A-130, Appendix III, shall be provided for all IT resources, at all times (i.e., security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.).

  3. This policy delineates the minimum standard for acceptable personal use of Government IT resources.

10.8.27.1.2  (10-02-2012)
Scope

  1. This policy applies to all individuals and organizations, including employees, contractors, vendors, and outsourcing providers, that use IRS equipment, resources, information, and information systems, whether they are in a duty or non-duty time status, and are engaged in limited personal use of Government IT resources while on-site at a government-designated office, traveling, or at an alternate work location.

  2. This policy applies, but is not limited to, circumstances such as:

    • Teleworking,

    • Flexiplace,

    • Official travel status,

    • Normal business location,

    • Normal work hours,

    • Extraordinary work hours, and

    • Performing work for the Department of the Treasury, its offices, and bureaus.

10.8.27.1.3  (11-30-2007)
IRM Section Topics

  1. This manual contains information on the following subjects:

    • Authority

    • General Policy

    • Specific Requirements

    • Prohibited Uses of Government IT Resources (see Exhibit 10.8.27-1.)

    • Glossary (see Exhibit 10.8.27-2.)

    • References (see Exhibit 10.8.27-3.)

10.8.27.1.4  (10-02-2012)
Authority

  1. Treasury Directive (TD) 87-04 (January 27, 2012), defines limited personal use of Government IT resources, and establishes standards and rules of conduct to allow Department of the Treasury employees the privilege to use Government IT resources for non-government purposes, when such use involves minimal additional expense to the Government and does not overburden any of the Department's IT resources, based on the following authorities:

    • Title 5 - Code of Federal Regulations (CFR) - Part 735, Office of Personnel Management, Employee Responsibilities and Conduct;

    • Title 5 - CFR Part 2635, Office of Government Ethics, Standards of Ethical Conduct for Employees of the Executive Branch;

    • Title 5 - CFR Part 3101, Supplemental Standards of Ethical Conduct for Employees of the Department of the Treasury; and

    • Title 31 - CFR Part 0, Department of the Treasury Employee Rules of Conduct.

  2. This IRM supplements guidance issued by Treasury and requirements set forth by IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance.

  3. The content within this IRM is not to contradict or alter the meaning of requirements stated in IRM 10.8.1. In the event there is a discrepancy between this policy and IRM 10.8.1, IRM 10.8.1 has precedence unless specifically noted otherwise.

10.8.27.2  (12-16-2011)
General Policy

  1. Individuals have no inherent right to use Government IT resources.

  2. This policy does not create the right to use Government IT resources for non-government purposes.

  3. Individuals have the privilege of being able to use Government IT resources for non-government purposes when such use:

    1. involves minimal additional expense to the Government;

    2. occurs during non-duty time for reasonable duration and frequency;

    3. does not violate the Standards of Ethical Conduct for employees;

    4. does not overburden any of the IRS's IT resources;

    5. does not adversely affect the performance of official duties; and

    6. does not interfere with the mission or operations of the IRS.

  4. When exercising the privilege of using Government IT resources during non-duty time, individuals are subject to the same federal, departmental, and agency requirements, restrictions, and policies imposed on them when using these resources to conduct official business. These include, but are not limited to, those in the following key areas:

    • ethics,

    • security,

    • disclosure, and

    • privacy.

  5. Unauthorized or improper use may result in loss or limitations of the use of IT resources, disciplinary or adverse actions, termination, criminal penalties, and the employee being held financially liable for the cost of improper use.

10.8.27.2.1  (06-11-2010)
Roles and Responsibilities

  1. IRM 10.8.2, Information Technology (IT) Security Roles and Responsibilities, defines IRS-wide roles and responsibilities related to IRS information and computer security, and is the authoritative source for such information.

  2. The supplemental requirements provided below are specific to the implementation of the Limited Personal Use Of Government Information Technology Resources Policy.

  3. Refer to IRM 10.8.2 for additional information regarding organizational and individual responsibilities related to information and computer security.

10.8.27.2.1.1  (10-02-2012)
Agency Head

  1. The E-Government Act of 2002 (P.L. 107-347) Title III, Federal Information Security Management Act of 2002 (FISMA), requires the head of each federal agency to provide information security protections commensurate with the risk and magnitude of the harm that may result from unauthorized access, use, disclosure, disruption, modification, or destruction of its information and information systems. The protections not only apply to employees within the agency, but also to contractors, and/or other organizations working on behalf of the agency, as defined in IRM 10.8.2.

  2. The IRS's Agency Head is the Commissioner; the Commissioner shall be responsible for ensuring that this policy is disseminated to all employees.

10.8.27.2.1.2  (10-02-2012)
IRS Information Technology (IT) organization

  1. The IRS IT organization is responsible for maintenance and dissemination of this policy, and shall establish sufficient controls to ensure equipment is used appropriately.

10.8.27.2.1.3  (10-02-2012)
Associate Chief Information Officer (ACIO), Cybersecurity

  1. The ACIO, Cybersecurity, shall develop and disseminate additional policy appropriate to personal use as necessary.

10.8.27.2.1.4  (10-02-2012)
Managers

  1. Managers shall ensure individuals are informed of appropriate uses of Government IT resources as a part of their introductory training, orientation, and/or the initial implementation of this policy. These requirements are also part of IRS employees' mandatory annual Security Awareness Training and Education (SATE).

  2. Managers shall ensure IT resources are being used appropriately and shall take corrective action if needed.

10.8.27.2.1.5  (10-02-2012)
Employees

  1. Consistent with established rules and standards of ethical conduct, individuals shall refrain from performing or engaging in illegal, inappropriate or unethical activities while using Government IT resources, at all times.

  2. Individuals shall be responsible for their own personal and professional conduct and shall follow, among others, the rules and regulations described below:

    1. The Office of Personnel Management (OPM) Employee Responsibilities and Conduct states, "An employee shall not engage in criminal, infamous, dishonest, immoral, or notoriously disgraceful conduct, or other conduct prejudicial to the Government" (5 CFR § 735.203).

    2. The Office of Government Ethics (OGE) Standards of Ethical Conduct states:
      (1) Employees shall put forth honest effort in the performance of their duties (5 Code of Federal Regulation (CFR § 2635.101(b)(5)).
      (2) An employee shall not use or permit the use of their Government position or title, or any authority associated with their public office in a manner that could reasonably be construed to imply that their agency or the Government sanctions or endorses their personal activities (5 CFR § 2635.702 (b)).
      (3) An employee has a duty to protect and conserve Government Property and shall not use such property, or allow its use, for any unauthorized purposes. (5 CFR § 2635.704(a)). Employee conduct pursuant to the IRM policy on limited personal use is considered an authorized use of government property as the term is used in 5 CFR § 2635.704(a). See TD 87-04(4)(e) (defining limited personal use).
      (4) An employee shall use official-time in an honest effort to perform official duties and in accordance with law or regulation (CFR § 2635.705).

    3. The Department of the Treasury Employee Rules of Conduct states:
      (1)
      Employees shall not engage in criminal, infamous, dishonest, or notoriously disgraceful conduct, or any other conduct prejudicial to the Government (31 CFR § 0.213).

  3. Individuals shall ensure that they do not give the false impression that they are acting in an official capacity when they are using Government IT resources for non-government purposes. In addition, they shall not post, disseminate, or otherwise use IRS documents and/or symbols as part of personal documents, Internet sites, or other forms of communication.

    1. If there is an expectation that such a personal use could be interpreted to represent an agency, an adequate disclaimer must be used. One acceptable disclaimer is -
      "The content of this message does not reflect the position of the U.S. Government, the Department of the Treasury, or the IRS."

10.8.27.2.1.6  (10-02-2012)
Contracting Officer's Representative (COR)

  1. The COR shall ensure contractors are informed of appropriate uses of Government IT resources as a part of their introductory training, orientation, or the initial implementation of this policy.

  2. The COR shall ensure IT resources are being used appropriately and shall take corrective action if needed.

  3. The COR shall ensure contractors who process, store, or transmit IRS information on non-government furnished and personally owned IT equipment, software and media, do so only when the contract under which they perform specifically establishes terms and conditions for such use (and that appropriate approvals have been obtained), and the contractor otherwise meets and complies with the security standards detailed in IRM 10.8.1, the contract, and/or other applicable IRS policy guidance.

10.8.27.3  (10-02-2012)
Specific Requirements

  1. Individuals are specifically prohibited from inappropriate internet usage such as participation in gambling, pornography, personal communication on social networking sites, peer-to-peer (P2P) file sharing, downloading unauthorized programs or software, and other activities that open IRS information or information systems to security risks. Specific examples are referenced in Exhibit 10.8.27-1, Prohibited Uses of Government IT Resources.

  2. Individuals are specifically prohibited from the pursuit of private commercial business activities or profit-making ventures using the Government's IT resources. The ban also includes individuals' use of the Government's IT resources to assist relatives, friends, or other persons in such activities (e.g., individuals may not operate or participate in the operation of a business with the use of IRS computers and Internet (i.e., "IRS.gov" ) resources).

  3. Individuals are specifically prohibited from engaging in any political fund-raising activity, endorsing any product or service, participating in any lobbying activity, or engaging in any prohibited partisan political activity. Individuals are also prohibited from using US Government resources for any of the aforementioned activities.

  4. Individuals should have no expectation of privacy while using any Government IT resources at anytime, including (but not limited to) accessing the Internet, proxy avoidance server, or e-mail. Individuals should be aware that their rights to privacy do not change even during limited periods of personal use. To the extent that individuals wish their private activities remain private, they should avoid using Government IT resources such as their computer, the Internet or e-mail.

    1. See the IRM 10.8.1 section titled "System-Use Notification Message/Warning Banner" for the current banner text.

  5. It is the policy of the IRS to:

    1. permit limited personal use of Government IT resources for non-government purposes, when such use involves minimal additional expense to the government, does not overburden any of the Service’s IT resources, and when access to these IT resources is already authorized for official government business;

    2. permit limited personal use to individuals during non-duty time for periods of reasonable duration and frequency of use;

    3. grant use that does not adversely affect the performance of official duties, result in the loss of an individual's productivity, or interfere with the mission or operations of the IRS;

    4. ensure that computer systems and networks are not used for downloading illegal, inappropriate, or unauthorized copyrighted content, including illegal downloads using file sharing programs, and downloading untrusted, unapproved, or malicious software; and

    5. authorize use that does not violate the Office of Government Ethics (OGE) Standards of Ethical Conduct for Employees of the Executive Branch found at 5 Code of Federal Regulations (CFR) Part 2635, the Supplemental Standards of Ethical Conduct for Employees of the Treasury Department found at 5 CFR Part 3101, Employee Responsibilities and Conduct 5 CFR Part 735, and the Department of the Treasury Employee Rules of Conduct found at 31 CFR Part 0.

  6. The IRS is not required to provide access to IT resources if not already provided for an approved business need. Therefore, this policy does not guarantee Internet or e-mail access to those who do not otherwise have it.

  7. Personal use shall incur only minimal additional expense to the Government in areas such as:

    1. communications infrastructure costs (e.g., telephone charges, telecommunications traffic);

    2. use of consumables in limited amounts (e.g., paper, ink, toners);

    3. general wear-and-tear on equipment;

    4. minimal data storage on storage devices; and

    5. minimal network impacts keeping e-mail messages sizes, including attachments, within IRS specified size guidelines.

      Note:

      (See the following IRWeb link for size limitations: http://irweb.irs.gov/AboutIRS/Nwsctr/Headlines/32760.aspx)

  8. Individuals shall be aware of IT security issues which are addressed in:

    • IRM 10.8.1, IT Security, Policy and Guidance;

    • IRM 10.8.2, IT Security, IT Security Roles and Responsibilities;

    • IRM 10.8.26, IT Security, Laptop Computer Security Policy; and

    • Any other IRS privacy concerns related to the safeguarding of agency information.

Exhibit 10.8.27-1 
Prohibited Uses of Government IT Resources

Prohibited uses of Government IT resources include, but are not limited to, the following examples:

Note:

Regardless of work status, these examples and other prohibited uses are in effect.

1) The creation, copying, transmission, downloading, storage, or retransmission of prohibited materials, video, sound (such as streaming video or music).

Note:

The allowance of streaming media (video or music) is to be done based on a justifiable, approved business need by the employee’s manager.

2) Social Media shall not be used in an official capacity.

  1. An exception has been made for approved IRS communicators handling official IRS media initiatives.

    Note:

    Personal usage of social media (e.g., Google Groups, Wikipedia, MySpace, Facebook, YouTube, Second Life, Flickr, Twitter) should be separate from your job and duty time.

3) See IRM 11.1.3, Communications, Contact with the Public and the Media , for guidance on authorized usage of new media and social media tools.

4) Viewing or accessing the following types of web sites:

  1. Pornographic, sexually explicit, or sexually oriented materials,

  2. Personal services web sites, such as Personals & Dating and Craigslist,

  3. Hacker sites (sites which open the IRS to unacceptable security risk) regardless of the security risks or lack thereof,

  4. Materials related to gambling (legal and illegal), terrorist activities, illegal weapons, and any other illegal activities or activities otherwise prohibited, etc.,

  5. On-line games, and

  6. Proxy avoidance sites (or similar capabilities), such as 3proxy, unblockme and proxite.

4) Using Government systems as a staging ground or platform to gain unauthorized access to other systems.

5) Downloading, copying, or installing of unauthorized applications (e.g., executable code), such as: (See Exhibit 10.8.27-2 for definition of an unauthorized program)

  1. Screen savers,

  2. Software products,

  3. "Push" technology applications (subscriber services) from the Internet (e.g., weather or news alert feeds, stock quote updates) that gather information and send it out automatically to a subscriber,

  4. Test or demo software, and

  5. Computer games.

6) The unauthorized acquisition, use, reproduction, transmission, or distribution of controlled information including computer software and data, that includes privacy information; material which is copyrighted, trademarked, or otherwise controlled with other intellectual property rights (beyond fair use), proprietary data, or export controlled software or data:

  1. Copyrighted materials, such as music, videos, and pictures.

7) Activities that are illegal, inappropriate, or offensive to fellow employees, contractors, vendors, outsourcing providers, or the public in general. Such activities include, but are not limited to: hate speech, or material that ridicules others on the basis of race, creed, religion, color, sex, disability, national origin, or sexual orientation.

8) The use for commercial purposes or in support of "for-profit" activities or in support of other outside employment or business activity (e.g., consulting for pay, sales or administration of business transactions, sale of goods or services).

9) Engaging in any political fund-raising activity, endorsing any product or service, participating in any lobbying activity, or engaging in any prohibited partisan political activity.

10) Posting agency information whether using government IT resources or personal resources to external news groups, bulletin boards or other public forums without authority. This includes any use that could create the perception that the communication was made in one's official capacity as a Federal Government employee, unless appropriate agency written approval has been obtained or the use is not at odds with the agency's mission or positions.

11) Any use that could generate more than minimal additional expense to the Government (e.g., subscribing to unofficial LISTSERV or other services which create a high-volume of e-mail traffic).

12) The use of peer-to-peer (P2P) file sharing software and networks:

  1. P2P refers to any software or system allowing individual users of the Internet, intranet or extranet to connect and share files or resources.

  2. Engaging in P2P practices creates a substantial computer security risk in that P2P may facilitate the spread of computer viruses.

  3. Specific examples of P2P file sharing include applications such as Morpheus, Napster, Grokster, Kazaa, and Gnutella, as well as decentralized applications such as SETI@Home.

  4. P2P is not allowed and is considered outside the scope of limited personal use.

13) Any personal use or storage of files on Home Directories or other network drives provided and maintained by the IRS.

14) Any use that reduces employee productivity or interferes with the performance of official duties.

15) Any access to non-IRS e-mail accounts through the Internet (i.e., accessing personal AOL accounts, accessing company accounts, etc. through the IRS Internet firewall).

16) Inappropriate use of IRS e-mail account(s), such as:

  1. Transmitting files larger than the specified size (see http://irweb.irs.gov/AboutIRS/Nwsctr/Headlines/32760.aspx),

  2. Any correspondence for personal gain (Avon, private commercial business, selling of personal goods or services, etc.),

  3. Solicitation of individuals, such as Girl Scout or Boy Scout fund raisers, and

  4. Chain letters or other unauthorized mass mailings regardless of the subject matter.

17) Any access to the Internet that does not go through an IRS-approved Internet gateway (i.e., firewall). Accessing the Internet from non-office locations using a government-owned computer must always be done via the IRS-approved internet gateway in accordance with IRM 10.8.26, IT Security, Laptop Computer Security Policy and IRM 10.8.40, IT Security, Wireless Security Policy; using any other connection (such as a private AOL account) is prohibited.

18) Any access to an Internet site that contains similar content to sites which have been prohibited or restricted.

19) Any use of a photocopier or fax machine that involves more than a few pages of material (e.g., copying a book, making numerous copies of a resume, or sending/receiving a lengthy document via fax machines).

20) Any use of photocopiers or fax machines that conflicts with the need to use the equipment for official business requirements.

21) Any use of telephone services that creates more than minimal additional expense to the Government.

Note:

Individuals should also remember that some use of Government IT resources is absolutely forbidden, even during non-duty time.

Exhibit 10.8.27-2 
Glossary

Employee non-duty time - Times when the individual is not otherwise expected to be addressing official business. Individuals may, for example, use Government IT resources during their non-duty time such as before or after a workday (subject to local office hours), lunch periods, authorized breaks, or weekends or holidays (if their duty station is normally available at such times). For individuals using Government IT resources in a government facility, no expanded access to the building will be provided beyond when the building is normally open for access. The use of Government IT resources during the aforementioned periods should be determined and/or agreed to by the individual and the organization’s managers. Individuals should also remember that some use of Government IT resources is absolutely forbidden, even during non-duty time.

Government IT resources - Includes, but is not limited to, office and telephone equipment and services (e.g., phone sets, cell phones, Blackberries, pagers, Tablets, and voice mail), desktop and laptop computers. It also includes related peripheral equipment (e.g., printers, scanners) and application software, library resources, fax machines, and photocopiers.

Information Technology - Any equipment, interconnected system, or subsystem of hardware or application software that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of voice or data.

Limited Personal Use - Activity by individuals that is conducted during personal time in the course of the business day and is considered an "authorized use" of government property as the term is used in the Standards of Conduct for Employees of the Executive Branch (5 CFR §2635.101 (b) (9) and §2635.704 (a)).

Minimal additional expense - An individual's limited personal use of Government IT resources is confined to those situations where the Government is already providing resources or services, and the use of such resources or services will not result in any additional expense to the Government, will result in only fair wear and tear, or use of small amounts of electricity, ink, toner, or paper. Examples of minimal additional expenses include: making a few photocopies, using a computer printer to print out a few pages of material, making occasional brief personal phone calls (within Treasury Department policy), infrequently sending personal e-mail messages, or limited use of the Internet for personal reasons. Limited personal use activity by individuals that is conducted during personal time in the course of the business day is considered an "authorized use" of government property as the term is used in the Standards of Conduct for Employees of the Executive Branch (5 CFR § 2635.101 (b) (9) and § 2635.704 (a)).

Privilege - In the context of this policy, means that the Department is extending the opportunity to its employees, contractors, vendors, and outsourcing providers, to use government property for limited personal use in an effort to create a more supportive work environment. However, this policy does not create the right to use Government IT resources for non-government purposes. Nor does the privilege extend to modifying the equipment used, including loading personal software, copying existing software, or making configuration changes. Bureau and office specific exceptions may be necessary, for example, to accommodate traveling staff members with a valid need to load money management software for keeping track of travel expenses.

Unauthorized data program - Is a program not explicitly approved or permitted by the organization(s) with responsibility for managing data programs such as the IDEA Lab, which authorizes programs running on the workstations.

Exhibit 10.8.27-3 
References

The following references were used in developing this policy:

  1. 5 CFR § 2635.101 (b) (5) and (9), Basic Obligation of Public Service

  2. 5 CFR § 2635.702 (b), Appearance of Governmental Sanction

  3. 5 CFR § 2635.704 (a) and (b) (1), Use of Government Property

  4. 5 CFR § 2635.705, Use of Official Time

  5. 5 CFR § 735.203, Conduct Prejudicial to the Government

  6. 5 CFR Part 3101, Supplemental Standards Of Ethical Conduct For Employees Of The Department Of The Treasury

  7. 31 CFR Part 0, Department Of The Treasury Employee Rules Of Conduct

  8. 31 CFR § 0.213, General Conduct Prejudicial to the Government

  9. Federal CIO Council, Recommended Executive Branch Model Policy/Guidance on "Limited Personal Use" of Government Office Equipment including Information Technology, May 19, 1999

  10. OMB Circular A-130, Appendix III, Security of Federal Automated Information Resources

  11. OMB Memorandum for Chief Acquisition Officers, Revisions to the Federal Acquisition Certification for Contracting Officer’s Representatives (FAC-COR), September 6, 2011

  12. The Hatch Act Reform Amendment of 1993, P.L. 103-94

  13. TD 81-01, Department of the Treasury Information Technology (IT) Manual, July 14, 2009

  14. TD P 85-01, Department of the Treasury IT Security Program, March 1, 2012

  15. TD 87-04, Personal Use of Government Information Technology Resources, January 27, 2012

  16. IRM 6.751.1, Discipline and Disciplinary Actions, Policies, Responsibilities, Authorities, and Guidance , Exhibit 6.751.1-1

  17. IRM 10.8.1, Information Technology (IT) Security, Policy and Guidance

  18. IRM 10.8.2, Information Technology (IT) Security, IT Security Roles and Responsibilities

  19. IRWeb link: http://irweb.irs.gov/AboutIRS/Nwsctr/Headlines/32760.aspx

  20. IRS IT organization website: http://it.web.irs.gov/ProceduresGuidelines/ITNameChange.htm


More Internal Revenue Manual