Skip to main content

Governance

Champion Staff

Name Institution Position
Dana Brunson Internet2 Campus Engagement Co-manager
Henry Neeman University of Oklahoma Campus Engagement Co-manager
Cathy Chaplin Internet2 Champion Coordinator
Jay Alameda University of Illinois Urbana-Champaign Champion Fellows Coordinator & ECSS Liaison

Champion Elected Leadership Team

Name Institution Position
Thomas Cheatham University of Utah Champion Leadership Team (2020-2022)
Douglas Jennewein Arizona State University Champion Leadership Team (2018-2022)
Timothy Middelkoop Internet2 Champion Leadership Team (2018-2022)
Julie Ma MGHPCC Champion Leadership Team (2018-2022)
Shelley Knuth University of Colorado Champion Leadership Team (2019-2021)
BJ Lougee Federal Reserve Bank of Kansas (CADRE) Champion Leadership Team (2019-2021)
Torey Battelle Colorado School of Mines Champion Leadership Team (2019-2021)

Champion Leadership Team Alumni

Name Institution Position
Hussein Al-Azzawi University of New Mexico Champion Leadership Team (2018-2020)
Aaron Culich University of California-Berkeley Champion Leadership Team (2017-2019)
Jack Smith West Virginia Higher Education Policy Commission   Champion Leadership Team (2016-2018)
Dan Voss University of Miami Champion Leadership Team (2016-2018)
Erin Hodges University of Houston Champion Leadership Team (2017-2018)
Alla Kammerdiner New Mexico State University Champion Leadership Team (2017-2019)

Regional Champions

The Regional Champion Program is built upon the principles and goals of the XSEDE Champion Program. The Regional Champion network facilitates education and training opportunities for researchers, faculty, students and staff in their region that help them make effective use of local, regional and national digital resources and services. Additionally, the Regional Champion Program provides oversight and assistance in a predefined geographical region to ensure that all Champions in that region receive the information and assistance they require, as well as establish a bi-directional conduit between Champions in the region and the XSEDE champion staff, thus ensuring a more efficient dissemination of information, allowing finer grained support. Finally, the Regional Champions acts as a regional point of contact and coordination, to assist in scaling up the Champion program by working with the champion staff to coordinate and identify areas of opportunity for expanding outreach to the user community.


Champion Institution Deputy Champion Institution Region
Ben Nickell Idaho National Labs Nick Maggio University of Oregon 1
Ruth Marinshaw Stanford University Aaron Culich University of California, Berkeley 2
Kevin Brandt South Dakota State University       3
Dan Andresen Kansas State University BJ Lougee Federal Reserve Bank Of Kansas City CADRE   4
Mark Reed University of North Carolina     5
Scott Hampton University of Notre Dame     6
Scott Yockel Harvard University Scott Valcourt Northeastern University 7
Anita Orendt University of Utah Shelley Knuth University of Colorado 8

Code of Conduct

Diversity Statement

Connect.Cyberinfrastructure welcomes and encourages participation in our community by people of all backgrounds and identities. We, the members of the Connect.Cyberinfrastructure, are committed to promoting and sustaining a culture that values mutual respect, tolerance, and learning. We work together as a community to help each other live out these values.

We have created this diversity statement because we believe that a diverse community is stronger, more vibrant, and produces better research. A diverse community where people treat each other with respect has more potential contributors, more sources for ideas, and fewer shared assumptions that might hinder the achievement of our goals.

Although we have phrased the formal diversity statement generically to make it all-inclusive, we recognize that there are specific identities that are impacted by systemic discrimination and marginalization. We welcome all people to participate in Connect.Cyberinfrastructure regardless of their identity or background.

Introduction & Scope

This code of conduct should be honored by everyone who participates in the Connect.Cyberinfrastructure community. It should be honored in any Connect.Cyberinfrastructure-related activities, by anyone claiming affiliation with Connect.Cyberinfrastructure, and especially when someone is representing Connect.Cyberinfrastructure in any role (including as an event volunteer or speaker).

This code of conduct applies to all spaces managed by Connect.Cyberinfrastructure, including all public and private mailing lists, issue trackers, wikis, forums, code repositories, and any other communication channel used by our community. The code of conduct equally applies at Connect.Cyberinfrastructure events and governs standards of behavior for attendees, speakers, volunteers, booth staff, and event sponsors.

This code is not exhaustive or complete. It serves to distill our understanding of a collaborative, inclusive community culture. Please try to follow this code in spirit as much as in letter, to create a friendly and productive environment that enriches the Connect.Cyberinfrastructure community.

We require all Connect.Cyberinfrastructure sponsored and affiliated projects, activities, and events, to adopt a code of conduct that encourages a productive, respectful environment for all contributors and community members.

If a person is found to violate the Connect.Cyberinfrastructure Code of Conduct, the steering committee may take any action they deem appropriate to resolve the situation, including warning the person in question, removing them from a specific activity, banning them from further participation in activities (in person or online), or expulsion from the Connect.Cyberinfrastructure community.

Standards for Behavior

All communication should be appropriate for a professional audience including people of many different backgrounds. Please always be kind and courteous. There is never a need to be mean, rude, or disrespectful. Thank you for helping make this a welcoming, friendly community for all.

We, the members of Connect.Cyberinfrastructure, strive to:

  • Be empathetic, respectful, welcoming, friendly, and patient. We remember that every Connect.Cyberinfrastructure event, project, and program is crafted by human beings who deserve to be treated with kindness and empathy. We work together to resolve conflict and assume good intentions. We may all experience some frustration from time to time, but we do not allow frustration to turn into a personal attack. A community where people feel uncomfortable or threatened is not a productive one.
  • Be collaborative. Our work depends on the participation of many people, and in turn others depend on our work. Effective and friendly collaboration enables everyone to better achieve their goals.
  • Be careful in the words that we choose. We are careful and respectful in our communication, and we take responsibility for our own speech. Be kind to others. Do not insult or put down other members of the community.

Unacceptable Behavior

We, the members of Connect.Cyberinfrastructure, are committed to making participation in this community a harassment-free experience.

We will not accept harassment or other exclusionary behaviors, such as:

  • The use of sexualized language or imagery
  • Excessive profanity (please avoid curse words; people differ greatly in their sensitivity to swearing)
  • Posting sexually explicit or violent material
  • Violent or intimidating threats or language directed against another person or group
  • Inappropriate physical contact and/or unwelcome sexual attention or sexual comments
  • Sexist, racist, or otherwise discriminatory jokes and language
  • Trolling or insulting and derogatory comments
  • Written or verbal comments which have the effect of excluding people on the basis of membership in a specific group, including level of experience, gender, gender identity and expression, sexual orientation, disability, neurotype, personal appearance, body size, race, ethnicity, age, religion, or nationality
  • Public or private harassment
  • Continuing to initiate interaction (such as photography, recording, messaging, or conversation) with someone after being asked to stop
  • Sustained disruption of talks, events, or communications, such as heckling of a speaker
  • Publishing (or threatening to post) other people’s personally identifying information (“doxing”), such as physical or electronic addresses, without explicit permission
  • Other unethical or unprofessional conduct
  • Advocating for, or encouraging, any of the above behaviors

Reporting Guidelines

If you believe someone is violating the code of conduct, please report this in a timely manner (see How to Submit a Report). Code of conduct violations reduce the value of the community for everyone. Connect.Cyberinfrastructure members take reports of misconduct very seriously and are committed to preserving and maintaining the welcoming nature of our community.

All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. All reports will be kept confidential, with the exception of cases where the Steering Committee determines the report should be shared with law enforcement. In those cases, the report will be shared with the proper legal authorities.

In some cases the Connect.Cyberinfrastructure Leadership may determine that a public statement will need to be made. If that’s the case, the identities of all involved parties and reporters will remain confidential unless those individuals instruct us otherwise.

For possibly unintentional breaches of the code of conduct, you may want to respond to the person and point out this code of conduct (either in public or in private, whatever is most appropriate). If you would prefer not to do that, please report the issue (see How to Submit a Report) or contact a Connect.Cyberinfrastructure steering committee member for assistance.

Take care of each other. Alert the Connect.Cyberinfrastructure steering committee if you notice a dangerous situation, someone in distress, or violations of this code of conduct, even if they seem inconsequential.

How to Submit a Report

If you feel your safety is in jeopardy or the situation is an emergency, contact local law enforcement before making a report to Connect.Cyberinfrastructure. (In the U.S., dial 911.)

Connect.Cyberinfrastructure is committed to promptly addressing any reported issues. If you have experienced or witnessed behavior that violates Connect.Cyberinfrastructure Code of Conduct, please send an email to the steering committee, Campus Champions staff, or by using the online form.

License

This code of conduct has been adapted from the US-RSE Association and NumFocus code of conducts, which was itself adapted from numerous sources, including the Geek Feminism wiki, created by the Ada Initiative and other volunteers, which is under a Creative Commons Zero license, the Contributor Covenant version 1.2.0, the Bokeh Code of Conduct, the SciPy Code of Conduct, the Carpentries Code of Conduct, and the NeurIPS Code of Conduct.

The Connect.Cyberinfrastructure Code of Conduct is licensed under a Creative Commons Attribution 3.0 Unported License