WWC snapshot of http://www.alw.nih.gov/WWW/ALW-policy.html taken on Sat Jun 10 17:44:29 1995

NIH Advanced Laboratory Workstation Policy

May, 1995

Table of Contents


Hours of Operation

Advanced Laboratory Workstation (ALW) servers generally operate 24 hours a day, seven days a week. Scheduled interruptions of service will be announced via electronic mail and the ALW World Wide Web (WWW) service at least one week in advance.

ALW servers are attended by operators from 8:00 am to 12:00 midnight Monday through Friday, excluding Federal holidays, and from 8:00 am to 4:00 pm on Saturdays.

The ALW System's staff provides customer support from 9:00 am to 4:00 pm Monday through Friday, excluding Federal holidays.

Remedial hardware maintenance is available for ALW file servers (not user-owned workstations) from 8:00 am to 5:00 pm Monday through Friday, excluding Federal holidays, with a four hour response time to begin repairs.

Service Charges

A schedule of rates governing the various kinds of services offered by DCRT has been established under the NIH Service and Supply Fund (Revolving Fund). For billing purposes, each customer-defined project is identified by a DCRT account number. In addition, everyone who personally uses any computer services must obtain a registered user name, which must be used on all requests for services and to authenticate to the ALW System. Users of data processing facilities are billed monthly.

Responsibilities of Account Sponsors

Each DCRT account is managed by an account sponsor, who plays a vital role in the success of the ALW System. Because of this, each sponsor should designate an alternate to accept responsibility in the sponsor's absence. Sponsors and alternates must be government employees. They have full responsibility for their computer accounts, and must ensure that accounts are used properly and for purposes that directly relate to official government business. Account sponsors open and close accounts, authorize and remove users, workstations, and group storage under their accounts, carry out important financial responsibilities, and provide the interface between the users and DCRT staff in account security and other matters.

The ALW staff wants to be kept informed of problems encountered by account sponsors and would like to hear about their concerns. The ALW Problem Tracking and Reporting system (PTR) or the 4-DCRT or 6-UNIX hotline should be used to inform DCRT of user problems, to authorize resetting forgotten passwords, and to apply for refunds. See Reporting Problems and Requesting Services for further information. Communication, or course, must always be two ways. Occasionally, DCRT staff will contact account sponsors in order to update information or if a problem arises concerning the use of an account.

The DCRT Technical Assistance and Support Center (TASC) serves as a focal point for all DCRT accounts and welcomes inquiries from sponsors concerning administrative procedures. Contact them by calling 4-DCRT (4-3278).

Specific responsibilities of account sponsors include:

Reporting Problems and Requesting Services

ALW staff responds only to problems and requests for services (increasing disk space, restoring backups, changing configurations, and so on) reported either by submitting a Problem Trouble Report (PTR) via the ptr command on an ALW machine, or by calling 4-DCRT (4-3278) or 6-UNIX (6-8649). Problems reported via other mechanisms are not logged, dispatched, or tracked.

We respond to problems and requests for services on a "best efforts" basis. However, we usually respond to requests for disk space and service outages in less than four hours, and to routine problems, questions, and requests to restore data from backups in less than two working days.

Proper Use of the ALW System

It is illegal to use government computer resources for personal or recreational purposes. Personal use includes generation of social mailing lists, personal correspondence, programs to process household financial records, and so on. The illegality of personal use of government computer resources is covered in both the Standards of Conduct and Title 18 of the Federal Code of Regulations. Recreational use includes the creation of artwork and calendars with no work-related purpose and the playing of games. Immediate action will be taken against any user found to be using ALW resources improperly. In addition, it is prohibited to produce, store, display, or transmit material that is sexually explicit, suggestive or otherwise offensive on government computing resources or facsimile machines. Federal Information Processing (FIP) resources at NIH are to be used solely to support the NIH mission

Employees who use FIP resources in a manner prohibited by the EEOC guidelines or DHHS Standards of Conduct will be subject to disciplinary action, up to and including suspension.

Access to shared data and applications programs

The ability to share stored data is one recognized advantage of the ALW environment. However, access to or the use of information (e.g., data and applications programs) stored on the ALW System is the sole responsibility of the "owner" -- the account sponsor or registered user -- of such information. Information belonging to other users may not be accessed, regardless of the degree of access control applied to it, without the explicit permission of the owner unless the information is stored in a facility which is intended for general availability such as the anonymous FTP or World Wide Web directories. Unauthorized access to data is a breach of Federal privacy/security regulations (See Security).

Proper use of communication facilities

Particular care must be taken in use of inter-user communication facilities such as electronic mail and news. Use of these facilities to harass other users, send obscene messages, or perpetrate jokes is a clear misuse of federal computing resources. In addition, electronic mail must be addressed to the specific persons who are intended to receive the mail; indiscriminate sending of electronic mail, either as bulk mail to many recipients or as mail to a random recipient, is not allowed.

Proper use of licensed software

NOTICE: Software distributed on the ALW System is obtained under a variety of legally binding license agreements that restrict the use, duplication, and transfer of the software and associated documentation. Unauthorized use, duplication, and/or distribution of this software can result in penalties for both the individual responsible and the National Institutes of Health, including civil damages up to $50,000 for each occurrence and criminal penalties including fines and imprisonment.

Each licensed software package and associated documentation distributed on the ALW System is authorized for limited use in conjunction with the services provided by the NIH Computing Facilities Branch. This software and documentation may not be duplicated or transferred to any other individual or facility. Each user who requests and receives such software is responsible for insuring its proper use. In the event of improper use, unauthorized copying or redistribution of the software and/or associated documentation, we will contact the responsible user and account sponsor for corrective action.

All users and account sponsors are responsible for paying special attention to the software listed in
Appendix C. Even though these software applications are accessible from all ALW workstations, use without a license constitutes software theft and violates both federal law and NIH policy.

Security

The Privacy Act of 1974 (Public Law 93-597) requires that Federal Agencies which collect information about individuals insure that it is disclosed only to authorized individuals and agencies; that it is accurate, relevant, up-to-date, and complete; and that its security and integrity are protected.

Computer security is a vital concern at NIH. The Computing Facilities Branch maintains physical security procedures to protect data from improper access by unauthorized individuals and performs contingency planning to insure that vital data can be reclaimed if a major physical disaster occurs. Each user and account sponsor has a clear role in maintaining a responsible level of computing security. Users and sponsors are expected to take routine precautions to safeguard the privacy of their passwords, and to report any suspected violations of this privacy to ALW staff.

Physical Security

To meet its responsibilities under the Privacy Act and to enable users to protect other types of sensitive data, the Computing Facilities Branch restricts physical access to its computer machine rooms. The restricted areas include the ALW, Convex System, and System 370 machine rooms and the output distribution area. Anyone in these areas must have an authorized identification badge. There are two types of badges. Regular entry badges are given to Computing Facilities Branch employees who have a recurring need to enter the restricted area. Temporary access badges, which permit short-term entry to equipment installers, repairmen, visitors, etc., are issued by the Head, Computer Operations Unit.

Any security system is only as effective as the efforts of the people using it. Users must also take actions to utilize the security facilities provided and to promote security in their working locations. Rooms housing workstations should be locked, passwords should not be kept near the workstation, papers with privacy data or any reference to passwords should be kept in a locked area, and users should logout or unlog before leaving their workstations unattended.

Disaster Planning

A disaster recovery plan is an organized effort to minimize the impact of a possible disaster that may interrupt data processing capabilitites. As part of our plan, all ALW servers are powered from Uninterruptible Power Supplies (UPSs) with sufficient capacity to isolate the servers from most power outages, which last only a few seconds.

We also plan to create additional full backup tapes of all disks that are used for the permanent storage of data and send these off-site for storage. In this way, some data and system recovery will be possible if there is a major catastrophe such as a flood or fire. We have not yet implemented this plan, however, so we recommend that users with critical data should periodically copy it to tape and arrange for off-site storage themselves.

Data and Access Security

Data security, beyond the physical security of the central computer facility and the system software that protects data while being processed, is the responsibility of the users who create and maintain data systems.

Users are responsible for deciding what other types of computerized data may need protection and for choosing and using appropriate security measures from among those offered. Please note however: The ALW System has not been certified by the Department of Defense to process any classified military data. Since the research mission of NIH requires data and information sharing, there will always by design be data that is not protected against access. Data should not be accessed without the owner's knowledge unless it is clearly intended for shared access.

The ALW System offers several facilities to assist in maintaining the security of data:

It should be noted that anyone who violates the provisions of the Privacy Act and permits the unauthorized release of personal information is subject to prosecution and fines.

Procedures for a Safer Computing Environment

Protect your account; select good passwords, change your password frequently (at least every other month), and avoid sharing your password with others. "Sharing" passwords undermines security, possibly resulting in unauthorized access to government computing resources.

Be particularly cautious when using network utilities such as telnet, ftp, and rlogin. When these programs prompt you for your password, they send it in the clear over the network, possibly revealing it to eavesdroppers.

Be careful about revealing your password to someone on the telephone. ALW staff never call users requesting their passwords unless it is with regard to a specific problem that has been reported by a Problem Tracking Report (PTR) or in direct response to a user telephone call. If an ALW staff member must initiate a contact and request a password, users should ask for the staffer's name and call back through the help line before fulfilling the request. This will ensure the identity of the ALW staff member, and prevent unauthorized persons from posing as systems personnel.

Remember that giving system:anyuser read or write permission on an Access Control List (ACL) enables over 20 million Internet users around the globe to read or write your files--do not do this unless that is what you intend!

Reboot your ALW at least twice a month to receive the latest security and system updates.

Security Violation Procedure

The ALW staff carefully monitors the system security information and takes immediate action when it appears that an attempt to breach security has occurred. Use of the login name related to any security violation is immediately suspended by the ALW Security Investigators.

The Security Investigators contact the account sponsor or alternate contact by telephone and send a confirming memorandum detailing the specific circumstances of the apparent security violation. In such a situation, it is the responsibility of the account sponsor to investigate the apparent violation and return a written explanation to the ALW staff responding to each instance of possible violation. When the written explanation is received and accepted, the Security Investigators will reinstate the suspended account/initials. Attempts to breach security may be innocent (simple lack of knowledge or understanding), but we are required to pursue all apparent security violations. ALW staff will work with the account sponsor to determine the cause of the problem and how violations can be avoided in the future.

At times, users may discover apparent breaches of security (such as discovering that an unknown person is making use of their login name), or may need assistance with a security-related problem. Please report apparent security problems immediately to the ALW staff.

Forgotten Passwords

In the unfortunate event that a password is forgotten, the user will be unable to authenticate and access ALW files. A forgotten password must be reset by ALW staff because passwords are stored only in an encrypted form. To request that a password be reset, the user or account sponsor may submit a PTR or send a memo to:
	Chief, Distributed Systems Section
	Computing Facilities Branch, DCRT
	National Institutes of Health 
	Building 12A, Room 2033
	12 SOUTH DR MSC 5624
	BETHESDA MD 20892-5624
	FAX: (301) 402-2867 
Since the password is by definition confidential, any request for "lost password" assistance will require extensive validation by ALW staff. This validation process entails checking records, contacting the account sponsor, and running software that resets the password. The length of time required to reset a user's password will depend on the time required to locate the individual who must authorize the password request. This process may require several days. Be extremely careful not to forget passwords.

Software Support

ALW provides installation and maintenance upgrades on a "best efforts" basis for software according to how it is licensed, as described in the following sections.

Public Domain and Freely Distributable Software

Public domain software is not covered by copyright (e.g. software developed by Government employees). Freely distributable software has a copyright that permits free distribution with restrictions or limitations (e.g. the GNU software, which requires distribution of source code).

ALW distributes supported public domain and freely distributable software to all client workstations. ALW staff provides support on a "best efforts" basis, since the authors of such software have no obligation to correct problems or provide assistance.

Site Licensed Software

Software in this category is copyrighted software licensed to be used on any machine subscribing to ALW service, for example, the vendor's UNIX operating system and the AFS cache manager. See Appendix A for a list of ALW site licensed software.

ALW distributes site licensed software to all client workstations. ALW staff provides assistance on a "best efforts" basis, and relies on the software vendor to correct defects and make enhancements.

Network Licensed Software

More and more applications are available with network licenses, also known as "floating" licenses. ALW distributes network licensed applications software to all client workstations. When such an application is executed, it contacts a license server to "check out" one of a limited number of licenses. If the supply of licenses is exhausted or the license server cannot be reached, the application issues a warning and will not run, or run only in a "demo" mode that does not permit work to be saved. Should this occur, notify the ALW staff via a PTR or by calling 4-DCRT or 6-UNIX so they can correct the problem or order additional licenses. Proper ALW etiquette is to not leave network licensed applications running if you are not using them, so the license is available to your fellow users. See Appendix B for a list of network licensed applications.

ALW staff provides assistance on a "best efforts" basis, and relies on the software vendor to correct defects and make enhancements.

Single Machine Licensed Software

Software is this category is licensed for use only on a specific machine. ALW distributes supported single machine licensed software to all client workstations, but users are expected to purchase their own licenses and maintenance service directly from the vendor.

Software licensed for a single machine may or may not run on an unlicensed machine, depending upon whether or not the vendor's software enforces the license.

Appendix C is a list of single machine licensed software. Even though these software applications are accessible from all ALW workstations, use without a license constitutes software theft and violates both federal law and NIH policy.

ALW staff provides assistance on a "best efforts" basis, and relies on the software vendor to correct defects and make enhancements.

Hardware Support

ALW currently provides no hardware support. This includes hardware installation. We recommend that users purchase installation from the equipment vendor along with the equipment itself, and that users purchase hardware maintenance from a qualified source.

Support for Third-Party Peripherals

We strongly recommend that owners of ALW workstations only use peripherals (e.g. expansion memory, disk drives, optical disk drives, tape drives, network interfaces, etc.) that are manufactured by the same company that manufactured their workstations (i.e., SUN disks for Suns, HP disks for HPs, and so on). While ususally such peripherals are slightly more expensive than so-called "third-party" peripherals, the manufacturers' peripherals can always be covered under your workstation hardware maintenance contract and, more importantly, the manufacturer can be relied upon to support their peripherals in current and future releases of their operating systems.

However, should you choose to attach third-party peripherals, the ALW policy for supporting these is as follows:

  1. ALW does not perform hardware installation or maintenance. The workstation owner is responsible for connecting cables, setting device numbers, installing memory, controllers, adapters, etc. We recommend purchasing installation from the equipment vendor on the original equipment order.

  2. ALW maintains a list of the third party peripherals for which we will perform software installation (see Appendix D). Workstation owners are responsible for checking this list in advance to be sure that we support the equipment they plan on ordering--DO NOT BELIEVE THE VENDOR!

  3. If a workstation owner can successfully install the hardware and software for an unsupported peripheral device on an ALW, make the device functional (e.g. mount partitions from a storage device), and provide us with all necessary software and the software installation procedure, we will make the installation persistent and add the device to our list of supported third party peripherals.

We have no control over continued software support for peripherals. Often, major operating system upgrades require new software and installation procedures for third-party equipment. If we do not obtain the new software and installation instructions from ALW users about these peripherals, the devices will be removed from our support list.

Local Magnetic and Optical Disk Storage

ALW does not recommend use of local magnetic or optical disk drives as an alternative to ALW-managed file space in AFS. We do not back up local storage, and cannot recover lost or corrupted files. Storage of data on optical media does not protect it from unintentional deletion, corruption by misuse or malfunction of system or application software, or mishandling or loss of removable media.

However, local storage devices should function normally on ALW systems. Upon request, ALW staff will custom package systems to automatically mount local storage.

ALW does not support the use of local storage for the home directories of registered ALW users. These must reside in AFS. AFS-resident home directories may contain symbolic links to directories on local storage, however.

File Backup Schedule

ALW makes backups of user home volumes and user data volumes each working day, Monday through Saturday, excluding Federal holidays. The daily backup takes a snapshot of user data as it was at approximately 6 A.M. of the same day. ALW can recover data as follows, depending on the age of the lost data:

Data less than 1 day old

The user data snapshot from which a backup is made is retained on line for 24 hours. You can recover data from your home directory as it was at the most recent 6 A.M. simply by looking in the directory path ~/OldFiles. An ALW system administrator can assist in recovering any other user data as it was at the most recent 6 A.M. by mounting the backup volume.

Data 2 to 7 days old

All daily backup tapes are retained for seven days. ALW staff can restore data from any working day in the previous 7 days.

Data 8 to 30 days old

One daily backup tape each week is retained for 30 days. ALW staff can recover data from some one day within each week for up to 30 days.

Data 31 to 365 days old

One daily backup tape from each 30-day period is retained for 365 days. ALW staff can recover data from some one day within each 30 day period for up to 365 days.

Data more than 365 days old

Data more than 365 days old is not retained and cannot be recovered.

Policy Change Procedure

Proposed changes to ALW policies will be posted on the ALW World Wide Web server at least 30 days prior to adoption to allow sufficient time for comment by ALW users.

Appendix A: ALW Site Licensed Software

Analyze  			analyze
MRIPS Medical Xcaliber		medx

Appendix B: ALW Network Licensed Software

AVS  				avs
Asterix				asterix
FrameMaker			maker
Lotus 1-2-3			123
Macsyma				macsyma
Mathematica			math
Matlab				matlab
Microsoft Excel			excel
Microsoft Word			word
Quanta				quanta
S-Plus				splus
SAS				sas
SoftWindows			softwindows
Sun ANSI C Compiler		cc
Sun ANSI C++ Compiler		CC
Sun ANSI FORTRAN Compiler	f77
Sun ANSI Pascal Compiler	pc
Synchronize			synchronize
WordPerfect			wp

Appendix C: ALW Single Machine Licensed Software

NOTICE: Use of the following software without a valid license constitutes software theft and violates both federal law and NIH policy
HP ANSI C Compiler		/bin/cc
HP C Developer's Kit		/usr/bin/admin /usr/bin/cdc /usr/bin/prof ...
HP C++ Compiler			/usr/bin/CC
HP C++ Developer's Kit		/usr/bin/cdvi, /usr/bin/cxxdev
HP Fortran77			/usr/bin/f77
HP Glance			glance
HP Laser CD-ROM			lrom
HP Pascal Compiler		/usr/bin/pc
HP SoftPC			/usr/bin/spc

Appendix D: Supported Third-Party Peripherals

CD Rom Drives

	TOSHIBA [Brand Name - No model info]

Disks

	ANDATACO
		[Andataco MICROP 2217-15MQ1001901]
		[AD1926 cyl 2770]
		[AD210 cyl 2575]
		[ANDATACO 200D3 DEC DSP3160S]
		[ANDATACO 450D5 DEC DSP5400S]
		[Andataco SEAGATE ST15150N]

	DEC
		[DEC RZ24 cyl 1346]

	FALCON
		[FALCON ST31200N cyl 2724]
		[FALCON 1.0GB-ST11200N cyl 1874]

	FUJITSU
		[Fujitsu1 cyl 1427]
		[FUJITSU M2624F-512]
		[Fujitsu M2624FA SCSI cyl 1463]

	IBM
		[SSE-400 [IBM-467] cyl 1162]

	MICROPOLIS
		[Micropolis 1598 cyl 1892]
		[Micropolis 1598-15 cyl 1931]
		[Micropolis 1908 cyl 1890]

	MAXTOR
		[MAXTOR P1-17S]
		[Maxtor XT-8000S]

	QUANTUM
		[Quantum ProDrive 105S cyl 974]

	SEAGATE
		[Seagate ST1480N]
		[Seagate ST11200N cyl 1853]
		[Seagate ST12400N cyl 2626]
		[ST3600N cyl 1872]
		[ST42100N cyl 2570]
		[ST42100N cyl 2571]
		[Segate cyl 2124]

	Unknown
		[BSCG1.2 cyl 1892]
		[BSCG1598-15 cyl 1892]
		[CDC Wren VII 94601-12G]
		[CRANEL-M2266SA cyl 1656]
		[Tahiti cyl 29190]
		[Wren4 cyl 1221]
		[Wren7 cyl 1616]
		[WREN-7 cyl 1929]

FDDI Interfaces

	CRESCENDO
		[FDDI Driver Release 2.1 for SunOS 4.1.x]
		[FDDI Driver Release 1.0 for Solaris 2.1]

	NETWORK PERIPHERALS
		[NP-SB FDDI Driver Release 1.5 for SunOS 4.1.x]
		[NP-SB FDDI Driver Release 2.2 for Solaris 2.x]

Optical Disks

	ARTECON
		[Artecon Erasable Optical Disk (EOD) - No model info]

	MAXOPTIX
		[MAXOPTIX Optical Disk (Loadable SQ Driver) - No model info]
		[MaxOptix Tahiti 2 A7.1 - No model info]

	 PINNACLE
		[REO Optical Disk Jukebox (Loadable JB driver) - No model info]
		[REO-650 Optical Disk - Compatible with SunOS 4.1.X]
		[REO-650/1300 Optical Disk]

Tape Drives

	ANDATACO
		[Exabyte EXB-8200 8mm Helical Scan]

	Unknown
		[Emulex MT02 QIC-11/QIC-24]

Miscellaneous

	Scanner "GPIB SCSI Controller [N. I. GPIB-SCSI] scanner"
	Sun SPARC 10 Clone "Axil Workstation [Axil 311]"
	SCSI Controller "[ptscII0] [ptvme0] ??"

Last modified: May 4, 1995

Keith Gorlen
Distributed Systems Section, Computing Facilities Branch
Division of Computer Research and Technology
National Institutes of Health
kgorlen@alw.nih.gov