May 25, 2011
Europe/Zurich timezone

Computing access - Security Rules

Computing Access - Security Rules

Use of CERN Computing Facilities:

The use of CERN's computers, networks and related services, such as e-mail, are governed by Operational Circular nº 5 (October 2000). For more information on Security rules, please consult the IT appropriate pages.

Network Connection Requests - External Visitor's Computer Registration:

Please note that registration of portable computers is mandatory at CERN and only registered computers will get network access. Should you require a network connection while at CERN, please use this link: connection request. Specific information can be found in this leaflet.

More detailed information on visitor's portable connection can be found here: information.