- File Server Policy
-
By using the IGB File Server, you agree to adhere to the following policies:
Home Directories
Each user is allowed 50 GB of personal information in their home directory. If you exceed your allocated 50 GB of space, CNRG will send you an e-mail asking you to remedy the situation.
Illegal or offensive content is not permitted on the IGB file serverGroup Directories
Each Research Theme is allocated 20 TB of shared space on the server that is split into sub-directories by each faculty/affiliate in the Theme. The purpose of this space is to share data between theme faculty, staff, and students, and for inter-theme collaboration. CNRG will not create private directories (those that only one user can access) in this space; personal data should be kept in your home directory.
- Account Policy
-
Availability
IGB Accounts are available to anyone affiliated with the IGB.
IGB Accounts are used for the following services:
• IGB Lab Safety Training
• IGB File Server
• Biocluster (add link to Biocluster request form)Password Changes
Users are required to change their passwords once per year. You will be notified several times by email before your current password expires. Contact help@igb.illinois.edu if your password has already expired.
Account Removal
IGB accounts can be removed for the following reasons:
• At the request of the user
• Six months after the user has left the IGB
• Six months after the user’s password has expiredCNRG reserves the right to terminate any account for any reason once a user is no longer affiliated with the IGB. Any data associated with the account will be turned over to the listed supervisor when the account is removed. To keep an account for more than six months beyond the end of the user's affiliation with the IGB, an IGB faculty member or affiliate must email help@igb.illinois.edu to request the extension.
- Computer Security Policy
-
Operating System Updates
IGB members are responsible for keeping their operating systems up to date with the current security patches provided by the manufacturer. CNRG may send notices of critical security updates by email. Failure to comply with this policy can result in your network connection being suspended. If you have questions about updating your system, please email help@igb.illinois.edu
Virus Scanning
IGB members are responsible for keeping an Anti-Virus program installed on their computers and kept up-to-date. CNRG may send notices of widespread viruses or other security threats by email. Failure to comply with this policy can result in your network connection being suspended.
If you are using Windows 10 or 11, we recommend Windows Defender. Windows Defender is built in to your operating system and can be found by searching for it in the Start Menu.
Software
At the IGB we generally allow users to install any software on their machine so long as it complies with all other policies, is not offensive, and is allowed by your superiors. However, if a user has a high frequency of problems with their machine due to the installation of junk programs or modification of programs requiring recurring CNRG assistance to fix, then the user's ability to install programs on their machine can be revoked. In general we expect users to be able to install their own software and do their own upgrades, however if there are problems we are more than happy to help.
Peer to Peer Software
To maintain network integrity and legal compliance, the use of torrenting software or peer-to-peer file sharing for downloading copyrighted material is not permitted. CNRG regularly scans for peer-to-peer traffic on our network.
Instrument Computers
All instrument-connected computers are to only be used in conjunction with the attached instrument. No other activities - including web surfing and e-mail checking - shall not be done from these machines. This is due to the necessary uptime of these machines and the cost and difficulty of re-installing the software for the instrument.
- Network Security Policy
-
Switches, Routers, Access Points
Per UIUC network policy, switches, routers, and access points are not allowed on the IGB network without written permission from CNRG. Failure to comply with this policy will result in the device being removed until a discussion with the appropriate professor or theme leader occurs.
Web, FTP, and other Servers
Web, FTP, and other servers are permitted on the IGB network so long as they do not generate a disproportionate amount of network traffic, are not involved in illegal activity, are kept secure, and do not contain content that contributes to an uncomfortable work environment.
- Desktop Backup Policy
-
Availability
The desktop backup service is available free to all in the IGB. However, this system is not foolproof. If you have extremely important files we suggest keeping them in more than one location. You may install the backup client on up to 4 of your IGB owned computers.
Responsibility
We will make our best effort to keep the system running on our end, but there will be days when for whatever reason the backup server does not respond properly. It is not feasible for us to check everyone's desktop backup client (Carbonite) to make sure it is running properly, so we suggest that each user periodically check desktop backup client (Carbonite) to see when they were last backed up and to notify us if there is a problem.
Data Retention
If everything is working properly, then any data on your computer aside from any of the exceptions below should be backed up on the Carbonite server. Any systems not backing up data for a year will be removed from the service. Carbonite is not meant to be a way to keep historical archives of old computer systems.
Disk Size
You are given a quota of 300GB of space on the backup server to store your backed up data.
Exceptions
Audio, video, and disk image files will not be backed up due to their large file sizes. For a full list of blocked file types, please contact us at help@igb.illinois.edu.
- Server Hosting Policy
-
Availability
Any lab or group that is interested in having a server hosted in IGB's server room, please reach out to help@igb.illinois.edu and we can provide suggestions and insight on what will work best for the work you are doing.
Responsibility
When the Computer and Network Resource Group (CNRG) manages a system, they assume the ultimate responsibility for the security of the system, not including any software being developed by the end user. As a result, for systems administered by the CNRG, no user will be allowed to have root access outside of CNRG personnel. In addition, all systems administered by CNRG will be monitored continuously by software, and in case of an outage, CNRG members will respond to restore the service as soon as possible.
- Virtual Machine (VM) Policy
-
Availability
Any lab or group that is interested in having a virtual machine set up, please reach out to help@igb.illinois.edu and we can provide suggestions and insight on what will work best for the work you are doing.
Support
CNRG will provide a basic level of support and security management for each VM. However, if something in addition to that is needed, CNRG will be happy to work on an MOU to increase the support when necessary.
Passwords
Passwords on VMs are set up for the end user. Sudo access can be granted upon request. The user table can be either custom, use the IGB LDAP service, or use the campus AD.