Advanced Computing Environment Policy
Policy Owner: Manager, Enterprise Access Infrastructure
Note: An owner must be a PCES-level manager or higher.
This policy provides formally documented management expectations and intentions.
The purpose of this document is to provide the policies for all Advanced Computing Environment (ACE) components contained within the Postal Service IT Infrastructure.
This policy applies to all Postal Service personnel and contracted vendors who are provided with Advanced Computing Environment (ACE) equipment.
The Advanced Computing Environment (ACE) is the standard Postal Service operating environment. The Enterprise Access Infrastructure Organization is responsible for managing, administering, and supporting the ACE infrastructure.
The ACE infrastructure includes the following components:
Any exception to this policy requires written approval from the Manager, Enterprise Access Infrastructure.
Each ACE user is provided a standard workstation (either a desktop or a laptop) with a standard software configuration. Laptops are provided only to mobile users or users who have a business requirement for remote access. Workstations will be replaced approximately every 4 years. Non-standard systems are not authorized within the ACE infrastructure and are subject to confiscation.
Workstations are assigned by position. Therefore, if a user is transferred or detailed to a position outside of his or her organization, the gaining organization must provide that user with a desktop or laptop system. Processes are in place to ensure that the user’s data can be moved to the new workstation. Assistance with this data migration can be obtained through local IT support personnel.
Kiosks are special-function ACE workstations that provide direct access to predetermined applications. Kiosks are placed in designated locations and are centrally managed. Users are not required to log on to a kiosk but will be required to log on to the application that the kiosk supports.
It is the user’s responsibility to ensure that adequate measures are taken to protect against theft and damage. Costs associated with the replacement of stolen or mistreated/abused devices are the responsibility of the local site.
Note: IT provided the hardware for the initial ACE migration. It is the responsibility of the local facility or organization to fund and procure any additional ACE-compliant hardware. The local facility or organization must also fund the hardware warranty, software, ongoing support, and any telecommunications charges for this new hardware.
The backup of data from a local workstation and the protection of the backup media is the sole responsibility of the user.
The user must ensure that backups are:
ACE servers are standardized for central management and support. No servers may be placed within the ACE infrastructure without the approval of the Manager, Distributed Computing Environment (DCE).
Server purchases, additions, or moves beyond the initial ACE rollout must be coordinated with the Manager, DCE.
Each user is allocated 400 MB of server storage. Users will be notified as they approach, and when they exceed, the 400 MB limit. Once this limit is reached, users will no longer be able to save items in their “My Documents” and “Desktop” folders.
Server data backups are retained by IT for a 30-day period. This also includes all server-based user data stored in either shared server folders or in the “My Documents” folder.
Only network printers and multifunctional peripherals (MFP) are supported in the ACE infrastructure.
ACE-approved locally attached printers are allowed at sites without an onsite file server and are funded with local funds. Network printers are provided as part of the standard ACE implementation.
ACE provides standards for other peripheral devices such as label printers, plotters, scanners, digital cameras, modems, and CD/RW drives. Unapproved peripheral devices are not authorized within the infrastructure and are subject to confiscation. For specific information concerning supported peripherals, please see the ADEPT II contract.
Note: HVAC and key card access control systems are non-standard and require approval from the Network Connectivity Review Board (NCRB) before being connected to the network.
All software must operate within the ACE infrastructure and must be pre-approved before it can be used within ACE. In addition:
Standard software comprises the core products that are on every workstation. They are centrally distributed as part of the workstation image and are centrally supported by the ACE program. Software must be locally funded for any new hardware that is purchased.
Optional software is authorized and approved software which is required by a subset of users to perform specific job related functions or tasks. Some optional software components require purchase software license (e.g., Microsoft Project). Optional software may, or may not, requested through eAccess. Distribution, and support methods vary, based on the individual software requirements.
Development software is a specialized sub-set of optional software. It encompasses products that are individually licensed and will be the responsibility of the user’s organization to fund, install, maintain, and support these products. The products will be authorized on a very limited basis and must be approved by the ITK.
All unauthorized non-standard software will automatically be removed from workstations.
A custom application is software that was created by a development organization. Any software component loaded to an ACE computer in support of a custom application must comply with the ACE standard software and must be approved by the ITK.
The ACE Software Approval Request is to be submitted when seeking to implement a new or modified software component within the ACE environment.
Approved components will be categorized (Standard Software, Optional Software, etc.) as appropriate.
1. Requestor must obtain Enterprise Architecture (EA) approval for non-standard software component.
2. Requestor must obtain Business Customer acceptance for the following:
a. To fund IT activities related to integrating the non-standard software component with current and future ACE environments
b. To fund redevelopment of the non-standard technology solution in situations where software component adversely affects the standard ACE environment
3. Requestor must obtain written approval from the Manager, Enterprise Access Infrastructure.
Field IT personnel may be provided limited ACE administrative access to provide support for problems which cannot be managed remotely. Requests for such access must be approved by theManager, Enterprise Access Infrastructure.
Section(s) Revised: N/A
Revision Description: Baseline
Section(s) Revised: All
Revision Description: Updated the look and feel to be consistent with the other policies, processes, and standards
Revision Date: 08/25/2010
Section(s) Revised: All
Revision Description: This document was made Section 508 compliant and was converted to HTML.
Revision Date: FY12/Q3