Policies regarding UITS research systems

On this page:


The High Performance Systems (HPS) group, part of the Research Technologies division of UITS, manages and administers IU's research supercomputers. These systems and associated support services enable IU researchers to solve large and complex scientific problems, and to handle massive data sets.

To protect data and systems at IU, the HPS group may place limits or restrictions on technology services provided on or from any HPS-owned or -managed system and network, as follows:

  • Limitations may be implemented through the use of policies, standards, and/or technical methods, and could include (but may not be limited to) usage eligibility rules, passphrase requirements, or restrictions against using certain protocols applications known to cause security problems.
  • Restrictions may be deployed permanently, based on continuing threat or risk, after appropriate consultation with affected constituents, or deployed temporarily, without prior coordination, in response to an immediate and serious threat.
  • Restrictions deployed temporarily will be removed when the risk is mitigated to an acceptable level, or if the restrictions have an effect on university functions that approaches or exceeds the risk associated with the threat, as negotiated between the affected constituents and HPS administrators.

Any stated policy by the HPS group is evaluated in conjunction with Appropriate Use of Information Technology Resources policy (IT-01).


You authenticate on the IU research systems with your IU passphrase. Each passphrase is intended for the owner of the account only; do not share your passphrase with others. If your passphrase is determined to be insecure, your account will be disabled until you reset your passphrase.

UITS will not give out account passphrases for the research systems in email or by telephone. If you've forgotten your passphrase, see Reset your IU passphrase.

Login and file transfer access

Login and file transfer access are limited to the designated interactive nodes via clients and commands that use the SSH protocol version 2 (SSH2). For security reasons, the Telnet and FTP protocols are no longer supported. For information about transferring files to and from the Scholarly Data Archive (SDA), see Access the SDA at IU.

Software requests

If you want to use public-domain or commercial packages on the research systems, you can request their installation on publicly accessible disk space:

For policy specific to Carbonate, see IU policies relative to installing software on Carbonate.


The Research Technologies division of UITS provides several systems and services that meet certain requirements established in the HIPAA Security Rule thereby enabling their use for research involving data that contain protected health information (PHI). However, using a UITS Research Technologies resource does not fulfill your legal responsibilities for protecting the privacy and security of data containing PHI. You may use these resources for research involving data containing PHI only if you institute additional administrative, physical, and technical safeguards that complement those UITS already has in place.

For more, see Your legal responsibilities for protecting data containing protected health information (PHI) when using UITS Research Technologies systems and services.

If you have questions about securing HIPAA-regulated research data at IU, email securemyresearch@iu.edu. SecureMyResearch provides self-service resources and one-on-one consulting to help IU researchers, faculty, and staff meet cybersecurity and compliance requirements for processing, storing, and sharing regulated and unregulated research data; for more, see About SecureMyResearch. To learn more about properly ensuring the safe handling of PHI on UITS systems, see the UITS IT Training video Securing HIPAA Workflows on UITS Systems. To learn about division of responsibilities for securing PHI, see Shared responsibility model for securing PHI on UITS systems.


  • Internet Relay Chat (IRC) bot programs are not permitted.
  • Unattended listening user services (for example, programs that open a socket waiting for a connection from another host) will be terminated.
  • Accounts not logged into within 30 days of creation will be disabled.
  • Accounts not used for a period of six months will be disabled.

Acknowledge grant support

The Indiana University cyberinfrastructure managed by the Research Technologies division of UITS is supported by funding from several grants, each of which requires you to acknowledge its support in all presentations and published works stemming from research it has helped to fund. Conscientious acknowledgment of support from past grants also enhances the chances of IU's research community securing funding from grants in the future. For the acknowledgment statement(s) required for scholarly printed works, web pages, talks, online publications, and other presentations that make use of grant-funded research systems at IU, see Sources of funding to acknowledge in published work if you use IU's research cyberinfrastructure.

Questions and comments

The policies described in this document were established with the goal of providing a stable, powerful, and efficient research computing environment for IU faculty, graduate students, and staff. If you have any questions or comments about these policies, UITS welcomes your input. Please contact High Performance Systems.

This is document avkh in the Knowledge Base.
Last modified on 2020-11-24 15:59:30.

Contact us

For help or to comment, email the UITS Support Center.