New R’Mail Storage Quota in Place for UCR Alumni

The new 10.00 GB R'Mail alumni quota went into effect on September 3, 2024. Qualifying alumni R’Mail accounts that are over the 10.00 GB storage limit are being reset, which permanently deletes all data and email associated with the account. 

For more information, please visit the ITS Blog. 

Workaround for Student Registration Issues

UCR is aware of the registration issues that students are experiencing and is working with the vendor to resolve the root issue.  They have identified the defect and are committed to giving us a fix as quickly as they can. Until that time, a potential workaround is to refresh the page using Ctrl+F5 (Windows) or Cmd+Shift+R (Mac) to resolve blank pages or non-functional buttons without clearing the browser's cache and logging out and back in.

hand taps computer screen and holds a pen

NDAA PROHIBITED MANUFACTURERS

 

UCr Gold Line

NDAA 889 PROHIBITED MANUFACTURERS

The National Defense Authorization Act (NDAA) prohibits the use of equipment manufactured by a limited set of manufacturers.

Please read this page for details on how to work with the Information Security Office (ISO) to discontinue the use of products from banned manufacturers. 

 

UCr Gold Line

PROHIBITED MANUFACTURERS

ISO strives to maintain a list of prohibited manufacturers; however, the federal government adds companies on a continuing basis. Please consider the list below to be provisional, as it may be over- and under-inclusive in some respects. UC Riverside personnel are responsible, at the time of equipment purchase, to refer to the list and ensure the manufacturer has not been added.

Contact infosecoffice@ucr.edu if you’re unsure or have other questions.

Background

Beginning in 2019, The National Defense Authorization Act (NDAA) introduced prohibitions on the use of equipment manufactured by a limited set of manufacturers.

 

2020 Update: More Manufacturers Added

This set of companies was expanded in the most recent 2020 NDAA. A list of banned companies is provided below.

 

Why NDAA Compliance Matters: Effects on Funding

Any organization acting as a contractor for any federal agency must comply with this prohibition in order to receive any funding from the federal government.

This prohibition is not limited to programs that perform contracted work, but to UC Riverside’s entire enterprise. A UC systemwide memo on this matter has been published by the Office of the President at: https://researchmemos.ucop.edu/index.php/site/memoDetail/memo_id/RPAC-20-05.

 

Your Role: Work with OIA to Discontinue Use of Prohibited Equipment

Everyone at UC Riverside has a role to play to ensure prohibited equipment is not used on campus networks or procured by the University. Please refer to the NDAA Guidance for Campus Units page to review the Campus Compliance Plan, which outlines roles and responsibilities.    

The Information Security Office (ISO) uses information drawn from network management data to identify equipment on the UC Riverside network in violation of this prohibition. When identified, the individual responsible for the equipment will be contacted and a remediation plan developed. In general, such equipment must be promptly removed from the network.

If you are using equipment manufactured by any of the prohibited companies, please contact us immediately before removing it. The regulations can be difficult to interpret and we can assist in the determination of whether your equipment is covered.

For assistance please contact infosecoffice@ucr.edu

 

Additional Information

  • This prohibition extends to the use of cell phones manufactured by the prohibited vendors for university business. This is primarily significant for staff members using Huawei phones. These may not be used for university business.
  • Video surveillance or security cameras are explicitly mentioned in the NDAA. Please consider this when purchasing any new video equipment.
  • In addition, the use of Kaspersky software, a common producer of commercial anti-virus software, has been prohibited since 2017. In order to ensure continued compliance, in January the campus will implement a network block preventing updates to Kaspersky servers from taking place.

 

Additional Resources

Let us help you with your search