I. Duration of Computer Accounts
Who When Expires Endorsement visiting faculty, research fellows, guest scholars end of visit* MSO graduate students end of student status(one quarter grace period) Graduate Counselor non-math graduate students taking designated** math graduate courses end of quarter Instructor P.I. guests as appropriate grant P.I. other*** as appropriate Chair, C.C.
* Expiration Date to be determined by MSO.
** At the beginning of each quarter, graduate courses that plan to use graduate lab will be determined.
*** Any other account requests have to be approved by the Chair of the Computing Committee. A supplemental form should be submitted to the consulting room along with an account application form.
Note: No account extensions can be granted without specific approval of the Chair of the Computing Committee (or the grant P.I., if the account is on a grant machine). File the supplemental form in the consulting room.
II. Policy Statement For Using Mathnet Computing Facilities
The Mathematics Department provides computing facilities to support research and education in mathematics. Use of this facility is restricted to its faculty, students, and staff. Some of the equipment is in support of (and funded by) subgroups within the Department. Use of a subgroup's equipment is limited to members of that subgroup. Exceptions require special approval.
All users must abide by the following rules:
- Accounts are to support mathematics research, mathematics education, and related Mathematics departmental activities only.
- The user account is for use by the applicant only. Accounts must not be shared with others. Assistants should obtain their own accounts.
- The system software, including the UNIX system itself, and many of the application software packages on the system are copyrighted or provided subject to licensing agreements between the vendor and the University of California. Copying licensed software is a serious violation of departmental and university policy and can also entail civil penalties.
- UNIX is not an absolutely secure system. Users must not attempt to violate any aspect of system security. For example, users must not take actions that could compromise the privacy of other users' accounts, files, or passwords, disguise the source of electronic mail, or conceal other aspects of their use of the system. (Under the recently passed Federal ``Communications Privacy Act,'' accessing another users' files without permission is a misdemeanor, and, in extreme cases, a felony.)
- The system is a limited resource shared by many people. Users must respect the rights of others to their share of use of the system and laboratories. Users should avoid impacting the system by running multiple computation-intensive jobs or by playing games. They should not monopolize public terminals or dial-in modem lines. They should limit their use of shared disk storage space.
- Users should follow laboratory rules, both as posted and as described in on-line handout, should comply with the requests of system administrators, and in general should help to keep laboratories in a condition suitable for use by all others.
- Failure to abide by the above departmental policies regarding the use of systems and peripheral devices will result in the cancellation of user privileges, appropriate university discipline, or even filing of criminal charges if circumstances warrant.
For more information, contact the Math Computer Consulting Office.
Last Updated: