Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents

Glossary

Frequently Asked Questions (FAQs)

...

1.1.1 UW Acceptable Use Policy

...

1.1.3.3 Responsibilities of PIs

Project Requests: Principal Investigators (PIs) are the only individuals that may request the creation of new projects, or request changes to projects.

The request of a project responsible for ensuring that these policies, procedures, and security rules are followed for their project members and ensuring that project members working under their supervision fulfill these responsibilities.

User Account Requests: Principal Investigators (PIs) are the only individuals approved to request user access to ARCC resources. PIs are also the only individuals that may request access changes on their managed projects.

PIs are responsible for ensuring that these policies, procedures, and security rules are followed for their project members and ensuring that project members working under their supervision fulfill these responsibilities.

Designated Managers: PIs may identify designated managers of their projects. Designated managers are project members that are allowed to request specific actions associated with a project on behalf of the project PI. Designated manager requests should be made in writing and specify:

The individual granted DM status
The project(s) they are granted DM for
The associated actions on the project that may be requested by the DM on the PI’s behalf
Timeframe (if any) for DM designation

1.1.3.4 Research Use

ARCC resources may only be used for research activities and must never be used in the violation of any other university regulation. The following categories of use (without limitation) are prohibited:

...

ARCC resources may only be used for activities authorized by the University and are always subject to Unireg 8-1. Prohibited actions include, but are not limited to, the following:

1.1.4.1 Unauthorized Access

...

Attempting to send or receive messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misusing legal user credentials (usernames, passwords, etc.), or causing some system component to function incorrectly

1.1.4.2 Altering Authorized Access

...

Changing or circumventing access controls to allow the user or others to perform actions outside authorized privileges

1.1.4.3 Reconstruction of Information or Software

...

Reconstructing or re-creating information or software outside authorized privileges

1.1.4.4 Data Modification or Destruction

...

Taking actions that intentionally modify or delete information or programs outside authorized privileges

1.1.4.5 Malicious Software

...

Intentionally introducing or using malicious software, including, but not limited to, computer viruses, Trojan horses, or worms

1.1.4.6 Denial of Service Actions

...

Using UW/ARCC resources to interfere with any service availability, either at UW or at other sites

1.1.4.7 Pornography

...

Using UW/ARCC resources to access, upload, download, store, transmit, create, or otherwise use sexually explicit or pornographic material

1.1.4.8 Harassment

...

Engaging in an offensive or harassing actions toward another individual or organization

1.2 Software, Data, Security and Access Control

ARCC Use by Foreign Nationals

...