ASU Research Computing Acceptable Use Policy
The purpose of the ASU Research Computing and the resources it oversees is to further the scientific, research, and educational efforts of ASU and it’s partners. In general, any activity that interferes with this purpose may be modified or cancelled by ASU Research Computing staff to support the research efforts of the University.
By using the ASU Research Computing systems and resources, you agree to the following Acceptable Use Policy:
1. University Policies
- 1.1 All users of ASU Research Computing resources are responsible for following Arizona State University’s “Computer, Internet, and Electronic Communications Information Management Policy” (ACD125) as well as any specific Departmental, College, or School requirements related to computing and electronics.
2. University Use Only
- 2.1 ASU Research Computing resources are specifically reserved for the use of scientists, researchers, and other staff to further research and scholarly advancement at ASU and it’s associated institutions and partners. Any use of the cluster for personal or commercial gain is strictly prohibited.
- 3.1 ASU Research Computing makes every attempt to schedule server and cluster maintenance during regularly scheduled maintenance windows, however issues do occur that may need to be handled outside these pre-described maintenance windows.
- 4.1 Any jobs or processes that impact the performance or load functions of the login nodes or interferes with other users running jobs will be terminated.
- 4.2 Cluster jobs containing wait times or “sleep loops” beyond a reasonable period, may not be run. Any job with a long wait or that contains an impactful/sustained sleep loop may be terminated without advance notice.
- 4.3 Unattended listening services (jobs that create listening ports for other computers to connect to) are strictly prohibited, and may be blocked by ASU Research Center Staff without notice.
- 4.4 Cluster jobs must be run on compute nodes configured for this purpose. Running jobs on the cluster login nodes is prohibited, and any jobs/processes that impact the performance or functions of the login nodes or interferes with other users running jobs may be terminated without notice.
5. Quotas and Storage
- 5.1 ASU Research Computing reserves the right to create, modify, and enforce quotas on all user directories, including home directories (/home), temporary/scratch directories, and team data directories (/data.) Users are reminded that storage provided by ASU Research Computing is for active research only, and not for long term or archival purposes. ASU Research Computing does not backup user storage, and user files may be deleted, moved, or made unavailable as needed by ASU Research Computing personnel. Users are responsible for backing up their own data.
- 5.2 ASU Research Computing high-speed storage is for data that is actively being used for research on the ASU RC Clusters, not for long-term Project Storage. Quotas are enforced for both individual home directories as well as shared research space (/data.)
- 5.3 While ASU Research Computing makes every effort to maintain the availability and integrity of our storage products, the storage arrays are not backed up. They are resilient against failure but do not support redundancy. It is the responsibility of individual users and projects to back up their own data to non-ASU Research Computing storage.
- 5.4 Files stored on ASU Research Computing storage arrays must be under active use on our clusters. Active Use is defined as used within the last 60 days or designated as a source dataset used for reference in cluster jobs. Files older than 60 days may be removed on an as-needed basis with prior discussion with the user.
- 5.5 Agave Scratch Space: The scratch space on the Agave supercomputer is a shared storage resource for temporary files and is available to all Agave users with no per-user storage limit. The scratch space provides short-term storage for immediate use during computational jobs. Each user is responsible for limiting their use of scratch storage to minimize the impact on other users. The Agave scratch space is not backed up, and ASU Research Computing is not responsible for the deletion or loss of any files from the scratch file system. Files stored in the scratch space are subject to deletion after 30 days of inactivity or at the determination of the ASU Research Computing Department if immediate action is required to ensure system stability. ASU Research Computing will notify the file owner, sponsoring PI, and/or Department when files are subject to deletion. Files that must be kept longer than 30 days should be moved to a home directory, purchased project storage, or another storage medium. Exceptions to this policy will be determined through consultation with the Research Computing Governance Board.
- 5.6 Sol Scratch Space: The scratch space on the Sol supercomputer, like Agave, is a shared storage resource for temporary files and is available to all Sol users. The scratch space provides short-term storage for immediate use during computational jobs. Each user is responsible for limiting their use of scratch storage to minimize the impact on other users. The Sol scratch space is not backed up, and ASU Research Computing is not responsible for the deletion or loss of any files from the scratch file system. In order to ensure the best system stability and performance the scratch directory has a limit of 5TB per user. ASU Research Computing may temporarily expand this limit to accommodate specific research needs. Requests for additional scratch space will be reviewed in consultation with the Research Computing Governance Board Chair. Determinations will be based on the research need and Sol scratch capacity. There is no guarantee that all extensions will be granted. Sol scratch files that have not been accessed for 90 days will be removed from the system. ASU Research Computing will notify the file owner, sponsoring PI, and/or Department when files are subject to deletion. Files that must be kept longer than 90 days should be moved to a home directory, purchased project storage, or another storage medium. Exceptions to this policy will be determined through consultation with the Research Computing Governance Board.
- 6.1 Some software offered on the system is controlled by individual license agreements. It is the responsibility of the user to maintain proper licensing of any user-installed software.
7. Restricted Data Sets
- 7.1 If your research data contains HIPAA (Health Insurance Portability and Accountability Act), FERPA (Family Educational Rights and Privacy Act), PII (Personally Identifiable Information), PHI (Protected Health Information), or any other regulated data, please consult with ASU Research Computer Staff prior to using any ASU Research Computing systems to verify that all required measures and controls are supported.
8. Cryptocurrencies, cryptographic mining, distributed cryptography
- 8.1 Performing “mining” operations involving cryptocurrencies such as BitCoin, distributed cryptography such as the distributed.net projects, and all forms of volunteer computing such as SETI@Home are prohibited without specific prior written consent of ASU Research Computing.
9. Violations of this Acceptable Use Policy, ACD125, or other University Policies
- 9.1 Violations of the policies of Arizona State University and/or ASU Research Computing may, at the discretion of ASU Research Computing, result in the temporary or permanent removal of accounts associated with ASU Research Computing, including accounts that allow access to clusters and storage.
10. Updates to ASU Research Computing Policies
- 10.1 ASU Research Computing may, at the discretion of ASU Research Computing Management, amend, modify, and or otherwise edit the polices of ASU Research Computing as needed, and published those changes to the ASU Research Computing website.
|Combined AUP and Scratch Policies||4/19/2019|