What personal information does the AMP website collect?
You can visit the AMP website and browse publicly visible simulation results without identifying who you are or revealing any personal information such as your name or e-mail address.
To submit new simulations to AMP, you must register and provide personal data including your full name, contact information, e-mail address, and institutional affilation. In addition, the IP address of the computer interacting with the AMP website is recorded and associated with your personal information to comply with XSEDE computer security policies.
How is personal information displayed or shared?
A registered user's personal information may be disclosed in three cases:
- To XSEDE resource providers as required to execute programs on remote supercomputers. Executing a program on a XSEDE supercomputer requires that the user's personal information, including the user's AMP login and e-mail address, as well as the originating client IP address, be included in the remote execution command.
- To AMP website visitors viewing simulation results. The full name of users that have submitted a simulation will be displayed on the simulation progress and result pages on the AMP website. Institutional affiliations and e-mail addresses are never displayed on the AMP website.
- To funding agencies in computational utilization reports. The full name and institution of every user submitting simulations to AMP will be reported to the funding agencies, including NCAR, NASA, and NSF, to justify the use of computational resources.
How are cookies and log file analysis used?
AMP receives and stores certain types of information whenever you interact with the Web site. AMP uses local (webserver) and outsourced third-party web activity monitoring (such as Google Analytics) to monitor general use of the website.
Embargoed Data and Proprietary Simulations
Results based on embargoed data, such as data from the Kepler mission, are viewable only to users at institutions participating in the appropriate Kepler consortium. The AMP developers have attempted to preserve the privacy of data but cannot guarantee the security of the data processing system. Throughout the workflow, data is stored on several different computer systems across several organizations. Confidential data should not be submitted to AMP.