ICS@PSU: Institute for CyberScience

User Policies/Data

Detailed information about the formal policies of the Institute for CyberScience at Penn State University.

By requesting an ICS-ACI user account, users acknowledge that they have read and understood all ICS-ACI and applicable Pennsylvania State University policies and agree to abide by said policies.

Authentication and Access Control

This policy serves to manage the lifecycle of ICS accounts created under the current state and configuration of the ICS-ACI. It specifies criteria for creating a user account, using an account, and transferring an existing user account (created under the former RCC), as well as the termination of a user account. Download and read the complete ICS-ACI-P030 Authentication and Access Control policy.

Data Protection and Retention

This policy outlines the protection of data that is created, collected or manipulated by personnel that fall within the scope of ICS-ACI and applies to any person who uses ICS-ACI resources or handles data managed by ICS-ACI. It specifies data retention policies and resources, as well as the responsibilities of the principal investigator, the University, and ICS-ACI. Download and read the complete ICS-ACI-P020 Data Protection and Retention policy.

Software Acceptable Use

This policy explains how software is introduced, installed, and maintained on the ICS computer system. The policy details how users can install their own software in their user or group spaces, as well as how ICS will regularly update the ACI software stack. Information on how to request new software for the ACI software stack is included. The policy also discusses who is responsible for licensing and usage agreements in various circumstances, and the rights that ICS reserves to make changes to installed software in order to keep ACI systems safe, up-to-date, and in compliance with University and government regulations. Download and read the complete ICS-ACI-P040 Software Acceptable Use policy.

SLA Terms and Conditions

This terms and conditions document outlines the basic provisions that guide the working relationships between researchers and ICS-ACI. Download and read the complete Service Level Agreement Terms and Conditions document.

Technical Communications Team

In response to customer feedback, The ICS-ACI recently established the technical communications team to further support the needs of users. This policy explains the role of the technical communications team. For more information, download and read the complete Technical Communications Description document.

Penn State Institute for CyberScience

Help us build the future. Contact ICS at Penn State.

  • email: ics@psu.edu
  • phone: ICS-ACI Support (i-ASK Center): 814-865-4275 | General Inquiries: 814-867-1467

February 2017

SuMoTuWeThFrSa
 1234
567891011
12131415161718
19202122232425
262728 
  • Feb 10, 201711:00 am - 5:00 pm

    XSEDE HPC Workshop: Big Data

    ICS will be hosting a free XSEDE workshop on Big Data (Hado…

    More Info
  • Feb 3, 201712:15 pm - 1:30 pm

    Big Data Social Science Speaker Series: Jay Yonamine (Google)

    “Data Science in Industry” Jay Yonamine is Head …

    More Info
  • Feb 3, 2017 - Feb 5, 20173:15 pm - 4:15 pm

    Geospatial Data Science Workshop 2017

    GDS 2017 is an opportunity to learn the skills needed to pro…

    More Info
  • Feb 10, 20173:30 pm - 5:00 pm

    “Getting to Know the Institute for CyberScience and Exploring Hurricanes through Computers”: Coffee Hour with Jenni Evans

    Join Jenni Evans, Professor of Meteorology and Director of I…

    More Info
  • Feb 3, 2017 - Feb 4, 20179:15 am - 12:00 pm

    City, Energy, Information Symposium and Workshop

    The “City, Energy, Information” symposium will provide n…

    More Info
  • Feb 3, 20173:30 pm - 5:00 pm

    “SKOPE: A CyberGIS Approach for Understanding Past Environments,” Geography Coffee Hour with Jonathan Rush

    Jonathan Rush will introduce a cyberGIS-enabled project to b…

    More Info
  • Feb 22, 20171:30 pm - 3:00 pm

    ACI User Social: Anne McKenna, “Data: Risks, Responsibilities, and Rights”

    Have you ever considered the legal implications of your rese…

    More Info