Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Please read the information below carefully. Additional information about the reason for this requirement is available below the “Receive credit” buttonon our FAQ on External Monitoring.
 
Any or all uses of Berkeley Lab’s Information Technology (IT), associated connected systems and all files may be intercepted, monitored, recorded, copied, audited, inspected, retained, and disclosed to authorized University, Department of Energy and law enforcement personnel.

...

In addition, when you use Berkeley Lab IT, you agree to our policies which include prohibitions on accessing sexually explicit materials, violating copyrights, or interfering with the operation or security of systems. This is a summary of our policies - the full versions are available in the Berkeley Lab RPM.
Your completion of this course constitutes consent to these terms.
 
For more information>>Insert FAQ or link in course

Course Credit

Submit your employee/affiliate ID number.  

...