User Policies
ARSC operates an unclassified and non-sensitive computing environment. Do not introduce classified or sensitive work on ARSC systems.
ARSC users are required to abide by current ARSC policies governing systems and resources operated by ARSC. The following list of policies should be reviewed by users on a regular basis. Significant new policies, or changes to existing policies are announced through the message-of-the-day (motd).
Abuse
Computer system assets of the Arctic Region Supercomputing Center are the computational hardware, software, data and networks utilized by our users and staff and owned, leased, licensed or operated by the Center.
Abuse may consist of, but is not limited to:
- Using or attempting to use ARSC's assets without prior authorization (which includes account sharing) or for unauthorized purposes.
- Tampering with or obstructing the operation of the computer systems, or attempting to do so.
- Inspecting, modifying, distributing, or copying privileged information, data or software without proper authorization; misusing copyrighted materials, or attempting to do so.
- Supplying, or attempting to supply, false or misleading information or identification in order to access ARSC's assets.
- Testing ARSC security without prior consent of the Director or Information Systems Security Manager (ISSM).
This policy statement applies to everyone who is granted access to any ARSC accounts including: employees, students, staff, faculty, contractors, visitors, consultants, and other ARSC affiliated persons.
Abuse of ARSC's computer assets is a serious matter that is subject to immediate action. Use of ARSC's assets is subject to ARSC policy, University of Alaska Fairbanks regulations, University of Alaska and Regents Policy, State of Alaska and Federal laws.
ARSC may terminate or restrict any user's access to ARSC's computer assets without prior notice to insure availability and security for other users.
Perceived, attempted, or actual abuse of ARSC's assets will be brought to the attention of the Director for action and/or appropriate referral.
A violation of standards, procedures or guidelines established pursuant to this policy shall be presented to the Information System Security Officer or Account Management (ISSO/Account Management) for appropriate action and could result in disciplinary action, including loss of account privileges, dismissal and/or legal prosecution.
ARSC provides a .forward on each system which will forward email from that system to the email address provided to ARSC on account creation. It is the user's responsibility to update the .forward file should after account creation.
Inactive Accounts
If your account is inactive for 180 consecutive days (6 months) it will be inactivated. If you do not contact us to have your account reactivated within six months of inactivation, your account will be disabled. Upon disabling of your account, all your files will be deleted and your account will be closed.
Login Shells
The following login shells are available on ARSC systems:
- sh (Bourne Shell)
- ksh (Korn Shell) default
- bash (Bourne-Again Shell)
- csh (C Shell)
- tcsh (Turbo C Shell)
If you would like to have your login shell changed, please contact the ARSC Help Desk (907.450.8602, consult@arsc.edu).
Initial Login
ARSC uses SecurID/PIN and/or University of Alaska passwords to facilitate access to ARSC resources. Remote access to systems may require that an ssh client kit be installed.
Users assigned a SecurID will be mailed an account packet containing both the SecurID card and a PIN. When establishing an ssh connections, users will be prompted for a passcode. A passcode can be generated by using the PIN with the SecurID.
Current University of Alaska (UA) users may use their UA password (used to access UA email, blackboard, etc) to access ARSC resources. Passwords can be changed using the ELMO webpage (https://elmo.alaska.edu).
Intellectual Property
ARSC users will not execute, copy, or store copyrighted or proprietary software on ARSC systems without proper authorization.
Lost Data
ARSC makes a reasonable attempt to ensure the availability and integrity of user data, including programs, data sets etc., through regular on-site backups of users' home directories. ARSC does not maintain off-site backups of user data. Users assume all responsibility for risk of loss by any means for data stored on ARSC computer systems.
For more information, please see our storage policy.
Lost Resources
ARSC makes a reasonable attempt to ensure the availability of the computing systems, but periodically the systems will go down for scheduled and unscheduled maintenance. Users are responsible for ensuring the recoverability of unexpectedly lost jobs wherever feasible.
Use of ARSC computer systems is at the users' own risk. Any warranties express or implied, including, but not limited to, any implied warranties of merchantability or fitness for any purpose, are hereby disclaimed.
Public Web
ARSC offers web services to current users to facilitate the distribution of research related content.
For more information see the web services page.
Publications
All publications resulting from research supported by ARSC grants shall include the following credit: "This work was supported in part by a grant of HPC resources from the Arctic Region Supercomputing Center at the University of Alaska Fairbanks." PIs must submit to ARSC copies of articles accepted for publication.
As a condition of continued access to ARSC resources, PIs will submit a brief annual report on their project, as directed by ARSC, describing research objectives, computational methodology, results, and significance of the research.
Security
Every user of ARSC systems can rightfully expect his or her programs, data, documents, etc., to be inaccessible to others, secure against arbitrary loss or alteration, and available for appropriate use, at all times.To help achieve this goal of protecting system security, ARSC system administrators reserve the right to routinely examine certain features of user accounts, such as the permissions set on environment files and the contents of specific environment files. ARSC also reserves the right, in cases of suspected security incidents, to inactivate and examine the contents of user accounts, without prior notification. For more information review the ARSC Security Policies page.
Data Retention
Please see storage policy pages.
Visualization Labs
The Visualization/Access Laboratory computers are authorized for non-sensitive data only. Do not introduce sensitive data onto these systems.
Please review ARSC's Visualization Labs Access Policy.
