SUPR
Current NAISS User Agreement
Please note: you need to log in to your SUPR user in order to accept the NAISS User Agreement (that applies even if you are using the paper alternative – you cannot print this page and send it).

Conditions for use of resources and services at Swedish academic computing centres connected to NAISS

Ref no: LiU-2022-05165 Version 2023-01-01

These conditions apply to the use of resources and services at computing centres connected to National Academic Infrastructure for Computing in Sweden (NAISS), including resources and services not financed by NAISS.

General

In this document the word centre refers to a Swedish, academic computing centre connected to NAISS. The word project refers to the allocation of resources or services, such as computational time and storage area. Each allocation has a project name, which may be based on a registration number. The conditions in this document are mandatory to receiving a user account and access to resources and services at a centre.

Access

Normally, membership in one or more project is required to access a centre’s resources and services via a user account. Membership in a project is granted by a principal investigator or a proxy for the principal investigator. Those who are not members in a project require a special permit to gain access to a centre’s resources. This also applies when providing a third party with such access, for example via grid or cloud services.

User account

A user account is strictly personal and shall not be used by anyone else besides the user. That is to say, it is prohibited to provide account access to anyone else or to use anyone else’s access information.

Passwords

All passwords shall be confidential and handled securely to prevent other parties from gaining access. This means they should not be written down and, if stored electronically, must be protected by an additional layer of encryption and password.

If there is any suspicion that another party might have knowledge of a password, it shall be replaced immediately.

Passwords shall be unique and, when possible, varied for different centres and systems.

Keys, certificates and other means of authentication shall be handled as securely as passwords.

Connection

To use a centre’s resources and services, connection shall be made using a secure method, as recommended by the centre.

Connection shall only be made from a computer with a good level of security, that is to say a computer that is kept updated and that does not contain any viruses, trojans or other malicious software.

Connection shall not be made from a country subject to Swedish exports restrictions for goods and technology, including software.

Usage

Centre resources and services shall only be used for activities for which the project in question has been granted resources.

Consideration

Many resources are shared by several users. When using these, consideration must be given to the other users of the resources.

Instructions from persons representing the centre or the allocating organisation shall be observed.

Acknowledgement

All use of a centre’s resources and services shall be suitably acknowledged. When such use results in publication, this shall be acknowledged in each publication according to the template included with the resource allocation approval.

Expired projects

Projects have a limited duration. Centres erase all data in storage areas connected to expired projects after a waiting period of 90 days. Centres also have the right to remove user accounts, and associated data, for users no longer belonging to any valid project, after a waiting period of six months.

Monitoring and consequences

The centres retain the right to monitor and log all usage of, and access to, the resources and services provided; the purpose of this being to ensure security and verify that regulations are observed.

Users who discover or suspect security vulnerabilities or abuse shall report these to the relevant centre immediately.

Users and user accounts under investigation for rule violations can be temporarily suspended with immediate effect.

Depending on the type of infringement and previous offences, measures taken against a user found to have broken the rules can amount to anything from a reprimand to a withdrawal of access to resources and services at all centres.

Suspicion of breach of the law can lead to a report to the police. Other legal measures, such as bringing an action for damages, can also be taken.

Other

Usage of local resources at a specific centre require compliance with local rules and conditions of use, see the links below for details.

Chalmers/C3SE: Section 7
https://webbpublicering360.portal.chalmers.se/Extern/Home/Download?recordnor=794003%262021_01%26955842_1_1.PDF%26ex

KTH/PDC: https://www.kth.se/polopoly_fs/1.298988%21/Menu/general/column-content/attachment/IT-ANSE.pdf