## Unacceptable Behaviors and Cluster Usage Policies
Understanding what constitutes misuse of cluster resources is crucial for maintaining a productive and secure research computing environment. The following behaviors are generally considered unacceptable and may result in account suspension or termination:
1. Resource Abuse
- **Hogging Resources**: Submitting an excessive number of jobs or requesting more resources than necessary, preventing other users from accessing the cluster.
- **Ignoring Queue Policies**: Consistently submitting jobs to inappropriate queues or violating queue-specific limits.
- **Circumventing Fairshare Mechanisms**: Attempting to game the system to get more than your fair share of resources.
2. Security Violations
- **Unauthorized Access**: Attempting to access other users' data or trying to elevate your privileges on the system.
- **Sharing Credentials**: Giving your login information to others or allowing unauthorized users to access the cluster through your account.
- **Installing Malicious Software**: Introducing malware, viruses, or any unauthorized software to the cluster.
3. Inappropriate Use of Compute Resources
- **Non-Research Activities**: Using the cluster for non-academic or non-approved purposes.
4. Misuse of Data and Storage
- **Storing Inappropriate Content**: Using cluster storage for personal files, especially large media files or inappropriate content.
- **Data Theft**: Attempting to exfiltrate large amounts of data or sensitive information from the cluster.
- **Excessive I/O Operations**: Running jobs that perform excessive read/write operations, potentially damaging the storage systems.
5. Violation of Software Licenses
- **License Violations**: Using software in violation of its license terms or using more licenses than allocated to you.
6. Disrupting Cluster Operations
- **Denial of Service**: Intentionally or unintentionally running jobs that crash nodes or disrupt cluster services.
7. Non-Compliance with Policies
- **Ignoring System Announcements**: Consistently disregarding important announcements from system administrators.
8. Attempts to Evade Monitoring or Quotas
- **Hiding Activities**: Attempting to conceal the nature of your computations or evade system monitoring tools.
- **Quota Evasion**: Trying to bypass storage quotas or other resource limitations set by administrators.
Consequences of Violations
The consequences of engaging in these behaviors can include:
1. Temporary suspension of your account
2. Permanent revocation of cluster access
3. Reporting to your supervisor, department, or funding agency
Best Practices to Avoid Violations
1. **Read and Understand Policies**: Familiarize yourself with all cluster usage policies and guidelines.
2. **When in Doubt, Ask**: If you're unsure about whether a particular use is acceptable, consult with cluster administrators.
3. **Regular Check-ins**: Periodically review your resource usage and job patterns to ensure compliance.
4. **Report Suspicious Activities**: If you notice potential misuse by others, report it to the administrators.
5. **Respect Others**: Remember that the cluster is a shared resource. Be considerate of other users' needs.
By adhering to these guidelines and using the cluster responsibly, you help maintain a productive and secure research computing environment for everyone.