Be the first to like this
As a system user, I will not install or remove programs or hardware (government or personally owned),
disable security configurations or audit logs, or alter device configurations. I will not attempt to strain, test,
circumvent, bypass security mechanisms, or perform network line monitoring or keystroke monitoring, I will not
introduce any executable code nor will I write any malicious code.