USAP Computer Requirements
United States Antarctic Program United States Antarctic Program Logo National Science Foundation Logo
Alert
As of midnight, December 20, 2024, the U.S. government is experiencing a lapse in appropriations. Until the situation is resolved, please refer to OPM.gov website regarding the status for federal employees. We expect the U.S. Antarctic Program to remain operational under our contractor for the foreseeable future. Should the situation change, we will post additional information on this website when it is legally permissible to do so.
 

Computer requirements apply to all systems connected to the United States Antarctic Program (USAP) network. They are intended to protect against inadvertent introduction of malicious applications that pose a security risk to the integrity of network science and operations systems that support the USAP.

Laptop Screening
Vulnerability Scanning 

If you have questions, contact Information Security:

Email: InfoSecOnCall@usap.gov
Phone: 720.480.2410

Laptop Screening

Computer screening requirements are provided in the USAP Participant Guide. If you are deploying and taking a laptop with you, be sure your system meets these requirements prior to your deployment in order to ensure that your system will be granted access to the USAP network.

Vulnerability Scanning

All systems on the USAP network are periodically scanned to detect vulnerabilities. If a vulnerability is detected on your system, the IT station manager or designee sends you an email providing information on the vulnerability, and identifying the timeframe you have to respond to the notification or to remediate the issue.

If you have a system on the network that is gathering scientific data and may be negatively impacted by the scans, contact the station help desk to request a test scan of the system before connecting to the USAP network.

Submitting a Risk Acceptance Recommendation

If there is a valid business case for why a vulnerability detected on a system cannot be remediated, submit the following form to InfoSecOnCall@usap.gov:

Risk Acceptance Recommendation Link to PDF file

The form provides fields for exemption justification and information on system and physical controls in place that mitigate risks to the system(s).

After you submit a Risk Acceptance Recommendation, the USAP Information Security Department reviews the recommendation, then submits it to the USAP Information Security Manager (ISM) for approval.

Information Security emails you indicating whether your exemption is approved or disapproved.