⚠️ Only Wynton Regular (P1-P2) accounts can use the cluster as of 2026-01-30. Protected (P3 and P4) data and accounts have been decommissioned.
Last Updated January 30, 2026
Wynton user responsibilities and requirements in support of this Agreement include:
By using the Wynton HPC environment, you agree to abide by the statement of its Purpose, Principles and Governance as well as the UCSF Minimum Security Standards.
P3 and P4 data, which include deidentified data and PHI, are prohibited. Even running jobs that involve this type of data is prohibited. Refer to UCSF Policy 650-16 Addendum F, UCSF Data Classification Standard for detailed definitions.
The PI is responsible for ensuring that users are listed on the Institutional Review Board (IRB) approval letter before they approve those users’ Wynton access to data that require IRB approval. The PI is also responsible for ensuring they are in compliance with their grant requirements (e.g. platform security, data retention policies).
It is the responsibility of the PIs to ensure the integrity of their data. The Wynton filesystem is not the primary source of data (not a system of record). Once the PI has write access to the data, they are entitled to manipulate the data as they see fit.
All Wynton users are responsible for ensuring they have their own back-ups so they are able to revert to an earlier version if a mistake is made or they want access to their data during an outage. Wynton does not offer a back-up service.
Upon separation from UCSF, a Wynton user’s home directory and its contents may be transferred to the user’s PI in accordance with the Authorized and Acceptable Use of Electronic Information Resources policy (650-18) “An account that is not deleted upon loss of affiliation shall be transferred to another UCSF faculty or staff person designated as being responsible for the account.” Accounts and data that are not claimed after 90 days may be permanently deleted.
Use of the Wynton HPC cluster is subject to UCSF’s policy on Authorized and Acceptable Use of Electronic Information Resources.
The Wynton Operations team is tasked with implementing the policies established by IT Governance and the Wynton Faculty Advisory Committee and ensuring that the cluster runs effectively and efficiently. Users agree not to attempt to circumvent policies or avoid restrictions imposed by the Wynton Operations team.
Accounts are personal, and login credentials must not be shared.
Users are prohibited from changing system-wide configurations on Wynton nodes.
The Wynton Operations team installs and maintains packages provided by the OS vendor and selects system-wide application software.
Software not managed by Wynton admins is the user’s responsibility. This includes but is not limited to: software installed in Wynton user and group directories, software in containers, and software installed using the Conda package manager. Additionally, Lmod modules that are not maintained by the Wynton admins themselves are the responsibility of the individual labs and users that maintain the module repositories (e.g. the CBI and Sali repositories).