Security Officer Responsibilities
The User’s Computer System Security Officer will:
- Obtain organization and/or owner authorization approval(s) and request user identifications (IDs) according to the user’s computer system security policy.
- Submit the request for access to CLER to NFC ’s CLER Operations.
- Suspend user IDs upon the employee’s termination or assignment change.
- Notify NFC of any changes in the authority or of the termination of an employee in their organization.
- Consult with NFC ’s CLER Operations on security matters related to the use of NFC ’s facilities.
- Monitor users’ activity for access violations.
NFC ’s Computer System Security Officer will:
- Grant authority to use/access the computer facilities based on OPM ’s authority and the user’s requirements.
- Establish, control, and maintain user ID.
- Log all unauthorized access attempts and furnish reports to the respective user computer system security officer for appropriate action.
- Monitor security concerns of OPM and the user computer system security officer related to NFC ’s facilities and resources.
See Also |