Acceptable Use Policies


By using UCCS Research Computing services you agree to comply with the following conditions of use (taken from the XSEDE Acceptable Use Policy):

  1. You will protect any access credentials (e.g., private keys, tokens & passwords) that are issued for your sole use. This includes:
    • Using a unique password for your account
    • Only entering your RC credentials into RC resources
    • Not knowingly allowing any other person to impersonate your RC identity.
  2. You will have only one Research Computing account and will keep your profile information up-to-date. If multiple identities are discovered for the same individual, those accounts and profiles will be merged at the discretion of the Research Computing personnnel.
  3. You will not use UCCS RC services or allocated resources for unauthorized financial gain or any unlawful purpose, nor attempt to breach or circumvent any UCCS Research Computing or Service Provider administrative or security controls. You will comply with all applicable laws and relevant regulations, such as export control law or HIPAA.
  4. You will immediately report any known or suspected security breach or misuse of Research Computing credentials to the UCCS OIT Help Desk.
  5. Use of Research Computing services and allocated resources is at your own risk. There are no guarantees that resources and services will be available, that they will suit every purpose, or that data will never be lost or corrupted. Users are responsible for backing up critical data.
  6. Logged information, including information provided by you for registration purposes, is used for administrative, operational, accounting, monitoring and security purposes.
  7. Violations of either UCCS Research Computing acceptable use and other policies may result in loss of access to Research Computing resources. Activities in violation of any laws will be reported to the proper authorities for investigation and prosecution.
  8. You will follow the Export Control Policy (see below) for all UCCS Research Computing services.
  9. You will follow the Acknowledgements Policy (see below) for UCCS Research Computing services contributing to research results in manuscripts submitted for publication and any other citable works. 

Export Control Policy

No export controlled technology or technical data related to the Export Administration Regulations (EAR) [1] or the International Traffic in Arms Regulations (ITAR) [2] is permitted on UCCS Research Computing resources. This includes export controlled data, export controlled software, and export controlled results generated as output. The user is responsible for ensuring compliance. Failure to adhere to this policy may result in account deactivation, and immediate deletion of any or all data maintained by the user on the resource.  

[1] https://www.bis.doc.gov/index.php/regulations/export-administration-regulations-ear

[2] www.pmddtc.state.gov/regulations_laws/itar.html

Acknowledgements Policy

All citable works benefiting from UCCS Research Computing resources must credit the appropriate resource in the acknowledgements section. See below for sample credit statements for UCCS RC Resources:


This work used the INCLINE cluster at the University of Colorado Colorado Springs. INCLINE is supported by the National Science Foundation, Grant # 2017917