You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Document Name: NCSA Infrastructure Terms of Service
Version: 0.1
Accountable: Adam Slagell
Authors: Adam Slagell
Approved:   DRAFT

 

  1. You will only use NCSA resources to perform work and transmit/store data consistent with the stated goals of your project and in congruence with the University of Illinois policy of appropriate use.
  2. You will not use NCSA resources for any unlawful purpose, nor attempt to breach or circumvent any NCSA administrative or security controls. You will comply with all applicable laws and regulations, including intellectual property rights and confidentiality agreements.
  3. You will protect your access credentials (e.g., private keys, tokens & passwords) which are issued for your sole use. This includes:
    1. Using a unique password for your NCSA account
    2. Only entering your NCSA password into ncsa.illinois.edu sites
    3. Not sharing any of your NCSA credentials with any other person
  4. You will immediately report any known or suspected security breach or misuse of NCSA access credentials to the NCSA Help Desk (help@ncsa.illinois.edu or +1 217.244.0710).
  5. Relevant access-granting organizations (e.g., National Science Foundation) your Principal Investigator (PI) or sponsor, and the NCSA are entitled to regulate, suspend or terminate your access, and you will immediately comply with their instructions.
  6. PIs and sponsors are responsible for properly vetting users on their allocations, ensuring access is granted to the intended person.  
  7. You will have only one NCSA account and will keep your profile information up-to-date.
  8. Use of resources and services through NCSA is at your own risk. Unless contractually agreed upon, there are no guarantees that resources and services will be available, that they will suit every purpose, or that data will never be lost or corrupted. Users are responsible for backing up critical data.
  9. Logged information, including information provided by you for registration purposes, is used for administrative, operational, accounting, monitoring and security purposes. This information may be disclosed, via secured mechanisms, only for the same purposes and only as far as necessary to cooperate with an incident investigation. 
  10. Violations of NCSA or University policies can result in loss of access to resources. Activities in violation of any laws may be reported to the proper authorities for investigation and prosecution. 
  • No labels