TERMS OF USE OF THE COMPUTING AND NETWORKING INFRASTRUCTURE AT THE SWIERK COMPUTING CENTRE (SCC)
1 User rights
§ 1.1 In order to get an access to resources, the user applies for the certificate at the address http://ca.cis.gov.pl/ and, at the same time, submits an application form and shows his identity document to the administrator. The certificate enables connection to the SCC network, from any location in the world, by using the VPN service.
§ 1.2 The user gets a login, consisting of the initial of his given name and his surname, and optionally a number appended to the end of it. This login is assotiated with the SCC account given to the user to his exclusive disposal. With this account the user gets an access to the following services:
(a) The shell on the server at usrint.cis.gov.pl, with access to the queueing system on the computing cluster. This queueing system has to be used for job submission.
(b) Personal WWW page at the address http://www.cis.gov.pl/~<login>.
(c) Internet communicator on the protocol XMPP/Jabber, for internal use only.
(d) Access to the Project's resources on page http://www.cis.gov.pl/.
§ 1.3 The administrators provide with technical consultancy needed for using resources. Questions and problems should be addressed to: nst@cis.gov.pl for the networking and access to services, admins@ncbj.gov.pl for computing resources and job submission.
2 User obligations
§ 2.1 The user is responsible for appropriate use of his account and for data stored in the SCC, including backup of valuable data. This concerns in particular data belonging to third parties.
§ 2.2 The user should keep in confidence his data enabling access to computing and networking resources. In particular, it is forbidden to share with third parties the passwords, keys and certificates, as well as any other data protected by law. The user has to immediately notify system administrators about any loss or leak of data, or about his suspition of such.
§ 2.3 The user binds himself to care about economy using resources allocated to him, in particular the processor time, operational memory and disk space. It is not allowed to submit jobs outside of the queueing system. After 7 days of processing the administrator is allowed to break jobs left unattended during this time.
§ 2.4 It is strictly forbidden to take any actions intended to compromise the security and stability of the system, in particular:
(a) Port scanning.
(b) Spoofing.
(c) Sniffing or grabbing.
(d) Storing and/or executing exploits.
(e) Unauthorized escalation of priviledges.
(f) Setting-up servers, bots and enabling any services other than those provided by SCC.
(g) Setting-up tunnels, proxies etc.
(h) Destroying or spoiling data belonging to third parties, in particular logs.
(i) Intentional overloading services.
(j) Any other forms of vandalism.
§ 2.5 In case of breaking this regulation, or breaking the law, the administrators reserve themselves the rights to:
(a) Reprimand the user.
(b) Deprive him an access to resources.
(c) Informing their supervisors in written.
(d) Enforcing law by notifying appropriate authorities or intelligence services.
3 System administration
§ 3.1 System administrators reserve themselves the right to temporarily suspend access to resources in well-justified cases, as technical, organizational and others, announcing in advance about the reason and foreseen duration of the cessation of service.
§ 3.2 The administrators publish communicates for users. These communicates are available after logging to the system or are sent out via email.
§ 3.3 In case of suspected violation of this regulation the Network Security Team has right to:
(a) Inspect the contents of user's data and remove these data if needed.
(b) Modify and reset priorities of running processes or suspend them.
(c) Forbid or block an access to resources.
4 Endnotes
§ 4.1 An up-to-date and binding version of the regulation is available on the SCC web page. The administrators will inform the users about important changes therein.
§ 4.2 In case of user's doubts as to the conformity of his actions to the terms of use the technical person on duty of the SCC should be consulted.
§ 4.3 The user agrees to his personal data processing exclusively for purposes related to his access to data.
§ 4.4 Relation of these regulations to given user expires after cancellation of the account. This normally happens 60 days after the expiration of the certificate.
The Regulations and the application form (PDF format) can be downloaded from here: Regulations.pdf