Policies regarding UITS research systems

On this page:


Overview


The High Performance Systems (HPS) group, part of the Research Technologies division of UITS, manages and administers computing systems dedicated to research. These systems and associated support services enable IU researchers to solve large and complex scientific problems, and to handle massive data sets.

To protect data and systems at IU, the HPS group may place limits or restrictions on technology services provided on or from any HPS-owned or -managed system and network, as follows:

  • Limitations may be implemented through the use of policies, standards, and/or technical methods, and could include (but may not be limited to) usage eligibility rules, passphrase requirements, or restrictions against using certain protocols applications known to cause security problems.
  • Restrictions may be deployed permanently, based on continuing threat or risk, after appropriate consultation with affected constituents, or deployed temporarily, without prior coordination, in response to an immediate and serious threat.
  • Restrictions deployed temporarily will be removed when the risk is mitigated to an acceptable level, or if the restrictions have an effect on university functions that approaches or exceeds the risk associated with the threat, as negotiated between the affected constituents and HPS administrators.

Any stated policy by the HPS group is evaluated in conjunction with Appropriate Use of Information Technology Resources policy (IT-01).

Passphrases

You authenticate on the IU research systems with your IU passphrase. Each passphrase is intended for the owner of the account only; do not share your passphrase with others. If your passphrase is determined to be insecure, your account will be disabled until you reset your passphrase.

UITS will not give out account passphrases for the research systems in email or by telephone. If you've forgotten your passphrase, see Reset your IU passphrase.

Login and file transfer access

Login and file transfer access are limited to the designated interactive nodes via clients and commands that use the SSH protocol version 2 (SSH2). For security reasons, the Telnet and FTP protocols are no longer supported. For information about transferring files to and from the Scholarly Data Archive (SDA), see Access the SDA at IU.

Software requests

If you want to use public-domain or commercial packages on the research systems, you can request their installation on publicly accessible disk space:

  • To request software for use on IU research supercomputers, submit the HPC Software Request form.
    Note:

    Big Red II will be retired from service on December 15, 2019. After that date, you will no longer be able to log into Big Red II; however, the data in your Big Red II home directory will remain accessible from your home directory on any of the other IU research supercomputers. New software requests for Big Red II will no longer be accepted after the October 13, 2019, maintenance window.

    Beginning October 14, 2019, IU graduate students, faculty, and staff will be able to create accounts on Big Red III. Undergraduate students and affiliates will be able to get accounts if they are sponsored by full-time IU faculty or staff members. Grand Challenges users who create Big Red III accounts will be able to request exclusive access to a portion of the system for running jobs.

    For more, see Upcoming changes to research supercomputers at IU.

  • To request bioinformatics software installation, use the NCGAS Cluster Software Request form.

For policy specific to Carbonate, see IU policies relative to installing software on Carbonate.

HIPAA

The Research Technologies division of UITS provides several systems and services that meet certain requirements established in the HIPAA Security Rule thereby enabling their use for research involving data that contain protected health information (PHI). However, using a UITS Research Technologies resource does not fulfill your legal responsibilities for protecting the privacy and security of data containing PHI. You may use these resources for research involving data containing PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place.

For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services.

UITS provides consulting and online help for Indiana University researchers, faculty, and staff who need help securely processing, storing, and sharing data containing protected health information (PHI). If you have questions about managing HIPAA-regulated data at IU, contact UITS HIPAA Consulting. To learn more about properly ensuring the safe handling of PHI on UITS systems, see the UITS IT Training video Securing HIPAA Workflows on UITS Systems. For additional details about HIPAA compliance at IU, see HIPAA Privacy and Security Compliance

Restrictions

  • Internet Relay Chat (IRC) bot programs are not permitted.
  • Unattended listening user services (for example, programs that open a socket waiting for a connection from another host) will be terminated.
  • Accounts not logged into within 30 days of creation will be disabled.
  • Accounts not used for a period of six months will be disabled.

Acknowledge grant support

The Indiana University cyberinfrastructure managed by the Research Technologies division of UITS is supported by funding from several grants, each of which requires you to acknowledge its support in all presentations and published works stemming from research it has helped to fund. Conscientious acknowledgment of support from past grants also enhances the chances of IU's research community securing funding from grants in the future. For the acknowledgment statement(s) required for scholarly printed works, web pages, talks, online publications, and other presentations that make use of grant-funded research systems at IU, see Sources of funding to acknowledge in published work if you use IU's research cyberinfrastructure.

Questions and comments

The policies described in this document were established with the goal of providing a stable, powerful, and efficient research computing environment for IU faculty, graduate students, and staff. If you have any questions or comments about these policies, UITS welcomes your input. Please contact High Performance Systems.

This is document avkh in the Knowledge Base.
Last modified on 2019-08-27 08:58:12.

Contact us

For help or to comment, email the UITS Support Center.