OMB Seal
Welcome to the Executive Office of the President Office of Management and Budget (OMB)
White House Seal
OMB Home Page
White House Home Page
  Site Search     
First Blue StarSecond Blue Star Third Blue Star Fourth Blue Star
 
Printer-Friendly Version
About OMB
Blue Bullet  Organization Chart
Blue Bullet  Contact OMB
President's Budget
Blue Bullet  Budget Documents
Blue Bullet  Supplementals, Budget
Amendments, and Releases
Federal Management
Blue Bullet  President's Management
Agenda
Blue Bullet  Office of Federal Financial
Management
-- Agency Audits
Blue Bullet  Office of Federal Procurement
Policy
-- CAS Board
-- FAIR Act Inventory
Office of Information and
Regulatory Affairs
Blue Bullet  OIRA Administrator
Blue Bullet  Regulatory Matters
Blue Bullet  Paperwork Requirements
Blue Bullet  Statistical Programs & Standards
Blue Bullet  Information Policy, IT & E-Gov
Communications & Media
Blue Bullet  News Releases
Blue Bullet  Speeches
Legislative Information
Blue Bullet  Statements of Administration
Policy (SAPs)
Blue Bullet  Testimony
Blue Bullet  Reports to Congress
Information for Agencies
Blue Bullet  Circulars
Blue Bullet  Memoranda
Blue Bullet  Bulletins
Blue Bullet  Privacy Guidance
Blue Bullet  Grants Management
Blue Bullet  Reports
Site Map
First Gov Link
egov link

Image of OMB Letterhead

M-04-26

September 8, 2004

MEMORANDUM FOR CHIEF INFORMATION OFFICERS

FROM: Karen S. Evans
Administrator, IT and E-Gov

Image of Karen S. Evans' signature
SUBJECT: Personal Use Policies and “File Sharing” Technology

The purpose of this memorandum is to detail specific actions agencies must take to ensure the appropriate use of certain technologies used for file sharing across networks. These actions are based on recommended guidance developed by the CIO Council in 1999. The effective use and management of file sharing technology requires a clear policy, training of employees on the policy, and monitoring and enforcement.

Background

A type of file sharing known as Peer-to-Peer (P2P) refers to any software or system allowing individual users of the Internet to connect to each other and trade files. These systems are usually highly decentralized and are designed to facilitate connections between persons who are looking for certain types of files. While there are many appropriate uses of this technology, a number of studies show, the vast majority of files traded on P2P networks are copyrighted music files and pornography. Data also suggests P2P is a common avenue for the spread of computer viruses within IT systems.

Federal computer systems or networks (as well as those operated by contractors on the government's behalf) must not be used for the downloading of illegal and/or unauthorized copyrighted content. It is important to ensure computer resources of the Federal government are not compromised and to demonstrate to the American public the importance of adopting ethical and responsible practices on the Internet.

The CIO Council has issued recommended guidance on “Limited Personal Use of Government Office Equipment Including Information Technology.1” Examples of inappropriate personal use include “the creation, download, viewing, storage, copying, or transmission of materials related to illegal gambling, illegal weapons, terrorist activities, and any other illegal activities or activities otherwise prohibited” and “the unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled information including computer software and data, that includes privacy information, copyrighted, trade marked or material with other intellectual property rights (beyond fair use), proprietary data, or export controlled software or data.”

Direction to Agencies

Effective use and management of file sharing technology requires a clear policy, training of employees on the policy, and monitoring and enforcement. Specifically, agencies are directed to:

  1. Establish or Update Agency Personal Use Policies to be Consistent with CIO Council Recommended Guidance.

OMB expects all agencies to establish personal use policies, consistent with the recommended guidance developed by the CIO Council. Agencies who have not established personal use guidance should do so without delay, but no later than December 1, 2004.

  1. Train All Employees on Personal Use Policies and Improper Uses of File Sharing

Agencies’ IT security or ethics training must train employees on agency personal use policies and the prohibited improper uses of file sharing. Training must be consistent with OMB Circular A-130, appendix III paragraph (3)(a)(b) which states agencies must “ensure that all individuals are appropriately trained in how to fulfill their security responsibilities […]. Such training shall assure that employees are versed in the rules of the system, be consistent with guidance issued by NIST and OPM, and apprise them about available assistance and technical security products and techniques.”

On October 6, 2004, as part of the agency annual reports required by Federal Information Security Management Act of 2002 (FISMA) described in OMB Memorandum 04-25, FY 2004 Reporting Instructions for FISMA2 agencies must report whether they provide training regarding the appropriate use of P2P file sharing.

  1. Implement Security Controls to Prevent and Detect Improper File Sharing

As required by FISMA, agencies are to use existing NIST standards and guidance to complete system risk and impact assessments in developing security plans and authorizing systems for operation. Operational controls detailing procedures for handling and distributing information and management controls outlining rules of behavior for the user must ensure the proper controls are in place to prevent and detect improper file sharing.

Again, OMB recognizes there are appropriate uses of file sharing technologies, but as with all technology it must be appropriately managed.

If you have any questions regarding this memorandum, please contact Jeanette Thornton, Policy Analyst, Information Policy and Technology Branch, Office of Management and Budget, phone (202) 395-3562, fax (202) 395-5167, e-mail: jthornto@omb.eop.gov.

 

Line to separate text from footnotes

1 http://www.cio.gov/documents/peruse_model_may_1999.pdf (May 19, 1999)

2 http://www.whitehouse.gov/omb/memoranda/fy04/m04-25.pdf (August 23, 2004)