Skip to main content
Skip to content
Case File
efta-efta00174277DOJ Data Set 9Other

EOUSA Division MEGA4 Automated Litigation Support System

Date
Unknown
Source
DOJ Data Set 9
Reference
EFTA 00174277
Pages
8
Persons
1
Integrity
No Hash Available

Summary

EOUSA Division MEGA4 Automated Litigation Support System Account Request and Approval Form For EOUSA Division Users To be used for DO.) EOUSA Division employees and authorized MEGA4 contractor staff Case/Project Information DJ NUMBER: 2442-0129 CASE NAME: US V. Epstein LEAD EOUSA DIVISION ATTORNEY NAME AND PHONE NUMBER: l .' 4 EOUSA CASE MANAGER NAME AND PHONE NUMBER: 9 ICONECT 9 RELATIVITY LIST OF SPECIFIC CASES/PROJECTS FOR WHICH ACCESS IS REQUIRED: US v. Epstein End User Information: FULL NAME: EOUSA SECTION: POSITION/TITLE: SOS-Analyst/P-6i_ TELEPHONE NUMBER: 1 BUILDING/LOCATION: 26 Federal Plaza EMAIL ADDRESS: v APPROVED BY: IS SIGNATURE IIIIMMIll Date: MEGA4 System Access — EOUSA Page 1 of 8 EFTA00174277 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 I. Introduction The Rules of Behavior (ROB) for General Users pertain to the use, security, and acceptable level

Tags

eftadataset-9vol00009
Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
EOUSA Division MEGA4 Automated Litigation Support System Account Request and Approval Form For EOUSA Division Users To be used for DO.) EOUSA Division employees and authorized MEGA4 contractor staff Case/Project Information DJ NUMBER: 2442-0129 CASE NAME: US V. Epstein LEAD EOUSA DIVISION ATTORNEY NAME AND PHONE NUMBER: l .' 4 EOUSA CASE MANAGER NAME AND PHONE NUMBER: 9 ICONECT 9 RELATIVITY LIST OF SPECIFIC CASES/PROJECTS FOR WHICH ACCESS IS REQUIRED: US v. Epstein End User Information: FULL NAME: EOUSA SECTION: POSITION/TITLE: SOS-Analyst/P-6i_ TELEPHONE NUMBER: 1 BUILDING/LOCATION: 26 Federal Plaza EMAIL ADDRESS: v APPROVED BY: IS SIGNATURE IIIIMMIll Date: MEGA4 System Access — EOUSA Page 1 of 8 EFTA00174277 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 I. Introduction The Rules of Behavior (ROB) for General Users pertain to the use, security, and acceptable level of risk for Department of Justice (DOJ) systems. The rules highlight that taking personal responsibility for the security of an information system and its data is an essential part of your job. As a user of the DOJ Information Technology (IT) data and systems, you are the first line of defense in support of DOD's IT security. The intent of the ROB is to acknowledge users' receipt and understanding of applicable IT security requirements from various Federal and DOJ policies and procedures. These requirements include, but are not limited to, the Office of Management and Budget (OMB) Circular A-130, OMB M-07-16, OMB M-05-08, the Privacy Act of 1974, DOJ Order 2640.2 (series), DOJ Order 2740.1 (series), and the DOJ IT Security Standard. Who is covered by these rules? These rules apply to all personnel (government employees and contractors) who perform general non- privileged duties on DOJ information systems, access or use DOJ information, or provide IT services to DOJ — hereafter referred to as users. All users are required to review and provide signature or electronic verification acknowledging compliance with these rules to their respective Component IT Security representative. Certain authorized personnel may obtain limited exemptions for specific occurrences when performing official duties. These individuals must document situations where equipment and software limitations listed below prevent mission operations. In addition to this ROB, the user shall also agree to and provide signature or electronic verification acknowledging compliance for the Privileged User ROB. The system Authorizing Official (AO) will issue an exemption if the accepted risk(s) and justification is documented and appropriate'. What are the penalties for noncompliance? Non-compliance with requirements will be enforced through sanctions commensurate with the level of infraction. Actions may include a verbal or written warning, temporary suspension of system access or permanent revocation, reassignment to other duties, or termination, depending on the severity of the violation. In addition, activities that lead to or cause disclosure of classified information may result in criminal prosecution under the U.S. Code, Title 18, Section 798, and other applicable statutes. Unauthorized browsing or inspection of Federal Taxpayer Information (Internal Revenue Code Sec. 7213A) is punishable with a fine of up to $1,000 and/or up to one year imprisonment. Unauthorized disclosure of Tax Return information (Internal Revenue Code Sec. 7213) is a felony punishable with a fine of up to $5,000 and up to five years in prison. In addition to these penalties, any Federal employee convicted under Sec. 7213 or Sec.7213A will be dismissed from employment. For additional information on mobile device exemptions, please refer to the Department of Justice Mobile Device and Mobile Application Security Policy Instruction v2 (hnpl/dojnet.doj.govijmdAnntitsecurity/documents/FDIAL- DOLMobile_Device_and_Application_Security_Policyjnstruction_v2.pd0. 1 MEGA4 System Access — EOUSA Revised March 2014 Page 2 of 8 EFTA00174278 Department of Justice Information Technology (11) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3, 2014 H. User Responsibilities A. General 1. Comply with all Federal laws and Department and Component policies and requirements, including DOJ Orders and Standards. Use DOJ information and information systems for lawful, official use, and authorized purposes only. 2. Do not generate, download, store, copy, or transmit offensive or inappropriate information in any medium, to include e-mail messages, documents, images, videos, and sound files. 3. Limit distribution of e-mail to only those with a "need to know." 4. Do not open e-mails from suspicious sources (e.g., people you don't recognize, know, or normally communicate with) and do not visit untrusted or inappropriate websites (unless authorized). Only download permissible files from known and reliable sources and use virus- checking procedures prior to file use. 5. Protect and safeguard all DOJ information, including personally identifiable information (PII), commensurate with the sensitivity and value of the data at risk. Protect and safeguard all DOJ information and information systems from unauthorized access, unauthorized or inadvertent modification, disclosure, damage, destruction, loss, theft, denial of service, improper sanitization, and improper use. 6. Verify that each computer-readable data extract containing sensitive PII data has been erased within 90 days of origination or that its use is still required. 7. Upon discovery of a known or suspected security incident, report the incident to your Help Desk, Incident Response Representative, Justice Security Operations Center, Security Manager, or Supervisor. 8. Immediately report lost or stolen devices (e.g., laptop, phone, tablet, thumb drive) to your Help Desk, Incident Response Representative, Justice Security Operations Center, Security Manager, or Supervisor. 9. Encrypt all DOJ Sensitive but Unclassified (SBU) data on authorized mobile computers, laptops, tablets, and removable media (e.g., removable hard drives, thumb drives, and DVDs) using Department-approved solutions unless a waiver or policy exemption exists. For classified environments, follow the procedures required for those networks for data storage and transport. All data is considered sensitive unless designated as non-sensitive by the Component Director/Head/Office Head. 10. Read and understand the DOJ security warning banner that appears prior to logging onto the system or mobile device. 11. Screen-lock or log off your computer when leaving the work area, and remove your PIV card, if utilized. Log off when departing for the day. 12. Keep all government-furnished equipment (GFE) mobile devices assigned to you in your 2 MEGA4 System Access— EOUSA Page 3 of 8 EFTA00174279 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 physical presence whenever possible. When it is necessary for you to be away from your GFE, particularly at a non-secure location, secure all your portable electronic devices and removable media, preferably out-of-sight (e.g. in a locked container). 13. Do not use Peer-to-Peer (P2P) technology on the Internet, such as Skype, BitTonent, etc. P2P is forbidden throughout the Department unless the Department's Chief Information Officer (CIO) or designee approves a waiver. 14. Do not auto-forward emails from your DOJ email account to your personal email account (e.g., Gmail, Yahoo, Hotmail). 15. Ensure that individuals have the proper clearance, authorization, and need-to-know before providing access to any DOJ information. 16. Consent to monitoring and search of any IT equipment that is brought into, networked to, or removed from DOJ owned, controlled, or leased facilities consistent with employee and contractor consent obtained through log-on banners and DOJ policies. 17. Properly mark and label classified and sensitive documents, electronic equipment, and media in accordance with the DOJ Security Program Operating Manual (SPOM) and DOJ Order 2620.7. IS. Adhere to Separation of Duties principles. Understand conflict of interest in responsibilities, roles, and functions within a system or application (e.g., duties of the System Administrator and Information System Security Officer (ISSO) should not be combined). 19. Do not change any configurations or settings of the operating system and security-related software, or circumvent and test the security controls of the system unless authorized. 20. Do not bypass native mobile device operating system controls to gain increased privileges (i.e., jailbreaking or rooting the device). 21. Do not use anonymizer sites on the Internet and bypass the Department security mechanisms designed to protect systems from malicious Internet sites. B. Classified Systems/Information 22. Do not process classified information on an unclassified system unless authorization is obtained to support a specific job function. 23. Send classified email only on systems authorized for that purpose and for the highest level of the classified data involved. 24. When in use, operate IT systems only in those areas or facilities certified for the highest classification or sensitivity level of the information involved. When not in use, store a classified computer, hard drive, removable media, etc. in an approved security container or in a facility approved for open storage. 25. Use classified laptops and similar devices in accordance with the DOJ Removable Media Requirements for Classified Systems, dated April 25, 2011. 3 MESAS System Access — EOUSA Page 4 of 8 EFTA00174280 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 C. Passwords 26. Adhere to at least the minimum password requirements for the system on which you are working. 27. Change the default password upon receipt from system administrator. 28. Do not share account passwords with anyone. 29. Avoid using the same password for multiple accounts. D. Mobile Computing & Remote Access Users 30. Use mobile GFE (e.g., laptop, tablet, smartphone) for official business and authorized uses. Mobile GFE is for use by DOJ personnel only (no spouses or relatives) and shall only connect through an authorized DOJ remote access network when accessing the Internet. 31. Only authorized applications and software for mobile GFE can be downloaded and installed on DOJ devices, and only from DOJ-authorized sources. 32. The use of Short Message Service (SMS) must be approved by the Authorizing Official. SMS messages are be limited to non-sensitive information. 33. Only install DOJ-provided removable media, including memory and subscriber identity module (SIM) cards, on mobile GFE. 34. Only connect to secure wireless networks where possible and take precautionary measures to prevent the compromise of DOJ data when insecure wireless networks must be used.2 35. Follow these guidelines unless explicitly authorized by the Authorizing Official to do otherwise: a. Do not connect non-DOJ mobile devices and/or accessories to DOJ networks. This includes mobile phones, tablets, laptops, Bluetooth devices, and other devices requiring both wired and wireless communication access. b. Do not enable mobile device tethering via Bluetooth, Universal Serial Bus (USB), or Wi-Fi hotspots on mobile GFE. c. Do not access non-Government cloud-based services—such as DropBox and iCloud—from mobile GFE. d. Do not connect mobile GFE to non-DOJ information systems, to include personal computers. E. Virtual Conferencing 36. Hosts and presenters must provide participants with advance notice if the virtual conference session is being recorded. 2 For additional information, please refer to the Department of Justice Secure Use of Wireless Networks FAQ at http://dojnet.doj.govfjmdfirrn/itsecurity/isesjeam.php. 4 MEGA4 System Access — EOUSA Page 5 of 8 EFTA00174281 Department of Justice Information Technology (11) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 37. Do not access a virtual conference presentation using an account with elevated privileges. 38. Limit presentation information to only that which is authorized for dissemination. 39. Delete all DOJ information on a provider's web site immediately upon the end of a virtual conference. 40. Do not install any agents or other software designed to enhance or aid in virtual conferencing. 41. Employ strong participant authentication mechanisms (i.e., multi-factor authentication, creating a pin, unique login credentials, etc.). 42. Enable logging and archiving to provide auditability of participant and host activity, as well as enable/disable meeting functions (e.g., upload, download, desktop sharing). F. Hardware 43. Do not add, modify, or remove hardware, or connect unauthorized accessories or communications connections to Dal IT resources unless specifically authorized. 44. Do not access the internal components of the computer, or remove the computer or its hard drive from DOJ facilities unless specifically authorized. 45. Wipe all devices prior to reissue. There is no expectation of maintaining any personal information, data, or applications on these devices. G. Software 46. Do not copy or distribute intellectual property — including music, software, documentation, and other copyrighted materials — without permission or license from the copyright owner. Use DOJ-licensed and authorized software only. 47. Do not install or update any software unless specifically authorized. 48. Do not attempt to access any electronic audit trails that may exist on the computer unless specifically authorized. H. Remote Web Access 49. Follow your organization's telework guidelines when working remotely and/or accessing DOJ information remotely. 50. Ensure the confidentiality of government information when using remote web access (e.g., OWA) from a non-GFE client (public or private). This includes the following: a. When downloading attachments to registered non-GFE private computers, immediately remove any extraneous attachments, encrypt them locally, or transfer them to an approved encrypted USB drive. b. Delete attachments when finished on registered non-GFE private computers. c. Do not download attachments on unregistered non-GFE public computers. 5 MEGA4 System Access —EOUSA Page 6 of 8 EFTA00174282 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3,2014 51. Do not print emails in public areas and with public non-GFE printers. Users may print with non-GFE private printers at home. Users will be held responsible for the compromise of Government information through negligence or a willful act. 52. Maintain a reasonable security posture (i.e., updated antivirus, local firewall, updated OS and software patch levels) on registered non-GFE private computers used for remote access. I. Traveling Users 53. The Component Mobile Computing Operations Manager, or equivalent, shall notify the JSOC, or an equivalent authorized SOC in advance, if you intend to travel to a foreign country with a DOJ laptop that will accompany you during any portion of travel with the intended dates and location(s) of travel. For travel to countries designated as high-risk counter-intelligence, the use of mobile devices must be approved by the DOJ CISO prior to travel. Requests are processed via email to both the DOJ ITSS Director and the DOJ ITSS Deputy Director.3 54. Minimize the information on your IT system to what is required to perform a particular mission while travelling and destroy copies of sensitive data when no longer needed. 55. Shut down IT devices when not in use or no longer needed. If the IT device is needed but not the associated network capability, turn off/disable the network/wireless network functionality.4 56. Assume all communications (including cellular services) are being intercepted and read when on travel in a foreign country. 57. Keep your remote access token separate from the laptop/tablet (preferably on you) when possible. J. Personally Identifiable Information 58. Safeguard against breaches of information involving PH, which refers to information that can be used alone or combined with other information that can distinguish or trace an individual's identity—such as a name, social security number, biometric records, the date and place of birth, mother's maiden name, etc. 59. Report all breaches of information involving MI to JSOC through your Component's standard procedures. 3 For additional information on foreign travel requirements, please refer to the Foreign Travel Laptop Use and Foreign Travel Laptop Use Waiver Request forms (http://dojnet.doj.gov/jmd/imUitsecurity/jsoc-cyber-defense.php). For additional information on the use of mobile devices during foreign travel, please refer to the Mobile Device and Mobile Application Security Policy Instruction (http://dojnet.doj.gov/jmd/irmfitsecurity/documents/FINAL- DOJ_Mobile_Device_and_Application_Security_Policy_Instruction_v2.pdt). 4 For additional information, please refer to the Department of Justice Secure Use of Wireless Networks FAQ at http://dojnet.doj.govijmd/imilitsecurity/ises_team.php. 6 MEGA4 System Access — EOUSA Page 7 of 8 EFTA00174283 Department of Justice Information Technology (IT) Security Rules of Behavior (ROB) for General Users Version 7.0 January 3, 2014 60. Access, maintain, store, or transmit PH that you are given explicit authorization to and ensure you meet required security controls.5 61. Disclose P11 in accordance with appropriate legal authorities and the Privacy Act of 1974. 62. Dispose of and retain records in accordance with applicable record schedules, National Archives and Records Administration guidelines and Department Policies.6 63. Do not perform unauthorized querying, review, inspection, or disclosure of Federal Taxpayer Information.' (See Internal Revenue Code Sec. 7213 and 7213A at httpillwww.irs.gov/irm/part11/irm 11-003-001. htmli4d0e 1 76) I acknowledge receipt and understand my responsibilities as identified above. Additionally, this acknowledgment accepts my responsibility to ensure the protection of PH that 1 may handle. I will comply with the DOJ IT Security ROB for General Users, Version 7.0, dated January 3, 2014. Printed Name Component and Sub-Component Note: Statement of acknowledgement may be made by signature if the ROB for General Users is reviewed in hard copy or by email/electronic acknowledgement if reviewed online. All users are required to review and provide their signature or electronic verification acknowledging compliance with these rules. Users with privileged accesses and permissions shall also agree to and sign the ROB for Privileged Users. If you have questions related to this ROB, please contact your Help Desk Security Manager, or Supervisor. The Department has the right, reserved or othenvise, to update the ROB to ensure it remains compliant with all applicable laws, regulations, and DOJ Standards. Updates to the ROB will be communicated through the Department's ISES Team Lead and Component Training Coordinators. s For additional guidance on P11, please refer to Information Technology Security, DO,1 Order 2640.2F (https://portal.doj.gov/sites/dm/drn/Directives/2640.2F.pdf). ° For disposal guidance, please refer to Records Management, DOI Order 2710.11 chttps://portal.doj.govisitesidm/dm/Directives/27I0.I l.pdf). For additional information on disclosure of federal taxpayer information, please refer to Internal Revenue Code Sec. 7213 and 7213A (lutp:frunewirs.goviirm/partlllirm_11-003-001.htmlitel0e176). 7 MEGA4 System Access — EOUSA Page 8 of 8 EFTA00174284

Related Documents (6)

House OversightOtherNov 11, 2025

Bill Siegel email chain discussing 'The Control Factor' and anti‑Islamic conspiracy narrative

The passage is an internal email and interview transcript promoting a conspiratorial worldview about 'Islamic Enemy' and 'Civilization Jihad.' It mentions Jeffrey Epstein as a sender but provides no c Email originates from Jeffrey Epstein's address, but only contains a casual invitation and a link to Bill Siegel outlines a theory called the 'Control Factor' that frames Islam as a coordinated threa

20p
Dept. of JusticeOtherUnknown

EFTA Document EFTA01355803

IMPORTANT INFORMATION FOR THE AGENT(S): .When you accept the authority granted under this Authorization/Power of Attorney, a special legal relationship is created between you and the Principal. This relationship imposes on you legal responsibilities that continue until you resign or the Authorization/Power of Attorney is terminated or revoked. You must: 1. act according to any instructions from the Principal, or, where there are no instructions, in the Principal's best interest; 2. avoid c

1p
DOJ Data Set 9OtherUnknown

IN RE:

IN RE: INVESTIGATION OF JEFFREY EPSTEIN Non-Prosecution Agreement IT APPEARING that the City of Palm Beach Police Department and the State Attorney's Office for the 15th Judicial Circuit in and for Palm Beach County (hereinafter, the "State Attorney's Office") have conducted an investigation into the conduct of Jeffrey Epstein (hereinafter "Epstein"); IT APPEARING that the State Attorney's Office has charged Epstein with one count of solicitation of prostitution, in violation of Florida Statutes Section 796.07; IT APPEARING that the interest of the United States pursuant to the Petite policy will be served by the following procedure expressed in this Agreement; IT APPEARING that the United States Attorney's Office and the Federal Bureau of Investigation have conducted their own investigation of Epstein's background and offenses including; knowingly and willfully conspiring with others known and unknown to commit an offense against the United States, in violation of Titl

6p
DOJ Data Set 9OtherUnknown

Attachment A

Attachment A CERTIFICATION FOR CONTINUED PRESENCE BY REQUESTING LAW ENFORCEMENT AGENCY TO: Unit Chief Parole and Law Enforcement Programs Unit Homeland Security Investigations U.S. Immigration and Customs Enforcement FROM: FBI, New York Field Office RE: Request for Continued Presence for: SAC , of the FBI New York Field Office concur in this request and certify, in accordance with the Department of Homeland Security (DHS)'s procedures for Continued Presence, that: 1. The justification and information concerning the request for Continued Presence are accurate and complete. 2. Documentation is attached certifying that the alien is a victim of a severe form of trafficking and may be a potential witness to that trafficking. 3. Name checks have been completed in the principle law enforcement databases on the person named in the request (National Crime Information Center and any other databases available) and, as appropriate, information from foreign law enforcement age

22p
DOJ Data Set 9OtherUnknown

" aNIMIIM>

From: " aNIMIIM> To: a' alMIIM>, 11 Subject: RE: SDNY Grand Jury Subpoena Dated July 5, 2019 issued to Date: Fri, 02 Aug 2019 13:55:48 +0000 I'm good with that. <MIMI.> Ori inal Messa e From: Sent: Thursday. August 1.2019 7:24 PM To: Subject: FW: SDNY Grand Jury Subpoena Dated July 5, 2019 issued to I'd suggest a call for late Monday afternoon, if that works. Original Message From: Bloom, Suzanne Jaffe aa Sent: Thursday. August 1.2019 7:20 PM To: Cc: Hud ens, Johanna Rae Subject: Re: SDNY Grand Jury Subpoena Dated July 5, 2019 issued to Hi all. Thanks again for your time yesterday. Just checking in to see when you'd like to continue our conversation. Please let us know what would work best for you. Many thanks, Suzanne Suzanne Jaffe Bloom Partner Winston & Strawn LLP <x-apple-data-detectors://2/1><x-apple-data-detectors://4/1>200 Park Avenue<x-apple-data-detectors://0/1> New York, NY 10166-4193<x-apple-data-detectors://0/1> Bio<http://vvwvv.winston.comien

4p
Dept. of JusticeOtherUnknown

EFTA Document EFTA01357352

From: Sent: To: Subject: Attachments: 1/21/2014 3: Edward Borlan1 Amanda Kirb Re: Case: 011 Reg E Dislcosure 01180757.pdf; pic26851.gif; pic15919.gie pic23576.gif; pic02726.gif Classification: Public Hi Amanda, my sincere apologies. I just reattached the correct disclosure in there. (See attached file: Reg E Dislcosure 01180757.pdf) Is it ok to you use the authorization time you put in dbforce? Thank you, Ted Borland (Embedded image moved to file: pic26851.gif) Ted Borland Assis

1p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.