WWW Public Fusion Internal Users

Section I - Basic Policies and Procedures for computer users within the Fusion DOE Cyberspace.

The Energy Group at General Atomics is composed of many unique organizations. A number of those organizations deal with Fusion Energy: DIII-D National Fusion Facility, Magnetic Fusion, Theory and Computational Science, Inertial Fusion Technology, Technical Publications, and Program Support. For simplicity, these organizations will be collectively referred to as the "Fusion Organizations" or "Fusion". At General Atomics, only the Fusion Organizations are connected to the Internet through the Energy Sciences Network. This connection makes the Fusion Organizations part of US Department of Energy (DOE) Cyber Space and obligates them to follow DOE rules and guidelines. One such obligation is for all computer users to annually participate in the site's Cyber Security Awareness program.

Your computer account is assigned only to you. Through this account, you are allowed certain system and project access privileges appropriate to performing your specific tasks. You are personally responsible for the appropriate use, care, and protection of any systems you access or for which you are assigned custodian responsibility, as well as software and data that reside on those systems.

At the time you made a Cyber Access Request, you read and agreed to the stated Policies and Procedures and, where applicable, you agreed to the DIII-D Data Usage and Publication Policy. What follows now is a reminder of some of the Policies you agreed to follow.


Appropriate use of computers within DOE Cyber Space

DOE Cyber Space is to be used for DOE-related work. Although incidental personal usage is permitted, it should be kept to a minimum. Should you have non-DOE work to perform, it must not be done within DOE Cyber Space. In this case, contact the Computer Support group for guidance.

Examples of limited personal usage, unrelated to work assignments, might include such things as an occasional small email to relatives, briefly checking the stock market or newspapers, work on resumes, or self-training for professional development. Basically, such usage must be consistent with the following:

  • it does not involve illegal activities,
  • it does not involve personal gain or political activities,
  • it does not violate stated policies or GA Standards of Business Ethics and Conduct,
  • it does not violate DOE policies,
  • it does not embarrass GA, the Energy Group, or the DOE, and
  • it does not consume excessive resources or interfere with the work of the Fusion organizations.


Inappropriate Use of computers within DOE Cyber Space

As previously stated, work done in DOE Cyber Space needs to be DOE work. It is important that the expected resources are available when they are needed. No user should do anything to cause harm to or to limit functionality of these resources.

While every effort is made to provide a robust, flexible computer environment to staff, there are certain activities and software applications that are not permitted in the Fusion cyber environment. It is your responsibility to know and abide by these limits. The following lists examples of disallowed activities.

Examples of Non-Sanctioned Activities
  • Any activity prohibited by General Atomics, DOE, or Fusion organizations, including but not limited to, lobbying, political activities, or solicitations.
  • The creation, downloading, viewing, storage, copying, or transmission of sexually explicit or sexually oriented materials.
  • Gambling.
  • Supporting or accessing sites promoting hate language, harassments or threats or sites that support discrimination of any nature.
  • Disabling security features or downloading hacker tools, including viruses, password crackers, network sniffing or scanning tools, or anything that can have malicious intent.
  • Participating in distributed computing efforts (e.g., SETI, Einstein@Home) that originate from non-project programs and are not monitored by the user and/or are not used for legitimate work.
  • Any personal use that may mislead someone into believing that you are acting in an official capacity.
  • Creation and forwarding of chain letters and mass mailings or using internal email distribution lists for non-work-related activities.
  • Using Fusion equipment and resources as staging grounds to gain unauthorized access to other systems.
  • Participating in any sort of illegal activities such as copyright violation, downloading bootlegged software, movies, music or such, serving via (e.g.)"peer-to-peer" any sort of copyrighted material without the permission of the author.
  • Operating a business or supporting for-profit organizations for compensation or hosting services for purposes not related to Fusion work.
  • Allowing unauthorized individuals (friends, family members, non-Fusion employees, vendors, etc.) use of GA or Fusion provided equipment or network resources.