PL 4 RULES OF BEHAVIOR - NIST-SP-800-53-R5/NIST-SP-800-53-R5.github.io GitHub Wiki

PL-4 RULES OF BEHAVIOR

Control:

  • a. Establish and provide to individuals requiring access to the system, the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy;
  • b. Receive a documented acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the system;
  • c. Review and update the rules of behavior [ Assignment: organization-defined frequency ]; and
  • d. Require individuals who have acknowledged a previous version of the rules of behavior to read and re-acknowledge [ Selection (one or more): [ Assignment: organization-defined frequency ]; when the rules are revised or updated ].

Discussion: Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use agreements (see PS-6). Organizations consider rules of behavior based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users, including individuals who receive information from federal systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for organizational and non-organizational users can also be established in AC-8. The related controls section provides a list of controls that are relevant to organizational rules of behavior. PL-4b, the documented acknowledgment portion of the control, may be satisfied by the literacy training and awareness and role-based training programs conducted by organizations if such training includes rules of behavior. Documented acknowledgements for rules of behavior include electronic or physical signatures and electronic agreement check boxes or radio buttons.

Related Controls: AC-2, AC-6, AC-8, AC-9, AC-17, AC-18, AC-19, AC-20, AT-2, AT-3, CM-11, IA-2, IA-4, IA-5, MP-7, PS-6, PS-8, SA-5, SI-12.

Control Enhancements:

  • (1) RULES OF BEHAVIOR / SOCIAL MEDIA AND EXTERNAL SITE/APPLICATION USAGE RESTRICTIONS
    Include in the rules of behavior, restrictions on:

    • (a) Use of social media, social networking sites, and external sites/applications;
    • (b) Posting organizational information on public websites; and
    • (c) Use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications.

    Discussion: Social media, social networking, and external site/application usage restrictions address rules of behavior related to the use of social media, social networking, and external sites when organizational personnel are using such sites for official duties or in the conduct of official business, when organizational information is involved in social media and social networking transactions, and when personnel access social media and networking sites from organizational systems. Organizations also address specific rules that prevent unauthorized entities from obtaining non-public organizational information from social media and networking sites either directly or through inference. Non-public information includes personally identifiable information and system account information.

Related Controls: AC-22, AU-13.

References: [OMB A-130], [SP 800-18].

⚠️ **GitHub.com Fallback** ⚠️