CERN Computer Security
Computing Rules
Reports & Presentations
CERN Computing Rules:
The Use of CERN Computing Facilities
The use of CERN's computers, networks and related services, such as e-mail, are governed by Operational Circular Nº5 (OC5). This circular and its "Subsidiary Rules of Use" define the rules and conditions that apply to the use of CERN's computing facilities. Any violation of these Computing Rules may result in sanctions.
Subsidiary Rules of Use
OC5 requires that users comply with specific rules applicable to services that they use, the so-called "Subsidiary Rules". Users must follow the operational procedures that are in force and the instructions of the service managers. Service managers may withdraw right of access to their service in order to resolve operational problems or in case of failure to comply with these subsidiary rules.
Software Restrictions
Some software applications are not generally permitted at CERN or its usage is restricted because these applications are known to cause security and/or network problems or otherwise prevent CERN's security monitoring systems from functioning correctly. In particular, this includes software which scans a network, and which might, thus, lead to disruption of sensitive equipment. If the corresponding software has been installed on CERN computers, it must be removed. It must be disabled on (or removed from) non-CERN computers.
If professional use is being considered then a prior security check is required before installation of the software. For this you must contact with details of your professional requirement, an endorsement from your group leader or experiment computing responsible, and details of how you will secure the software and ensure it complies with CERN's Computing Rules.
© Copyright 2021 CERN Computer Security Team
Phone: +41 22 767 0500
(Please listen to the recorded instructions.)
Please use the following PGP key to encrypt messages sent to
CERN Computer Security Team <>
429D 6046 0EBE 8006 B04C DF02 954C E234 B4C6 ED84
Operational Circular Nº5Aims of OC5Personal use policyViolation of rulesComputer accountsData Handling PolicyData Retention PolicyOuter Perimeter Firewall OpeningsProperly destroying dataAFSDFSEOSRunning Windows PCsSecurity BaselinesSocial Media GuidelinesThird party access to users' accounts and data Using file servicesUsing the e-mail serviceUsing the networkUsing webcamsTeamViewerVPNs and other overlay networksLicensing CERN SoftwareOffice of Data Privacy ProtectionOpen Hardware Repository