Legal Notice: U.S. Department of Housing and Urban Development
This computer system, including all related equipment, networks, and network devices (specifically including Internet access) contains data belonging to the U.S. Government,
and is provided for authorized U.S. Government use only. Access requires the use of one or more Multi-factor Authentication methods, which ties the account to an authorized user,
validated by either account number and password or PIV ID card and PIN that must never be shared with anyone at any time. Doing so increases the risk of access by an unauthorized
person posing as you. Authorized personnel will treat information about HUD computing resources (i.e., system names, technologies employed, etc.) as sensitive and will not reveal
it to unauthorized personnel. This computer may be monitored for all lawful purposes, including ensuring that its use is authorized, to facilitate protection against unauthorized
access, and to verify operational security. During monitoring, information may be examined, recorded, copied and used for authorized purposes. All activities and information,
including personal information, associated with the use of this system may be monitored. Use of this computer system, authorized or unauthorized, constitutes consent to monitoring.
Misuse or unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other
adverse action. Use of this system implies understanding of these terms and conditions. Authority: U.S. Federal Criminal Code (18 USC 1030. Fraud and Related Activity with Computers)
and HUD Information Technology Security Policy 2400.25.
By using this U.S. Government information system you understand and consent to the following:
- The information system Rules of Behavior (RoB) provides the rules that govern the appropriate use of
the information system for all government, contract personnel and other federally funded users. The RoB is
intended to enhance and further define the specific rules each user must follow while accessing the
information system and enforcing user understanding of:
- HUD's policy requiring a separation of duties between the requestor and approver for financial transactions;
- Prohibition from misusing the information system, i.e., exceeding their authority;
- The existence of and penalty for violating 18 USC 1030:
- The elements of 18 USC 1030(a)4, "Accessing to Defraud and Obtain Value" are:
- Knowingly accessing a protected computer without or in excess of authorization;
- With intent to defraud;
- Access furthered the intended fraud; and
- Obtain anything of value
- The penalty for violating this statute includes a fine and imprisonment of not more than ten years, or both.
- All new users of the information system must read the RoB and sign the accompanying acknowledgement form before accessing
the information system. This acknowledgement must be completed annually thereafter. By signing the form users reaffirm their knowledge of,
and agreement to adhere to, the RoB. The RoB may be presented to the user in hardcopy or electronically.
The user's acknowledgement may be obtained by written signature or by electronic acknowledgement or signature.
- Users have no reasonable expectation of privacy regarding any communications or data transiting or stored on
this information system. At any time, the government may for any lawful government purpose monitor, record, intercept,
audit, and search and seize any communication or data transiting or stored on this information system.
Use of this system indicates consent to monitoring and recording.
- Any communications or data transiting or stored on this information system may be disclosed or used for any lawful government purpose.
- Access is given only to the information system to which the user requires access in the performance of their official duties
and the user will not attempt to access systems they are not authorized to access.
- Acknowledgement that disciplinary action may be taken based on violation of the RoB.
DRGR Privacy Act Statement
Disaster Recover Grants Reporting System (DRGR) records information that is necessary to provide you with system access while adhering to Federal
Information System security requirements. For example: username, password, email, and full name. DRGR also records information necessary to transact
business with HUD grantee organizations. For example: full name, business phone, business address, email of point(s) of contact, and for Technical
Assistance Providers (TA) under the Community Compass TA and Capacity Building Program, staff labor rates. DRGR collects this information for administering
individual points of contact representing organizations doing business with HUD, and to perform oversight of cooperative agreements with grantees.
Finally, DRGR may also store document attachments containing individual data from beneficiaries of CPD Programs. For example, full name, range of household
income, household size, household type, race and ethnicity, home address, employment data, or health conditions. These documents serve as evidential support
for conclusions or other determinations made about grantee performance during CPDs risk-based monitoring program.
The information collected is not used for any other purpose. The authority for this information collection is the Disaster Recovery Grant Reporting System
(OMB Approval No. 2506-0165), the Application for Federal Assistance SF-424 (OMB Approval No. 4040-0004), the Application For Community CompassTA and
Capacity Building Program Notification of Funding Availability and Awardee Reporting (OMB Approval No. 2506-0197), and the CPD Monitoring Handbook 6509.2.