Users with proprietary data agree that they can work in NERSC's open environment in which data access is controlled primarily by UNIX file permissions.
All software used on NERSC computers must be appropriately acquired and used acc
ording to the appropriate licensing. Possession, use or transmission of illegal
ly obtained software is prohibited. Likewise, users shall not copy, store or tra
nsfer copyrighted software or data, except as permitted by the owner of the copyright.
Unauthorized Access Users are prohibited from attempting to send or receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.
Altering Authorized Access: Users are prohibited from changing or circumventing access controls that allow themselves or others to perform actions outside their intended authorized privileges.
Reconstruction of Information or Software Users are not allowed to reconstruct or recreate information or software for which they are not authorized.
Data Modification or Destruction Users are prohibited from taking actions that intentionally modify or delete information or programs for which they are not authorized.
Malicious Software Users must not intentionally introduce or use malicious software, including, but not limited to, computer viruses, Trojan horses, or worms.
Denial of Service Actions Users may not use NERSC resources to interfere with any service availability, either at NERSC, or at other sites.
Please enter the characters you see in the image above (not case sensitive).