Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Panel

Document Name: NCSA Infrastructure Account Terms of ServiceUse
Version: 0.12
Accountable: Adam Slagell
Authors: Adam Slagell
Approved:   DRAFT

Table of Contents
outlinetrue

 

Scope

Users of NCSA resources, whether or not they are authenticating with accessing with an NCSA identity, accept the following terms of use for these resources:

Terms of Use

  1. Resources are used You will only use NCSA resources to perform work and transmit/store data consistent with the stated goals of your project and in congruence with the University of Illinois policy of appropriate use. and any additional additional requirements set by sponsors.
  2. All applicable laws, regulations, intellectual property rights and confidentiality agreements are respected, and no attempts are made You will not use NCSA resources for any unlawful purpose, nor attempt to breach or circumvent any NCSA administrative or security controls. You will comply with all applicable laws and regulations, including intellectual property rights and confidentiality agreements.
  3. NCSA account holders protect their You will protect your access credentials (e.g., private keys, tokens & passwords) which are issued for your sole only their use. This Adequate protection includes:
    1. Using a unique password for your their NCSA account;
    2. Only entering your their NCSA password into ncsa.illinois.edu sitessystems; and
    3. Not sharing any of your NCSA credentials with any other person.
  4. Suspected You will immediately report any known or suspected security breach or misuse of NCSA access credentials are immediately reported to the NCSA Help Desk (help@ncsa.illinois.edu or +1 217.244.0710).
  5. Relevant access-granting organizations (e.g., National Science Foundation) your , relevant Principal Investigator Investigators (PIPIs) or sponsorsponsors, and the NCSA are entitled to regulate, suspend or terminate your access, and you will immediately comply with their instructionsany access.
  6. PIs and sponsors are responsible for properly vetting users on their allocations, ensuring access is granted to the intended person.  
  7. You will have Each person has only one NCSA account and will keep your identity and is responsible for keeping their profile information up-to-date.
  8. Use of resources and services through NCSA is at your own risk. Unless contractually agreed upon, there are no guarantees that resources and services will be available, that they will suit every purpose, or that data will never be lost or corrupted. Users Therefore, users are responsible for backing up critical data.
  9. Logged information , including information provided by you for registration purposes, is used for administrative, operational, accounting, monitoring and security purposes. This information may be disclosed, via secured mechanisms, only for the same purposes and only as far as necessary to cooperate with an incident investigation or mandatory reporting

Consequences

Violations of NCSA or University policies can result in loss of access to resources.

...

Violations of

...

laws or destruction of property can result in criminal or civil action by the proper authorities

...