NERSC Appropriate Use Policy

The following is a list of general computer use policies and security rules that apply to individual end users of NERSC.  Further information on NERSC security policies and practices can be found on the NERSC Computer Security page.  Principal Investigators are responsible for implementing these policies and procedures in their organization and ensuring that end users working under their supervision fulfill their responsibilities. 

User Accountability

Users are accountable for their actions. Violations of policy may result in applicable administrative or legal sanctions.

Resource Use

Resources provided by NERSC are to be used only for activities authorized by the Department of Energy (DOE) or the NERSC Director. The use of NERSC resources for personal or private benefit is prohibited. NERSC resources are provided to users without any warranty. NERSC will not be held liable in the event of any system failure or loss of data. NERSC resources cannot be used for any military or defense end use or application, or to facilitate any transaction that would otherwise violate U.S. export control regulations.

Government Rights

DOE funds support NERSC and the use of NERSC resources by users. Absent any applicable agreement with your institution, the Federal government or LBNL may have rights in your work product under the Bayh-Dole Act and other legislation and regulations. If you are funded by a Federal research grant, cooperative agreement or contract, intellectual property terms (if present) of that agreement will apply. If you are employed by a Federal government agency or National Laboratory, intellectual property rights covering your work apply. Otherwise, patent and intellectual property waivers may be available, but your host institution must make a specific application to LBNL.

Passwords and Usernames

A user identifier known as a username and password are required of all users. Passwords must be changed at NERSC's request. All passwords must conform to NERSC guidelines, which are found in Getting Help/passwords. Passwords must not be shared with any other person and must be changed as soon as possible after an unacceptable exposure, suspected compromise or by direction of a NERSC staff member.

Notification

Users must notify NERSC immediately when they become aware that any of the accounts used to access NERSC have been compromised. Users should promptly inform NERSC of any changes in their contact information.

Software and Data

The use of NERSC resources to store, manipulate, or remotely access information, software, or data that may affect the legal or security status of NERSC or LBNL, or require additional controls, requires prior written approval from NERSC. Such materials include, but are not limited to, export-controlled software or technical data (e.g under EAR (Export Administration Regulations) or ITAR (International Traffic in Arms Regulations)), Personally Identifiable Information or health information (including data covered by HIPPA, the Health Information Portability and Accountability Act), and information subject to "Official Use Only" or similar government restrictions.

THE USE OF NERSC RESOURCES TO STORE, MANIPULATE, OR REMOTELY ACCESS CLASSIFIED INFORMATION, UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (UCNI), NAVAL NUCLEAR PROPULSION INFORMATION (NNPI), SECRET RESTRICTED DATA (SRD), SPECIAL ACCESS REQUIRED DATA (SAR), THE DESIGN OR DEVELOPMENT OF NUCLEAR, RADIOLOGICAL, BIOLOGICAL, OR CHEMICAL WEAPONS OR OF ANY WEAPONS OF MASS DESTRUCTION IS EXPRESSLY PROHIBITED.

Users are solely responsible for protecting their computer files and agree that NERSC's cyber and data security arrangements are sufficient for their work. To facilitate open science, NERSC maintains an environment in which data access is controlled primarily by UNIX file permissions and passwords, and networks provide no explicit encryption.

All software used on NERSC computers must be appropriately acquired and used according to the appropriate licensing. Possession, use or transmission of illegally obtained software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.

Use by Foreign Nationals

Use by foreign nationals is generally permitted regardless of whether access to NERSC is from the United States or abroad. However, OFAC (Department of Treasury’s Office of Foreign Assets Control) regulations prohibit use of NERSC services by citizens of Cuba, Iran, Syria or Sudan while residing and/or working in one of those countries.

Deviations from Authorized Privileges Not Allowed

General: Users are not allowed to deviate from the terms of this NERSC Appropriate Use Policy in any way, including, but not limited to, the following:


Unauthorized Access Users are prohibited from attempting to send or receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.


Altering Authorized Access: Users are prohibited from changing or circumventing access controls that allow themselves or others to perform actions outside their intended authorized privileges.


Reconstruction of Information or Software Users are not allowed to reconstruct or recreate information or software for which they are not authorized.


Data Modification or Destruction Users are prohibited from taking actions that intentionally modify or delete information or programs for which they are not authorized.


Malicious Software Users must not intentionally introduce or use malicious software, including, but not limited to, computer viruses, Trojan horses, or worms.


Denial of Service Actions Users may not use NERSC resources to interfere with any service availability, either at NERSC, or at other sites.

Data Retention

NERSC reserves the right to remove any data at any time and/or transfer data to other individuals (such as the Principal Investigator) working on the same or similar project once a user account is deleted or a person no longer has a business association with NERSC.

Although NERSC takes steps to ensure the integrity of stored data, NERSC does not guarantee that your computer files are protected against destruction. You are strongly encouraged to read the NERSC data policy and make additional copies of your important software or data in the HPSS tape archive system or at other sites.

In some cases, NERSC may make backup copies of some files. When backup copies are made, NERSC reserves the right to hold such copies indefinitely or to delete them at its discretion. If you have data which you do not want backed up, you may request NERSC to exclude specific directories from backup.

Account Usage

Users are not allowed to share their accounts with others, except with the express written permission of the NERSC Director.

Monitoring and Privacy

Users have no explicit or implicit expectation of privacy. NERSC retains the right to and actively monitors the content of all activities on NERSC systems and networks and to access any computer file without prior knowledge or consent of users, senders or recipients.  NERSC may retain copies of any network traffic, computer files or messages indefinitely without user's prior knowledge or consent. NERSC may, at its discretion, share information gathered through monitoring with the Department of Energy, University of California, other incident response organizations, and local, state, federal, and international law enforcement organizations.

NERSC personnel and users are required to address, safeguard against and report misuse, abuse and criminal activities. Misuse of NERSC resources can lead to temporary or permanent disabling of accounts, loss of DOE allocations, and administrative or legal actions.


NERSC Appropriate Use Policy, revision 3.0, date: August 31, 2016
First Name: 
Last Name: 
Citizenship:  (Select from the list presented.)
Organization:  (Select from the list presented.)
Work Phone:  (format: 123-456-7890, non-US users please include country code)
Email: 
PI's Full Name:  (Please enter the full name of a NERSC Principal Investigator for one of your NERSC project accounts (repositories)

Attestation
I have read this NERSC Appropriate Use Policy and understand and accept my responsibilities in the use of NERSC resources.
Your Initials:   
I attest that I am not a citizen of Cuba, Iran, Syria or Sudan who will be using NERSC resources while residing and/or working in one of these countries.
Your Initials:   
I understand that the Federal government or LBNL may have rights in my work product, unless there is a specific agreement (such as a research grant or contract) with my institution addressing intellectual property.
Your Initials:   

captcha
Can't read it? Refresh the image

Please enter the characters you see in the image above (not case sensitive).



NOTICE: All connections are logged. For further information see: NOTICE TO USERS