Skip navigation
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Food Safety
    • Recalls & Public Health Alerts
      • Report a Problem with Food
        • Additional Recalls
      • Annual Recall Summaries
        • Summary of Recall Cases in Calendar Year 2012
        • Summary of Recall Cases in Calendar Year 2013
        • Summary of Recall Cases in Calendar Year 2014
        • Summary of Recall Cases in Calendar Year 2015
        • Summary of Recall Cases in Calendar Year 2016
        • Summary of Recall Cases in Calendar Year 2017
        • Summary of Recall Cases in Calendar Year 2018
        • Summary of Recall Cases in Calendar Year 2019
        • Summary of Recall Cases in Calendar Year 2020
        • Summary of Recall Cases in Calendar Year 2021
        • Summary of Recall and PHA Cases in Calendar Year 2022
    • Food Safety Stats
      • Consumer Research
    • Foodborne Illness and Disease
      • Illnesses and Pathogens
        • Campylobacter
          • Campylobacter En Español
        • Clostridium botulinum
        • Escherichia coli O157:H7
        • Parasites and Foodborne Illness
        • Salmonella Questions and Answers
      • Resources for Public Health Partners
        • State Departments of Public Health
      • Outbreaks
        • Outbreak Investigations: Prevention
        • Outbreak Investigations: Response
    • Safe Food Handling and Preparation
      • Food Safety Basics
        • Additives in Meat and Poultry Products
        • Appliance Thermometers
        • Asar a la parrilla y seguridad alimentaria
        • Cleanliness Helps Prevent Foodborne Illness
        • Cooking for Groups
        • Cooking with Microwave Ovens
        • Cutting Boards
        • Deep Fat Frying
        • Doneness Versus Safety
        • Food Allergies
        • Glossary of Packaging Terms
        • Grilling Food Safely
        • Grilling and Food Safety
        • High Altitude Cooking
        • How Temperatures Affect Food
        • How to Find the USDA Establishment Number
        • Importing Meat, Poultry & Egg Products US
        • Inspection for Food Safety: The Basics
        • Irradiation and Food Safety FAQ
        • Keeping "Bag" Lunches Safe
        • Keeping Food Safe During an Emergency
        • Kitchen Thermometers
        • Mail Order Food Safety
        • Meat and Poultry Labeling Terms
        • Meat and Poultry Packaging Materials
        • Natural Flavors on Meat and Poultry Labels
        • Safe Handling of Take-Out Foods
        • Slaughter Inspection 101
        • Slow Cookers and Food Safety
        • Smoking Meat and Poultry
        • Tailgating Food Safety Q & A
        • Understanding FSIS Food Recalls
        • Water in Meat & Poultry
        • Danger Zone 40F - 140F
        • Food Product Dating
        • Freezing and Food Safety
        • Leftovers and Food Safety
        • Molds on Food: Are They Dangerous?
          • Hongos en los Alimentos: ¿Son Peligrosos?
        • Refrigeration
        • Safe Temperature Chart
        • Shelf-Stable Food
        • Steps to Keep Food Safe
        • The Big Thaw — Safe Defrosting Methods
        • The Color of Meat and Poultry
        • Washing Food: Does it Promote Food Safety?
        • Food Safety While Hiking, Camping & Boating
        • Seguridad Alimentaria Durante Caminatas, Campamentos y Paseos en Bote
      • Meat
        • Bacon and Food Safety
        • Bagre de la Granja a la Mesa
        • Beef From Farm To Table
        • Bison from Farm to Table
        • Carne de res ablandada mecánicamente
        • Catfish from Farm to Table
        • Color of Cooked Ground Beef as It Relates to Doneness
        • Corned Beef
        • Door-to-Door Meat Sales
        • Fresh Pork from Farm to Table
        • Goat from Farm to Table
        • Ground Beef and Food Safety
        • Hams and Food Safety
        • Hot Dogs & Food Safety
        • Jerky
        • Lamb From Farm to Table
        • Mechanically Tenderized Beef
        • Rabbit From Farm to Table
        • Roasting Those "Other" Holiday Meats
        • Sausages and Food Safety
        • Veal from Farm to Table
        • Yersiniosis and Chitterlings Tips
      • Poultry
        • Chicken From Farm to Table
        • Chicken Liver
        • Duck and Goose from Farm to Table
        • Hock Locks and Other Accoutrements
        • Is Pink Turkey Meat Safe?
        • Let's Talk Turkey Roasting
        • Poultry Processing: Questions & Answers
        • Poultry: Basting, Brining, and Marinating
        • Stuffing and Food Safety
        • The Poultry Label Says "Fresh"
        • Turduckens Require Safe Food Handling
        • Turkey Basics: Handling Cooked Dinners
        • Turkey Basics: Safe Cooking
        • Turkey Basics: Safe Thawing
        • Turkey Basics: Stuffing
        • Turkey from Farm to Table
        • Turkey: Alternate Routes to the Table
      • Eggs
        • Egg Products and Food Safety
        • Shell Eggs from Farm to Table
      • Emergencies
        • A Consumer's Guide to Food Safety: Severe Storms and Hurricanes
        • Fires and Food Safety
        • Keep Your Food Safe During Emergencies
        • Removing Odors from Refrigerators and Freezers
      • USDA Meat and Poultry Hotline
      • Brochures & Publications
    • Food Defense and Emergency Response
      • Emergency Response
      • Continuity of Operations (COOP)
      • Food Defense
        • Risk Mitigation Tool
        • Food Defense Considerations for Transportation of FSIS-Regulated Products
        • Food Defense Tools, Resources and Training
        • Functional Food Defense Plans
        • International Food Defense
  • Science & Data
    • Research Priorities
    • Data Sets & Visualizations
      • Microbiology
        • Baseline Microbiology Data Reports
        • Microbiological Testing Program for RTE Meat and Poultry Products
          • Tables & Results Microbiological Testing Program for RTE Meat
          • Tables & Results: Microbiological Testing Program Pasteurized Egg Products
          • Aggregate Salmonella Categorization of Raw Chicken Parts, NRTE Comminuted Poultry, Young Chicken Carcass and Young Turkey Carcass Establishments Using Moving Windows
          • Salmonella Initiative Program Criteria
            • Quarterly Sampling Reports on Antimicrobial Resistance
            • Quarterly Sampling Reports on Raw Beef Products
            • Quarterly Sampling Reports on Ready-to-eat Products and Egg Products
            • Quarterly Sampling Reports on Salmonella
            • Salmonella Action Plan: A One and Two Year Update
            • Salmonella Categorization of Individual Establishments for Poultry Products
        • Microbiological Testing Program for Escherichia coli O157:H7 and non-O157 Shiga toxin-producing Escherichia coli (STEC)
          • Year-to-Date Totals: Testing of Raw Ground Beef Component (RGBC) Samples for E. coli O157:H7 and non-O157 Shiga toxin-producing E. coli (STEC)
          • Annual Report for STEC in Raw Ground Beef or Veal and Raw Ground Beef or Veal Components
          • Individual E. coli Positive Results for Raw Ground Beef (RGB) and RGB Components 2017
          • Individual E. coli Positive Results for Raw Ground Beef (RGB) and RGB Components 2018
          • Individual E. coli Positive Results for Raw Ground Beef (RGB) and RGB Components 2016
          • Individual E. coli Positive Results for Raw Ground Beef (RGB) and RGB Components 2015
          • Year-to-Date 2018 Totals: Results of Raw Ground Beef Component (RGBC) Samples for E. coli O157:H7 and non-O157 Shiga toxin-producing E. coli (STEC):
        • National Antimicrobial Resistance Monitoring System (NARMS)
        • Salmonella Verification Testing Program Monthly Posting
      • Chemical Residues and Contaminants
      • Humane Handling Data
      • Laboratory Sampling Data
        • Egg Product Testing, Years 1995-2017
      • Inspection Task Data
    • Scientific Reports
      • Public Health Regulations (PHR)
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2022
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2021
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2016
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2017
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2018
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2019
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2020
        • FSIS Data Analysis and Reporting: Public Health Regulations FY 2023
      • Interagency Food Safety Analytics Collaboration (IFSAC)
    • Laboratories & Procedures
      • Accredited Laboratory Program
        • Key Facts: ISO Accreditation
      • FSIS Laboratories
        • Requesting Bacterial Isolates from FSIS
    • Risk Assessments
    • Sampling Program
      • Raw Pork Products Exploratory Sampling Program
      • Sampling Results for FSIS Regulated Products
    • Journal Publications
  • Policy
    • Food Safety Acts
      • Federal Meat Inspection Act
      • Poultry Products Inspection Act
      • Egg Products Inspection Act
      • Humane Methods of Slaughter Act
    • FSIS Guidelines
    • Directives & Notices
      • FSIS Notices
      • FSIS Directives
    • Petitions
    • Federal Register & Rulemaking
      • Federal Register Notices
      • Federal Register Rules
      • Executive Orders, Small Business Protection Laws & Other Guidance
      • Regulatory Priorities
    • Advisory Committees
      • National Advisory Committee on Meat and Poultry Inspection (NACMPI)
      • National Advisory Committee on Microbiological Criteria For Foods (NACMCF)
        • 2021-2023 National Advisory Committee on Microbiological Criteria For Foods (NACMCF)
        • NACMCF 2022 Subcommittee
        • 2018-2020 National Advisory Committee on Microbiological Criteria For Foods (NACMCF)
  • Inspection
    • Inspection Programs
      • Inspection of Meat Products
        • Humane Handling Ombudsman
        • Modernization of Swine Slaughter Inspection
      • Inspection of Poultry Products
        • Reducing Salmonella in Poultry
          • Pilot Projects: Salmonella Control Strategies
          • Proposed Regulatory Framework to Reduce Salmonella Illnesses Attributable to Poultry
            • Component 1
            • Component 2
            • Component 3
          • Salmonella By the Numbers
          • Salmonella KPI
          • Salmonella Risk Assessments
        • Modernization of Poultry Slaughter Inspection
      • Inspection of Egg Products
      • Inspection of Siluriformes
    • Compliance Guidance
      • Significant Guidance
      • HACCP
        • HACCP-Based-Inspection Models Project
          • New Poultry Inspection System (NPIS)
          • HIMP Redesign Achievement of Performance Standards Young Chicken Plants
          • List of HIMP Participating Plants
        • HACCP Validation
      • PHIS
        • PHIS: Historical Information
      • Retail Guidance
      • Small & Very Small Plant Guidance
        • Appealing Inspection Decisions
        • Food Safety Resources for Small and Very Small Plant Outreach: Order Form
        • Small Plant Help Desk
        • Small Plant Help Desk Form
      • Microbial Risk
        • Listeria Monocytogenes
        • Salmonella
        • Shiga Toxin-Producing E.Coli (STEC) and E. Coli O157:H7
        • Specified Risk Material
          • BSE Rules Being Strictly Enforced
        • Guidance for Controlling Listeria monocytogenes (Lm) in Retail Delicatessens - Best Practice Tips for Deli Operators
      • Specified Risk Material Resources
      • Food Safety Assessments Tools
      • Recall Process
      • Sanitation Performance Standards Compliance Guide
      • Labeling
        • Basics of Labeling
        • Claims Guidance
        • Nonfood Compounds
          • Compounds Used for Construction and Repair in Federally Inspected Meat and Poultry Plants
          • Criteria Used by the Former Compounds and Packaging Branch for Evaluating Nonfood Compounds and Proprietary Substances
        • Ingredients Guidance
        • Label Submission and Approval System (LSAS)
          • Integration of Paper Label Applications into the Label Submission and Approval System (LSAS)
        • Labeling Policies
          • Human Food Made with Cultured Animal Cells
          • Regulations for Package Dating
          • Comprehensive List of Reasons for Label Modifications and Returns
        • Labeling Procedures
          • Information Required For Requesting a Temporary Approval
          • 10 Most Common Mistakes And How to Avoid Them
          • Label Submission Checklist
          • Labeling Situations That Can Not Have a Temporary Approval
          • Labeling and Establishment Responsibilities
          • Ten Most Commonly Asked Labeling Questions
          • Trans Fat Declarations in the Nutrition Facts Panel on Product Labeling
      • New Technology
        • Cooperative Agreements FY 2003
        • Cooperative Agreements FY 2004
        • Cooperative Agreements FY 2005
        • Food Safety Technologies FY 2003
        • Food Safety Technologies FY 2004
        • Food Safety Technologies FY 2005
        • NOL for Non-O157 STEC Test Methods
        • New Technology Information Table
      • Humane Handling
    • Import & Export
      • Import & Export Library
        • Eligible Foreign Establishments
        • U.S. Establishments by Country
          • Australia Eligible Establishments
          • Brazil Export Eligible Establishments
          • Egypt Export Eligible Establishments
          • Gibraltar Export Eligible Establishments
          • Israel Export Eligible Establishments
          • Japan (Casings) Export Eligible Establishments
          • Japan (Cold Storage Facilities) Export Eligible Establishments
          • Mexico Export Eligible Establishments
          • Russia (Beef) Export Eligible Establishments
          • Russia (Pork) Export Eligible Establishments
          • Russia (Poultry) Export Eligible Establishments
          • Russia (Prepared Products) Export Eligible Establishments
          • South Africa Eligible Establishments
      • Import Guidance
        • FSIS Import Procedures for Meat, Poultry & Egg Products
        • FSIS Import Reinspection
        • Sourcing Egg Products and Shell Eggs From Foreign Countries
      • Export Guidance
      • Equivalence
      • PHIS Components
      • International Reports
        • Foreign Audit Reports
        • Import and Export Data
    • Regulatory Enforcement
      • Humane Handling Enforcement
      • Quarterly Enforcement Reports
        • Quarterly Enforcement Reports (Narrative, Archived v1)
        • Quarterly Enforcement Reports (Narrative, Archived v2)
        • Quarterly Enforcement Reports (Narrative, Archived v3)
        • Quarterly Enforcement Reports (Narrative, Archived v4)
      • FSIS Policies on Regulatory Decisions
    • Inspection Training & Videos
      • Inspection & Mission Training
      • Meat, Poultry and Egg Product Inspection Videos
      • Regulatory Education Video Seminars
    • Apply for Grant of Inspection
      • Grants & Financial Options
    • State Inspection Programs
      • Cooperative Interstate Shipping Program
        • Cooperative Interstate Shipment (CIS) Establishments
      • Guidance Documents for State and Local Agencies
      • States With and Without Inspection Programs
      • Reviews of State Programs
    • Establishments
      • FSIS Inspected Establishments
      • Meat, Poultry and Egg Product Inspection Directory
    • Inspection Forms
  • About FSIS
    • History
    • Leadership & Organizational Structure
    • Strategic Planning
      • FSIS Enterprise Governance Decision Making Process
    • Core Values
    • Food Safety & Agency Partners
      • Memoranda of Understanding (MOU)
    • Freedom of Information Act (FOIA)
      • FSIS Adjudications
      • FSIS FOIA Reading Room
      • Frequently Requested Records
      • Making a Freedom of Information Act (FOIA) Request
    • Federal Employee Viewpoint Survey (FEVS)
  • Contact Us
    • FSIS Offices
      • Office for Food Safety (OFS)
      • Office of the Administrator (OA)
      • Office of Field Operations (OFO)
      • Office of Investigation, Enforcement, and Audit (OIEA)
      • Office of Public Health Science (OPHS)
      • Office of Policy and Program Development (OPPD)
      • Office of the Chief Financial Officer (OCFO)
      • Office of International Coordination (OIC)
      • Office of Employee Experience and Development (OEED)
      • Office of the Chief Information Officer (OCIO)
      • Office of Management (OM)
      • Office of Public Affairs and Consumer Education (OPACE)
      • Internal Affairs (IA)
      • Office of Planning Analysis Risk Management (OPARM)
      • Civil Rights Staff
    • FSIS Department Emails
    • State Contacts
    • askFSIS
      • Having Trouble with the Webform
    • Pregúntele a Karen
  • Careers
    • Apply for a Job
    • Job Opportunities
    • Who Works for Us
      • Dr. Summer Addo — an Unexpected Career Path
      • Dr. Jeanetta Tankson Shares Her Passion for Science and Food Safety
      • Micheall Myrie - Visual Information Specialist and AAFE Award Winner
      • DDM Jeffery Jacobsen Ensures Meat is Safe and Cooks it, Too!
      • CSI Sherri Rodriguez: Thankful for FSIS and Friends
      • Stephen Whatley Celebrates 50 Years of Federal Service
      • Stevie Hretz Enjoys Putting “Humans First!”
      • Archives
    • Career Profiles
      • Administrative Positions
      • Compliance Investigator Positions
      • Consumer Safety Inspector
      • Food Inspector
      • Professional Positions
      • Public Health Veterinarian (PHV)
      • Scientific Positions
    • Incentives
      • Federal Employee Benefits Summary
    • Employment Programs
    • Food Inspector Apprenticeship Programs
    • Professionals with Disabilities
  • News & Events
    • Events & Meetings
      • Officials' Calendar of Meetings
      • Food Safety Education Month
    • News & Press Releases
      • News Feeds & Subscriptions
    • Publications
    • Branding & Toolkits
  • Employees
    • HR Policies & Systems
      • Forms
      • Performance Management
      • Understanding Your Benefits
        • Emergency Backup Dependent Care (EBDC) Program
    • FSIS Safety
      • COVID-19 Pandemic Resources
        • Information about Face Coverings/Masks and Face Shields
      • Workplace Violence
    • Onboarding
      • New Hire Training
    • Agency Awards & Achievements
    • Professional Development Opportunities
      • OFO Workforce Investment Initiative Pilot Program
    • Employee News & Stories
      • FSIS Snapshots
        • March 2023 Snapshots
        • February 2023 Snapshots
        • January 2023 Snapshots
        • December 2022 Snapshots
        • September 2022 Snapshots
        • August 2022 Snapshots
        • November 2022 Snapshots
        • July 2022 Snapshots
        • October 2022 Snapshots
        • June 2022 Snapshots
        • May 2022 Snapshots
        • April 2022 Snapshots
        • March 2022 Snapshots
        • February 2022 Snapshots
        • January 2022 Snapshots
        • December 2021 Snapshots
        • November 2021 Snapshots
        • October 2021 Snapshots
        • September 2021 Snapshots
        • August 2021 Snapshots
        • July 2021 Snapshots
        • June 2021 Snapshots
      • Submit Your Stories
      • Black History Month — Resistance Through Agricultural Innovations
      • Tiffanie Newman: Versatility at FSIS and in Daily Life
      • Meet Pickle-Eating Champ, CSI Joe Smith
      • Supervisors Make All the Difference!
      • Disability: Part of the Equity Equation
      • Archives
        • ARCHIVE: National Preparedness Month - Cyber Security for Remote Work
        • ARCHIVE: National Preparedness Month: Occupant Emergency Planning
        • ARCHIVE: Message from Leadership — Women’s Equality Day
        • ARCHIVE: Managing Heat Risk in Hot Weather
        • ARCHIVE: New Netflix Show Features USDA and FSIS
        • ARCHIVE: Asian American, Native Hawaiian and Pacific Islander Heritage Month — Advancing Leaders Through Collaboration
        • ARCHIVE: Thank You for Your Public Service
        • ARCHIVE: World Veterinary Day — Recognizing the Resilience of FSIS Veterinarians
        • ARCHIVE: Two Hero Inspectors Provide Potentially Life-Saving CPR to a Plant Employee
        • ARCHIVE: Hero Inspector Saves a Life While on the Road
        • ARCHIVE: Administrative Professionals Day — Thank You
        • ARCHIVE: Chief Information Security Officer Marvin Lykes Recognized for Operational Excellence
        • ARCHIVE: Women’s History Month: Women Providing Healing, Promoting Hope
        • ARCHIVE: Alameda District Awards Petaluma Circuit Inspectors Recognition Coins
        • ARCHIVE: Collaborating in the Caribbean — Bringing Awareness About African Swine Fever
        • ARCHIVE: Message from Leadership — Be an Advocate for Public Health
        • ARCHIVE: Message from Leadership — Honoring Dr. Martin Luther King Jr.
        • ARCHIVE: In Their Own Words: The 2021 Administrator’s Awards for Excellence Winners Speak Out
        • ARCHIVE: CSI Koffi Hoenou – From Togolese Teacher to U.S. Citizen
        • ARCHIVE: Dearborn, Mich., Circuit Inspectors Receive Collaborative Coins
        • ARCHIVE: Don’t Invite Foodborne Illness to the Party
        • ARCHIVE: Inspection for Ritual Meat and Poultry Slaughter
        • ARCHIVE: Thanksgiving Message from Leadership
        • ARCHIVE: Make a Difference for You and Your Colleagues – Respond to FEVS by Dec. 3
        • ARCHIVE: American Indian/Alaskan Native Heritage Month — Together Towards Tomorrow
        • ARCHIVE: Federal State Audit Staff Twice Honored for Supporting Military Staff
        • ARCHIVE: Veterans Day Messages from FSIS Leadership
        • ARCHIVE: Food Inspector Apprenticeship Programs for Veterans
        • ARCHIVE: Disability Employment Awareness Month — America’s Recovery: Powered by Inclusion
        • ARCHIVE: Helping Today’s Inspectors Be Tomorrow’s Leaders with Tuition Reimbursement
        • ARCHIVE: Dr. Geraldine Vidal-Covas Embraces Her Hispanic Heritage, Encourages All
        • ARCHIVE: National Preparedness Month – Home Go Kits & Pets
        • ARCHIVE: Mask Requirements Updated for FSIS Employees
        • ARCHIVE: Modernizing Egg Inspection
        • ARCHIVE: FSIS Recognized Twice for 2020 Food Safety Education Efforts
        • ARCHIVE: Four Steps to Good Mental Health
        • ARCHIVE: Building Relationships at Work
        • ARCHIVE: Pride Month and USDA’s Commitment to Inclusion
        • ARCHIVE: Honoring the Dedicated Public Servants of FSIS
        • ARCHIVE: Asian American and Pacific Islander Contributions to Our Nation’s History
        • ARCHIVE: USDA Vaccination Heroes Do Their Part for America
        • ARCHIVE: Remembering Their Sacrifice: Jean Hillery, Tom Quadros and Bill Shaline
    • Facilities and Services
    • Employee Bargaining
    • Civil Rights

Food Safety and Inspection Service

  • About FSIS
  • Contact Us
  • Careers
  • News & Events
  • Employees
  • Food Safety
  • Science & Data
  • Policy
  • Inspection
  • Recalls
  • Search
  • Full Menu
ALERT: Elkhorn Valley Packing Recalls Boneless… See more details
Page Hero
  • Policy
    • Food Safety Acts
      • Federal Meat Inspection Act
      • Poultry Products Inspection Act
      • Egg Products Inspection Act
      • Humane Methods of Slaughter Act
    • FSIS Guidelines
    • Directives & Notices
      • FSIS Notices
      • FSIS Directives
    • Petitions
    • Federal Register & Rulemaking
      • Federal Register Notices
      • Federal Register Rules
      • Executive Orders, Small Business Protection Laws & Other Guidance
      • Regulatory Priorities
    • Advisory Committees
      • National Advisory Committee on Meat and Poultry Inspection (NACMPI)
      • National Advisory Committee on Microbiological Criteria For Foods (NACMCF)
Subscribe for Updates
Ask FSIS

askFSIS

Find answers to questions on inspection-related policies, programs, systems, and procedures.
Find An Answer
Document in circle icon

Participate in Creating Standards

FSIS invites the food safety community to participate in establishing standards for our food safety policies and services. Join us for public meetings or respond to comment requests.
Learn More

Managing Information Technology (IT) Resources - Revision 1

FSIS directive 1300.7
Series Type 1,000 Series: FSIS Infrastructure
Issue Date Jun 03, 2009
Full Directive
1300.7.pdf

I. PURPOSE

This directive:

A. Describes FSIS IT policy.

B. Establishes procedures and responsibilities for using FSIS IT Resources to: 

  1. Protect the employee and FSIS. 
  2. Ensure the most appropriate and efficient allocation of resources. 
  3. Minimize the risk to FSIS from inappropriate use via: 
    1. Virus attacks.
    2. Compromised network systems and services. 

C. Updates Office of Chief Information Officer’s (OCIO’s) policy for  reimbursement of IT services.

II. CANCELLATION

This directive cancels:

A. FSIS Directive 1300.1, Revision 3, Amendment 1, FSIS Information Resources Management, dated 6/19/96.

B. FSIS Directive 1300.7, Managing Information Technology Resources, dated 12/10/07.

C. FSIS Notice 14-09, FSIS Wireless Service Acquisitions, dated 2/24/09.

D. FSIS Notice 106-08, Reimbursement Policy for Broadband Services, dated 12/31/08.

E. FSIS Notice 84-08, Funding for Blackberry™ Devices, dated 11/18/08.

III. REASON FOR REISSUANCE

This directive is being reissued to:

A. Combine the following IT policies into a central location:

  1.  FSIS Notice 14-09, FSIS Wireless Service Acquisitions, dated 2/24/09.
  2. FSIS Notice 106-08, Reimbursement Policy for Broadband Services, dated 12/31/08.
  3. FSIS Notice 84-08, Funding for Blackberry™ Devices, dated 11/18/08.

B. Establish FSIS wireless service acquisitions policy and procedures for the purchase of IT equipment.

C. Change the name of the Enterprise Change Control Board to Technical Change Control Board (TCCB).

D. Establish that Instant Messaging (IM) is prohibited on Government-owned  equipment (GOE) for communication external to FSIS.

IV. REFERENCES

Directive 1310.3, Technical Change Control Board (TCCB)

Directive 1320.2, Systems Development Life Cycle

DM-3525-002, USDA Internet Use and Copyright Restrictions

DR 3080-001, Records Management

DR 3300-001, Telecommunications & Internet Services and Use

5 CFR Part 2635.101, The Standards of Ethical Conduct

FIPS 140-2, Security Requirements for Cryptographic Modules

SF-1164, Claim for Reimbursement for Expenditures on Official Business

AD-700, Procurement Request

Web site:

 https://inside.fsis.usda.gov/fsis/emp/static/global/offices/oSpace/ocioOffice/itConnection/ itConnection.jsp

V. ABBREVIATIONS

The following appear in their shortened form in this directive:

  • CD Compact Disk
  • CD-ROM Compact Disk—Read Only Memory
  • CIO Chief Information Officer
  • CM Configuration Management
  • COOP Continuity of Operations Plan
  • DO District Office
  • DR Departmental Regulation
  • DSL Digital Subscriber Line
  • DVD Digital Video Disk
  • E-mail Electronic Mail EMC Emergency Management Committee
  • EOE Employee-Owned Equipment
  • EVDO Evolution-Data Optimized
  • FIPS Federal Information Processing Standard
  • GOE Government-Owned Equipment
  • ID Identification
  • IM Instant Messaging
  • IT Information Technology
  • OCIO Office of Chief Information Officer
  • OFO Office of Field Operations
  • OM Office of Management
  • OPACE Office of Public Affairs and Consumer Education
  • OPEER Office of Program Evaluation Enforcement and Review
  • PC Personal Computer
  • PDA Personal Digital Assistant
  • PII Personally Identifiable Identification
  • RFC Request for Change
  • RMS Resource Management Specialist
  • SES Senior Executive Service
  • SSL Secure Socket Layer
  • TB Telecommunications Branch
  • TCCB Technical Change Control Board
  • USB Universal Serial Bus
  • VPN Virtual Private Network

VI. POLICY

It is FSIS policy to provide employees with the necessary IT resources to carry out the Agency’s mission. Employees and their agents are accountable for all actions performed with their user ID and password. Sharing this unique user information is prohibited. The expectation of privacy or confidentiality does not apply in your use of FSIS IT resources.

A. IT resources are used to:

  1. Enhance delivery of services to the public and industry.
  2. Protect Agency data and secure the overall infrastructure.

B. Employees must take all necessary steps to protect FSIS IT resources and media (examples: hard disks, floppy disks, CD-ROMs and tapes, removable drives and media, and DVDs).

C. Employees should immediately call the FSIS Service Desk at 202–720–4016 (headquarter employees), or 800–473–9135 (field employees), to report any unusual or unexplainable changes to IT resources such as:

  1. Vanishing files.
  2. Slow or disrupted network service.
  3. Pop-up window

D. GOE should only be kept in vehicles when traveling to perform official business or travel to and from the workplace. GOE and media must:

  1. Never be left in plain view within the vehicle.
  2. Always be locked in the vehicle and out of view. 
  3. Be secure at all times when not stored at the worksite.

E. GOE and media must not be placed in checked baggage when traveling. GOE must always be kept in sight.

F. Personal and privacy data should not be stored on mobile GOE (examples: laptop, Blackberry™ ,or thumb drive) or media unless the data are encrypted and approved for use.

G. Immediately report any loss or theft of IT resources in the following order:

  1. USDA at 888–926–2373, 24 hours a day.
  2. FSIS Service Desk at 202–720–4016, from 7:30 a.m. to 4:30 p.m. eastern standard time, or 800–473–9135, from 5:00 a.m. to 11:00 p.m. central standard time. After hours, record your message and a service desk or IT specialist will respond by the next business day.

H. Immediately report PII incidents by contacting USDA at 877–744–2968 or 888–926–2373, 24 hours a day.

VII. DEFINITIONS

See Attachment 8-1 for a listing of definitions used in this directive.

VIII. APPLICABILITY

This directive applies to all FSIS employees, other Federal agencies, State and local  governments, and authorized private organizations or individuals who use FSIS IT  resources.

PART TWO—PORTABLE ELECTRONIC DEVICES

I. PROVISIONS

FSIS provides portable electronic devices (example: Blackberry™ devices) to eligible employees to access FSIS information systems for routine operations and emergency response. These devices provide:

A. Back-up communications when network disruptions occur.

B. Enhanced responsiveness and remote accessibility to managers and staff.

C. Effective communication for emergency responders.

D. Automated information access when no other access is available.

E. Off-hour project monitoring support.

F. Out-of-the-office staff access.

II. RESPONSIBILITIES

A. OCIO maintains all portable electronic device procurement fees and monthly service fees for:

  1. SES. 
  2. EMC (maximum of three employees per program area).
  3. Headquarters-level COOP and Crisis Action Team personnel.
  4. Recall management staff.
  5. OPACE recall leads (up to three employees).
  6. Designated OCIO personnel.

B. Program areas are responsible for funding Blackberry™ devices and services for the following employees:

  1. Program-level COOP personnel.
  2. All other roles and staff.

C. OCIO must review and approve all program area portable electronic device procurement requests prior to purchasing.

D. Employees must perform duties following The Standards of Ethical Conduct (5 CFR Part 2635.101(b)(5)).

E. OCIO manages telecommunications following DR 3300-001 and other related laws and regulations. (NOTE: Program areas are responsible for managing their wireless accounts and submitting an annual inventory report to the OCIO.)

F. Supervisors must ensure appropriate IT use within their organizations and should be proactive in speaking with employees about authorized use, and employees should talk with their supervisors about authorized IT use.

G. Portable electronic device use is a privilege. Supervisors or other appropriate Agency officials may revoke or limit this privilege at any time.

III. ACQUISITION JUSTIFICATION

Supervisors must ensure that portable electronic devices procured, support the employee’s responsibilities, related productivity, and responsiveness requirements.

IV. POLICY AND PROCEDURES ENFORCEMENT

OCIO approves new or replacement portable electronic device acquisitions and related service contracts for the program area staff. (NOTE: Program areas cannot procure devices that do not conform to the FSIS standard unless an exception is granted by OCIO.) Program areas must document exception requests and include supporting documentation.

A. Acquisition Procedures. Program areas must:

  1. Comply with policy and approval requirements when ordering a device or replacing an existing device.
  2. Follow the procurement ordering process after receiving approval(s).
  3. Review and promptly execute payment for monthly charges.
  4. Provide immediate access to the portable electronic device (for inspection, troubleshooting, forensic examination, etc.), including any passwords, upon OCIO’s written request.

B. Inventory and Property Management

  1. OCIO monitors portable electronic device usage.
  2. Program areas:

a. Ensure that staff members create a property record for all devices; recording the manufacturer, model number, serial number, assigned user, and telephone numbers.

b. Ensure that employees make equipment available for inventory.

c. Notify OCIO of user or equipment changes.

d. Provide an annual electronic inventory report to OCIO.

C. Standard Configuration.

  1. A portable electronic device is assigned to the position, not the person, and accounted for using inventory control. Return portable electronic devices to the accountable property officer when departing from your assigned position.
  2. A portable electronic device permits access to official e-mail and document attachments. Portable electronic devices are configured to work only with Government-owned computers.

D. Device Replacement. For replacement due to damage or malfunction, contact OCIO, FSIS Service Desk at 202–720–4016 (headquarter employees) or 800–473–9135 (field employees). If the device is lost or stolen, follow the instructions from Part One, subparagraphs VI. G. and H. OCIO will cancel the device from accessing FSIS networks and the device will be remotely erased of all content.

E. Blackberry™ Device Password Policy.

  1. Passwords must be five or more characters in length. Passwords with five characters must contain at least one letter and one number character
  2. Passwords with six or more characters are not required to contain a letter character.
  3. Passwords expire after 90 days
  4. Ten consecutive failed login attempts will automatically and entirely erase the information on the Blackberry™ device.

PART THREE—COMPUTER EQUIPMENT USE

OCIO funds IT equipment for the Agency by providing authorized employees with one computer loaded with the standard image. (NOTE: As desktop computers are replaced with laptop computers, the laptop computer will become the employee’s sole computer.) Authorized field employees will be issued a semi-rugged laptop loaded with the standard image. Employees who transfer to other positions within FSIS will take their assigned computer with them.

I. ACCEPTABLE USE

A. Personal. Employees may have limited personal use of Government office equipment during personal time, at no additional security or privacy risk to the Government. Such limited personal use is considered an authorized use of Government property (DR 3300-001). However, supervisors or other appropriate Agency officials may further restrict personal use based on office needs or inappropriate use in the office. Limited personal use involves:

  1. Minimal additional expense to the Government (examples: normal wear and tear, low electricity, ink, toner, or paper use).
  2. Use during the employee’s personal time (examples: weekends (if the employee has access to the work site), before and after work, lunchtime, or during scheduled break periods).
  3. No interference with the Agency mission or operations.
  4. FSIS standard software loaded games used during personal time as a learning tool to navigate the mouse, touchpad, or other input device.

B. General. Use of GOE that promotes general Agency-supported information sharing among employees is considered authorized use. In addition, employees may use GOE to communicate with recognized employee organizations. However, supervisors or other appropriate Agency officials may further restrict general use based on office needs or inappropriate use in the office. Acceptable general use involves:

  1. E-mailing announcements or fliers for recognition and award events where regulations permit the use of Government funds for the function.
  2. E-mailing announcements or fliers for FSIS employees leaving the Agency or retiring.

II. UNACCEPTABLE USE

Inappropriate use of GOE is prohibited. Inappropriate use includes:

A. Generating more than minimal additional expense to the Government.

B. Causing congestion, delay, or disrupted service to any Government system or equipment. EXAMPLES:

  1. Forwarding "chain" e-mails.
  2. E-mailing greeting cards.
  3. Using sites that require large broadband connections, such as large-size audio or video files not needed for work purposes.
  4. Downloading video, sound, pictures, or other large (greater than 500 kilobytes) file attachments.

C. Illegal or offensive activities. EXAMPLES:

  1. Pornography.
  2. Hate speech.
  3. Material that ridicules a person’s race, creed, religion, color, sex, disability, national origin, or sexual orientation.
  4. Unauthorized acquisition, use, reproduction, transmission, or distribution of any copyrighted material including software, music, videos, etc.

D. FSIS standard software loaded games used during working hours.

E. Using GOE for commercial or "for-profit" activities such as outside employment or personal business activity. EXAMPLES:

  1. Consulting for pay.
  2. Sales.
  3. Business administration transactions, such as sale of goods or services.
  4. Gambling.

F. Involvement in any outside activities. EXAMPLES:

  1. Fund-raising
  2. Endorsing products or services.
  3. Participating in lobbying events.
  4. Engaging in prohibited partisan political events. (EXCEPTION: The prohibition against engaging in political activity does not apply to Presidential appointees who have received Senate confirmation.)

III. GUIDELINES

A. Employees must not leave FSIS computers in an operational state while unattended. When leaving your computer system, manually lock the computer.

B. Files created or stored on a PC or a flash drive (personal or Government-owned) must be scanned often for virus protection prior to downloading files to a Government computer. Only approved external drives with hardware encryption or FIPS 140-2 compliant can access the government-owned computer.

C. All removable media devices, such as CDs, DVDs, removable hard drives, and thumb drives containing sensitive but unclassified information, including PII, are required to be encrypted at the FIPS 140-2 standard. Sensitive information stored on mobile devices other than laptops (examples: PDAs or Blackberry™ devices) will employ encryption whenever available. All mobile devices must be password protected.

D. Employees must not share their user ID or password with others.

E. EOE laptops and desktops cannot be connected to the FSIS network, either directly or through a VPN connection except for authorized use of SSL VPN by OCIO.

F. EOE portable electronic devices or PDAs cannot be connected to FSIS computers or networks.

G. Only GOE can be used to access the FSIS network or process FSIS sensitive-but-unclassified information.

H. All computer access points (serial, USB, FireWire®, infrared, Bluetooth, wireless Ethernet, etc.) are routinely monitored and controlled.

I. Limited storage of personal files on the computer is permitted. (EXAMPLE: An employee, during personal time, writes a letter to an insurance company, or updates their résumé.)

J. Personal files, including audio or video files, cannot be stored on FSIS network servers.

K. Audio or video files found on a local hard drive can be deleted without prior notice.

L. Employees must not download file-sharing software (examples: music, video file sharing, such as iTunes, Bit Torrent, IM, Napster, etc.), peer-to-peer software or games on GOE or FSIS network servers.

M. Unauthorized acquisition, use, reproduction, transmission, or distribution of any copyrighted material, including software, is strictly prohibited.

N. Employees must not install any software on GOE. Only an FSIS service desk or authorized IT specialist may install hardware and software to Agency computers, unless otherwise directed by OCIO.

O. Personal files, including photos and videos, are not to be used as screensavers or backgrounds on GOE.

P. Screensavers are not to be downloaded from the Internet. The FSIS standard image configured screensaver includes parameters for locking the computer after a prescribed time interval as a security feature and is not to be changed.

Q. All employees must complete all Federal and USDA mandated training (example: Security Awareness and Privacy training prior to receiving access to Agency IT resources).

IV. PASSWORD CONFIGURATION

A. Passwords must:

  1. Be a minimum of 12 characters in length.
  2. Not contain any dictionary words. (NOTE: Names that appear in a dictionary such as Jill, John, or Bill cannot be used.)
  3. Contain at least one capital and one lowercase letter, one number, and a non-letter character (examples: % and #). 
  4. Not be identical to the last 24 passwords.

B. Change passwords every 60 days.

V. FILE RETENTION

A. Employees are responsible for backing up all data files.

B. Save data files, (correspondence, spreadsheets, database files, etc.) to “My Documents” either to your local hard drive or to the FSIS network server.

C. Data files saved on the local hard drive or the FSIS network server, should be backed up to a diskette, flashdrive, or CD.

VI. ACQUISITION PROCEDURES

A. Program areas must obtain OCIO review and approval before:

  1. Purchasing IT equipment.
  2. Purchasing or entering into IT requirements gathering or development contracts with vendors without OCIO approval.

B. Hardware on the OCIO approved list does not require an RFC. To view  the current software and hardware list and documentation on the RFC process, visit  the IT Connection page in InsideFSIS at  https://inside.fsis.usda.gov/fsis/emp/static/global/offices/oSpace/ocioOffice/itConnection/ itConnection.jsp.

C. To order IT hardware, the program area requisitioner should:

  1. Log on to the FSIS network, open Internet Explorer, and go to http://service/footprints. Footprints is the single entry point for all IT procurements.
  2. Enter IT hardware request information into Footprints, regardless of cost, by selecting “Purchase Hardware” from the approved pick list and submit request. When IT hardware items are not on the approved list, the request is routed automatically to the CM team for further processing and presentation to the TCCB. (NOTE: Only program area requisitioners with purchasing ability will be able to see the “ORDER  PROJECT” within Footprints.)

PART FOUR—COMPUTER CONFIGURATION STANDARDS

I. STANDARDS

A. All Agency computers are loaded using the standard image for the specific computer model. Software not included in the standard image is considered supplemental and is not supported by FSIS. View the standard image list at (https://inside.fsis.usda.gov/fsis/emp/static/global/offices/oSpace/ocioOffice/itConnectio n/itConnection.jsp). Users must be authenticated through eAuthentication to access the list.

B. Only hardware and software approved by OCIO through the RFC process can be installed on Agency computers. This includes downloading trial software, commercial software, freeware, or upgrades from the Internet.

C. Only purchased and licensed software is installed on GOE. The software must be authorized and cannot conflict with the standard image. Loading software that deviates from the standard image is prohibited.

D. OCIO maintains FSIS purchased software and licensing documentation.

E. The minimum software for the desktop is Windows XP and Office XP.

F. The minimum software for the server operating system is Windows 2000.

G. The FSIS Service Desk does not support computers running any operating system other than Windows XP.

H. Software for personal use, Web browser plug-ins, and downloads from the Internet are not allowed unless reviewed and approved by TCCB.

I. Employees must use care when obtaining data from non-Agency sources. Occasionally, data could be packaged with embedded software. Such software can cause system problems. Contact the FSIS Service Desk at 202–720–4016 (headquarter employees) or 800–473–9135 (field employees) before accepting non-Agency software.

J. Employee-owned software is prohibited on GOE.

K. Employees must not install software or applications without approval from OCIO.

L. Employees must not alter or tamper with the system or security configuration of FSIS computer systems.

II. STANDARD IMAGE

A. OCIO establishes the standard software image after reviewing the Agency’s computing needs and the Federal and departmental requirements. The standard image contains the base software to meet user computing needs, and provides uniform usage and support.

B. The standard image selection focuses on:

  1. Individual software package quality.
  2. Functions where a package excels or falls behind its competitors, or special and common user needs.
  3. Complementary features and conversion ease among packages.
  4. Retraining costs.
  5. Future computer technology trends.

III. OPERATING PROCEDURES

A. OCIO maintains the following operations:

1. Destruction of Outdated Software. OCIO destroys outdated software and licenses. OCIO also erases installation disks and recycles the documentation.

2. Evaluation Software. Downloads for evaluations or software test copies from the Internet are not permitted without OCIO consent. FSIS service desk or authorized IT specialists may download an evaluation copy to a user’s computer only if:

  • There is an evaluation period expiration date.
  • OCIO has approved the installation of the software.

3. Migrating Unauthorized Software. In the migration of a Government computer, an FSIS service desk or authorized IT specialist assists the user in submitting an RFC for seeking authorization of the unsupported software package. The migration will take place without the unsupported software package if approval is not reached within 30 days.

4. Recycling Replaced Software. Software is not redistributed by program areas if replaced by newer packages. Such software is "recycled" within the OCIO library system. (NOTE: The Agency’s OCIO library system is a centralized location that houses the collection of media procured for GOE. The FSIS Service Desk maintains the library.)

  • A recycled software evaluation for requesters is based on the use and system requirements. Licensing remains centrally located and the documentation (manuals) is moved to the new user.
  • Upgraded software versions that require the original software for installation are maintained with the original software and license.

B. FSIS service desk or authorized IT specialists perform new upgrade installations to maximize installation standardization, and minimize potential problems and hazards.

IV. NEW SOFTWARE

A. OCIO funds new Enterprise-level software packages only.

B. OCIO does not fund supplemental software.

C. To order software, see Part Three, subparagraph VI. C. 1-2.

D. TCCB evaluates new software requests based on documented business needs, system requirements, compatibility with the standard image, and compliance with Federal and Departmental policies. Based on the evaluation, the TCCB:

  1. Recommends an alternate software package.
  2. Advises the user that the requested software is approved for purchasing.

E. When approved, the user orders the software following the appropriate procurement process.

F. An FSIS service desk or authorized IT specialist loads the supplemental software.

  1. If a problem occurs with the supplemental software that affects the standard image, the specialist will reload the standard image to fix the problem.
  2. OCIO maintains original installation diskettes or software and licensing documentation for security and legal reasons. The FSIS service desk or authorized IT specialist keeps copies of rescue diskettes and other software, and where possible, the user maintains software documentation (manuals) for training purposes.

V. RELOADING SUPPLEMENTAL SOFTWARE

A. When GOE fails and the user maintains supplemental software, the FSIS service desk or authorized IT specialist can reload the operating system if the software

  1. More Than 3 Years Old and The Software Is Available. The FSIS service desk or authorized IT specialist reloads the software and informs the user to purchase the most recent version of the software within 30 days.
  2. Less Than 3 Years Old and The Software Is Available. The FSIS  service desk or authorized IT specialist reloads the software and stores the media in the central repository within OCIO.

B. If the user or the FSIS Service Desk does not have the software, the application is not reloaded. The FSIS service desk or authorized IT specialist assists the user in reordering the software. The FSIS service desk or authorized IT specialist loads the software when it arrives and maintains the media in the central repository within OCIO.

PART FIVE—INTERNET USE

I. BACKGROUND

The Internet provides FSIS employees the opportunity to locate and use current and historical data from multiple sources worldwide in their decision-making processes. These networks subscribe to a common set of standards and protocols. Users have worldwide access to Internet hosts and their associated applications and databases. Employees are expected to use the Internet to improve their job knowledge or access scientific, technical, and other information relevant to the Agency’s mission.

II. RESPONSIBILITY

A. User Responsibility. GOE is for official use and authorized purposes. Use serves as consent to security monitoring of any type. This includes incidental and personal uses, whether authorized or unauthorized. The expectation of privacy or confidentiality does not apply in your use of FSIS access to the Internet.

  1. Employees are expected to communicate electronically in a manner that reflects positively on themselves and on the Agency.
  2. Employees who accidentally access an unacceptable Web site must not open the site. Click out of the site and immediately close the browser.
  3. Employees must not engage in any unlawful activity.
  4. Employees must not imply that they are acting in an official capacity when using GOE for non-Government purposes.
  5. . Employees must not engage in any activity that would compromise the security of any Government host computer or FSIS network.
  6. Employees must not disclose or share log-in passwords with others.
  7. Employees must not download file-sharing software (examples: music, video file sharing software such as iTunes, Bit Torrant, IM, Napster, etc.), peer- to-peer software, games, or copyrighted material on GOE or FSIS networks.

B. Supervisory Responsibility. Supervisors have final authority in determining whether an employee requires Internet access to accomplish assigned duties. The supervisor will:

  1. Authorize Internet access to FSIS employees in order to conduct the official business of the Agency.
  2. Provide guidance on proper Internet use according to this directive.
  3. Advise employees of the restriction against personal use of Agency Internet access resources from other than departmental or partner facilities.
  4. Determine the appropriateness of their employees’ use of the Internet. This includes the acceptability of Internet sites visited and the determination of personal time versus official work hours.

III. USE

A. Internet access can provide significant performance benefits for the Agency. However, there are significant legal, security, and productivity issues related to Internet use. EXAMPLES:

  1. Transmitting computer viruses and malware from Internet sources.
  2. Consuming limited disk storage space with downloaded information from the Internet onto FSIS network drives and users’ computers.
  3. Eavesdropping of employees transmissions by hackers (example: this might include passwords, sensitive data, or correspondence).
  4. Breaching data security, confidentiality, and intellectual property rights.

B. Computer equipment use and Internet access to accomplish job responsibilities has priority over personal use.

C. Employee participation during non-work hours in news groups, chat sessions, and e-mail discussion groups is permitted if these sessions have a direct relationship to the user's job. If personal opinions are expressed, a disclaimer stating that this is not an official position of the Agency must be included.

D. Video and voice files should only be downloaded from the Internet when they serve an approved Agency function.

E. Personal files obtained via the Internet may not be stored on FSIS networks.

IV. WIRELESS POLICY

FSIS employees in official travel status or telecommuting may use wireless Internet access services provided the following conditions are met:

A. Employees must use GOE when accessing the FSIS network.

B. The Government incurs no additional expense.

C. VPN client must be activated and used when accessing the FSIS network.

D. Internet Service Provider access software not authorized by OCIO cannot be installed on the Government issued computer.

E. Virus and malware protection must be up-to-date.

I. GUIDANCE

Employees using Government-owned or -leased equipment consent to security  monitoring, for incidental and personal uses, whether authorized or unauthorized. There is no privacy or confidentiality when using Government e-mail systems. E-mail messages are departmental property, not personal property. Privacy and confidentiality are expectations that do not apply to e-mail messages (stored, retrieved, or exchanged).

A. FSIS provides an e-mail system to enhance productivity. E-mail messages must:

  1. Meet the same standards for distribution or display as if they are tangible documents or instruments.
  2. Not contain messages, postings or materials that serve to abuse, insult, intimidate, threaten or harass others. Do not send e-mails to create an intimidating, hostile, or offensive environment.
  3. Clearly and accurately identify the sender.
  4. Not conceal or misrepresent the sender’s name or affiliation in an effort to dissociate the sender from responsibility for their action. It is inappropriate  to alter the e-mail source, message, or posting.
  5. Ensure the following information is shown in the signature line of all e-mail messages sent, replied to, or forwarded:
  • Name and title.
  • Department, Agency, division, and branch.
  • Mailing address.
  • Telephone number, facsimile number, and e-mail address.

B. Do not access any mailbox other than your own without authorization. If circumstances arise and someone else’s mailbox requires access, submit a request for authorization to the Information System Security Program Manager, OCIO via Outlook  at OCIO Security Operations Center.

C. Remain sensitive to inherent limitations of shared network resources. No computer security system can prevent a determined person from gaining unauthorized access to sensitive information. The Agency cannot guarantee electronic document privacy and confidentiality.

D. Ensure you know and understand the guidelines and policies of an electronic message board or social media site before sending or replying to a message. If you subscribe to an electronic discussion list, or set up a social media account, always  ensure that you know how to unsubscribe from that list, and do so when you no longer have use for the information.

E. Refrain from forwarding e-mail messages without a legitimate business purpose under circumstances likely to:

  1. Embarrass the original sender.
  2. Violate the sender’s clearly expressed desire to restrict additional dissemination.

F. Do not use e-mail to violate FSIS policy, regulation, or the rights of another. This abuse is subject to restricted e-mail and network access privileges and appropriate disciplinary action.

G. Do not put Government telecommunication systems to uses that would reflect adversely on USDA or FSIS. Such uses that could reflect adversely are:

  1. Pornography.
  2. Playing on-line games.
  3. Private business.
  4. Chain letters.
  5. Unofficial advertising, soliciting, or selling except on authorized bulletin boards established for such use.
  6. Violations of statute or regulation.
  7. Inappropriately handled sensitive information.
  8. Gambling.
  9. Hate-oriented sites.
  10. Other uses that are incompatible with public service.

H. Do not overburden the telecommunications system (such as sending broadcasts and group meetings).

I. Exercise caution when sending large messages to lists that may have hundreds of employees, and refrain from repeatedly sending or forwarding large messages or files (such as pictures or large attachments greater than 500 kilobytes) that will overburden the network.

II. E-MAIL RETENTION

A. Conserve the e-mail system. Be responsible for the content and maintenance of your e-mail box.

1. Check your e-mail frequently.

2. Delete unwanted messages immediately since they consume disk storage.

3. Keep retained e-mail messages in your e-mail box to a minimum.

4. Reduce the use of attachments when possible and enter the text directly into the e-mail message to eliminate additional steps.

5. Archive your messages by moving them from your mailbox to an Outlook personal storage folder file (.PST). To create an Outlook Personal Folder (PST File), from your inbox:

  • Click Tools, Options, Mail Setup Tab.
  • Click the Data files button.
  • Click the Add button.
  • Highlight Office Outlook Personal Folders File (.pst) and click OK. 
  • In the Create or Open Outlook Data File window, type a descriptive name for the personal folder (or accept the default name). Click OK.
  •  In the Create Microsoft Personal Folders window, type a descriptive name for the personal folder (or accept the default name). Click OK. 
  • Click Close.
  • Click OK. (NOTE: The personal folder should appear in your Folder List window on the left side of the screen.)

6. Store the .PST file on your computer hard drive and save a backup  copy on a DVD or flash drive.

B. OCIO uses a departmentally recognized process that follows DR 3080-001 to store all incoming and outgoing e-mail that transverse the FSIS network.

III. AUTOMATICALLY FORWARDED E-MAIL MESSAGES

A. FSIS does not permit auto-forwarding mail sent to your Agency e-mail address box.

B. Reasons for not permitting auto-forwarding include:

  1. Carelessness in creating and managing mailbox-forwarding rules can cause significant harm to the server and result in the loss of e-mail service to  employees.
  2. FSIS uses the fsis.usda.gov mail address to document official  communication. FSIS employee e-mail addresses are registered to the FSIS e-mail directory, which enables traceability. In a dispute, e-mail that is auto-forwarded out of the FSIS domain cannot be used to defend a complaint against the Agency.

IV. IM

IM encompasses peer-to-peer applications that pose a significant threat to the FSIS network. IM use and downloading are prohibited on GOE. (See DM-3525-002.) Peer-to-Peer software and other programs that perform IM functions have no departmental business need and must not be loaded on workstations or equipment used to conduct official USDA business.

V. MULTI-RECIPIENT E-MAILS

Guidelines for approval when requesting a multi-recipient e-mail message.

A. Examples of what can be included:

  1. Departmental issuances such as event announcements, street closings, shuttle service, or fire drills.
  2. Health service messages such as blood testing and Employee Assistance Program services.
  3. Federally sponsored groups.
  4. Fliers for employees retiring or leaving the Agency.

B. Examples of what cannot be included:

  1. Ads for sale of items.
  2. Leave donor requests

C. Identify the following information with the request:

1. Before submitting a request for approval, classify the message as:

a. Announcement.

b. Memorandum.

c. Event.

d. Informational.

e. Reminder.

2. Submit a Footprints ticket at http://service/footprints to publish an announcement. If the message contains special formatting, attach the text (example: Word document) to the Footprints ticket. Do not type the message text directly in the Footprints ticket.

3. Allow 1 full business day when requesting to publish an announcement.

4. Provide a contact for replies in the message.

5. Provide the subject and corresponding text for all entries.

6. Limit the use of attachments, whenever possible. If an attachment contains just text, cut and paste it into the message body.

D. Provide the distribution list(s) of recipients to receive the message (example: All Users).

  1. Review text for typographical errors.
  2. State whether or not there is an attachment.
  3. Keep graphics to a minimum.
  4. Total message size must be less than 500 kilobytes. The size of a message can be determined by adding the ‘Size’ column header to your existing Inbox  column header row. From your Inbox:

a. Put the cursor on top of the ‘From” column header and right click once.

b. Click on “Customize Current View.”

c. Select “Fields.”

d. Select “Size” from the Available Fields column.

e. Select “Add” and click OK.

E. Use the following standards for all broadcast messages:

  1. Font – Sans Serif.
  2. Font Size – 12.
  3. Font Color – Black.

VI. MULTI-EMPLOYEE DISTRIBUTION LISTS

Users may send to distribution lists for their own program area. (EXAMPLE: OM users can send to the OM list or to any OM division distribution list.) However, OM users  cannot send to any other program area or divisional lists (example: OFO).

VII. E-MAIL SIZE CONSTRAINTS AND CONTENTS

To manage the distribution of available resources within FSIS’ network, the following is required:

A. Except for multi-recipient e-mail messages, messages must be less than 20 MB in size. Some field employees use dial-up access and downloading large documents is problematic.

B. Documents in any standard software package are acceptable (examples: Word, Excel, etc).

C. Messages should be straight text without graphics. Do not add signature images or logos. Use /s/ rather than a signature image. NOTE: Some users access email via personal electronic devices that can only view Microsoft and Excel documents.

D. Do not use color, pictorial, or animated backgrounds in your messages.

E. Animated icons called Emoticons contain Spyware. Never download or add animated Emoticons to your e-mail messages.

F. Use Portable Document Format files to assure that employees do not alter file contents.

PART SEVEN—REIMBURSEMENT POLICY FOR BROADBAND SERVICES

I. POLICY

It is FSIS policy to:

A. Restrict access to the FSIS network from EOE. EOE connected to the FSIS network is not authorized or supported.

B. Deny reimbursement for employees’ additional telephone lines of broadband connection costs unless covered under paragraph III.

C. Deny broadband reimbursement for employees with Blackberry™  tethering capability or who have EVDO wireless cards.

II. AGENCY RESPONSIBILITIES

The Agency:

A. Ensures that FSIS-approved computer software and security patches are  applied correctly.

B. Supports a direct-wired or broadband card connection between broadband  services and FSIS-owned computers. (NOTE: The Agency, including the FSIS Service Desk, will not support the use of EOE, routers, or services used as part of a home network.)

C. Reviews, approves, and submits the completed SF-1164 within 45 calendar days for payment. (See paragraph IV.)

III. ELIGIBILITY FOR BROADBAND REIMBURSEMENT

Reimbursement of broadband costs will be provided by OCIO only for the following  employees:

A. SES.

B. Recall management staff.

C. Headquarters – level COOP only.

D. EMC (maximum of three employees per program area).

E. OPACE (maximum of three recall employees).

IV. REIMBURSEMENT PROCEDURES

A. Reimbursement Requests. Approved employees (see paragraph II.)  must be submitted within 60 calendar days after the end of the quarter.

B. Reimbursement Submission. Approved employees (see subparagraph III.) must complete an SF-1164 and attach the original cable, modem,  or DSL bill. If unable to locate and send an original bill, obtain a copy, sign and date it, and include the statement “in lieu of original” on it. Send the SF-1164 and the bill(s) to:

  • USDA FSIS OFFICE OF CHIEF INFORMATION
  • OFFICER (OCIO)
  • ROOM 4452 SOUTH BUILDING
  • 1400 INDEPENDENCE AVENUE SW
  • WASHINGTON DC 20250–3700

C. Reimbursement Criteria

  1. Reimbursement is limited to eligible employees that have DSL or cable modem broadband connectivity. The reimbursement charges only include  the service charge and rental fees for the modem. The total reimbursable charge cannot exceed $70 per month.
  2. Only one startup installation charge will be reimbursed per employee, per year, except on a case-by-case basis with prior OCIO approval.
  3. Either Blackberry™ tethering or wireless card services are provided, if available, in lieu of reimbursement for broadband service.
  4. Reimbursement will not be permitted if tethering or wireless cards are provided to employees.

V. RESTRICTIONS FOR EOE

A. EOE connected to federally reimbursed broadband is permitted for personal use, if the broadband use:

  1. Involves no additional expense to the Government.
  2. Does not violate security policies or pose a security risk for the Agency.
  3. Does not interfere with official business.

B. EOE can never be used to connect to the FSIS network.

PART EIGHT—FSIS WIRELESS SERVICE ACQUISITIONS

FSIS promotes the most cost-effective use of commercial wireless mobile  communications and encourages coordinated acquisition planning and shared usage plans to reduce costs where feasible.

I. ELIGIBILITY FOR WIRELESS SERVICE FUNDING OR REIMBURSEMENT

A. OCIO only funds or reimburses Blackberry™ tethering or EVDO wireless card service costs for the following employees:

  1. SES.
  2. Recall management staff.
  3. Activated headquarters-level COOP and Crisis Action Team personnel.
  4. EMC (maximum of three employees per program area).
  5. OPACE recall leads (up to three employees).
  6. Designated OCIO personnel.

B. Program areas are responsible for funding Blackberry™ tethering or EVDO wireless card service costs for the following employees:

  1. Non-activated headquarters-level and COOP personnel.
  2. All other roles and staff.

II. APPLICABILITY

Part Eight of this directive applies to all:

A. Commercial wireless devices, services, and technologies that transmit voice and data.

B. FSIS employees authorized to use EVDO communications or Blackberry™ tethering capability for business operations.

III. PROVISIONS

A. The program area:

  1. Provides funding for Blackberry™ tethering or EVDO wireless service costs requested for their employees. (NOTE: There is a limited activation of three EVDO cards per day. This ensures that the FSIS service desk team can  effectively manage callers requiring EVDO activation assistance.)
  2. Must immediately report lost or stolen EVDO cards by following the  instructions under Part One, subparagraphs VI. G. and H. Service provided for lost or stolen EVDO cards will be terminated.
  3. Must immediately request cancellations for EVDO card service by creating a Footprints Request ticket via the Intranet at http://service/footprints.

B. The TB:

  1. Maintains a loaner pool of 10 EVDO cards (cards without service). Service is activated on loaner EVDO cards on an as-needed basis. EVDO loaner cards are funded by OCIO. Requests for loaner cards require CIO approval prior to  issuance. The maximum time limit for a loaner EVDO card is 30 days.
  2. Terminates service provided for lost or stolen EVDO cards.
  3. Orders new and replacement EVDO cards.

IV. ACQUISITION JUSTIFICATION

A. Supervisors must ensure that the service procured is justified, technically effective, appropriately managed, and meets one of the following criteria:

  1. An employee who works 3 or more days per week away from their fixed office (example: frontline supervisors).
  2. A member of the Recall Management Staff.
  3. A member of the EMC.
  4. An employee who is in a service capacity and must be accessible 24 hours a day, 7 days a week.

B. Employees who meet at least one of the criteria listed in subparagraph IV.  A.1-4 and have been issued a Blackberry™ (previously funded by the program office) will be offered Blackberry™ tethering. An EVDO card will be ordered if the tethering service feature is not available through the Blackberry™ device.

V. PROCEDURES FOR OBTAINING SERVICES WHEN FUNDED BY THE PROGRAM AREA

Requests for program funded commercial EVDO or Blackberry™ tethering  communication services for employees are processed as follows:

A. The program area office prepares a completed Form AD-700. Include the following information on the AD-700:

  1. Name of the employee requiring the service.
  2. Type of service requested (EVDO card or tethering).
  3. Work and home address of the employee requiring the service.
  4. Estimated monthly cost for the service requested.
  5. Management code used to fund the monthly service.
  6. Provide justification for service requirement that meets one of the criteria listed in subparagraph IV. A. 1-4

B. The program area office submits a completed Form AD-700 to the TB, OCIO, via fax at 202–690–3738, or scans and e-mails to TelecommunicationsTeam@fsis.usda.gov. (NOTE: The cost of the service must be paid by the requesting program area office.)

C. A service provider will be selected by the TB based on the best available service coverage.

VI. PROCEDURES FOR OBTAINING SERVICES WHEN FUNDED UNDER THE PUBLIC HEALTH DATA INFRASTRUCTURE CONSOLIDATION SYSTEM

Requests for commercial EVDO services and cards for OFO fixed and patrol inspection assignments are processed as follows:

A. As new assignments are established, the RMS within each OFO DO must submit requests by creating a Footprints Request ticket via the Intranet at  http://service/footprints.

B. The RMS must provide the following information in a Footprints Request ticket:

  1. Assignment number associated with the EVDO service or card request.
  2. Address for each establishment covered within the assignment number.
  3. Name of the Federal inspector working the assignment number.
  4. Whether the location is a fixed establishment location or patrol assignment. 

C. The DO must issue only one EVDO card per fixed establishment location or patrol assignment.

D. The EVDO cards will be shipped to the requesting DO address.

E. The requesting RMS will deliver the EVDO card to the FSIS inspector and update the FSIS Microsoft SharePoint Web site with all changes to the EVDO card assignment database.

F. The RMS will report patrol or fixed assignments that become vacant by creating a Footprints Request ticket. EVDO services for assignments remaining vacant for more than 30 days will be suspended until the vacancy is filled by the DO. The DO will maintain the EVDO cards that have suspended service.

VII. ACTION BY THE TB

The TB:

A. Processes the AD-700 within 3 business days.

B. Activates the tethering feature within 72 hours after the AD-700 is approved.

C. Creates and sends a Footprints Request ticket to the employee when the tethering feature is activated. The ticket will contain the installation instructions to launch the tethering service on the Blackberry™ device. For additional assistance, the employee can reply to the Footprints Request ticket requesting assistance.

D. Updates the FSIS SharePoint Web site with changes to the EVDO card assignment database.

E. Verifies the availability of the requested service at the location specified on the AD-700.

F. Ships EVDO cards to the requesting office address provided on the AD-700.

VIII. ADDITIONAL INFORMATION

FSIS continues to progress in replacing computer dial-up connections used by FSIS  field personnel with high-speed telecommunication lines. (NOTE: Not all food  production establishments are located in areas that have ready-access to hard-wired, high-speed services. For those locations, FSIS is implementing EVDO mobile wireless  broadband service where available.)

A. Provisions for FSIS field EVDO services under the Public Health Data Infrastructure Consolidation System are:

  1. Limited to Federal inspection locations or assignments.
  2. Only available to Federal employees in OFO working at fixed establishment locations or on patrol inspection assignments.

B. The goal of the Public Health Data Infrastructure Consolidation System broadband sites is to provide one dedicated Internet connection, replacing dial-up at fixed establishment locations or one location on patrol inspection assignments.

See full PDF for attachments

  • DEFINITIONS
  • USDA.gov
  • USA.gov
  • Whitehouse.gov
  • About Us
  • Our Performance
  • Information Quality & Publishing Schedule
  • Visit OIG
  • FOIA
  • Accessibility Statement
  • Privacy Policy
  • Non-Discrimination Statement
  • Plain Writing
  • No FEAR
  • Significant Guidance

Food Safety and Inspection Service

  • Pinterest
  • Twitter
  • Facebook
  • GovDelivery
  • Instagram
  • Flickr
  • YouTube
  • Linked In
  • RSS
.

Start your search

Popular Topics

Recalls Import & Export FSIS Directives FSIS Guidelines Petitions