A+ A A-

CHPC User policy

Please note: The CHPC must have a signed copy of this form on file for every user.

Please download the
CHPC User Policy here.
CHPC Quota Policy here.
CHPC BackUp and Archive Policy here.

Introduction

The following is a list of general computer use policies and security rules that apply to all users of CHPC resources. Further information on CHPC security policies and practices can be found at CHPC Security.

User Accountability

Users are accountable for their actions and may be held accountable to applicable administrative or legal sanctions.

Resource Use

Computers, software, and communications systems provided by CHPC are to be used only for work sanctioned by the Scientific Advisory Committee and CHPC Management. Use of CHPC resources to store, manipulate, or remotely access any national security information is prohibited. The use of CHPC resources for personal or non-research-related activity is prohibited. CHPC systems are provided to our users without any warranty. CHPC will not be held liable in the event of any system failure or loss of data.

Software Use

All software used on CHPC computers must be appropriately acquired and used according to the appropriate licensing. Possession, use or transmission of illegally obtained software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.

Passwords and Usernames

A user identifier known as a username and password are required of all users. Passwords must be changed at least every six months. All passwords must conform to CHPC guidelines - see Logging In in the Support section. Passwords must not be shared with any other person and must be changed as soon as possible after an unacceptable exposure, suspected compromise or by direction of a CHPC staff member.

Notification

Users must notify CHPC immediately when they become aware that any of the accounts used to access CHPC have been compromised. Users should promptly inform CHPC of any changes in their contact information.

top of the page

Unauthorised Access

Users are prohibited from attempting to receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.

Altering Authorised Access

Users are prohibited from changing or circumventing access controls to allow themselves or others to perform actions outside their authorized privileges.

Reconstruction of Information or Software

Users are not allowed to reconstruct or recreate information or software for which they are not authorized.

Data Modification or Destruction

Users are prohibited from taking unauthorized actions to intentionally modify or delete information or programs.

Malicious Software

Users must not intentionally introduce or use malicious software such as computer viruses, Trojan horses, or worms.

Denial of Service Actions

Users may not deliberately interfere with other users accessing CHPC or other system resources.
 

top of the page

Data Retention

CHPC reserves the right to remove any data at any time and/or transfer data to other individuals working on the same or similar project once a user account is deleted or a person no longer has a business association with CHPC. This will be done in consultation with the leader of the project, in case there might be IP issues associated with the project, as stipulated in the Memorandum of Agreement between the CHPC and Project’s Institution or Organization.

Account Usage

Users are not allowed to share their accounts with others.

Monitoring and Privacy

Users have no explicit or implicit expectation of privacy. CHPC retains the right to monitor the content of all activities on CHPC systems and networks and access any computer files without prior knowledge or consent of users, senders or recipients. This exercise will be done responsibly considering the confidentiality of the information. CHPC may retain copies of any network traffic, computer files or messages indefinitely without prior knowledge or consent. CHPC personnel and users are required to address, safeguard against and report misuse, abuse and criminal activities. Misuse of CHPC resources can lead to temporary or permanent disabling of accounts, loss of allocations, and administrative or legal actions.

Acronynms

Acronyms Description of meaning SAC Scientific Advisory Committee CHPC Centre for High Performance Computing ICT Information and Communication Technology TEI Tertiary Education Institution S&T Science and Technology IP Intellectual Property DST Department of Science and Technology.

Ownership and Responsibilities

The Technical Operations Manager will be responsible for updating this document from time to time if required, and also for the implementation and the management of compliance issues associated with this document.

 

top of the page

CHPC Student Cluster Competition 2013

Tsessebe Cluster Available

Graphical Processing Unit Cluster Available

CHPC SAGrid Cluster Available

Dirisa Storage Unit Available

Social shares

Website developed by Multidimensions