The document summarizes the registration and login process for a new institutional user of the electronic Research Administration (eRA) Commons system. It provides the registered institution name and address, assigned username, and a temporary password. It instructs the user to access the system using the provided username and change the temporary password upon first login. Contact information is given for assistance.
This document sets out general issues related to the
Telkom Internet service and contains the Telkom Internet
Acceptable Use Policy (AUP).
Your Telkom Internet account provides you access to a vast
collection of networks around the world via the World Wide
Web, electronic mail, and File Transfer Protocol (FTP). Your
use of these services is subject to the AUP.
It is our intention to allow Telkom customers access to everything
the internet has to offer, with minimal or no interference.
Our belief in free speech is a firm commitment to
our customers. However, certain activities are considered
inappropriate by the internet community at large and
cannot be permitted under the guise of free speech.
Save as may be set out herein, we do not monitor the
activity of accounts, except for measurements of system
utilization and billing records. However, in our efforts to
promote good citizenship within the Internet community,
if we become aware of inappropriate use of our service,
we will respond appropriately.
If a Telkom Internet account is used in a manner which
violates this AUP, we reserve the right to terminate the
service without notice. Our preferred course of action is
to advise you of the inappropriate behaviour and any
corrective action that is necessary. However, certain
circumstances may warrant immediate termination of the
Telkom Internet service without notice.
As a member of our network community, we encourage
you to use your internet access responsibly. Should you
have any questions regarding this policy, feel free to contact
us at 10210.
Reports of activity in violation of this policy may be sent
via e-mail to abuse@telkomsa.net.
CONTENTS
1 Introduction
2 Protecting Your Account
3 Account and Network Security
4 Electronic Mail
5 Protection of Network Performance
6 Personal Home Pages
7 Third Party Internet Relay Chat (IRC)
8 Illegal Activities
9 Fair usage policy
10 Breach of the Acceptable Use Policy
11 General
Jayine Group is a multi faceted business organisation serving society in various forms since 2008. We are the leading service provider of Online Advertisements to industries and corporate clients. offers you a wide range of Bulksms and web based solutions. We excel in our endeavor to meet your requirement with our distinguished, goal oriented and focused services. It is a one-stop-shop for all your Bulksms and web solutions. In the years of its existence, Jayine enriched itself with experience working with reputed corporates, government and semi organizations and people from different fields and areas making Jayine Group immensely successful. We, at jayine Group have a philosophy, which arises from our belief that if one is successful and prosperous, one should share the benefits with those less fortunate. It becomes our responsibility to take our share of duties towards creating a better world for the future.
This document sets out general issues related to the
Telkom Internet service and contains the Telkom Internet
Acceptable Use Policy (AUP).
Your Telkom Internet account provides you access to a vast
collection of networks around the world via the World Wide
Web, electronic mail, and File Transfer Protocol (FTP). Your
use of these services is subject to the AUP.
It is our intention to allow Telkom customers access to everything
the internet has to offer, with minimal or no interference.
Our belief in free speech is a firm commitment to
our customers. However, certain activities are considered
inappropriate by the internet community at large and
cannot be permitted under the guise of free speech.
Save as may be set out herein, we do not monitor the
activity of accounts, except for measurements of system
utilization and billing records. However, in our efforts to
promote good citizenship within the Internet community,
if we become aware of inappropriate use of our service,
we will respond appropriately.
If a Telkom Internet account is used in a manner which
violates this AUP, we reserve the right to terminate the
service without notice. Our preferred course of action is
to advise you of the inappropriate behaviour and any
corrective action that is necessary. However, certain
circumstances may warrant immediate termination of the
Telkom Internet service without notice.
As a member of our network community, we encourage
you to use your internet access responsibly. Should you
have any questions regarding this policy, feel free to contact
us at 10210.
Reports of activity in violation of this policy may be sent
via e-mail to abuse@telkomsa.net.
CONTENTS
1 Introduction
2 Protecting Your Account
3 Account and Network Security
4 Electronic Mail
5 Protection of Network Performance
6 Personal Home Pages
7 Third Party Internet Relay Chat (IRC)
8 Illegal Activities
9 Fair usage policy
10 Breach of the Acceptable Use Policy
11 General
Jayine Group is a multi faceted business organisation serving society in various forms since 2008. We are the leading service provider of Online Advertisements to industries and corporate clients. offers you a wide range of Bulksms and web based solutions. We excel in our endeavor to meet your requirement with our distinguished, goal oriented and focused services. It is a one-stop-shop for all your Bulksms and web solutions. In the years of its existence, Jayine enriched itself with experience working with reputed corporates, government and semi organizations and people from different fields and areas making Jayine Group immensely successful. We, at jayine Group have a philosophy, which arises from our belief that if one is successful and prosperous, one should share the benefits with those less fortunate. It becomes our responsibility to take our share of duties towards creating a better world for the future.
SpyFly Background Checks Services Help CenterSpyfly
SpyFly provides complete background check service, making it fast, easy, and safe for people to find and learn the truth about anyone. We aggregate billions of public records into a single, easy to use interface and manage the information for you with cutting edge technology.
E-Verify is a free Web-based system developed by the Department of Homeland Security to help ensure new hires are eligible to work in the United States. This system compares the information provided by the employee on a Form-1-9 (Employment Eligibility Verification) to data from Homeland Security and the Social Security Administration.
The bad guys are trying to steal your information! It seems there is another story on the news every day about large security breaches and the potential exposure of private, personal data. During this hour, Sleuthing Trainees will learn what the fraudsters are looking for, how they are gaining access to it and which employee populations are most at risk. This course, as well as the fortitude of the Sleuthing Graduates, have the potential to prevent millions in future payroll fraud losses.
Micheal Green - JustTech
Mary O'Shaughnessy - Her Justice
Sart Rowe - LSNTAP
In this webinar we look at what phishing is, how it impacts legal aid organizations, and how to take steps to reduce the likelihood and impact of getting hit with an attack.
SpyFly Background Checks Services Help CenterSpyfly
SpyFly provides complete background check service, making it fast, easy, and safe for people to find and learn the truth about anyone. We aggregate billions of public records into a single, easy to use interface and manage the information for you with cutting edge technology.
E-Verify is a free Web-based system developed by the Department of Homeland Security to help ensure new hires are eligible to work in the United States. This system compares the information provided by the employee on a Form-1-9 (Employment Eligibility Verification) to data from Homeland Security and the Social Security Administration.
The bad guys are trying to steal your information! It seems there is another story on the news every day about large security breaches and the potential exposure of private, personal data. During this hour, Sleuthing Trainees will learn what the fraudsters are looking for, how they are gaining access to it and which employee populations are most at risk. This course, as well as the fortitude of the Sleuthing Graduates, have the potential to prevent millions in future payroll fraud losses.
Micheal Green - JustTech
Mary O'Shaughnessy - Her Justice
Sart Rowe - LSNTAP
In this webinar we look at what phishing is, how it impacts legal aid organizations, and how to take steps to reduce the likelihood and impact of getting hit with an attack.
1. IPF Assignment View
The registration process is now complete. You have confirmed that the registered institution below is correct.
Shortly, you will recieve an email with your username and password.
Registered Institution
Institution Name: MEKELLE UNIVERSITY
Institution Address:
MEKELLE UNIVERSITY
TIGRAY
MEKELLE, ETHIOPIA
MEKELLE,
KINDEYA LILAY,
Username MEKELLEUNIV1
The passwordassociatedwithyourrecentlycreatedaccountis $9evysrp Thispasswordisnot
functional.
Functional Newpassword #5etahpr
The above passwordistemporary.Youwill be requiredtochange yourpasswordthe firsttime you
successfullylogintothe system.Onthe Change Passwordpage,enterthe temporarypasswordinthe
CurrentPasswordfield.Pleasereadthe instructionsonthe Change Passwordpage carefullybefore
selectinganewpassword.
To access the systemuse the Username providedinthe email notifyingyouof yournew account.
For any furtherquestions aboutthisemail,please contactthe eRA HelpDeskatour preferred
methodof contact http://ithelpdesk.nih.gov/eRA/ orcall 1-866-504-9552 (tty:301-451-5939) or
commons@od.nih.gov .
Please accessthe Commonsat http://public.era.nih.gov/commons/
2. Welcome to the Commons
Welcome
KINDEYA LILAY
ID: MEKELLEUNIV1
Institution: MEKELLE UNIVERSITY
Roles: SO
eRA Commons Help Desk
Hours: Mon-Fri, 7AM-8PM EDT/EST
Web:http://era.nih.gov/help/
Toll-free: 866-504-9552
Phone: 301-402-7469
TTY: 301-451-5939
Contact initiated outside of business hours via Web or voice mail w ill be returned the next
business day.
System Information Message
All systems are available
Alerts:
If you have questions on whether to submitan eSNAP or RPPR, please see
Notice NOT-OD-13-061for guidance.
If your RPPR is due and you’ve either initiated and/or submitted an eSNAP
instead,please submityour requestfor supportvia our online ticketing
system at eRA Help Desk Customer Portal.
Commons allows you to perform the following activities below based on the
privileges associated with this profile:
Administration - Allows you to assign a delegate to perform system and
accounts maintenance more...
Institution Profile - Enables you to view and update institution information
more...
Personal Profile - Allows you to update your personal information more...
Status - Allows you to check the status of grants and applications thathave
been submitted more...
eSNAP - Allows you to review the information needed to complete a grant
application more...
xTrain - Enables you in a Trainee or SO role to confirm the information that
you have submitted for a Trainee role type more...
Internet Assisted Review (IAR) - Allows reviewer to submitcritiques and
preliminaryscores for applications theyare reviewing more...