Acceptable Use Policy for High Performance Computing (HPC) Cluster

Effective Date: October 7, 2024

1. Introduction

Welcome to the High Performance Computing (HPC) Cluster. This Acceptable Use Policy (AUP) is designed to ensure the security, integrity, and efficient operation of the HPC resources. By accessing or using the HPC Cluster, you agree to comply with the terms and conditions outlined in this policy, as well as the terms and conditions outlined in the Case Western Reserve University (CWRU) AUP. The HPC policy serves as an addendum to the CWRU AUP, and does not supersede it. Failure to adhere to these policies may result in suspension or termination of your access privileges.

2. Scope

This policy applies to all users of the HPC Cluster, including but not limited to faculty, staff, students, researchers, and external collaborators. It covers all resources associated with the HPC Cluster, including hardware, software, data storage, and network infrastructure.

3. User Responsibilities

3.1 Account Security

  • Accounts used to access HPC resources are CWRU network id logins. Users are expected to keep their password/passphrase confidential and to follow the university’s network ID and passphrase policy.
  • Users are responsible for all activities conducted under their account. Sharing accounts or login credentials is strictly prohibited.
  • Users must promptly report any security breaches, including unauthorized use of their account, to the HPC support team.

3.2 Resource Usage

  • Use of the HPC Resource is limited to university research and instructional use within official CWRU courses. No commercial use is permitted.
  • Users agree to use HPC compute nodes, file systems, and shared resources efficiently and responsibly to prevent undue strain on HPC systems.
  • Users should not run jobs that could significantly degrade the performance of the HPC compute nodes, file systems, or network. Do not run jobs on the login nodes. It is advised to follow other important tips for efficient job submission.
  • Users must adhere to job scheduling policies and guidelines, including batch job submission and priority, wall-time limits, and efficient resource allocation.

3.3 Data Management

  • Users are encouraged to own a backup of the data for which they are responsible, and for ensuring the integrity and security of their data and any backups they receive and/or own.
  • Users must comply with data storage policies, including quotas and retention guidelines.
  • Sensitive or confidential data must be encrypted and handled in accordance with applicable laws and regulations.
    • Data classified as HIPAA must be stored, transmitted, and processed only within the Secure Research Environment (SRE), subject to applicable laws and regulations.
    • Data classified as NIH genomic/phenotypic data must be stored, transmitted, and processed on Research Computing systems that comply with the NIST 800-171 requirements. Contact HPC administrators for correct resources and relevant data use agreement forms for new research that starts after Jan 2025.
    • Data classified as CUI (Controlled Unclassified Information) is not to be stored, transmitted, posted, published, or processed on Research Computing resources unless that resource explicitly states that CUI is authorized. Additionally, CUI cannot be published/posted on public Research Computing and Case Western Reserve University resources. Contact the Office of Research Technology Management for authorized private/restricted CUI storage and processing resources.
    • For all other regulated data, consult with HPC administrators before storing, transmitting, or using it on HPC systems/network.

3.4 Software Usage

  • Users must comply with all software licensing agreements and intellectual property laws.
  • Unauthorized copying, distribution, or use of software is prohibited. Illegally obtained software (e.g. cracked or hacked software/license keys) is prohibited from being stored and/or used on HPC systems.
  • Users can request properly licensed software, including but not limited to university-owned and department-owned, to be installed on the cluster by the HPC team.
  • Users should use properly licensed or open-source software when installing it themselves.

4. Prohibited Activities

4.1 Unauthorized Access

  • Users must not attempt to gain unauthorized access to any HPC resources, including other users' accounts or data not explicitly permitted or through shared data resources. Default file permissions allow a PI to access data created by researchers in the PI's groups, but do not allow the PI to access data created by researchers in other groups to which the PI does not belong.
  • Users must not use tools or techniques designed to compromise the security or integrity of the HPC Cluster.

4.2 Malicious Activities

  • Users must not engage in activities that could harm the HPC cluster or its users, including running software that can potentially introduce malware, viruses, or by using other potentially harmful software, including software not designed for current research or classroom activities.
  • Users must not use the HPC cluster to conduct or support any illegal activities as defined by local, state, and federal laws, and university policies.

4.3 Resource Misuse

  • Users must not use HPC resources for non-research-related or non-classroom activities, including personal projects, cryptocurrency mining, or commercial projects without explicit authorization from HPC managers. Consult this guide for classroom activities.
  • Users must not engage in activities that could cause excessive strain on the HPC resources, such as running excessively large or poorly optimized jobs, or running jobs on login nodes.

5. Monitoring and Enforcement

5.1 Monitoring

  • The HPC support team reserves the right to monitor HPC usage to ensure compliance with this policy.
  • Monitoring activities may include, but are not limited to, logging user activities, job submissions, and data transfers.
  • Users can expect a reasonable level of privacy of their data on HPC resources; however, some data may be investigated for HPC resource usage monitoring or policy violation, or for security incident response.

5.2 Enforcement

  • Violations of this policy may result in disciplinary actions, including suspension or termination of HPC access.
  • Severe violations may be reported to relevant authorities and could result in legal action.

6. Reporting Issues

6.1 Support

  • For general troubleshooting, refer to the HPC guide here.
  • Users encountering issues with the HPC Cluster should contact the HPC support team via hpc-support@case.edu

6.2 Security Incidents

  • Users must promptly report any security incidents, including unauthorized access or data breaches, to the HPC support team at hpc-support@case.edu.

7. Amendments

This policy may be amended from time to time to reflect changes in technology, legal requirements, or organizational needs. Users will be notified of significant changes to this policy via email or the HPC Cluster's user portal.

8. Acknowledgment

By using the HPC Cluster, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy. Failure to adhere to this policy may result in disciplinary actions, including suspension or termination of your access privileges.


Contact Information:

HPC Support Team
Email: hpc-support@case.edu
Office hours: Updated on our Google Calendar (must be signed into CWRU account)