Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

EDA User Check List (Read this page.)

EDA User Discussion Check List

  • EDA is primarily intended for installation of academic applications
  • IT staff will continue to provide management of the desktop computer
    • EDA users should not modify managed software without consulting with IT staff
    • EDA users should not modify security settings on the computer  without consulting with IT staff
    • Examples:
    • Anti-virus
    • Operating System/Application patching
    • Firewall settings
    • EDA users should inform IT staff when making configuration changes
    • EDA users should not create local accounts or modify existing accounts
  • The EDA user is responsible for licensing any applications installed with EDA
  • Do not share EDA account and password with anyone
  • Typical EDA user support will be done through the users account by IT staff, via UAC and the local administrator account
  • IT staff will be monitoring more closely the operation of computers configured with EDA
    • Process launched from EDA access
    • Applications installed
    • Changes to security settings/applications
    • EDA users will receive information about EDA use via email


  • Due to heightened security concerns, ITS mandates that IT staff review and remediate incidents that occur in violation of the agreement.  Remediation may include loss of EDA privileges.
  • Similar to standard desktops and laptops, EDA computers are not backed up, so any data stored locally is unprotected from loss

View file
nameEDA User Discussion Check List.docx
height250

...