COMDTINST 5375.1B
b. Personal Use: Activity that is conducted for purposes other than accomplishing official business,
educational, or otherwise authorized activity.
c. Information Technology (IT): Any equipment or interconnected system or subsystem of
equipment that is used in the automatic acquisition, storage, manipulation, management,
movement, control, display, switching, interchange, transmission, or reception of data or
information. IT includes, but is not limited to, desktop computers, personal computers, laptops,
handheld computers, Personal Digital Assistants (PDAs), related peripheral equipment, and
software.
d. Non-work Time: Any time CG personnel are not required to be performing assigned CG duties.
Examples of non-work time include off-duty hours such as lunch periods, authorized breaks,
before or after a workday, weekends or holidays, but only if your duty station would normally be
available to you at such times.
7. POLICY.
a. This Instruction is a lawful general order, punishable under Article 92 of the UCMJ. Violations
of this Instruction may result in administrative and disciplinary action against military personnel.
It is authority for taking adverse personnel actions against civilian employees. Violations of this
Instruction may result in a person being held financially liable for the cost of prohibited or
inappropriate use of government office equipment.
b. Personnel must be authorized to use government office equipment for official Government
business before it is available for limited personal use.
c. Personal use of government office equipment is authorized for CG personnel only during non-
work time, when such use:
(1) Involves minimal expense to the government.
(2) Does not reduce unit productivity or interfere with the mission or operations.
(3) Use of the Internet is limited to 30 minutes over a 24-hour period. Commands are authorized
to approve additional personal use on a case-by-case basis.
d. Managers and supervisors may further restrict personal use based on the needs of the command
or office, or problems with unauthorized or inappropriate use.
e. All CG personnel must comply with the requirements of this Instruction when telecommuting, in
addition to existing policy regarding telecommuting.
f. This Instruction shall be referenced in all CG Information User Agreements.
g. Any unauthorized personal use incident (suspected or actual) must be reported to the local IT
support staff and Information System Security Officer/Assistant (ISSO/ISSA), including
accidental introduction of virus/worm, malicious software, accidental release of sensitive
2