Computer Use Agreement
Appropriate use of Laboratory computing resources
Print Computer Use Agreement
This agreement applies to all users of Brookhaven National
Laboratory’s computer resources, which include Laboratory owned
computers, computer systems, networks, storage, printers and
portable/mobile devices, as well as all methods of access,
whether local or remote. Computer resources are provided to
support the Laboratory’s official business.
The Laboratory monitors its computer resources to detect
improper use. Investigation of detected improper use may result
in confiscation of the offending device for confirmation and
evidence gathering by appropriate authorities.
Use of the Laboratory's computer resources implies consent to
review and disclose information and usage upon violation of this
agreement or when mandated by law. Violations will result in
consequences including, but not limited to, loss of access to
computer resources, administrative disciplinary action, and
civil and criminal penalties.
of Computer Users
- Be aware of, knowledgeable about, and comply with the requirements
of the BNL Cyber Security Program as described in SBMS.
- Follow BNL policy regarding the use and protection of accounts and
- Protect sensitive information and Personally Identifiable
Information (PII) in accordance with the requirements set forth in the
Operations Security (OPSEC) and
SBMS Subject Areas.
- Observe licensing and other computer-related contract provisions -
particularly those that could expose the Laboratory to legal costs or
damages if not followed.
- Ensure that computers under your control have virus-protection software installed and kept up to date.
- Keep computing systems properly configured and patched to remain
compliant with current cyber security requirements. This function may be
delegated to local system administrators or central IT staff.
- Participate in cyber security training and awareness.
- Report suspicious activity or known security violations to the Cyber
Security Incident Response Team,
email@example.com or the Cyber Security Hotline at extension 8484.
Limited Personal Use
There is no inherent right for the personal use of the Laboratory's
computer resources however limited use for personal purposes is allowed
under the following criteria:
- Involves minimal additional expenses to the Laboratory.
- Does not interfere with the mission and operations of the
Laboratory, interfere with job performance or delay or compromise the
- Does not compromise information security.
- Does not involve illegal activities.
- Does not involve operating a private business or supporting any
- Does not involve activities that could potentially embarrass the
Laboratory or the DOE.
- Does not give the impression of acting in an official capacity when
using computing resources for personal purposes.
- Personal use may be restricted if the above criteria are violated
and personal use of classified computer resources is not permitted.
The following examples of personal use of Laboratory computer resources
constitute acceptable activities that meet the criteria specified above.
- Ongoing education, self-training, and professional development.
- Personal correspondence and work on your own resume or those of
- Work for charities and non-political local community groups.
- Good-taste Internet access.
- Limited use of instant messaging or internet-based phone programs.
- Research activities, such as reading newspapers and magazine
articles, checking airline prices and schedules and purchasing tickets,
browsing sales catalogs, comparing prices of automobiles, obtaining road
maps, and checking accounts in credit unions and retirement plans.
- Occasional personal banking such as managing checking and savings
accounts online or reviewing your retirement portfolio.
If you are unsure whether certain personal use of Lab computing is
appropriate, contact the Cyber Security Office for clarification via
email to firstname.lastname@example.org or through the Cyber Security Hotline at
The following are examples of inappropriate use of Laboratory computer
resources and are prohibited.
- Accessing content that promotes hate language,
harassments, or threats.
- Accessing content that ridicules others on the basis of
race, creed, religion, sex, disability, nationality, or sexual
- Creating, downloading, viewing, storing, copying, or transmitting
sexually oriented or sexually explicit material (e.g., pornography,
- Working for commercial purposes or supporting for-profit
organizations that are outside the scope of your BNL appointment.
- Recommending products or services as being endorsed by BNL.
- Participating in any partisan political activity.
- Misleading someone into believing you are acting in an official
- Hosting services (such as web sites) that are not of general
interest to the Laboratory.
- Using prohibited peer-to-peer (P2P) file sharing services, such as
those listed at
- Circumventing the perimeter firewall in a way that allows an
internal machine to be accessed from an external, insecure network
without first obtaining approval via the Cyber Security Management
Information System. Example is forwarding an internal port to an
- Creating and/or forwarding of chain letters and unrequested bulk
- Using software, such as password-cracking tools and vulnerability
scanners, without the consent of the Information Systems Security Manager (ISSM).
- Intentional use of software or techniques meant to disguise or
circumvent the detection of computing activities on the BNL network.
This list should not be considered all-inclusive; please check with the
Cyber Security Office about your proposed usage. Please reference DOE Order
203.1 “Limited Personal Use of Government Office Equipment Including
Information Technology” for additional information and guidance.
All users are required to have a signed copy of this document on
file with Human Resources prior to using BNL computer resources.
By signing this form you are acknowledging that you have read,
understand, and agree to comply with the above principles
governing the use of Brookhaven National Laboratory computer
Note: If a BNL employee, guest, or contractor
does not have a signed copy of the Computer Use Agreement on
file, then accounts for access to BNL computing resources will
be denied and computer access will be limited to the BNL visitor
You must have the Adobe Acrobat Reader software installed
in order to view and print this file.
Obtain the Reader, or
troubleshoot common technical problems when trying to view these PDF
For all users of Brookhaven’s computers and networks and all methods of
access, whether local or remote.
Signed Computer Use Agreements for employees and
contractors are to be sent to Human Resources. The signed
forms can be sent via inter-office mail to Bonnie Miller, Building
400B. Signed forms can also be faxed to HR at 631-344-3195 or be
sent via email to email@example.com.
Signed forms for guests and visitors are handled by the RHIC
and AGS Users Center. Guest and Visitor forms can be emailed to
additional contact information on the Users Center click
Changes to Computer Use Agreement - 3/17/2009
Changed wording in two Inappropriate Use bullets to reflect the intent to
access inappropriate content instead of the inadvertent access to an
inappropriate site. Wording changed from:
> Supporting or accessing sites that ...
> Accessing content that ...
The bullet on the use of password cracking tools was changed
to require consent from the ISSM instead of express written consent from the
CPPM. The new wording reflects actual operations.
> without the express written consent of the Cyber
Protection Program Manager (CPPM).
> without the consent of the Information Systems Security Manager (ISSM).
If you have a
question that is not addressed in these pages, please send an email to
Last Modified: March 23, 2010
Please forward all questions about this site to: