Category: Computing
-
Revised computer security rules
Revised computer security rules — [This article was updated on 4 February 2025] At its second meeting, the Computer Security Board formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5, OC5) related to Identities, Authentication & Authorisation (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website
-
Data Classification Policy
Data Classification Policy — CERN has just released, for internal distribution only, the Data Classification Policy document, which establishes a framework for classifying professional data entrusted to or originating from the Organization. The objective of classification is to provide persons dealing with information with a concise indication of its level of security and access, thus
-
Document Management Systems – Guidelines
Document Management Systems – Guidelines — Over the years, CERN’s workflows and activities have resulted in a variety of software solutions being used to manage, store and track digital records. Based on an analysis of the document management systems (DMSs) currently used at CERN, the recently published Document Management Systems document aims to provide users


