Life Sciences Collaborative Access Team

9700 S. Cass Ave, Bldg 436A
Argonne, IL 60439
Main Office:    630-252-0627
21-ID-D:    630-343-6851
(alt: 630-359-8311)
21-ID-E:    630-343-6852
(alt: 630-359-8322)
21-ID-F:    630-343-6853
(alt: 630-359-8303)
21-ID-G:    630-343-6854
(alt: 630-359-8314)

Home > Using LS-CAT > Terms of Service

LS-CAT Terms of Service

Use of the LS-CAT remote services is subject to the following conditions:

  1. When logging in to LS-CAT remote services away from the beamline you must use your own credentials. This process starts by being named on the Experiment Safety Assessment Form (ESAF) for the experiment in which you are participating. This is required regardless of your status (local, remote, mail-in, observer, etc.).
  2. Groups working at the beamline may log in using their group's ESAF account on that beamline's control computer. This is the only instance in which a single account may be shared.

  3. You must be registered with the APS User office and have completed any required training. A valid APS badge number is required. Note that remote users do not need the APS badge itself, just the number, which is obtainable after registering with the APS User Office.

  4. All materials sent or brought to LS-CAT must be declared in the ESAF. If you'd like to add something after the ESAF is submitted let your staff contact know.

  5. This web site is embedded in a federal computer system that is used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this site for security purposes to ensure it remains available and to protect information in the system. By accessing this site, you are expressly consenting to these monitoring activities.

  6. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.