Overview; Scope; and Purpose
This Policy defines the types of use permitted by Stability’s community of Users and also
specifies prohibited uses. The purpose of this Policy is to protect the Systems and
information stored thereon and communicate the importance of protecting Stability Systems
and confidential information, and specify how Users may use the Systems. All Users must
comply with this Policy as a condition of access to and use the Systems.
Effective security is a team effort involving the participation and support of all Users. Although
this Policy aims to be thorough and extensive, it may not cover every situation that may arise,
and thus you must apply common sense when using the Systems. Employee and non-Employee
Users Users who are unsure about what constitutes acceptable use of the Systems must contact
the Stability IT department by email to [email protected]
This Policy is also intended to inform Users about the expectations they should have regarding
security and privacy in connection with their use of and Stability’s monitoring and protection of
the Systems. Nothing in this Policy is intended to infringe on or interfere with any rights
including employee rights under applicable laws.
Definitions
- “Administrator(s)” means, where applicable, the Project leaders that allow and monitor
Systems access by Users.
- “Cluster” means Compute Grant Committee (“CGC”) approved Systems that are used in
Projects by CGC approved Entities
- “Confidential Information” means any confidential or proprietary information, trade
secrets, or sensitive personal data, whether provided or learned in oral, written, visual or
other tangible form, including, without limitation, information concerning Stability’s
business, property, technology, current or former User, customers, Projects, models, pictures,
photographs, illustrations, graphic resources, game character, source code, object code, text,
sounds, video, data and any materials thereof not generally known to the public and which is
either identified as “Confidential” or “Proprietary” at the time of disclosure or which under
the circumstances surrounding the disclosure should reasonably be considered to be confidential or proprietary due to its nature or the context of its disclosure. Confidential
Information also includes copies, notes, abstracts and other tangible embodiments made by
any person that are based on or contain any such information.
- “Credentials” means user IDs, passwords, and other login credentials, such as access cards,
that grant a User access to the Systems.
- “Employees” means all Stability employees, including those that have HPC Systems access,
contractors, consultants, temporary hires, volunteers and interns.
- “Entity” means any organization, institution, government and other third parties accessing
the Project(s), including Users who have access to Projects through an affiliation with any of
the above..
- “Malicious Software” means any (a) virus, malware, ransomware, Trojan horse, worm, back
door, time bomb, drop dead device, spyware or adware, or (b) similar program, routine,
instruction, device, code, contaminant, logic or effect designed or intended to disable,
disrupt, erase, harm, or otherwise impede the operation of, or enable any person to access
without authorisation, or otherwise materially and adversely affect the functionality of, the
Systems (or any portion thereof).
- “Policy” means this Stability Employee HPC Cluster users, Employees and Third Parties
Users Computing Systems Acceptable Use Policy.
- “Project” means research by anEntity for Stability that has been duly approved by Stability’s
Compute Grant Committee.
- “Stability” or the “Company” means Stability AI Ltd. and Stability Inc.
- “Systems” means the HPC cluster including all related computational resources, cloud
assets, computers, printers, databases, mobile devices, phones, operating systems
applications (including Web-based apps), websites, utilities, firmware, middleware, and other
software, networks, and communications systems owned, operated, licensed, leased, or under
the control of Stability, including pursuant to any outsourced or cloud computing
arrangements, or which otherwise connect to a Stability network or research cluster.
- “Users” means all Employee HPC Cluster users, Employees and third parties given
temporary access to the Systems, such as researchers, investigators, and Project delegates and
including those Employees who have access to Projects through an affiliation with any
Entity.
Systems Use