Specific conditions of use of the CESGA computing services

All users of the CESGA computer systems must read, know and expressly accept the following conditions of use:

Legality and compliance:

Users agree not to accept or encourage practices that violate Spanish or European Union legislation.

On the other hand, they are committed to comply with all the regulations on intellectual property, data protection, cybersecurity and others on the protection of the fundamental rights of people.

Relating to security:

  • You agree not to share your account with any other person. The identification and authentication of each account is confidential and non-transferable, with all responsibility for the account holder.
  • Use a secure and unknown password for other people. Passwords must contain special characters, letters and numbers and have a sufficient length (minimum 6 characters). In addition, it must be renewed periodically.
  • They commit themselves not to skip the existing security measures, as well as not to access the resources, systems or information to which they do not have authorization to access.
  • Must inform the CESGA support services of any event that implies a failure in the security of the systems or any other potential risk, in accordance with the provisions of the General Data Protection Regulations regarding the notification of security breaches (articles 33 and 34).
  • You must provide CESGA with the identification of the terminal or terminals from which you are accessing.

Concerning the use:

  • They commit to use resources efficiently and only for the purpose for which they have been authorized. In no case may resources be used for purposes other than those authorized, or for activities that are contrary to the legal order or public order, especially those that may be constitutive of administrative offense, or criminal law.
    For the use of software covered by any license agreement of CESGA, they will respect the conditions of said agreement.
  • They will not use the resources of CESGA in any way that might offend other users, or cause damage to the property or rights of other people.
  • Expressly accept the exemption from liability of CESGA and its staff, in case they may suffer any loss as a result of the use of CESGA resources, specifically any loss that may affect the confidentiality, integrity or availability of the data.
  • They will allow the CESGA operators access to the information generated in the CESGA and the monitoring of the activities they carry out in order to maintain the functioning of the resources used.
  • I accept that CESGA resources will not always be available for my use as expected and to deny any responsibility to CESGA operators in case of being affected by availability or any other aspect of CESGA resources.
  • Include explicit mention of the use of resources and services of CESGA in the scientific production (articles, presentations in congresses, conferences, books, book chapters, etc.) made as a result of the use of those resources. This mention will include a brief description of the calculation resources used.
  • They must provide CESGA with a brief description of the research project carried out, using the calculation resources of CESGA. They will report, when requested, the scientific production for which they have used the computational resources of CESGA. They will also commit to authorize the publication of said information in the annual report of CESGA.
  • For the calculation of core-hours (or core-hours) consumed by users’ jobs, the number of cores reserved for work multiplied by the execution time (also called elapsed time or wall time) of the work will be multiplied. The cores reserved for the work will be the cores used by this one and also those that can not be used by other works due to the resources requested by him. For example, if a job uses 1 core of a node but uses all the memory of the node or a node exclusively, the reserved cores will be all of the node’s.

Liability and sanctions

When an incorrect or not acceptable use is demonstrated with respect to what is specified in this document, the CESGA will proceed to interrupt the service provided, depending on the severity and reiteration of the incident, or the temporary suspension of the service (or the indefinite withdrawal of the same). ).

The responsibilities that may arise from the incorrect use of resources by the user will be assumed by the user.

CESGA will provide the necessary means to allow the consultation of these rules in an easy way.

Data protection policy

The supercomputing services offered by CESGA are designed to carry out scientific studies and complex data calculations. That is why CESGA does not authorize the use of supercomputing capacity in operations that may involve the processing of personal data.

Consequently, all data that is entered into the supercomputing equipment by users must be decoupled (anonymized), and therefore the introduction of personal data is not allowed.

That is why in the provision of supercomputing services, CESGA will not act as the data processing manager of a personal nature for the purposes of the provisions of art. 28 of the RGPD, and therefore should not perform a risk analysis or adopt special security measures, since the service is provided solely for the purpose of supercomputing and complex calculation.

Any violation of the provisions of this clause will be the sole and exclusive responsibility of the user of the supercomputing service, which undertakes not to treat personal data in the use of this service.

CESGA will not perform any type of analysis of the data hosted or processed in the supercomputing service, so the declaration of the user of the service must be in accordance with this ANS.

In no case shall CESGA be liable for the loss of income or for indirect, special, incidental, consequential, punitive or exemplary damages, nor for damages for lost profits, loss of income, business suspension or loss of business information, without import their cause or any theory of responsibility.

In case the user of the service needs to perform a personal data processing, he / she may request it from CESGA, together with a detailed identification of the purpose, legitimation, as well as a specific risk assessment. In this case, CESGA will proceed to analyze, depending on the documentation delivered, to inform the user about the possibility or impossibility of providing the service, based on the risk analysis presented and the security measures that are necessary. In any case, in this case, a contract for treatment must always be formalized in accordance with the provisions of art. 28 of the RGPD.