It is a military form published by the U.S. Department of the Army (DA) on March 1, 2020. The form, often falsely referred to as DD 7789, is a military form used by and within the U.S. military. To date, the DA has not provided separate instructions for the form. In the absence of compelling circumstances (see the definitions in Appendix A of the ECP), the review of information or the suspension of a suspected account should be delayed until normal opening hours to allow for appropriate authorization and/or notification activities. In particular, the principles of academic freedom, freedom of expression and privacy of information have a significant impact on the management of computer systems at UBC. Individuals with privileged access must follow existing guidelines, laws, rules, precedents and procedures, while taking the necessary steps to provide quality, timely and reliable IT services. For example, individuals must comply with the provisions of the University of California (UC) Electronic Communication Policy (ECP), which require the slightest review of content and the least necessary measures to resolve a situation. Preferred access allows a person to take actions that could affect computer systems, network communications or other users` accounts, files, data or processes. Preferred access is generally granted to system administrators, network administrators, employees who manage computer accounts, or other employees whose tasks require special permissions for a computer system or network. Individuals with privileged access must respect the rights of users of the system, respect the integrity of associated systems and physical resources, and comply with all relevant laws or regulations. Individuals are also required to keep ad brief on all procedures, business practices and operational guidelines relating to the activities of their local department.
Download an updated DA 7789 PDF form or browse hundreds of other DA forms stored in our online database. In the event of a conflict or dispute over activities related to this agreement, individuals may exercise their rights to resolve the situation through existing procedures. These procedures would include informal dispute resolution procedures between supervisory departments or services, relevant provisions of employment policies or contracts, procedures for executing students or teachers, or other documents relating to the person`s membership in the university. Authorization In most cases, the holder of an electronic communication protocol (see ECP`s definitions of ANNEXE A) must be obtained before accessing his files or affecting his or her processes. If consent is not obtained, the conditions of access without consent of the ECP must be met. (see Section IV of the ECP. B and also „Access to Berkeley Campus Electronic Communications.“) Notification In both cases, the worker or any other authority that notifies the measures concerned and the reasons for these measures endeavours to report it as soon as possible, in accordance with legal and higher education policy.