CONTRACT 5699 Memorandum of UnderstandingAgreement No. 5699
Memorandum of Agreement
between the
City of El Segundo
and the
N
ff
Federal Emergency Management Agency
Integrated. Public Alert and Warning System
(IPAW"S) Program Management Office
Regarding the use of:
City of El Segundo
Interoperable System(s)
and
IPAWS OPEN Platform for Emergency Network
(IPAWS-OPEN)
Version 4.2
22 Jul 2019
WARNING: This document is FOR OFFICIAL USE ONLY (FOUO). It contains information that may be exempt
from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled,
transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information and is not to
be released to the public or other personnel who do not have a valid "need -to -know" without prior approval of the
FEMA Integrated Public and Warning System and the FEMA Disclosure Offices.
1
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
MEMORANDUM OF AGREEMENT
1.0 SUPERSEDES: CA City of El Segundo—MOA-1
`4[1 Q II ITO r]1Li1041CI
The purpose of this memorandum is to establish a management agreement between the City of El Segundo
hereinafter referred to as the Collaborative Operating Group (COG), and the Federal Emergency Management
Agency (FEMA) IPAWS Program regarding the utilization and security of City of El Segundo Interoperable
System(s) (as shown in Appendix A), which interoperate with the IPAWS-Open Platform for Emergency Networks
(IPAWS-OPEN). The expected benefit is to enable information interoperability across emergency response
organizations and systems as intended by the FEMA IPAWS Program.
This agreement will govern the relationship between the Collaborative Operating Group and FEMA, including
designated managerial and technical staff and system users associated with the aforementioned COG. As indicated
within the terms of this agreement, both parties agree to allow system interoperability through the use of SOAP over
HTTPS via the public internet. Under this agreement, no direct or networked connection using VPN (or equivalent
technology) between the systems named in Appendix A and IPAWS-OPEN is allowed. In the event a direct
connection is required, an Interconnection Security Agreement must be executed.
3.0 AUTHORITY
The authority for this agreement is based on the Communications Act of 1934, as amended (47 U.S.0 § 606) and the
implementation of regulation 47 C.F.R § 11 which establishes the statutory basis under which the FEMA IPAWS
Program operates emergency alerting systems. In addition, Executive Order 13407 of June 26, 2006, Public Alert
and Warning System Executive Order states, "It is the policy of the United States to have an effective, reliable,
integrated, flexible, and comprehensive system to alert and warn the American people... establish or adopt, as
appropriate, common alerting and warning protocols, standards, terminology, and operating procedures for the public
alert and warning system to enable interoperability and the secure delivery of coordinated messages to the American
people". In response, FEMA established the IPAWS Program Management Office (PMO) in April 2007.
4.0 BACKGROUND
It is the intent of both parties to this agreement to establish and utilize a standardized web based application interface
(as defined by the IPAWS-OPEN Web Service Interface Design Guidance) between the information technology (IT)
systems shown below to facilitate the exchange of emergency messages within the production environment. The
testing of the interoperability of these systems has been performed through the use of FEMA's Test and Development
environment to ensure the transference and receipt of emergency messages using approved messaging standards. The
interoperability between these systems is supported by the use of SOAP over HTTPS via the public internet.
5.0 COMMUNICATIONS
Frequent formal communications are essential to ensure the successful management and operation of system
interoperability. Both parties agree to maintain open lines of communication between designated staff (as indicated in
Appendix B) at both the managerial and technical levels. All communications described herein must be conducted in
writing and may be disseminated by electronic means unless otherwise noted.
The owners of the respective systems agree to designate and provide contact information for technical leads for their
respective systems, and to facilitate direct contacts between technical leads to support the management and operation
of system interoperability. To safeguard the confidentiality, integrity, and availability of the systems and the data they
store, process, and transmit, both parties agree to provide notice of specific events within the timeframes indicated
below:
• Security Incidents: Technical, administrative and/or help desk staff will immediatelv notify their designated
counterparts by telephone or e-mail when a security incident(s) is detected and/or a violation of the Rules of
Behavior (see Appendix C) has been identified. Both parties agree to make the appropriate technical and
administrative individuals available for all necessary inquiries and/or investigations. Containment and/or
2
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
resolution procedures will be documented by the identifying party and after action reports generated and
submitted to the system owner and/or designated security officials within five (5) business days after detection of
the incident(s).
• Disasters and Other Contingencies: The FEMA IPAWS Program Office will notify the COG by telephone, e-
mail or other acceptable means in the event of a disaster or other contingency that disrupts the normal operation
of IPAWS-OPEN.
• System Interconnections: This MOA is intended for systems interoperating with IPAWS-OPEN using SOAP
over HTTPS via the public Internet. If in the future, an interconnection (i.e. dedicated system -to -system
connection) is required to IPAWS-OPEN, this MOA must be updated and an Interconnection Security
Agreement (TSA) must be executed. If a change in status from interoperating to interconnected system is
required, the initiating party will notify the other party at least 3 months before the planned interconnection is to
be in place.
• Discontinuation of Use: In the event the use of IPAWS-OPEN is no longer required, the COG agrees to
immediately notify, in writing, the FEMA IPAWS Program Office at which time the COGID and associated
access credentials will be deactivated.
• Personnel Changes: Both parties agree to provide notification of changes to their respective system owner or
technical lead. In addition, both parties will provide notification of any changes in the point of contact
information provided in Appendix B. All relevant personnel changes and changes to contact information must
be provided within 5 business days of the change.
6.0 TYPE OF INTERCONNECTIVITY
Both parties agree that the COG will utilize only the assigned COGID, associated credentials and digital certificates
provided by the FEMA IPAWS Program Office to support interoperability between the system(s) listed in Appendix
A and IPAWS-OPEN. In addition, all interoperable systems must be configured to interface with IPAWS-OPEN over
the public Intemet using only approved web service standards and associated requirements. A listing of approved
web service standards and supporting requirements can be obtained from the IPAWS-OPEN Web Service Interface
Design Guidance document.
In the event, a dedicated connection is required, both parties will agree to negotiate and execute an Interconnection
Security Agreement (ISA) as required per Department of Homeland Security (DHS) policy which must be signed by
all required parties before the interconnection is activated. Proposed changes to either system that affect system
interoperability will be reviewed and evaluated to determine the potential impact. If the proposed changes impact the
agreed upon terms, the MOA will be renegotiated and executed before changes are implemented.
7.0 SECURITY
To ensure the joint security of the systems and the message data they store, process, and transmit, both parties agree
to adhere to and enforce the Rules of Behavior (as specified in Appendix Q. In addition, both parties agree to the
following:
Ensure authorized users accessing the interoperable system(s) receive, agree to abide by and sign (electronically
or in paper form) the IPAWS-OPEN Rules of Behavior as specified in Appendix C. Each jurisdiction is
responsible for keeping the signed Rules of Behavior on file or stored electronically for each system user.
• Utilize FEMA approved PKI certificates to digitally sign messages as they are transported over the public
Internet.
• Certify that its respective system is designed, managed and operated in compliance with all relevant federal laws,
regulations, and policies.
• Document and maintain jurisdictional and/or system specific security policies and procedures and produce such
documentation in response to official inquiries and/or requests.
3
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
• Provide physical security and system environmental safeguards for devices supporting system interoperability
with IPAWS-OPEN.
• Ensure physical and logical access to the respective systems as well as knowledge of the COGID and associated
access criteria are only granted to properly vetted and approved entities or individuals.
Where applicable, ensure that only individuals who have successfully completed FEMA -required training can
utilize the interoperable systems to issue alerts and warnings intended for distribution to the public.
• Where applicable, document and maintain records of successful completion of FEMA -required training and
produce such documentation in response to official inquiries and/or requests.
8.0 PROFICIENCY DEMONSTRATION
Once enabled, each COG operating under this agreement must demonstrate their ability to compose and send a
message through the IPAWS-OPEN system at regular intervals. Such demonstration must be performed on a monthly
basis through generation of a message successfully sent through the IPAWS-OPEN Training and Demonstration
environment.
9.0 ASSOCIATED SOFTWARE REQUIREMENTS
The COG will need to select a software package which will allow the COG to properly populate a Common Alerting
Protocol (CAP) message which complies with both the OASIS Common Alerting Protocol Version 1.2 and the OASIS
Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0. With respect
to the software and the software vendor selected FEMA expects the selected software to provide the following
minimum critical capabilities and services:
• Permissions:
o The ability to assign and manage user permissions; and
o The ability to retrieve and view IPAWS Alerting Permissions
• Proficiency:
o The provision of vendor support, to include user training, and around the clock technical support;
and
o The ability to submit both live and test digital certificates, with clear, easily identifiable information
that indicates the environment to which the software is pointed (Live or Test)
• User Interface:
o The provision of an intuitive user interface, to include help menus; and
o The ability to notify the user of digital certificate expiration; and
o The ability to constrain event types and geocodes to user permissions; and
o The ability to send one alert to multiple channels; and
o The provision of displays that show required fields based on selected channel; and
o The ability to pre -populate fields to the greatest extent possible; and
o The ability to support templates; and
o The ability to create a polygon or circle, of less than 100 nodes; and
o The ability to update or cancel an alert, without having to reenter all of the data; and
o The ability to alert the end user if a software license has expired; and
o Clear explanations if alert information is case sensitive when entered
• Confirmation and Error Checking:
o The ability to pre -check an alert message for errors, prior to sending; and
o The ability to create free -form 90 -character WEA text, while preventing prohibited characters; and
4
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
The provision to IPAWS of alert status codes for any sent alert, with a clear definition of whether
the codes are advice codes or error codes, along with the meaning of those codes; and
o The provision of user confirmation of connectivity to IPAWS; and
o The ability for users to see alert history and/or logs
10.0 COST CONSIDERATIONS
This agreement does not authorize financial expenditures by the COG on behalf of FEMA. The FEMA IPAWS
Program is responsible for the costs associated with developing, operating and maintaining the availability of the
IPAWS-OPEN system. The COG is responsible for all costs related to providing their users with access to IPAWS-
OPEN via the public Internet. These costs may include hardware, software, monthly Internet charges, completion of
security awareness training and other related jurisdictional costs.
11.0 PROPERTY OWNERSHIP
Each Party agrees and acknowledges that nothing in this Agreement shall be construed as giving a party any
proprietary rights in or to the intellectual property of the other party. Each Party further agrees that nothing in this
Agreement shall be construed as creating or granting to a party any implied or express license in or to the intellectual
property of the other party.
12.0 TIMELINE
This agreement will remain in effect based on the life of the Authority to Operate (ATO) for IPAWS-OPEN or a
maximum of three (3) years after the last date on either signature in the signature block below. Upon expiration of the
IPAWS-OPEN ATO or after three (3) years (whichever comes first), this agreement will expire without further action
and system access privileges will be revoked. If the parties wish to extend this agreement, they may do so by
reviewing, updating, and reauthorizing this agreement. This agreement supersedes all earlier agreements, which
should be referenced above by title and date. If one or both of the parties wish to terminate this agreement
prematurely, they may do so upon 30 days' advanced notice or in the event of a security incident that necessitates an
immediate response. This agreement may be suspended by FEMA for failure to perform the Proficiency
Demonstration for two consecutive months. A suspended COG may be reinstated upon a completion of a successful
Proficiency Demonstration.
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
SIGNATORY AUTHORITY
I agree to the terms of this Memorandum of Agreement. Noncompliance on the part of either organization or its users
or contractors concerning the policies, standards, and procedures explained herein may result in the immediate
termination of this agreement.
City of El Segundo Official
Name: Scott Mitnick
Title: City Manager
Signature
City of EI Segundo
350 Main St
EI Segundo, CA, 90245
(Ic� r- : r
f
Date)
Ana qL---
QClerk
Cify of EI Segundo
6
V4.2, June 20, 2019
Federal Emergency Management Agency
IPAWS-OPEN System Owner
Name: Mark A. Lucero
Title: Chief, IPAWS Engineering
Digitally signed by MARK A
MARK A LUCERO LUCERO
Date: 2019.08.13 16:38:10 -04'00'
(Signature Date)
Attn: IPAWS-OPEN System Owner, Suite 5NW-0309
Federal Emergency Management Agency
500 C Street SW
Washington, D.C. 20472-3153
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
Appendix A
Listing of Interoperable Systems
The FEMA IPAWS Program recognizes that Emergency Management organizations may utilize multiple tools to
facilitate the emergency management process. As a result, jurisdictions may need to interoperate with IPAWS-OPEN
using more than one system. In order to comply with DHS policy, all systems interoperating with IPAWS-OPEN
must be documented and supported by a Memorandum of Agreement. As a result this appendix must be completed to
identify all systems associated with the COG and used for interoperating with ]PAW S -OPEN. This Appendix must
be amended as applicable systems are added or removed from operations.
« IPAWS-OPEN
IPAWS-OPEN is the backbone system that structures the alert and distributes the
Function: message from one interoperating and/or interconnected system (message sender) to
another interoperating and/or interconnected system (message recipient).
Location: Bluemont, VA; Clarksville, VA
Description of data, Messaging data is considered Sensitive But Unclassified (SBU) information and does
including sensitivity or not contain Personally Identifiable Information (PII), Financial data, Law
classification level: Enforcement Sensitive Information or classified information. Each message that
flows through the IPAWS-OPEN system will be associated to a specifically assigned
system User ID and COGID as captured within the message elements. This
information will be retained in system logs.
The systems listed below are managed and operated by the COG and are subject to the terms defined within the
Memorandum of Agreement including the Rules of Behavior in Appendix C. Each interoperable system will be
assigned unique authentication credentials, which must be protected by the COG. In the event these credentials are
compromised, the COG is expected to immediately contact the FEMA IPAWS Program Management Office. The
systems listed below are only allowed to interoperate with IPAWS-OPEN based on the criteria set forth within the
IPAWS-OPEN Web Service Interface Design Guidance.
► Everbridge
Function:
Location:
Description of data,
including sensitivity or
classification level:
V4.2, June 20, 2019
Everbridge MNS provides critical information to residents during emergencies by
sending public alerts for
major events for disseminations to WEA/CMAS, EAS, NWEM and Public Feed.
Burbank, CA; Denver, CO;
Data is comprised of emergency public alert messages.
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
Appendix B
COG Point of Contact Information
Designated COG Primary Point of Contact:
Name: Randall Collins
Title: Emergency Management Coordinator
Business Email Address: rcollins@elsegundo.org
Primary Phone Number: 310-524-2366
Alternate Phone Number:
Organization: City of EI Esegundo - Emergency Management
Mailing Address: 350 Main St, EI Segundo, CA, 90245
Designated Alternate Point of Contact:
Name: Amiel Farnam
Title: Emergency Management Coordinator
Business Email Address: afarnam@elsegundo.org
Primary Phone Number: 310-524-2287
Alternate Phone Number:
Organization: City of EI Segundo - Emergency Management
Mailing Address: 350 Main St, EI Segundo, CA, 90245
Designated Technical Point of Contact:
Name: Randall Collins
Title: Emergency Management Coordinator
Business Email Address: rcollins@elsegundo.org
Primary Phone Number: 310-524-2366
Alternate Phone Number:
Organization: City of EI Esegundo - Emergency Management
Mailing Address: 350 Main St, EI Segundo, CA, 90245
8
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
FEMA: Integrated Public Alert and Warning System
Open Platform for Emergency Networks (IPAWS-OPEN)
Contact Name
Contact Number
Email Address
Summary of System
Responsibilities
Lytwaive Hutchinson
202-212-2480
lytwaive.hutchinson@fema.dhs.gov
Chief Information Officer,
FEMA
Togai Andrews
202-212-7332
togai.andrews@fema.dhs.gov
Chief Information Security
Officer
Mark Lucero
1 202-646-1386
I
mark.lucero@fema.dhs.gov
System Owner
FEMA PMO - IPAWS-
Gary Ham
703-899-6241
gary.ham@associates.fema.dhs.gov
OPEN
Gustavo Barbet
202-212-3586
gustavo.barbet@associates.fema.dhs.gov
FEMA ISSO - IPAWS-
OPEN
Neil Bourgeois
703-732-6331
neil.bourgeois@associates.fema.dhs.gov
FEMA-EADIS IPAWS-
OPEN Tech Lead
9
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
Appendix C
IPAWS-OPEN Rules of Behavior
1.0 INTRODUCTION
The following rules of behavior apply to all persons with application access to City of El Segundo Interoperable
System(s) and/or who have been issued a COGID with associated credentials for IPAWS-OPEN. These individuals
shall be held accountable for their actions related to the information resources entrusted to them and must comply
with the following rules or risk losing their access privileges. The Rules of Behavior apply to users on official travel
as well as at their primary workplace (e.g., Emergency Operations Center— EOC) and at any alternative workplace
(e.g., telecommuting from a remote or satellite site) using any electronic device including laptop computers and
portable electronic devices (PED's). PED's include personal digital assistants (PDA's) (e.g. Palm Pilots), cell phones,
text messaging systems (e.g., Blackberry), and plug-in and wireless peripherals that employ removable media (e.g.
CDs, DVDs, etc.). PEDs also encompass USB flash memory (thumb) drives, external drives, and diskettes. These
Rules of Behavior are consistent with existing DHS policies and DHS Information Technology (IT) Security
directives and are intended to enhance the awareness of each user's responsibilities regarding accessing, storing,
receiving and/or transmitting information using IPAWS-OPEN.
2.0 APPLICATION RULES
2.1 Official Use
• IPAWS-OPEN is a Federal application to be used only in the performance of the user's official duties in
support of public safety as described in the National Incident Management System (NIMS).
• The use of the IPAWS-OPEN for unauthorized activities is prohibited and could result in verbal or written
warning, loss of access rights, and/or criminal or civil prosecution.
• By utilizing IPAWS-OPEN, the user of the interoperable system(s) consents to allow system monitoring to
ensure appropriate usage for public safety is being observed.
• City of El Segundo will be held accountable for safeguarding all configuration items and information
entrusted to them by FEMA. City of EI Segundo is expected to manage the relationship with supporting
vendors, consultants and any other entities providing system support on their behalf. In addition, City of El
Segundo will be held accountable in the event of a security breach or disclosure of sensitive configuration
information such as digital certificates. City of El Segundo understands that the use of digital signatures,
used on their behalf, is binding and City of El Segundo will be held accountable accordingly. In the event
sensitive information is mishandled, utilization of IPAWS-OPEN may be immediately revoked by FEMA.
• If software interoperating with IPAWS-OPEN enables users to geo-target public alert messages by means
of geospatial polygons or circles, then the user shall restrict any such geospatial boundaries so as to remain
within the geographical limits of their public warning authority (or as near as possible), as determined by
applicable state and/or local laws and duly adopted operational plans.
2.2 Access Security
• All Email addresses provided in connection with interoperable system(s) user accounts must be associated
to an approved email account assigned by the user's emergency management organization. The use of
personal email accounts to support emergency messaging through IPAWS-OPEN is prohibited.
• Upon approval of the MOA by FEMA, a COG account with COGID and Digital Certificate will be created
and issued to the designated technical representative. All individuals with knowledge of these credentials
must not share or alter these authentication mechanisms without explicit approval from the FEMA IPAWS
Program.
10
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
Every interoperable system user is responsible for remote access security as it relates to their use of
IPAWS-OPEN and shall abide by these Rules of Behavior.
2.3 Interoperable System User Accounts and Passwords
• All users must have a discrete user account ID which cannot be the user's social security number. To
protect against unauthorized access, passwords linked to the user ID are used to identify and authenticate
authorized users.
• Accounts and passwords shall not be transferred or shared. The sharing of both a user ID and associated
password with anyone (including administrators) is prohibited.
• Accounts and passwords shall be protected from disclosure and writing passwords down or electronically
storing them on a medium that is accessible by others is prohibited.
• The selection of passwords must be complex and shall:
o Be at least eight characters in length
o Contain a combination of alphabetic, numeric and special characters
o Not the same as any of the user's previous 8 passwords.
• Passwords shall not contain any dictionary word.
• Passwords shall not contain any proper noun or the name of any person, pet, child, or fictional character.
Passwords shall not contain any employee serial number, Social Security number, birth date, phone
number, or any information that could be readily guessed about the creator of the password.
• Passwords shall not contain any simple pattern of letters or numbers, such as "gwerty" or "xyzl23".
• Passwords shall not be any word, noun, or name spelled backwards or with a single digit appended, or with
a two -digit "year" string, such as 98xyz123.
• Pass phrases, if used in addition to or instead of passwords, should follow the same guidelines.
• Passwords shall not be the same as the User ID.
• Users shall either log off or lock their workstations when unattended.
• Workstations shall be configured to either log off, or activate a password -protected lock, or password -
protected screensaver within fifteen (15) minutes of user inactivity.
• Locked sessions shall remain locked until the user re -authenticates.
• Workstations shall be protected from theft.
• A user's account shall be automatically locked after three consecutive failed logon attempts.
• The automatic lockout period for accounts locked due to failed login attempts shall be set for a minimum of
twenty (20) minutes.
• A process shall exist for manually unlocking accounts prior to the expiration of the twenty (20) minute
period, after sufficient user identification is established.
• Sessions shall automatically be terminated after sixty (60) minutes of inactivity.
• Users are required to change their passwords at least once every 90 days.
11
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
• Passwords must be promptly changed whenever a compromise of a password is known or suspected.
2.4 Integrity Controls & Data Protection
• All computer workstations accessing IPAWS-OPEN must be protected by up-to-date anti-virus software.
Virus scans must be performed on a periodic basis and when notified by the anti-virus software.
• Users accessing interoperable system(s) to utilize IPAWS-OPEN must:
o Physically protect computing devices such as laptops, PEDs, blackberry devices, smartphones, etc;
o Protect sensitive data sent to or received from IPAWS-OPEN;
o Not use peer-to-peer (P2P) file sharing, which can provide a mechanism for the spreading of
viruses and put sensitive information at risk;
o Not program computing devices with automatic sign -on sequences, passwords or access
credentials when utilizing IPAWS-OPEN.
Users may not provide personal or official IPAWS-OPEN information solicited by e-mail. If e-mail messages are
received from any source requesting personal information or asking to verify accounts or other authentication
credentials, immediately report this and provide the questionable e-mail to the Local System Administrator and/or the
City of El Segundo Help Desk.
• Only devices officially issued through or approved by DHS, FEMA and/or approved emergency
management organizations are authorized for use to interoperate with IPAWS-OPEN and use of personal
devices to access and/or store IPAWS-OPEN data and information is prohibited.
• If a Blackberry, smartphone or other PED is used to access the interoperable system(s) to utilize IPAWS-
OPEN, the device must be password protected and configured to timeout or lock after 10 minutes of
inactivity.
• If sensitive information is processed, stored, or transmitted on wireless devices, it must be encrypted using
approved encryption methods.
2.5 System Access Agreement
• I understand that I am given access to the interoperable system(s) and IPAWS-OPEN to perform my
official duties.
• I will not attempt to access data, information or applications I am not authorized to access nor bypass
access control measures.
• I will not provide or knowingly allow other individuals to use my account credentials to access the
interoperable system(s) and IPAWS-OPEN.
• To prevent and deter others from gaining unauthorized access to sensitive resources, I will log off or lock
my computer workstation or will use a password -protected screensaver whenever I step away from my
work area, even for a short time and I will log off when I leave for the day.
• To prevent others from obtaining my password via "shoulder surfing", I will shield my keyboard from view
as I enter my password.
• I will not engage in, encourage, or conceal any hacking or cracking, denial of service, unauthorized
tampering, or unauthorized attempted use of (or deliberate disruption of) any data or component within the
interoperable system(s) and IPAWS-OPEN.
«� 1 agree to inform my Local System Administrator when access to the interoperable system(s) and/or
12
V4.2, June 20, 2019
Agreement No. 5699
FOR OFFICIAL USE ONLY // CONTROLLED UNCLASSIFIED INFORMATION
IPAWS-OPEN is no longer required.
I agree that I have completed Computer Security Awareness training as may be required by my jurisdiction
prior to my initial access to the interoperable system(s) and IPAWS-OPEN and that as long as I have
continued access, I will complete Computer Security Awareness training on an annual basis. If my
jurisdiction does not provide Computer Security Awareness training, I will complete the FEMA self -study
course IS -906. Workplace Security Awareness (https://training.fema.gov/is/courseovervicw.aspx?code=lS-
906) on an annual basis.
2.6 Accountability
r I understand that I have no expectation of privacy while using any services or programs interoperating with
IPAW S -OPEN.
r I understand that I will be held accountable for my actions while accessing and using interoperable
system(s) and IPAWS-OPEN, including any other connected systems and IT resources.
I understand it is my responsibility to protect sensitive information from disclosure to unauthorized persons
or groups.
I understand that I must comply with all software copyrights and licenses pertaining to the use of ]PAWS -
OPEN.
2.7 Incident Reporting
I will promptly report IT security incidents, or any incidents of suspected fraud, waste or misuse of systems
to the Local System Administrator and/or the City of El Segundo Help Desk.
3.0 ]PAWS -OPEN Rules of Behavior Statement of Acknowledgement
I have read and agree to comply with the requirements of these Rules of Behavior. I understand that the terms of this
agreement are a condition of my initial and continued access to City of El Segundo Interoperable System(s) and
IPA WS -OPEN and related services and that if I fail to abide by the terms of these Rules of Behavior, my access to
any and all IPA WS -OPEN information systems may be terminated and I may be subject to criminal or civil
prosecution. I have read and presently understand the above conditions and restrictions concerning my access.
Printed Name (as listed in Appendix B):
Signature: Date:
13
V4.2, June 20, 2019