All software used on NERSC computers must be appropriately acquired and used according to the appropriate licensing. Possession, use or transmission of illegally obtained software is prohibited. Likewise, users shall not copy, store or transfer copyrighted software or data, except as permitted by the owner of the copyright.
Unauthorized Access Users are prohibited from attempting to send or receive unintended messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misuse of legal user credentials (usernames, passwords, etc.), or by causing some system component to function incorrectly.
Altering Authorized Access: Users are prohibited from changing or circumventing access controls that allow themselves or others to perform actions outside their intended authorized privileges.
Reconstruction of Information or Software Users are not allowed to reconstruct or recreate information or software for which they are not authorized.
Data Modification or Destruction Users are prohibited from taking actions that intentionally modify or delete information or programs for which they are not authorized.
Malicious Software Users must not intentionally introduce or use malicious software, including, but not limited to, computer viruses, Trojan horses, or worms.
Denial of Service Actions Users may not use NERSC resources to interfere with any service availability, either at NERSC, or at other sites.
Please enter the characters you see in the image above (not case sensitive).