Arseven Computing Cluster Acceptable Use Policy
This computer system and the data herein are available only for authorized purposes by authorized users in accordance with TAMU SAP 29.01.03.M0.02, Information Resources — Acceptable Use. Students are also governed by Student Rules, including Rules for Responsible Computing and Individual Responsibility for Use of Computing Resources and Facilities.
Use for any other purpose may result in administrative/disciplinary actions and/or criminal prosecution against the user. Usage may be subject to security testing and monitoring. Users have no expectation of privacy except as otherwise provided by applicable privacy laws.
By university regulation and The State of Texas law, it is illegal for users of state computing systems to share passwords and computer accounts.
Storage and backups
Disk storage in this cluster is provided only for files/data required for computation on these servers. Any/all scratch space on these systems is not for long-term storage and is provided to meet the current needs of your computation. If required, staff may delete files in any scratch space to meet the needs of the overall system, however, prior notice will be sent to users to reduce used space whenever possible.
Backups are only provided for home directories daily. No scratch storage is backed up.
Data classification
By using this computer system, you acknowledge and affirm that all data stored/used is only:
- Public data (DC-3), or
- University-internal data (DC-4)
as defined in the Texas A&M Information Security Controls Catalog.
No data categorized as confidential (DC-5) or critical (DC-6) may be used, stored, or transmitted by this computer system.
Shared resource expectations
This computer system is a shared resource, and we ask that users request only as much resources (cores, memory, and other specialized hardware) as are necessary for their computation. Users that repeatedly request more resources than necessary will find their jobs cancelled.
Additionally, this computer resource is not intended to be an SSH jump-host, and we ask that users do not initiate SSH connections from the computer resource to other systems — with the exception of version control systems (git/GitHub) or scp/sftp for moving data.