...
Table of Contents |
---|
Frequently Asked Questions (FAQs)
...
1.1.1 UW Acceptable Use Policy
...
1.1.3.3 Responsibilities of PIs
Project Requests: Principal Investigators (PIs) are the only individuals that may request the creation of new projects, or request changes to projects.
The request of a project responsible for ensuring that these policies, procedures, and security rules are followed for their project members and ensuring that project members working under their supervision fulfill these responsibilities.
User Account Requests: Principal Investigators (PIs) are the only individuals approved to request user access to ARCC resources. PIs are also the only individuals that may request access changes on their managed projects.
PIs are responsible for ensuring that these policies, procedures, and security rules are followed for their project members and ensuring that project members working under their supervision fulfill these responsibilities.
Designated Managers: PIs may identify designated managers of their projects. Designated managers are project members that are allowed to request specific actions associated with a project on behalf of the project PI. Designated manager requests should be made in writing and specify:
The individual granted DM status
The project(s) they are granted DM for
The associated actions on the project that may be requested by the DM on the PI’s behalf
Timeframe (if any) for DM designation
1.1.3.4 Research Use
ARCC resources may only be used for research activities and must never be used in the violation of any other university regulation. The following categories of use (without limitation) are prohibited:
...
to facilitate any transaction that would violate U.S. export control regulations.
1.1.3.5 User Data Requirements
Users of ARCC resources agree to store only data that meets the following conditions:
...
does NOT contain copyrighted material that the user doesn’t have appropriate rights to.
1.1.3.6 Compliance with requests from ARCC
...
You are required to comply within a prompt timeframe to ARCC direct requests from regarding the use of ARCC resources. This includes requests to reduce disk space consumption or halting prohibited actions. ARCC purposefully aims to keep our list policies as short as possible in order to facilitate the use of these research tools in novel and creative ways, however, behaviors or practices that interfere with the ability of others to use shared resources, must be handled with immediacy and ARCC staff require prompt compliance on such requests.
1.1.3.7 Monitor the email address for your account
...
You are required to monitor your USERNAME@uwyo.edu email address. If you are an external collaborator, you should monitor the email address provided to IT Application Security upon your account creation.
1.1.3.8 Provide notification
...
ARCC users should notify arcc-help@uwyo.edu immediately when aware that any accounts used to access ARCC resources have been compromised.
...
ARCC resources may only be used for activities authorized by the University and are always subject to Unireg 8-1. Prohibited actions include, but are not limited to, the following:
1.1.4.1 Unauthorized Access
...
Attempting to send or receive messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misusing legal user credentials (usernames, passwords, etc.), or causing some system component to function incorrectly
1.1.4.2 Altering Authorized Access
...
Changing or circumventing access controls to allow the user or others to perform actions outside authorized privileges
1.1.4.3 Reconstruction of Information or Software
...
Reconstructing or re-creating information or software outside authorized privileges
1.1.4.4 Data Modification or Destruction
...
Taking actions that intentionally modify or delete information or programs outside authorized privileges
1.1.4.5 Malicious Software
...
Intentionally introducing or using malicious software, including, but not limited to, computer viruses, Trojan horses, or worms
1.1.4.6 Denial of Service Actions
...
Using UW/ARCC resources to interfere with any service availability, either at UW or at other sites
1.1.4.7 Pornography
...
Using UW/ARCC resources to access, upload, download, store, transmit, create, or otherwise use sexually explicit or pornographic material
1.1.4.8 Harassment
...
Engaging in an offensive or harassing actions toward another individual or organization
1.2 Software, Data, Security and Access Control
ARCC Use by Foreign Nationals
...