Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Principal Investigators (PIs) are responsible for ensuring that these policies, procedures, and security rules are followed for their project members and ensuring that project members working under their supervision fulfill these responsibilities.

1.1.3.4 Research Use

ARCC resources may only be used for research activities and must never be used in the violation of any other university regulation. The following categories of use (without limitation) are prohibited:

...

to facilitate any transaction that would violate U.S. export control regulations.

1.1.3.5 User Data Requirements

Users of ARCC resources agree to store only data that meets the following conditions:

...

does NOT contain copyrighted material that the user doesn’t have appropriate rights to.

1.1.3.6 Compliance with requests from ARCC

...

You are required to comply within a prompt timeframe to ARCC direct requests from regarding the use of ARCC resources. This includes requests to reduce disk space consumption or halting prohibited actions. ARCC purposefully aims to keep our list policies as short as possible in order to facilitate the use of these research tools in novel and creative ways, however, behaviors or practices that interfere with the ability of others to use shared resources, must be handled with immediacy and ARCC staff require prompt compliance on such requests.

1.1.3.7 Monitor the email address for your account

...

You are required to monitor your USERNAME@uwyo.edu email address. If you are an external collaborator, you should monitor the email address provided to IT Application Security upon your account creation.

1.1.3.8 Provide notification

...

ARCC users should notify arcc-help@uwyo.edu immediately when aware that any accounts used to access ARCC resources have been compromised.

...