The National Institute for Computational Sciences

 Acceptable Use of Information Technology Resources

When using information technology (IT) resources at the Joint Institute for Computational Sciences (JICS) the following policy applies to all users of JICS IT resources:
  1. The University of Tennessee (UT) policy, IT0110 Acceptable Use of Information Technology Resources, applies to all JICS IT resources and users. See
  2. Users have the responsibility to follow UT IT0110 policy sections 2 and 3 to ensure confidentiality, integrity, and availability of JICS resources under their control including their programs and data and to protect their account(s) from unauthorized use. Users who suspect their account(s) have been compromised shall immediately notify JICS security staff at
  3. Users may not copy, use, and/or distribute proprietary software without the software owner’s permission. Possession or use of illegally copied software is prohibited; all software must be appropriately acquired and used according to the specific licensing of the software.
  4. To ensure protection of information and IT resources, user activity may be monitored, intercepted, recorded, copied, audited, inspected, and disclosed to authorities. By using JICS resources, the user consents to such at the discretion of authorized JICS personnel.
  5. Activities in violation of any laws or policy may be reported to the proper authorities for investigation and prosecution. Abusive activity may be reported to the user’s home institution for review and action, if any. Violations of UT or JICS policy can result in loss of access to JICS accounts, resources, and possible prosecution.
  6. JICS resources may only be used by authorized users and is limited to the purpose prescribed in the project award.
  7. JICS file systems are generally very reliable, however, data may still be lost or corrupted. Users are responsible for backing up critical data.
  8. Modifying file access times (using touch or any other method) for the purpose of circumventing purge policies may result in the loss of access to the scratch file systems. Under special circumstances, users may request a purge exemption by submitting a request in a timely manner that includes detailed justification to
  9. Use of JICS resources for processing proprietary, export controlled, or sensitive information, source code, or executable code must be disclosed in the account request process to identify data owner and/or sponsor security requirements and/or data use agreements. This process will determine the appropriate resources, if any, that can be used for processing proprietary or sensitive information. Storing and/or processing proprietary or export control information must have prior approval by JICS management and the University of Tennessee Export Control Office. Sensitive information that is not proprietary or export controlled must have prior approval by JICS management and any IRB approvals that are necessary per University policy.
  10. Regardless of a user’s citizenship or permanent residency, user agrees not to access JICS resources from the following countries: Cuba, Iran, North Korea, Sudan, and Syria.
  11. Users who are a Foreign National (FN) of one of the countries identified in #9 above agree to the following special terms of use (Foreign National is defined at
    • FN users will access JICS resources only as authorized pursuant to applicable anti-terrorist asset control laws, regulations, rules and Executive Orders, or pursuant to a “specific license” as described below (i.e., a license issued specifically for the FN user by the United States Treasury Department’s Office of Foreign Assets Control (OFAC) regulations, as opposed to a “general license” or authorization).
    • FN users authorized to access JICS resources pursuant to a visa-related general license or authorization will not access JICS resources unless they possess a current, valid U.S. visa in an authorized visa category, and the scope of that visa encompasses research requiring the use of JICS computational resources.
      • Authorized visa categories for Iranian nationals are found in 31 C.F.R. § 560.505
      • Authorized visa categories for Sudanese nationals are found in 31 C.F.R. §538.509
      • Authorized visa types for Cuban nationals are found in 31 C.F.R. §515.571(a)(5)
      • Cuban nationals in a non-visitor status may be authorized pursuant to 31 C.F.R. §515.505(c)
  12. Further, FN users will not access JICS resources while located outside the U.S and will not access JICS resources during any period in which the user is out of visa status.
  13. If the FN user is required to obtain a specific license from OFAC, the FN user will only access JICS resources subject. to the conditions of a valid specific license obtained before accessing JICS resources.

Questions can be directed to JICS User Assistance at 1-865-241-1504 during normal working hours, 9:00 am - 5:00 pm ET or email Security incidents can be reported to

*- For the purposes of these Terms of Use, ”national” means an individual who is not a U.S. citizen, not a lawful permanent resident of the U.S., and not a “protected individual” as defined in 8 U.S.C. Section 1324 (such as an asylum visa holder).