Skip to end of metadata
Go to start of metadata
Non-LBNL Owned Computers and Devices
Berkeley Lab generally allows the use of non-LBNL owned computers and devices for onsite network access and for remote access. The end user and their line management (and/or host) is responsible for ensuring the security of the information system and takes responsibility for the system and its use. There is no formal authorization or permission, except as noted below for the wired network. Note that your division, department, or enclave may have additional stricter rules regarding the use of non-LBNL owned computers and devices and a particular application owner may specify more restrictive rules in their use policies.
Requirements for Network Access
Use of Berkeley Lab networks and remote access constitutes agreement with Berkeley Lab Information Management Policies and Procedures. At a minimum, non-LBNL owned computers should meet our Minimum Security Requirements.
If your personally owned system or device is blocked from network access for a security violation, please follow the instructions on the website you are redirected to, or failing that, contact the help desk.
Use of the Wired Network
Non-LBNL systems should generally use the Berkeley Lab guest wireless network whenever possible. However, this is impractical in many cases, and with approval of a Berkeley Lab employee, a non-LBNL system or device may also be attached to the wired network and receive a DHCP address. Assignment of a fixed IP address requires either employee status or designation of a security-responsible host.
Security Considerations for Personally Owned Systems and Devices Used for Remote Access to LBNL Systems
When you use a non-LBNL computer to connect to Berkeley Lab resources, to the extent possible, you should ensure the system is secure. Shared computers in computer labs, internet cafes, and even your home computer have the potential to be infected with password-sniffing programs or hardware which would allow your Berkeley Lab username and password to be compromised (based on previous experience, we would encourage you to be exceptionally careful if you share your home computer with a child or teenager.) Use caution when using these systems and be aware of the greater risks associated with them.