THE USE OF NERSC RESOURCES TO STORE, MANIPULATE, OR REMOTELY ACCESS CLASSIFIED INFORMATION, UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (UCNI), NAVAL NUCLEAR PROPULSION INFORMATION (NNPI), SECRET RESTRICTED DATA (SRD), SPECIAL ACCESS REQUIRED DATA (SAR), THE DESIGN OR DEVELOPMENT OF NUCLEAR, RADIOLOGICAL, BIOLOGICAL, OR CHEMICAL WEAPONS OR OF ANY WEAPONS OF MASS DESTRUCTION IS EXPRESSLY PROHIBITED.
Users are solely responsible for protecting their computer files and agree that NERSC's cyber and data security arrangements are sufficient for their work. To facilitate open science, NERSC maintains an environment in which data access is controlled primarily by UNIX file permissions and passwords, and networks provide no explicit encryption.
All software used on NERSC computers must be appropriately acquired and used according to the appropriate licensing. Possession, use or transmission of illegally obtained software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.
Unauthorized Access Users are prohibited from attempting to send or receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.
Altering Authorized Access: Users are prohibited from changing or circumventing access controls that allow themselves or others to perform actions outside their intended authorized privileges.
Reconstruction of Information or Software Users are not allowed to reconstruct or recreate information or software for which they are not authorized.
Data Modification or Destruction Users are prohibited from taking actions that intentionally modify or delete information or programs for which they are not authorized.
Malicious Software Users must not intentionally introduce or use malicious software, including, but not limited to, computer viruses, Trojan horses, or worms.
Denial of Service Actions Users may not use NERSC resources to interfere with any service availability, either at NERSC, or at other sites.
Although NERSC takes steps to ensure the integrity of stored data, NERSC does not guarantee that your computer files are protected against destruction. You are strongly encouraged to read the NERSC data policy and make additional copies of your important software or data in the HPSS tape archive system or at other sites.
In some cases, NERSC may make backup copies of some files. When backup copies are made, NERSC reserves the right to hold such copies indefinitely or to delete them at its discretion. If you have data which you do not want backed up, you may request NERSC to exclude specific directories from backup.
Please enter the characters you see in the image above (not case sensitive).