Helix Systems > new users
 

Policies of Helix Systems


 

Who May Use the NIH Helix Systems

Accounts on the NIH Helix systems are for the use of researchers in NIH intramural research programs.

User Responsibilities

The NIH Helix systems are for appropriate government use only

System resources are for the work-related use of authorized users only. In particular, Internet Relay Chat (IRC), Multiple User Dungeons (MUDs) and MOO are not considered appropriate use of NIH Helix system resources.

E-Mail

The NIH Office of Information Resources Management considers chain letters, holiday joke messages, and ads to be inappropriate activities, subject to disciplinary action, according to an OIRM policy memo.

Internet

The NIH Senior IRM Official released a policy memo on December 8, 1995 stating "use of the NIH Internet services is limited to activities that support the NIH mission," subject to disciplinary action including suspension.

World Wide Web

The NIH IRM Council released World Wide Web: NIH Guidance in December 1995. A cover letter states that ".users of NIH networks may create NIH Web pages that are clearly mission related, and do not violate the acceptable use policies of the systems or networks used to publish them." Policy guidelines comprise the bulk of the document.

Read the announcements!

Users are responsible for reading the system messages and announcements. Often these appear in the form of msgs on helix.nih.gov. Users who log into helix.nih.gov will see these automatically; those who only log onto other hosts should consider regularly invoking msgs remotely on helix. The following command (either on the command line or in your .login file on the non-helix host) can accomplish this.

rsh helix.nih.gov msgs -f

Account sharing among multiple users is strongly discouraged

Account sharing poses a security risk and introduces ambiguities into email and other services. User of shared accounts should not expect the same level of Staff software support offered to individual users.

Access to data and applications is implicitly restricted

Information belonging to another user may not be accessed, regardless of the degree of access control applied to it, without the explicit permission of the owner, unless the information is stored in a facility intended for general availability (such as an anonymous FTP or World Wide Web directory).

Be civil in your communications

Particular care must be taken in use of inter-user communication facilities such as electronic mail and USENET news. Use of these facilities to harass other users, send obscene messages, or perpetrate "chain letters" is a misuse of federal computing resources.

 

 

Helix Systems, CIT, NIH
last update: March 20, 2003