LS-CAT

Life Sciences Collaborative Access Team

9700 S. Cass Ave, Bldg 436A
Lemont, IL 60439
Main: 630-252-0222
Help: administrator@ls-cat.org

Terms of Service

Please read all sections of this page before requesting beamtime or collecting data.

Data Retention Policy (academic and non-profit users)

For the benefit of our academic users, we guarantee retention of data on-site for 31 days.

Data Retention Policy (industrial users)

For the security of our industrial users, we retain data for 8 days, see to it that our users have retrieved all their data, and then promptly delete it from our on-site storage.

HKL-2000 Acknowledgement (academic and non-profit users)

The use of the software package should be referenced in publication as follows:

Z. Otwinowski and W. Minor "Processing of X-ray Diffraction Data Collected in Oscillation Mode", Methods in Enzymology, Volume 276: Macromolecular Crystallography, part A, p. 307-326, 1997, C.W. Carter, Jr. and R.M. Sweet, Eds., Academic Press.

LS-CAT Acknowledgment

Please include the following phrase in all publications based on data collected at LS-CAT:

This research used resources of the Advanced Photon Source, a U.S. Department of Energy (DOE) Office of Science User Facility operated for the DOE Office of Science by Argonne National Laboratory under Contract No. DE-AC02-06CH11357. Use of the LS-CAT Sector 21 was supported by the Michigan Economic Development Corporation and the Michigan Technology Tri-Corridor (Grant 085P1000817).

Also mutually beneficial is a statement in the text noting the location(s) and designation(s) of beamlines (e.g., "...data collected at the Life Sciences Collaborative Access Team beamline 21-ID-D at the Advanced Photon Source, Argonne National Laboratory").

LS-CAT Terms of Service

Use of the LS-CAT remote services is subject to the following conditions:

  1. All publications must include the LS-CAT Acknowledgement statement listed above.
  2. Non-commercial users working on-site must also, in publications based on their experimental data, cite all third-party software used to perform processing and analysis of their X-ray diffraction data.
  3. Industrial users working on-site may only use our computers to share their data and run software for which they have purchased the appropriate commercial license. This includes, but is not limited to the following: HKL, DIALS, XDS, CCP4, or any other software designed to perform indexing or structure determination of X-ray diffraction data.
  4. When logging in to LS-CAT remote services away from the beamline you must use your own credentials. This process starts by being named on the Experiment Safety Assessment Form (ESAF) for the experiment in which you are participating. This is required regardless of your status (local, remote, mail-in, observer, etc.).
  5. Groups working at the beamline may log in using their group's ESAF account on that beamline's control computer. This is the only instance in which a single account may be shared.

  6. You must be registered with the APS User office and have completed any required training. A valid APS badge number is required. Note that remote users do not need the APS badge itself, just the number, which is obtainable after registering with the APS User Office.

  7. All materials sent or brought to LS-CAT must be declared in the ESAF. If you'd like to add something after the ESAF is submitted let your staff contact know.

  8. This web site is embedded in a federal computer system that is used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this site for security purposes to ensure it remains available and to protect information in the system. By accessing this site, you are expressly consenting to these monitoring activities.

  9. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.