Responsibilities, Expectations, and Policies¶
where responsible and professional use of Cheaha accounts, storage, and computational resources is expected to maintain system integrity and support collaborative research. Please refer below for the eligibility requirements and responsibilities of Research Computing services users.
- Adherence to UAB IT policies.
- Adherence to research data security requirements, when applicable (e.g., NIST 800-171, HIPAA, etc.)
- Responsible Conduct of Research (RCR) training completed.
- Fair and appropriate use of RCS platforms and services.
- Adherence to UAB IT policies.
- Adherence to research data security requirements, when applicable (e.g., NIST 800-171, HIPAA, etc.)
- Responsible Conduct of Research (RCR) training completed.
- Fair and appropriate use of RCS platforms and services.
- Research data security
- Awareness, understanding, and application of relevant security standards, e.g., NIST 800-171, HIPAA, FERPA, etc.
- Know which requirements apply to each of your grants.
- Manage administrative controls for members of shared allocations.
- Responsible and accountable for all XIAS Guest actions and behavior.
- Research data lifecycle management
- Migrate unused data to LTS or archive.
- Backup critical data.
- Contact Support to discuss.
- Adherence to UAB IT policies.
- Adherence to research data security requirements, when applicable (e.g., NIST 800-171, HIPAA, etc.)
- Responsible Conduct of Research (RCR) training completed.
- Fair and appropriate use of RCS platforms and services.
- Research data security
- Awareness, understanding, and application of relevant security standards, e.g., NIST 800-171, HIPAA, FERPA, etc.
- Know which requirements apply to each of your grants.
- Manage administrative controls for members of shared allocations.
- Responsible and accountable for all XIAS Guest actions and behavior.
- Research data lifecycle management
- Contact Support to discuss data management plans leveraging no-cost Research Computing resources.