HomeNewsCommentariesDisplay

User responsibilities regarding information systems use

SHAW AIR FORCE BASE, S.C. – -- The growing reliance on automated information systems by the Air Force is evident today. This reliance requires the implementation of protocols guiding information systems use.

To reference your responsibilities regarding the use of computers, utilize Air Force Mandate 33-152: User Responsibilities and Guidance for Information Systems. This article serves to provide Airmen a brief synopsis of user responsibilities outlined in the aforementioned AFMAN.

The most common way to distribute information efficiently is with electronic messaging (e-mail). We send hundreds of e-mails every week, which is why we must abide by certain rules concerning instant messaging. Following these guidelines will increase network efficiency.

E-mail practices that significantly reduce the speed of the network include: using the “reply to all” function when not necessary, sending large attachments to personnel, and using the mail distribution list to send miscellaneous messages. Alternatives to these inefficient e-mail practices are as follows: Do not use the reply all function unless absolutely necessary, make files publicly available on a SharePoint or on a shared drive to eliminate the need to send large attachments, and use the mailing distribution list responsibly.

The following protocols are in accordance with AFMAN 33-152 Section 6.2: Air Force Messaging.

Data encryption is vital in maintaining the confidentiality of sensitive information. However, using encryption carelessly has negative consequences for network efficiency. Encryption increases bandwidth and data allocation therefore it should only be used to protect For Official Use Only, Privacy Act information, and other sensitive data. Use data encryption only when necessary. This protocol is in accordance with AFMAN 33-283 Section 6.6.2: Encrypting.

If you are unsure if an e-mail contains sensitive information, consult your immediate supervisor for guidance. This practice will ensure that everyone is doing his or her part to protect the security and performance of the network.