Acceptable Use Policy for the Niflheim Linux supercomputer cluster

Version of 30 January 2026

INTRODUCTION

1.1 A user of Niflheim (in the following referred to as Facility Use Party) has rights and obligations in connection with the use of the Niflheim supercomputer, located at the Center for Atomic-scale Materials Design (CAMD) at DTU, Department of Physics, for HPC computer simulations.

1.2 Violation of this Acceptable Use Policy may result in suspension of access, termination or other legal actions as determined solely by DTU.

1.3 The use of Niflheim must comply with any other terms or requirements set out in the Niflheim user documentation on this web site, including any security requirements.

1.4 DTU reserves the right to monitor the usage of and access to Niflheim.

GENERAL FACILITY USE PARTY RESPONSIBILITIES

2.1 The Facility Use Party is accountable for their own actions when using Niflheim.

PROHIBITED USE

3.1 The Facility Use Party agrees not to use Niflheim:

  • to disable, interfere with or circumvent any aspect of the use of the Niflheim facility or to gain unauthorized access to DTU’s systems including, but not limited to, circumvention of user management to gain access to more capacity or other to which the Facility Use Party is not entitled;

  • to use their own software on Niflheim that has not been appropriately acquired and/or not used in accordance with the corresponding software license agreements;

  • to engage in, promote or encourage illegal, fraudulent, or malicious activities, including to harm, or attempt to harm, others;

  • to violate, or encourage the violation of, the legal rights of others (for example, this may include infringement or misappropriation of the intellectual property rights of others in violation of applicable laws);

  • for any unlawful, invasive, infringing, defamatory or fraudulent purpose, including but not limited to phishing, creating a pyramid scheme or mirroring a website;

  • to violate the security, integrity, or availability of any user, network, computer or communications system, software application, or network or computing device;

  • to engage in offensive or harassing actions towards individuals or organizations;

  • to generate, distribute, publish or facilitate unsolicited mass email, promotions, advertisings or other solicitations;

  • to access, upload, download, store, transmit, create, or otherwise use sexually explicit or pornographic material; or

  • to otherwise engage in immoral or unethical behavior.