Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    • Environmental Topics
    • Air
    • Bed Bugs
    • Cancer
    • Chemicals, Toxics, and Pesticide
    • Emergency Response
    • Environmental Information by Location
    • Health
    • Land, Waste, and Cleanup
    • Lead
    • Mold
    • Radon
    • Research
    • Science Topics
    • Water Topics
    • A-Z Topic Index
    • Laws & Regulations
    • By Business Sector
    • By Topic
    • Compliance
    • Enforcement
    • Laws and Executive Orders
    • Regulations
    • Report a Violation
    • Environmental Violations
    • Fraud, Waste or Abuse
    • About EPA
    • Our Mission and What We Do
    • Headquarters Offices
    • Regional Offices
    • Labs and Research Centers
    • Planning, Budget, and Results
    • Organization Chart
    • EPA History

Breadcrumb

  1. Home
  2. Confidential Business Information under TSCA

VDI Training

Note: This index is intentionally not hyper-linked.

TSCA Training

I. Introduction

II.  Responsibilities

III. Access

IV. Document Management

V.  Violations


VDI Training

I.  Rules of Behavior

II.  Accessing CBI through the VDI

III. Use of VDI only in private controllable spaces

IV. Use of VDI

V. Reporting suspected CBI violations

VI. It’s up to you to protect CBI

VII. Test your knowledge

VIII. Correct answer to quiz

Test your knowledge

FILE TRANSFER

Your position as a chemical engineer in the new chemicals program requires you to frequently access and discuss CBI with other members of the new chemicals team. Because you sometimes need to transfer non-CBI materials from the CBI LAN to the Admin LAN, you were granted permission to have file transfer capabilities within VDI. One of the members of the team finds accessing the CBI LAN through VDI to be burdensome and therefore often uses the file transfer functionality of VDI to transfer files from the CBI LAN to his laptop. One afternoon, this team member emails you a file, that is clearly labeled as CBI, and asks for your help. This is a CBI violation. What action should you take?:

A) Tell the team member that they shouldn’t email CBI and to resend the message on the CBI LAN email system.

B) Report this to your immediate supervisor.

C) Delete the file and keep the secret to yourself; no one will ever know.

D) A and B.

Back
Contact Us to ask a question, provide feedback, or report a problem.
Last updated on October 24, 2024
  • Assistance
  • Spanish
  • Arabic
  • Chinese (simplified)
  • Chinese (traditional)
  • French
  • Haitian Creole
  • Korean
  • Portuguese
  • Russian
  • Tagalog
  • Vietnamese
United States Environmental Protection Agency

Discover.

  • Accessibility Statement
  • Budget & Performance
  • Contracting
  • EPA www Web Snapshot
  • Grants
  • No FEAR Act Data
  • Plain Writing
  • Privacy
  • Privacy and Security Notice

Connect.

  • Data
  • Inspector General
  • Jobs
  • Newsroom
  • Regulations.gov
  • Subscribe
  • USA.gov
  • White House

Ask.

  • Contact EPA
  • EPA Disclaimers
  • Hotlines
  • FOIA Requests
  • Frequent Questions
  • Site Feedback

Follow.