General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsHere is the GSA's written policy about the non-private nature of any communications
on a GSA device (which applies to the devices provided to the Trump transition team).
https://www.gsa.gov/cdnstatic/CIO_P_2165.2_GSA_Telecommunications_Policy_%28Signed_on_4-25-2014%29.pdf
2. Applicability . This policy applies to all GSA employees, contractors/subcontractors as specified in Memorandum of Understanding (MOUs) or other agreement vehicles, government agencies, individuals, corporations, or other organizations that process or handle any GSA - owned information, data, or IT system equipment.
d. Information ownership . All documents, images and messages composed, sent, received or stored on GSA - provided equipment remain the property of the GSA .
9. Monitoring . GSA IT continuously monitors use of GSA telecommunications . GSA may audit a users telecommunications usage at any time. The CIO P 2100.1I G SA IT Security Policy states:
a. Obtaining access to GSA resources must constitute acknowledgment that monitoring activities may be conducted.
b. Users have no expectation of privacy on GSA IT systems. All activity on GSA IT systems is subject to monitoring.
MaryMagdaline
(6,856 posts)shraby
(21,946 posts)safeinOhio
(32,713 posts)signed by the players to put on display for the world to see..end of story....