The U.S. Department of Labor (DOL) uses Monster Government Solutions’ (MGS) Hiring Management Enterprise recruitment system. DOL has named the system Department of Labor Online Opportunities Recruitment System (DOORS). These are the Rules of Behavior for DOORS/Monster Hiring Management Enterprise System users.

  • Any remote access to the network to access data in this system must be made through a VPN using two-factor authentication if the data you are accessing is other than your own. Two-factor authentication is where one of the factors is provided by a device separate from the computer gaining access.
  • All PII media other than your own (i.e., hard copy reports, information loaded to a CD, thumb drive, or any other removable electronic media) that is transported (see definition below) will be encrypted using FIPS 140-2 or greater compliant software.
  • Transported, in addition to this and/or other electronic transmissions and physical removal, includes sending the information via e-mail and/or accessing the information from your home PC/laptop or agency laptop or contractor provided PC/laptop from home or any other location not defined as agency facility. Keep in mind that if you view the information from your home or other location, this is considered to be a download and removed from the physical protected agency facility.
  • Any and all files that contain PII that are sent via e-mail will be encrypted using Entrust or an equivalent technical solution that meets NIST standards.
  • PII that is stored on Laptops or removable media or at a remote location must be deleted within 90 days or when no longer needed for official agency business purposes.
  • Facsimile Transmissions and Reproduction of Sensitive Information/documents should only be done on government-owned or approved equipment. Hotel, personal, or commercial facsimile and copy machines should not be used.
  • Sensitive documents must be transmitted in a sealed, opaque envelope or wrapping. Mark the envelope or wrapping with the recipient's address, a return address, and the words "TO BE OPENED BY ADDRESSEE ONLY". Documents can be sent via the following U.S. mail methods: First Class, Express, Certified, or Registered Mail. Any commercial carrier may be used. Double wrapping is recommended for additional protection. Individual offices may impose additional requirements.
  • You must conduct only authorized business on the system.
  • Your level of access to systems and networks owned by Monster Government Solutions is limited to ensure your access is no more than necessary to perform your legitimate tasks or assigned duties. If you believe you are being granted access that you should not have, you must immediately notify the DOORS Team at DOORS@dol.gov, who can then notify Monster Government Solutions Support Line at 866-656-6831.
  • You must maintain the confidentiality of your authentication credentials such as your password. Do not reveal your authentication credentials to anyone; a Monster Government Solutions employee should never ask you to reveal them.
  • You must follow proper logon/logoff procedures. You must manually logon to your session; do not store you password locally on your system or utilize any automated logon capabilities.
  • You must promptly logoff when session access is no longer needed. If a logoff function is unavailable, you must close your browser. Never leave your computer unattended while logged into the system.
  • You must report all security incidents or suspected incidents (e.g., lost passwords,improper or suspicious acts) related to Monster Government Solutions systems andnetworks to the Monster Government Solutions Operations Center Enter phone number.
  • You must not establish any unauthorized interfaces between systems, networks,and applications owned by Monster Government Solutions.
  • Your access to systems and networks owned by Monster Government Solutions isgoverned by, and subject to, all federal laws, including, but not limited to, the PrivacyAct, 5 U.S.C. 552a, if the applicable Monster Government Solutions system maintainsindividual Privacy Act information. Your access to Monster Government Solutionssystems constitutes your consent to the retrieval and disclosure of the information withinthe scope of your authorized access, subject to the Privacy Act, and applicable state andfederal laws.
  • You must safeguard system resources against waste, loss, abuse, unauthorizeduse or disclosure, and misappropriation.
  • You must not process U.S. classified national security information on the system.
  • You must not browse, search, or reveal information hosted by Monster GovernmentSolutions except in accordance with that, which is required to perform your legitimatetasks or assigned duties.
  • You must not retrieve information, or in any other way disclose information, for someonewho does not have authority to access that information.
  • You must ensure that Web browsers use Transport Layer Security (TLS) 1.1 (or higher).TLS must use a minimum of 128-bit encryption.
  • You must ensure that your web browser is configured to warn about invalid sitecertificates.
  • You must ensure that web browsers warn if the user is changing between secure and non-secure mode.
  • You must ensure that your web browser window used to access systems owned byMonster Government Solutions is closed before navigating to other sites/domains.
  • You must ensure that your web browser checks for a publisher’s certificate revocation.
  • You must ensure that your web browser checks for server certificate revocation.
  • You must ensure that web browser checks for signatures on downloaded files.
  • You must ensure that web browser empties/deletes temporary Internet files when thebrowser is closed.
  • By your signature or electronic acceptance (such as by clicking an acceptance button onthe screen) you must agree to these rules.
  • You understand that any person who obtains information from a computer connected tothe Internet in violation of her employer’s computer-use restrictions is in violation of theComputer Fraud and Abuse Act.
  • You agree to contact the Monster Government Solutions Chief Information SecurityOfficer or the Monster Government Solutions Support Line at866-656-6831 if you do not understand any of these rules.
  • Authorized users are responsible for the proper handling of Government data. I agree toprotect the data base information for which I have been granted access incompliance with the provisions of the Privacy Act, the implementing regulations at 29CFR

Rules of Behavior

I have read the above Rules of Behavior for users of Monster Government Solutions on behalf of systems and networks. By my electronic acceptance and/or signature on the Access User Request & ROB Form, I acknowledge and agree that my access to all Monster Government Solutions systems and networks is covered by, and subject to, such Rules. Further, I acknowledge and accept that any violation by me of these Rules may subject me to civil and/or criminal actions and that Monster Government Solutions retains the right, at its sole discretion, to terminate, cancel or suspend my access rights to the Monster Government Solutions systems at any time, without notice.

Please return to the DOORS Access Form to certify agreement to abide by the above Rules of Behavior for Monster/DOORS System Access.

For Questions: Contact the Help Desk at doors@dol.gov or Kenneth Broome at broome.kenneth@dol.gov or 202-693-0441 or Karen Stallion at stallion.karen@dol.gov or 202-693-7657