User responsibilities

When you are granted access to use NCAR resources, you accept the following responsibilities:

  • You will use these computer and information systems in an ethical and legal manner.
  • You agree not to duplicate or use copyrighted or proprietary software without proper authorization.responsibilities
  • You may not use NCAR computer and information systems in any manner for any business, professional, or other activity that is unrelated to the purpose of your allocation or terms of employment except as otherwise stated in Access to and Use of Computer and Information Systems.
  • You are required to acknowledge the use of CISL resources, including the Research Data Archive, in any resulting publications, in a manner consistent with the examples provided.
  • You are responsible for protecting your personal identification number, authentication token, and/or password.
  • You may not share your account privileges with anyone or knowingly permit any unauthorized access to a computer, computer privileges, systems, networks, or programs. If sharing is detected, the accounts of those involved will be disabled.
  • While NCAR storage systems are highly reliable, you are responsible for backing up critical data to protect it against loss or corruption. You also are responsible for understanding the usage and data retention policies for the file system and data archive resources used.
  • You agree to report potential security breaches as soon as possible to the CISL Help Desk at 303-497-2400.
  • You are responsible for ensuring that NCAR has current contact information for you, including phone number, email address, and mailing address. If your name, phone number, email address, or other information changes, notify the CISL Help Desk by email. If CISL personnel can’t reach you when they need to—about a problem caused by a job you are running, for example—the job may be killed and you will be locked out of the system.
  • When your project ends or you will no longer be using NCAR systems, you are responsible for returning your authentication token as described here. A fee is charged for lost or unreturned tokens.
  • Project leads (including instructors associated with classroom allocations) are responsible for ensuring that users on their projects are aware of these responsibilities and for ensuring that authentication tokens are returned when users complete their work or students finish their classes. Project leads are responsible for any token replacement fees.

Please contact us if you have questions.