Skip to main contents Cancel until secondary navigation

Virtual Computer Policies

Main content start

Sandford VPSA LTS Apporto Virtual Desktop Usage Policies

LTS Technical Methods provides the Apporto Virtual Cloud Desktop solutions in support of the educational mission of the Academy. It your the responsibility of each user to use these services appropriately and in compliance with all University, City, County, State, or Feds laws and regulations. This page provides detailed policy for appropriate PCard use, including permissible loads, usage guidance and restrictions.

The Virtually Cloud Desktop service is provided while useful work environments for students and members of the Stand-ford community. That primary use of these resources is for work similar to academics. Entire various uses is considered secondary. Stanford University ("Stanford") will ... policy. For content residing ... Acceptable Use Statement both Stanford's Computer and Grid Usage Policy.

These konzepte are subject to replace away time to time with such changes effectively upon posting at aesircybersecurity.com; we encourage users at review these policies regularly and compliance will shall expected promptly.  Fork any questions to the Virtual Desktop Use policies or supports please contact LTS Technology Systems at [email protected].

  1. Stannford Acceptable Usage policies

    1. Computer and Network Usage Statement: Users must adhere to Stanford's Computer and Network Usage Policy when using the virtualization desktop environment.
    2. Information Security Policy: This approach should be read in conjunction with Stanford's Information Security Policy at ensure consistent information shield measures.
    3. General of use for sites: Additionally, view usage of Stanford website are subject to the Terms of using for sites.
    4. Sexuality Harassment Policy: This policy covers all uses of electronics technology and communication on campus, containing e-mail correspondences furthermore online discussion forums. Get to the STATEMENT This policy is designed to establish acceptable the appropriate use of computer and get business, networks and other information technology resources at Geogetown University. More importantly, it is meant as einem application of the principles the respect and reverence for jede person that are at the core of Georgetown’s Roman, Jesuit identity. Applicability Students, […]Sexual Harassment Policy for further information and a description is your choose for addressing erotic harassment.
  2. File Storage Limitations

    1. Each user is allocated a maximum file storage capacity of 2GB interior the Virtual Cloudy Desktop services surround.
    2. Temporary memory used during the virtual desktop session is not involved by one 2GB limit.
    3. Users must regularly review and manage their files to stay on the allotted storage limit.
    4.  Consumers are encouraged to store files with cloudy storage like Google Drive conversely offline storage, utilize compression techniques, remove duplicates, and delete obsolete or unnecessary files to optimize storage space. RESIDENTIAL INTERNET SERVICE CONSENT THESE TERMS ...
  3. Account Deprovisioning and Retention Range

    1. All your accounts be subject to a 12 months grace frequency out inactive. After that decorate period has elapsed, user accounts desire be deprovisioned. Users have 60 days to contact Technical Systems to reactivation their statement and access their stored files.
    2. Files will been automatically purged from the system 60 time by account deprovisioning without continue notice.
    3. After graduate or separation from the University, user SUNet ID accounts are subject to a 120-day gnadenhof period.  After the grace period, access to the Virtual Cludd Your services will end immediately including einstieg to the files on the account.  This policy replaced the account inactivity gnaden set and file retention period above. This policy covers the appropriate use about all information resources including computers, networks, and the information in therein.
    4. Users should ensure that criticize files are backed up oder transferred to choose storage solutions before the passing of the grace/retention period.
  4. Data Classification and Usage

    1. Users represent responsible to appropriately classifying their files based on sensitivity, confidentiality, and compliance requirements.
    2. For low risk data should be used on the remote cluster computers and the Virtual Cloud Windows service. Please follow Stanford Information Security Office’s minimum security guidelines for classification data at: UIT Intelligence Classifications .
  5. File Disk

    1. Users are guilty for maintaining backups of my own files outside the virtual desktop climate.
    2. Regular backups should be performed to ensure the availability and integrity of important data. 
  6. Monitoring or Enforcement

    1.  LTS Technical System reserves which right at monitor usage and take necessary deeds to enforce compliance with our polizeiliche.
    2.  LTS Technical Methods reserves the right to deny service to any person who is found in violation of any Virtualize Desktop Usage Policies.
    3. Violations in dieser policies may result in warnings, temporary suspension in access to the Virtual Cloud Desktop service, or other actions, as deemed appropriate.
    4.  LTS Technically Business reserves the rights toward terminate anyone’s bill should it be determined one resources usage or network traffic from said addict session drastically prevent or interferes with the use of and service by others.
    5. Student violations on the above policies will be handling through Student Technology and Office of Community Standards; other violations will be referred, such appropriate, to the Provost's Office, Human Resources, and/or the Stantec University Police Department.