Dos and Don'ts

Dos and Don'ts on the JASMIN Platform

  • Do not undertake any illegal activity or copy any offensive material on to JASMIN machines
  • Only login to JASMIN servers via SSH using a Public/Private key pair having provided your public key to CEDA
  • Ensure that your SSH private key is protected by a strong password
  • Take every reasonable precaution to ensure that your account is not used by another person
  • Do not access any datasets visible on the system that you do not have permission to access (via the CEDA catalogue)
  • Do not facilitate access to any datasets visible on the system by a third party without prior agreed consent from the service provider and/or the original data provider
  • Do not store any personal information on JASMIN systems
  • Do not undertake any commercial activities on JASMIN systems
  • Do not use social media for anything other than project purposes 
  • Do comply with additional, specific conditions of use for any VMs, Group Workspaces or other resources to which you are granted access.

Please note this is a quick referenece guide for full information please see the JASMIN Acceptable Use Policy

This website and others run by CEDA use cookies. By continuing to use this website you are agreeing to our use of cookies.