I have been made aware and understand that applicable State of Arizona statutes*, rules, policies and directives bind all State of Arizona (State) employees, contractors, vendors, volunteers and other users who have access to the State’s technology systems and applications.
[State of Arizona employees] This agreement does not create a contract for employment between any employee and the State. Nothing in this agreement changes the fact that all uncovered employees of the State are at-will employees and serve at the pleasure of the appointing authority.
[Non-State employees/other users (such as, contractors, leased employees, vendors, volunteers, etc.] Nothing in this agreement creates an employment relationship with the State of Arizona.
In consideration for access to State information technology systems and applications, I agree to at all times abide by all applicable Arizona State statutes, rules, policies and directives, and understand that I am prohibited from violating the foregoing, which includes, but is not limited to, the following actions:
[State of Arizona employees] All new State employees must be provided with a copy of A.R.S. § 38-448 at the time of authorizing an employee to use an agency computer; the full text of this statute appears below:
38-448. State employees; access to internet pornography prohibited; cause for dismissal; definitions
I agree to seek clarification before entering, modifying, deleting, altering, or disclosing data. I agree to immediately notify my supervisor, manager or any member of the Agency’s executive team of any suspected or confirmed unauthorized disclosure or misuse in violation of this agreement or any applicable statutes, rules or policies.
Appropriate action will be taken, including immediate termination of access, to ensure that applicable federal and state statutes, regulations and directives governing confidentiality and security are enforced. Aside from revocation of access, breach of procedures pursuant to this policy or misuse of State property including computer programs, equipment and/or data, may result in prosecution in accordance with any applicable provision of statute, including Arizona Revised Statutes (A.R.S.) Section 13-2316, for computer tampering and/or:
During all times that I have access to State information technology systems and applications, I accept responsibility for adhering to all applicable State of Arizona statutes, rules, security policies and directives and agree to abide by this agreement. I understand that I have access to instruction on and access to applicable statutes, rules and policies. Failure to accept the terms of this agreement will mean I will not be permitted access to State of Arizona produced media, data, computer equipment and software.
*Applicable State of Arizona statutes and policies include, but are not limited to:
ABOUT THIS AGREEMENT
The Department of Economic Security (DES) information systems are the property of the State, which includes, but is not limited to all computer equipment, software, operating systems, storage media, network accounts to get electronic mail, internet browsing, file services and application access.
Before receiving any initial systems access, all users, employees, contractors or volunteers who will have access to any DES data, systems, facilities or clients must read and acknowledge it by electronically signing the User Affirmation Agreement (UAA).
Upon receipt of a completed UAA, users are required to complete the Initial Security Awareness Training CIS001-1 computer-based training (CBT) course or its equivalent.
Every DES user is required to annually recertify their understanding by completing the Security Awareness Training CIS001-1 computer-based training (CBT) course.
WHAT IS THE USER AFFIRMATION AGREEMENT?
The UAA is in place to protect you and DES. The UAA explains the acceptable use of information, electronic/computer equipment and network resources to conduct DES business or interact with internal networks and business systems, whether they are owned or leased by DES, the employee or a third party. Any DES employee found to have violated the UAA may be subject to disciplinary action, up to and including termination of employment.
WHO AND WHAT DOES THE UAA APPLY TO?
The UAA applies to all DES:
RULES OF BEHAVIOR FOR USERS OF DES SYSTEMS AND RESOURCES
DES employees are expected to be familiar with and adhere to the guidelines in the following policies. The policies can be found at this URL: DES IT Information Security Policies
STATEMENTS OF UNDERSTANDING
I understand that all personnel/users who have access to DES data are responsible for protecting that data and are bound by all applicable federal and state laws and DES policies enacted in the protection of DES data. I agree to abide by all applicable federal and state laws and DES policies.
I understand that DES will take appropriate action to ensure that applicable federal, state and local laws and DES policies governing confidentiality and security are enforced.
A violation of these requirements or misuse of DES property including computer programs, equipment, and data, may result in withdrawal of individual access privileges and prosecution in accordance with any applicable provision of law.
Please enter your personal details below. (* denotes required field)