Section I - Basic Policies and Procedures for computer users within the Fusion DOE Cyberspace.The Energy Group at General Atomics is composed of many unique organizations. A number of those organizations deal with Fusion Energy: DIII-D National Fusion Facility, Magnetic Fusion, Theory and Computational Science, Inertial Fusion Technology, Technical Publications, and Program Support. For simplicity, these organizations will be collectively referred to as the "Fusion Organizations" or "Fusion". At General Atomics, only the Fusion Organizations are connected to the Internet through the Energy Sciences Network. This connection makes the Fusion Organizations part of US Department of Energy (DOE) Cyber Space and obligates them to follow DOE rules and guidelines. One such obligation is for all computer users to annually participate in the site's Cyber Security Awareness program. Your computer account is assigned only to you. Through this account, you are allowed certain system and project access privileges appropriate to performing your specific tasks. You are personally responsible for the appropriate use, care, and protection of any systems you access or for which you are assigned custodian responsibility, as well as software and data that reside on those systems. At the time you made a Cyber Access Request, you read and agreed to the stated Policies and Procedures and, where applicable, you agreed to the DIII-D Data Usage and Publication Policy. What follows now is a reminder of some of the Policies you agreed to follow. Appropriate use of computers within DOE Cyber SpaceDOE Cyber Space is to be used for DOE-related work. Although incidental personal usage is permitted, it should be kept to a minimum. Should you have non-DOE work to perform, it must not be done within DOE Cyber Space. In this case, contact the Computer Support group for guidance. Examples of limited personal usage, unrelated to work assignments, might include such things as an occasional small email to relatives, briefly checking the stock market or newspapers, work on resumes, or self-training for professional development. Basically, such usage must be consistent with the following:
Inappropriate Use of computers within DOE Cyber SpaceAs previously stated, work done in DOE Cyber Space needs to be DOE work. It is important that the expected resources are available when they are needed. No user should do anything to cause harm to or to limit functionality of these resources. While every effort is made to provide a robust, flexible computer environment to staff, there are certain activities and software applications that are not permitted in the Fusion cyber environment. It is your responsibility to know and abide by these limits. The following lists examples of disallowed activities. Examples of Non-Sanctioned Activities
|
This page was updated February 06 2020. ©2024 General Atomics All Rights Reserved |