The following notice applies to all users of SLAC information resources, authenticated or not,
authorized or not.
NOTICE TO USERS
This computer system and/or its connection to the network
of the Stanford Linear Accelerator Center (SLAC) is for
authorized use only.
As a user
(authorized or unauthorized), you
have no explicit or implicit expectation of privacy.
Any or all uses of this system or network and all stored or
transmitted files may be intercepted, monitored, recorded,
copied, audited, inspected, and disclosed to authorized site,
government, and law enforcement personnel.
By using this system or network
(from SLAC or from elsewhere,
using a SLAC-supplied computer or a computer
supplied by another party),
you consent to such interception,
monitoring, recording, copying, auditing, inspection,
and disclosure at the discretion of authorized personnel.
Further, authorized personnel may detain, access, and copy data
from either SLAC or non-SLAC owned computers when there is reason
to believe misuse has occurred.
Unauthorized or improper use of this system may result in administrative disciplinary action and civil and criminal penalties. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.
LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.
More detailed SLAC policy and rules for computing, including appropriate use, may be found at http://www.slac.stanford.edu/comp/security/csc-policies/info-res-use.html
The following notice applies to all members of the SLAC Community, including employees, collaborators, and other authorized users of SLAC information resources.
Use of SLAC Information Resources
Persis Drell, March 2008
Working at SLAC we have certain responsibilities imposed
on us by Stanford University and the U. S. Department of Energy regarding the
use of information resources. As Director of the Laboratory, I want to remind
everyone of these responsibilities and the serious consequences to us as
individuals if we do not adhere to the regulations that govern us.
Use of SLAC information resources is subject to the SLAC
Limited Personal Use of Government Office Equipment including Information
Technology policy, the Stanford University
Computer and Network Usage Policy, and other relevant policies which can
be found at
SLAC information resources are also subject to
"appropriate use" requirements found in federal law and the provisions of the
SLAC contract. These laws and policies apply to all data-communication and
telecommunication facilities and services (including, but not limited to,
e-mail, instant messaging, telephones, voice mail, faxes, SLAC data, networking
services, storage media, computers and associated peripherals and software),
whether for administration, research, teaching or other purposes. Connecting
equipment not owned by SLAC to SLAC networks is a use of SLAC information
Any member of the SLAC community who, without
authorization, threatens the access and sharing of information is engaging in
unethical and unacceptable conduct. Such unethical conduct includes destroying,
altering, dismantling or damaging SLAC information resources, or interfering
with access to or use of these SLAC resources.
The following is an outline of some of the
responsibilities for those who use SLAC information resources.
- Suspected misuse of SLAC
information resources must be reported at once. This is an affirmative duty.
The SCCS help line (Ext. HELP  Option 3) can ensure that you are put
in contact with the proper authority for receiving such a report.
- SLAC information resources
-- including browsing the Internet -- may only be used for work related to
SLAC business. Minor incidental personal use is allowed if it satisfies the
- It does not impact or interfere with the
employee's legitimate job performance.
- It does not impact or interfere with the work of
any other employee or the correct functioning of any SLAC information
- It does not support running a business or paid
- It does not involve illegal activities or violate
- Legally protected
information subject to privacy laws or confidentiality requirements such as
data that might give unfair advantage to a vendor, e-mail, and personnel
records is stored on SLAC computers:
- Users should take appropriate steps to safeguard
legally protected information for which they are responsible. For
information concerning the protection of data from unauthorized use,
contact your departmental support.
- Users should not attempt to gain unauthorized
access to legally protected information. Users suspecting that they have
accidentally gained access to such information should not use or
disseminate the information and should report the incident to
Computer Hardware and
- SLAC computer accounts are
normally intended for use only by the individual assigned to that account.
Each account holder is responsible for the resources used by that account
and for taking necessary precautions to prevent others from using the
account. Shared accounts require adequate justification and explicit
authorization. Users shall not seek to gain or enable unauthorized access to
- Passwords must be chosen
with care and not divulged to anyone. Different classes of systems, for
example business systems, scientific computing systems and accelerator
control systems have different requirements on user passwords. Users are
responsible for following the password policies for the systems on which
they have accounts.
- Users shall not interfere
with the intended use of SLAC information resources or without
authorization: destroy, alter, dismantle, disfigure, prevent rightful access
to, or otherwise interfere with the integrity of computer-based information
and/or information resources.
- Unauthorized copying of
copyrighted software is strictly prohibited.
- Because electronic
communications (e-mail, instant messaging, news group contributions, etc.)
pertain to SLAC business, their content reflects on SLAC. Therefore, it is
important that such items be professional and not personal in nature. Use of
SLAC's electronic communication facilities to send fraudulent, harassing,
obscene, threatening, racial, sexual or other unlawful messages is
prohibited and illegal, as is use of SLAC information resources for lobbying
of any kind.
- Electronic communication
files such as e-mail are not intended for general dissemination.
Unauthorized perusal of such files is not permitted. Conversely, sensitive
data should not be sent as e-mail because no means of storage or
transmission available at SLAC is completely secure.
SLAC's contract with the government makes
virtually all information on SLAC computer systems, including e-mail,
available to the government. It is not SLAC policy to routinely monitor
e-mail. However, SLAC cannot and does not guarantee the privacy of e-mail
- E-mail and other
electronically stored information (ESI) is routinely discoverable in legal
proceedings; ESI, and in some circumstances, all related metadata, may be
retrievable and producible in litigation even after it has been "deleted".
SLAC requires that users act in accordance with these
responsibilities, SLAC policy, University policy, and relevant laws and
In order to assure all relevant parties that no misuse of
resources occurs, SLAC reserves the right to sample stored or in-transit data at
any time. Improper use of computing facilities may lead to disciplinary actions
up to and including termination and/or legal action.
Persis Drell, Director
Stanford Linear Accelerator Center