Skip to Content
Unclassified

Mission Debrief: Government Resources

CPCON

The United States Cyber Command (USCYBERCOM) Instruction 5200-13 establishes Cyberspace Protection Conditions (CPCON) for the DoD. CPCON establishes protection priorities for each level during significant cyberspace events, as shown in the table below. Depending on the CPCON level, users may experience disruptions in service or access to physical spaces.

CPCON Level DoD Risk Level Priority Focus
CPCON 1 Very High Critical Functions
CPCON 2 High Critical and Essential Functions
CPCON 3 Medium Critical, Essential, and Support Functions
CPCON 4 Low All Functions
CPCON 5 Very Low All Functions

Ethical Use of GFE

Ethical use of government furnished equipment (GFE):

  • Use GFE for official purposes only
  • Don’t allow unauthorized users to use your GFE
  • Don’t view or download pornography
  • Don’t gamble on the Internet
  • Don’t conduct private business/money-making ventures
  • Don’t load or use personal/unauthorized software or services, such as DropBox or peer-to-peer (P2P) software
    • P2P software can compromise network configurations, spread viruses and spyware, and allow unauthorized access to data
  • Only use streaming video and audio for official business and in accordance with your organization’s policy
  • Don’t illegally download copyrighted programs or material
  • Don’t make unauthorized configuration changes
  • Only check personal e-mail if your organization allows it
  • Don’t play games unless allowed by your organization to do so on personal time
  • Always physically secure your device, including when working from home

Note: All DoD-owned devices are subject to monitoring. When you use these devices, you authorize the monitoring of your activity on these devices.

Use of Government E-mail

E-mail use must not adversely affect performance of your role or reflect poorly on your organization. To use e-mail appropriately:

  • Do not use e-mail to sell anything
  • Do not send:
    • Chain letters
    • Offensive letters
    • Mass e-mails
    • Jokes
    • Unnecessary pictures
    • Inspirational stories
  • Avoid using “Reply All” to prevent sending unnecessary e-mail traffic
  • Only use e-mail for personal reasons if allowed by your organization
  • Use a digital signature when sending attachments or hyperlinks, as required by the DoD
  • Do not use personal accounts, such as webmail, to conduct official DoD communication

Follow your organization’s policy on non-email platforms, such as Teams, and webmail (a web-based service that checks e-mail remotely). If webmail is allowed, use caution as it may bypass built-in security features and other safeguards, such as encryption, and thus may compromise security. Communications in any format, including chats and SMS messaging, may be official records, which you should consider before deleting from any Government device.

Skip to Next Tab
Select Next to continue.
Skip Navigation
Unclassified