Terms and Conditions

Acceptable Use Policy HPC CEDIA

This Acceptable Use Policy (the “Policy”) indicates the prohibited uses of the High Performance Computing cluster of the CEDIA network (“ CEDIA HPC cluster”). The examples described in this Policy are not exhaustive. We may modify this Policy at any time by posting a modified version on the CEDIA network website. By accessing the HPC CEDIA cluster, you accept the latest version of this Policy. If you violate the Policy or authorize or assist others to do so, we may suspend or terminate your use of the Services.

You may not use, encourage, promote, facilitate, or instruct others to use the CEDIA HPC Cluster for any illegal, dangerous, fraudulent, infringing, or offensive use or to transmit, store, display, distribute, or otherwise make available content that is illegal, dangerous, fraudulent, infringing or offensive. Prohibited activities or content include:

  • Illegal, Dangerous or Fraudulent Activities. Any activity that is illegal, that violates the rights of third parties, or that may harm third parties, our activities or reputation, including disseminating, promoting or facilitating child pornography, offering or distributing fraudulent goods, services, plans or promotions; offer or disseminate fraudulent goods, pyramids, phishing or pharming.
  • Violating Content. Content that infringes or misappropriates any proprietary or intellectual property right of a third party.
  • Offensive Content. Defamatory, obscene, offensive, invasive of privacy, or otherwise inappropriate content, including content that constitutes child pornography, is related to violence, or depicts non-consensual sexual acts.
  • Dangerous Content. Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.

You may not use the cluster to violate the security or integrity of any network, computer or communication system, software application, network or device (each, a "System"). Prohibited activities include:

  • Unauthorized access. Access or use any System without permission, including attempting to explore, scan or test the vulnerability of a System or breach any security or authentication measures used by a System.
  • Interception: Monitoring data or traffic on a System without authorization.
  • Falsification of Origin. Forcing TCP-IP packet headers, email headers, or any part of a message that describes its origin or route. Fair use of aliases and anonymous senders is not prohibited by this provision.

You will not be able to make network connections to any users, hosts or networks unless you have permission or communicate with them. Prohibited activities include:

  • Monitoring or Tracking. Monitoring or tracking of a System that interrupts or disrupts the System being monitored or tracked.
  • Denial of Service (DoS). Flooding a target with communication requests so that the target cannot respond to legitimate traffic or responds so slowly as to render it ineffective.
  • Intentional interference. Interfere with the proper functioning of any System, including any deliberate attempt to overload a system through mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of Certain Network Services. Network operation services such as open proxies, open mail relays or open recursive domain name servers.
  • Bypass System Restrictions. Use manual or electronic means to circumvent any use limitations imposed on a System, such as access and storage restrictions.
  • You will not distribute, publish, send or facilitate the mass mailing of spam or other messages, promotions, advertisements or solicitations (such as "spam"), including commercial advertisements and informational announcements.
  • You will not alter or obscure mail headers or assume the identity of a sender without the express permission of the sender. You will not get responses to messages sent from another internet service provider if those messages violate this Policy or that provider's acceptable use policy.

You will not be able to interrupt or modify the works sent by other users without their prior consent. Each user must make responsible use of their space.

If a submitted job limits access/processing by other users, it will be removed from the process queue. If a user repeatedly submits this kind of work, they will be penalized in a timely manner for the well-being of the HPC CEDIA cluster user community.

You will not use the service for activities that are not related to academia or research. Remember that if you change the activity mentioned in the form, you need to notify CEDIA staff.

We emphasize that the HPC CEDIA cluster should not be used to store confidential or sensitive information. We are not responsible for loss, leak or theft of information of this type. If you need to work with confidential information within the HPC CEDIA cluster, you should contact the support department via email in advance.

We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the HPC CEDIA cluster. We will:

  • Investigate violations of this Policy or misuse of the HPC CEDIA cluster; either
  • Remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for the use of the HPC CEDIA cluster.

We may report any activity that we believe violates any law or regulation to the appropriate authorities, regulators or other third parties. Our reporting may include disclosure of appropriate user information. We may also cooperate with law enforcement, regulatory or other appropriate third parties to support the investigation and reporting of illegal conduct by providing information from networks and systems related to alleged violations of this Policy.

If you become aware of a violation of this Policy, you must notify us immediately and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please contact us at the support email.