Policies

Signing document on tableUF RESEARCH COMPUTING ACCEPTABLE USE POLICY

This acceptable use policy applies in addition to the UF Acceptable Use Policy and UF Information Technology Acceptable Use policy

The purpose of HiPerGator and its related resources is to advance the scientific, educational, and research efforts of the University of Florida and its partners. Any activity that interferes with this purpose may be modified or cancelled by UFIT Research Computing staff.

By using HiPerGator systems and resources, you agree to the following Acceptable Use Policy.

A valid GatorLink account is required to obtain a HiPerGator account. Active computational and blue storage allocations are required for data analyses, creation, or maintenance of active user accounts on HiPerGator.

 

If your research data contains HIPAA (Health Insurance Portability and Accountability Act), FERPA (Family Educational Rights and Privacy Act), PII (Personally Identifiable Information), PHI (Protected Health Information), or any other regulated data, the following options are available:

  • HIPAA and PHI data: HiPerGator meets the security and compliance requirements of the HITRUST standard. To set up a project that works with PHI, you must adhere by the policies and follow the procedures described here.
  • FERPA data: HiPerGator meets the security and compliance requirements of the HITRUST standard. To set up a project that works with FERPA, you must adhere by the policies and follow the procedures described here.
  • ITAR/EAR and CUI data: ResVault has been certified to be compliant with NIST 800-171 and 800-53-moderate. Follow the policies and procedures described here.

In all cases of restricted data, please contact Research Computing staff for detailed guidance on how to proceed.

CRYPTOCURRENCIES AND MINING

Performing “mining” operations involving cryptocurrencies such as BitCoin, distributed cryptography such as the distributed.net projects, and all forms of volunteer computing such as Folding@Home are prohibited.

LICENSING

Some software offered on the system is controlled by individual license agreements. It is the responsibility of the user to maintain proper licensing of any user-installed software.

MAINTENANCE

Research Computing makes every attempt to schedule server and cluster maintenance during regularly scheduled maintenance windows. However, issues do occur that may need to be handled outside these pre-described maintenance windows.

SERVICE ACCOUNTS

Research Computing supports the use of non-interactive service accounts for workflow and application execution or data transfers from external sources. Submit a support request to start the process of obtaining an approved service account. Project duration and sufficient documentation are required with the account request.

Account aliases for interactive use by a person that are associated with a position that changes regularly are not supported by RC.

MFA

Multi-Factor authentication is required for all individual Research Computing accounts.