Who We Are
News & Stories
Dec 1, 2023
December 5, 2023
December 6, 2023
December 7, 2023
University Wide Events
No Communication Compromises
Areas of Study
Changing the world
Community & Innovation
Research Experiences & Services
Our Global Presence
Global at Home
Global Learning For All
Your Journey Starts Here
Explore Our Campus
Elevated User Rights
Merrill Learning Center 1120
Last Revised: January 10, 2019
Refer Questions to: Executive Director, Gallaudet Technology Services
This document provides a framework for the management of Elevated User Rights (EUR) requests, also commonly known as ‘admin rights’ on desktop systems.
This policy incorporates feedback from Client Support Services and is approved by the Information Security Officer and Chief Information Officer.
The policy covers machines, commonly described as desktop systems running Windows, Linux or Mac:
These machines are University owned and connected to any of the University’s networks: wired, wireless, or virtual private network (VPN) from remote sites.
Systems run as ‘Servers’ by Data Center Operations team are not covered under this policy as usage is more restricted and controlled.
Systems such as embedded experimental, monitoring, control systems, or medical equipment are unlikely to be covered under this policy, unless it’s a dual purpose PC also used as a desktop system.
This policy exists to support the University’s IT strategy to deliver efficient, secure, and cost-effective IT solutions while supporting University colleagues in variety of approaches to teaching, research, and enterprise.
If you have a University issued computer, you will not usually have administrator level access on your machine. This is because the computer has been configured as part of central managed service to automatically receive updates and security patches.
This allows us to reduce the total cost of ownership of computers by having standard, easily supported configurations and ensures that University network and users are not put at risk by computers having incorrectly configured or malicious software accidentally installed on them.
The controlled management of EUR is vital to the business of University to ensure:
Systems with EUR are kept to a minimum because there is always an increased risk from malicious software, cyber attacks, or corruption. Vital data can be lost and time lost from restoring the system.
GTS recognizes that some staff need to have EUR in order to do their University work. All requests will be reviewed on a case-by-case basis and if approved, the implementation of EUR will also vary based on the need or the device being used. Such systems are kept to a minimum, so not all requests will be necessarily approved or may be approved on a temporary basis.
Users who submit the EUR request have demonstrated the ability to configure and manage their workstations and who possess an understanding of the responsibility of maintaining appropriate security measures. They are able to maintain the integrity of their desktop system and routinely check for and eliminate malware.
Your supervisor or head of department will be consulted with and has agreed with your need for EUR. Justified requests will be reviewed by Information Security Officer and Chief Information Officer.
The following GTS policies need to be read, understood, and acknowledged before EUR can be granted.
The user agrees to adhere to the these GTS Policies:
Once EUR is assigned, your machine will be considered non-standard.
Keep a backup of your data in central file store or cloud file store.
If there is a machine malfunction, GTS staff will do their best to restore service as quickly as possible. However, if the machine has been assigned EUR, there may be some changes that GTS staff know nothing about. We can only offer a guarantee of restoring the latest version of standard PC deployment. We encourage data to be backed up on central file stores or cloud file stores.
If your PC breaks and the only way to fix it is to wipe it and return it to a standard configuration, you will be responsible for re-installing additional software that you have previously installed.
EUR will be withdrawn if a machine is repeatedly corrupted or compromised. The original base image will be restored on the desktop system.
You are only permitted to elevate to install or run software that:
Do not use EUR to:
If a user abuses his/her administrative access, GTS will revoke this access immediately and will restore the original base image on the computer. Abuse is defined as, but not limited to:
Violation of this policy or repeated support problems will result in revocation of the EUR and/or other sanctions.
The user is informed of the potential risks running a system with EUR. These risks may result in damage to the Operating System and software applications and there may be loss of data. The user is personally responsible for the protection and backup of data.
If any major issues occur as a malware outbreak, corruption, configuration breakage, or disruption to the University’s IT infrastructure or network, the issue must be reported right away to GTS so that we can aid in the prevention of further disruptions and recovery of the original PC functionality.
GTS cannot be held responsible or made liable for any loss of data and/or damages caused thereafter.
For audit purposes, Gallaudet must have on file documentation showing that Elevated User Rights have been formally requested and approved. If a Gallaudet employee, would like to apply for EUR, they must follow these steps:
Last Reviewed: 11/04/2019
Gallaudet University, chartered in 1864, is a private university for deaf and hard of hearing students.
Copyright © 2023 Gallaudet University. All rights reserved.
800 Florida Avenue NE, Washington, D.C. 20002