Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

Live template


Pop away


Berkeley Lab generally allows the use of non-LBNL owned computers and devices for onsite network access and for remote access. The end user and their line management (and/or host) is responsible for ensuring the security of the information system and takes responsibility for the system and its use. There is no formal authorization or permission, except as noted below for the wired network. Note that your division, department, or enclave may have additional stricter rules regarding the use of non-LBNL owned computers and devices and a particular application owner may specify more restrictive rules in their use policies.


When you use a non-LBNL computer to connect to Berkeley Lab resources, to the extent possible, you should ensure the system is secure. Shared computers in computer labs, internet cafes, and even your home computer have the potential to be infected with password-sniffing programs or hardware which would allow your Berkeley Lab username and password to be compromised (based on previous experience, we would encourage you to be exceptionally careful if you share your home computer with a child or teenager.) Use caution when using these systems and be aware of the greater risks associated with them.pop-away