Acceptable Use Policy

UC Davis High-Performance Computing Acceptable Use Policy
Effective Date: Nov 12, 2024

Use of the UCD Cluster 

This form identifies a set of University policies and articulates the specific policies that govern your access to the University of California, Davis (UCD) High-Performance Computing Core Facility (HPCCF) clusters (HPCCF Cluster). In addition to the policies here, all users are subject to the Electronic Communications Policy(1) of the University of California. Users are responsible for understanding and complying with requirements for handling sensitive and/or confidential data.

The system you are being provided access to is for approved uses only as determined by the principal investigator and consistent with UCD policies. This system is only approved for unclassified, non-proprietary fundamental research.  No incidental personal use is permitted on the HPCCF Cluster.

Scope

This policy governs the use of high-performance computing clusters at UC Davis (the HPCCF Cluster) and applies to all University users served by the High-Performance Computing Core Facility (HPCCF).  University users, as defined by UCD PPM 310-23(2), include: 

1. UC Davis students, staff, academic appointees, Principal Investigators (PIs) and emeriti. Department heads may grant access in support of teaching, research, public service, and patient care mission of the University, and the administrative functions that support that mission. 

2. Other individuals who are affiliated with the University, including those in program, contract, or license relationships. Department heads may grant access for the term of the affiliation, when such access supports the mission of the University and is not in competition with commercial providers. These individuals must be sponsored by a UC Davis department and complete a Temporary Affiliate form. 

a. Students, academic appointees, and staff at other UC campuses. 

b. Continuing and Professional Education students enrolled in courses requiring access. 

c. Retirees. 

d. Volunteers. 

e. Contractors, independent consultants, and certain agents of the University other than employees may be given access for the sole purpose of conducting their business on behalf of the University, unless agreed otherwise in writing.

This policy encompasses computing, network, and storage resources associated with the following systems, hereafter referred to as the 'HPCCF Cluster':

  • Atomate – School of Medicine
  • Barbara (LSSC0) – Genome Center
  • Cardio – School of Medicine
  • Demon – College of Letters and Science
  • Farm – College of Agricultural and Environmental Sciences
  • Franklin – College of Biological Sciences
  • Hive – High-Performance Computing Core Facility
  • HPC1 – College of Engineering
  • HPC2 – College of Engineering
  • Impact – College of Letters and Science
  • Peloton – College of Letters and Science
  • additional hardware and resources maintained by HPCCF

Conditions

1. COMPLIANT USE.  Use of the HPCCF Cluster is subject to UC Davis policy, including but not limited to UCD PPM 310-23, Electronic Communications—Allowable Use(1) and University of California Policy BFB-IS-3: Electronic Information Security(3).  You will only use the HPCCF Cluster to perform work and transmit and/or store data consistent with bona fide scientific research or teaching (University users) or the statement of work in your service agreement or research contract (external users).  The UCD Office of Research will serve as arbiter for any questionable use. Review UCD IET Information Security(4) and University of California Policies and Guidelines for Information Security(5) for general training on information security.

2. FAC POLICIES.  The HPCCF operations team is tasked with implementing the policies endorsed by the HPCCF Facility Advisory Committee and ensuring that the cluster runs effectively and efficiently. Users agree not to attempt to circumvent policies nor avoid restrictions imposed by the HPCCF.  HPCCF FAC policies are posted on the HPCCF website(6).

3.  DATA SECURITY.  The user is responsible for identifying and complying with any security concerns or regulations applicable to their data. The HPCCF Cluster does not meet the standards of: NIST 800-171(7) for Controlled Unclassified Information (CUI); DoD NISPOM(8) for protection of classified information; protected health information (PHI) or other data regulated by HIPAA(9); or high-risk export controlled data or technology regulated by EAR and/or ITAR.  The HPCCF Cluster must not be used to process, store, or transmit information governed by these regulations. You agree that you will not store, process, or transmit confidential or regulated data; or any information with a data protection classification of P3, P4, availability classification of A3, A4, or higher; or data elements with a Statutory Requirement for Notification(10) to affected parties in case of a confidentiality breach; or any data that would cause high impact to the university if maliciously modified, exposed to unauthorized viewers, or made unavailable. Review the UCD Data Classification Standard(11) for an overview of protection levels and regulations.  See also UCOP policies regarding data classification and availability(12)

4. IP and COPYRIGHT.  You will abide by intellectual property and copyright laws and observe confidentiality and security requirements from agreements and sponsors to protect research data, as applicable. 

5. LEGITIMATE PURPOSE.  You will not use the HPCCF Cluster for personal financial gain or for any unlawful purpose, nor attempt to breach or circumvent any HPCCF administrative or security controls. You may only use the HPCCF Cluster for legitimate research, teaching and business purposes as specified in the statement of work in your service agreement or research contract. You will comply with all applicable federal, state, and local laws while using the HPCCF Cluster.

6. ACCOUNTS.  You agree that you are liable for any activities on your HPCCF Cluster account and will keep your profile information current and accurate.  Principal investigators (PIs) and external organization sponsors are responsible for adequately vetting users on their allocations and agree to evaluate their list of current authorized users at least every six months.  PIs and sponsors are responsible for the behavior of their users. Users agree that PIs and sponsors for their account are entitled to regulate, limit, suspend, or terminate their access. 

a. LOSS of ACCESS.  HPCCF is entitled to regulate, suspend, or terminate your access.  Violations of this HPCCF policy and/or UC Davis policies can result in loss of access to the HPCCF Cluster and other computing resources. Activities on the HPCCF Cluster in violation of any laws and/or university policies will be reported to the proper authorities for investigation and prosecution. 

b. DELETION.  Accounts that are not used for more than a year are subject to deactivation. Access to the HPCCF Cluster will end promptly once users are no longer affiliated with UC Davis. PIs and sponsors are responsible for notifying HPCCF through submission of a Service Now ticket when users are no longer working with the project or associated with UC Davis. 

c. PROXY.  You agree that authorized HPCCF staff may act on your behalf as your cluster user to provide support or to keep the cluster running optimally. 

7. CREDENTIALS.  You will protect your access credentials (e.g., username, private keys, tokens & passwords) that are issued for your sole use. This includes: 

  • Only entering your HPCCF Cluster password or utilize your own private key to log in to the HPCCF Cluster.
  • Not sharing any of your HPCCF Cluster credentials or keys with any other person. 
  • Protecting your credentials from malicious access.
  • Using a unique and strong password for your HPCCF Cluster account that meets the UCD password standard(13.

8.  INTEGRITY.  You are prohibited from changing or circumventing access controls to allow yourself or others to perform actions outside your authorized privileges or to circumvent security systems.  You are prohibited from taking unauthorized actions to intentionally modify, delete, or reconstruct information or programs.  You must not intentionally introduce or use malicious software such as computer viruses, Trojan horses, or worms.  You are responsible for taking reasonable steps to ensure the integrity and security of software you introduce to the system. You may not deliberately interfere with other users’ access to system resources.

9. BREACHES.  You will immediately report any known or suspected security breach or misuse of HPCCF Cluster access credentials by emailing hpc-help@ucdavis.edu and cybersecurity@ucdavis.edu.

10. RISK.  This system is provided without warranty or set service level. UCD will not be held liable in the event of any system failure or loss of data.  Use of resources and services through the HPCCF Cluster is at your own risk. There are no guarantees that resources and services will be available, that they will suit every purpose, or that data will never be lost or corrupted. Users are responsible for backing up critical data or using replicated or archive storage services provided through the HPCCF Cluster.

11. HARDWARE.  You acknowledge the HPCCF Hardware Support Policy(14).  New purchases of HPC hardware will only be supported if approved by HPCCF.  HPCCF will maintain hardware and provide priority support for users in the PI’s group. After 5 years, HPCCF will offer support at an hourly rate; after 7 years, HPCCF maintains the right to end hardware support.

11. SOFTWARE.  All software and data used on the HPCCF Cluster must be appropriately acquired and used according to the appropriate licensing. The licensee of software or data is responsible for ensuring that license constraints are met.  Possession or use of illegally copied software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.  Licensed software may only be installed on the HPCCF Cluster if the license permits its use for research on multiple computers across a network. Users are responsible for ensuring that any software they install or request to be installed on the HPCCF Cluster abides by license agreements. 

12. SOFTWARE INSTALL.  You acknowledge the HPCCF Software Installation Policy(15).  Software not managed by HPCCF, including software installed in PI groups and user directories, are the user's responsibility. To comply with UCOP and UC Davis security policies, software used on any of the clusters should be vetted through the UC Davis Vendor Risk Assessment (VRA) program(16).

12. MONITORING.  Logged information, including information provided by you for registration purposes, is used for administrative, operational, accounting, monitoring, and security purposes. This information may be disclosed via secured mechanisms only for the same purposes.  You have no expectation of privacy in your use of the HPCCF Cluster. Your actions, history, and user data are subject to inspection and review by authorized parties. HPCCF may share this information with law enforcement at its discretion.

13. DOWNTIME.  Users acknowledge that regular maintenance and downtime need to be scheduled and communicated in advance to keep systems running at their peak and to apply critical patches. Users acknowledge that unscheduled downtime may be required to fix unforeseen issues and to apply critical security patches.

14. ACKNOWLEDGMENT. Users agree to acknowledge HPCCF in publications, presentations, and other media and scholarship. The following wording is recommended: “This research used the High-Performance Computing Core Facility (HPCCF) at the University of California, Davis.”

References

(1) University of California Electronic Communications Policy (ECP)

            https://policy.ucop.edu/doc/7000470/ElectronicCommunications

(2) UC Davis PPM 310-23, Electronic Communications—Allowable Use

https://ucdavispolicy.ellucid.com/documents/view/357/active

(3) University of California Policy BFB-IS-3: Electronic Information Security

https://policy.ucop.edu/doc/7000543/BFB-IS-3

(4) UC Davis IET Information Security

https://iet.ucdavis.edu/security

(5) University of California Policies and Guidelines for Information Security

https://www.ucop.edu/information-technology-services/initiatives/ucop-information-security/policies-and-guidelines.html

(6) High-Performance Computing Core Facility

            https://hpc.ucdavis.edu/about

(7) NIST SP 800-171 Rev. 3:  Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

            https://csrc.nist.gov/pubs/sp/800/171/r3/final

(8) National Industrial Security Program Operating Manual (NISPOM)

https://www.federalregister.gov/documents/2020/12/21/2020-27698/national-industrial-security-program-operating-manual-nispom

(9) HIPAA for Professionals

https://www.hhs.gov/hipaa/for-professionals/index.html

(10) UC Berkeley Notice-triggering Information Summary

https://security.berkeley.edu/policy/glossary#StatutoryNotification

(11) UC Davis Data Classification Standard 

https://iet.ucdavis.edu/security/uc-davis-data-classification-guide

(12) University of California policies regarding data classification and availability

https://security.ucop.edu/policies/institutional-information-and-it-resource-classification.html

(13) UC Davis password standard 

https://computingaccounts.ucdavis.edu

(14) HPCCF Hardware Support Policy

            https://hpc.ucdavis.edu/model-hpc-hardware-support 

(15) HPCCF Software Installation Policy

            https://hpc.ucdavis.edu/software-installation-policy

(16) UC Davis Vendor Risk Assessment (VRA) program

https://iet.ucdavis.edu/news/demystifying-vendor-risk-assessment-process

Last updated: Nov 7, 2024

Approved: Nov 7, 2024