Accounts

Types of Accounts

The PNNL and EMSL Computing Environment provides opportunity for several types of computer accounts. Staff group leaders and/or sponsors will identify which are appropriate for each person. Those available include

New User Registration Procedures

The following items are required before people can access EMSL computers. Normally, the group secretary or administrative assistant is responsible for determining what is required for each applicant and is trained on completing the various processes. Contact your EMSL sponsor to initiate these processes.

If the person is not a US citizen, the requesting organization must complete a Foreign National Visitor Authorization (FNVA). This process, depending on the sensitivity of the represented country, can take up to several weeks.

If the person is a US citizen, then proof of citizenship is required. Presenting any of the following to an EMSL ISC (Information Security Contact) is acceptable. A copy can be used or may be made of the presented item.

EMSL Computer Users are registered via PNNL's Computer Access Request System (CARS) . No computer accounts can be created until the registration process is complete including the online PNNL Computer Security Guide course.

After CARS approval, requests for access to EMSL's Unix computers are made through PNNL's Integrated Operations System (IOPS)

Computer Security

It is important that EMSL computers be used in an appropriate and secure manner in order that first class computing capabilities continue to be available to scientists inside and outside the Laboratory. It is your responsibility to understand and abide by PNNL's computer security policies as explained in the online PNNL Computer Security Guide. Failure to follow established policies is taken seriously and can result in loss of computing privileges.

When you login to a EMSL computer you will see the following security banner:

***************************************************************************
                              NOTICE TO USERS

This is a Federal computer system and is the property of the United
States Government. It is for authorized use only. Users (authorized or
unauthorized) have no explicit or implicit expectation of privacy.

Any or all uses of this system and all files on this system may be
intercepted, monitored, recorded, copied, audited, inspected, and disclosed
to authorized site, Department of Energy, and law enforcement personnel,
as well as authorized officials of other agencies, both domestic and
foreign. By using this system, the user consents to such interception,
monitoring, recording, copying, auditing, inspection, and disclosure at the
discretion of authorized site or Department of Energy personnel.

Unauthorized or improper use of this system may result in administrative
disciplinary action and civil and criminal penalties. By continuing to use
this system you indicate your awareness of and consent to these terms and
conditions of use.

By logging on to this system you agree to the above terms and conditions.

***************************************************************************


[Overview] [Accounts] [Applications] [Help] [MSCF] [RemoteAccess] [Systems]