Please download the
The following is a list of general computer use policies and security rules that apply to all users of CHPC resources. Further information on CHPC security policies and practices can be found at CHPC Security.
Users are accountable for their actions and may be held accountable to applicable administrative or legal sanctions.
Computers, software, and communications systems provided by CHPC are to be used only for work sanctioned by the Scientific Advisory Committee and CHPC Management. Use of CHPC resources to store, manipulate, or remotely access any national security information is prohibited. The use of CHPC resources for personal or non-research-related activity is prohibited. CHPC systems are provided to our users without any warranty. CHPC will not be held liable in the event of any system failure or loss of data.
All software used on CHPC computers must be appropriately acquired and used according to the appropriate licensing. Possession, use or transmission of illegally obtained software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.
A user identifier known as a username and password are required of all users. All passwords must conform to CHPC guidelines. The new password requirement are as follow:-
Users must notify CHPC immediately when they become aware that any of the accounts used to access CHPC have been compromised. Users should promptly inform CHPC of any changes in their contact information.
Users are prohibited from attempting to receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.
Users are prohibited from changing or circumventing access controls to allow themselves or others to perform actions outside their authorized privileges.
Users are not allowed to reconstruct or recreate information or software for which they are not authorized.
Users are prohibited from taking unauthorized actions to intentionally modify or delete information or programs.
Users must not intentionally introduce or use malicious software such as computer viruses, Trojan horses, or worms.
Users may not deliberately interfere with other users accessing CHPC or other system resources.
CHPC reserves the right to remove any data at any time and/or transfer data to other individuals working on the same or similar project once a user account is deleted or a person no longer has a business association with CHPC. This will be done in consultation with the leader of the project, in case there might be IP issues associated with the project, as stipulated in the Memorandum of Agreement between the CHPC and Project’s Institution or Organization.
Users are not allowed to share their accounts with others.
Users have no explicit or implicit expectation of privacy. CHPC retains the right to monitor the content of all activities on CHPC systems and networks and access any computer files without prior knowledge or consent of users, senders or recipients. This exercise will be done responsibly considering the confidentiality of the information. CHPC may retain copies of any network traffic, computer files or messages indefinitely without prior knowledge or consent. CHPC personnel and users are required to address, safeguard against and report misuse, abuse and criminal activities. Misuse of CHPC resources can lead to temporary or permanent disabling of accounts, loss of allocations, and administrative or legal actions.
Acronyms Description of meaning SAC Scientific Advisory Committee CHPC Centre for High Performance Computing ICT Information and Communication Technology TEI Tertiary Education Institution S&T Science and Technology IP Intellectual Property DST Department of Science and Technology.
The Technical Operations Manager will be responsible for updating this document from time to time if required, and also for the implementation and the management of compliance issues associated with this document.