By using Wynton HPC, you agree to abide by the statement of its Purpose, Principles and Governance.
Users who wish to access protected data such as Protected Health Information (PHI) are required to log into node(s) that implement enhanced security such as additional access restrictions and/or relevant HIPAA compliance measures.
Because IT security requirements, operating systems, and hardware are continually evolving, difficult situations may arise in the future. For example, it is possible that future requirements imposed by UCOP or UCSF concerning PHI data would in turn negatively impact on the ability of the cluster to serve its founding purpose, as defined in the Governance document. In such a case, the Steering Committee may roll back configurational changes or otherwise re-configure the cluster, so that the founding needs are still satisfied, even if that occurs at the expense of some applications. Therefore, while every effort will continue to be made to maximize the number of applications, it is impossible to guarantee that once supported applications will always remain supported. If a rollback is required the Wynton OPS team and Shared Compute governance will make it a priority to stand up a separate cluster supporting the required functionality.
Use of the Wynton HPC cluster is subject to UCSF’s policy on Authorized and Acceptable Use of Electronic Information Resources.
The Wynton OPS team is tasked with implementing the policies established by the Faculty Steering Committee and with ensuring that the cluster runs effectively and efficiently. Users agree not to attempt to circumvent policies nor avoid restrictions imposed by the Wynton OPS team.
Under no circumstances are users to share their account and password with others.