Rehabilitation Services Administration


You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C ยง 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to:

  • Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and
  • Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State.

If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel.

Rules of Behavior

  1. Use the RSA website only for official Government business;
  2. Provide complete and accurate data when using reporting using the RSA website;
  3. Protect sensitive information from access by, or disclosure to, unauthorized personnel;
  4. Report immediately all security incidents and potential threats and vulnerabilities involving computing resources to RSA Technical Support;
  5. Create and use strong passwords and do not disclose your password to anyone (including RSA staff);
  6. Do not reuse passwords. Each password should be unique;
  7. Log-off the RSA website when you are done;
  8. Do not leave your PC unattended when logged into the RSA website. In addition, users are requested to use the Windows screensaver feature with password feature enabled to protect unattended terminals;
  9. Report any compromise or suspected compromise of a password to RSA Technical Support;
  10. Contact RSA Technical Support when access to the RSA website is no longer required (for example when transferring to another position, or terminating employment).