Grant use that does not adversely affect the performance of official duties, interfere with
the mission or operations of the IRS or the Office of Chief Counsel.
D. Authorize use that does not violate the Office of Government Ethics (OGE) Standards of Ethical Conduct for Employees of the Executive Branch found at 5 Code of Federal Regulations (CFR) Part 2635, the Supplemental Standards of Ethical Conduct for Employees of the Treasury Department found at 5 CFR Part 3101, and the Department of the Treasury Employee Rules of Conduct found at 31 CFR Part 0.
A. Employees are expected to conduct themselves professionally in the workplace and to refrain from using government information technology equipment / resources for activities that are inappropriate based on established standards of conduct. In addition, some restrictions are necessary to avoid practices that have the potential of degrading the overall performance of Counsel and IRS systems.
B. Prohibited uses of government technology, equipment and resources by employees (even on non-work time) include, but are not limited to:
Downloading, copying, or installing of unauthorized application (e.g., executable code) or any program not explicitly approved or permitted by the organization(s) with responsibility for managing data programs, such as:
“Push” technology applications (subscriber services) from the Internet (e.g.,
weather or news alert feeds, stock quote updates) that gather information and send it out automatically to a subscriber,
Test or demo software, and
Personal communication on blogs and social networking sites such as Facebook,
MySpace, Yahoo! 360°, Twitter, etc.;
Viewing or accessing the following types of web sites:
Pornographic, sexually explicit, or sexually oriented materials (including creation, download, viewing, storage, copying of such materials); or
Personal services web sites, such as Personals & Dating and Craigslist.
Access to hacker sites (regardless of the security risks or lack thereof);
Using Government systems as a staging ground or platform to gain unauthorized
access to other systems;