Policies regarding UITS research systems

On this page:

General information

The High Performance Systems (HPS) group, part of the Research Technologies division of UITS, manages and administers computing systems dedicated to research. These systems and associated support services enable IU researchers to solve large and complex scientific problems, and to handle massive data sets.

To protect data and systems at IU, the HPS group may place limits or restrictions on technology services provided on or from any HPS-owned or -managed system and network, as follows:

  • Limitations may be implemented through the use of policies, standards, and/or technical methods, and could include (but may not be limited to) usage eligibility rules, passphrase requirements, or restrictions against using certain protocols applications known to cause security problems.
  • Restrictions may be deployed permanently, based on continuing threat or risk, after appropriate consultation with affected constituents, or deployed temporarily, without prior coordination, in response to an immediate and serious threat.
  • Restrictions deployed temporarily will be removed when the risk is mitigated to an acceptable level, or if the restrictions have an effect on university functions that approaches or exceeds the risk associated with the threat, as negotiated between the affected constituents and HPS administrators.

Any stated policy by the HPS group is evaluated in conjunction with IU's Appropriate Use of Information Technology Resources policy (IT-01) as defined in the IU Information & IT policies.


You authenticate on the IU research systems with your IU passphrase. Each passphrase is intended for the owner of the account only; do not share your passphrase with others. If your passphrase is determined to be insecure, your account will be disabled until you reset your passphrase.

UITS will not give out account passphrases for the research systems in email or by telephone. If you've forgotten your passphrase, see Reset your IU passphrase.

Login and file transfer access

Login and file transfer access are limited to the designated interactive nodes via clients and commands that use the SSH protocol version 2 (SSH2). For security reasons, the Telnet and FTP protocols are no longer supported. For information about transferring files to and from the Scholarly Data Archive (SDA), see At IU, how do I access the SDA?

Software requests

If you want to use public-domain or commercial packages on the research systems, you can request their installation on publicly accessible disk space:

For policy specific to Carbonate, see At IU, what is the policy about installing software on Carbonate?


The Research Technologies division of UITS provides several systems and services that meet certain requirements established in the HIPAA Security Rule thereby enabling their use for research involving data that contain protected health information (PHI). However, using a UITS Research Technologies resource does not fulfill your legal responsibilities for protecting the privacy and security of data containing PHI. You may use these resources for research involving data containing PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place. For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services. For help with HIPAA-related issues on UITS systems, contact UITS HIPAA Consulting.


  • Internet Relay Chat (IRC) bot programs are not permitted.
  • Unattended listening user services (e.g., programs that open a socket waiting for a connection from another host) will be terminated.
  • Accounts not logged into within 30 days of creation will be disabled.
  • Accounts not used for a period of six months will be disabled.

Acknowledging grant support

The Indiana University cyberinfrastructure managed by the Research Technologies division of UITS is supported by funding from several grants, each of which requires you to acknowledge its support in all presentations and published works stemming from research it has helped to fund. Conscientious acknowledgment of support from past grants also enhances the chances of IU's research community securing funding from grants in the future. For the acknowledgment statement(s) required for scholarly printed works, web pages, talks, online publications, and other presentations that make use of grant-funded research systems at IU, see If I use IU's research cyberinfrastructure, what sources of funding do I need to acknowledge in my published work?

Questions and comments

The policies described in this document were established with the goal of providing a stable, powerful, and efficient research computing environment for IU faculty, graduate students, and staff. If you have any questions or comments about these policies, UITS welcomes your input. Please contact High Performance Systems.

This is document avkh in the Knowledge Base.
Last modified on 2018-06-11 16:40:04.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.