Cybersecurity
02 Sep 2025
Yes
-  

 

 

ISIS Cybersecurity Induction for Facility Users

No
 

Key Responsibilities

Cybersecurity is the responsibility of all of us. Cybersecurity issues can impact ISIS operations and the safety of our data. We are committed to working closely with all our visiting users to maintain a safe and secure environment. Your awareness and support are key to helping us protect ISIS and keep everything running smoothly.

Acceptable Use Policy (AUP)

  • Read & Agree

  • Key Points

    • Respect privacy, avoid unauthorised access, and adhere to all guidelines provided.

User Accounts

  • Account Usage

    • Only use your assigned accounts. Sharing of credentials to unauthorised individuals is strictly prohibited.

  • Security

    • Maintain the confidentiality of your login details and report any suspicious activity immediately.

Personal Device Usage

  • Secure Network Access

    • Facility Users should connect only to the appropriate guest Wi-Fi. Plugging in devices physically is not permitted without prior authorization.

  • Device Security Compliance

    • Personal devices should have updated software, active antivirus protection, and strong passwords.

  • Data Protection

    • Do not store or access any ISIS data that is not directly related to your own research on your device.


Reporting Incidents & Data Handling

Reporting Incidents

  • Importance

    • Immediate reporting helps us address and mitigate potential threats swiftly.

  • How to Report:

    • Contact: Reach out to your designated ISIS Local contact for any cybersecurity concerns or incidents.

    • Details: Provide detailed information about the incident, including what happened, when, and any relevant screenshots or logs.

Data Handling and Confidentiality

  • Data Storage

    • Approved Locations: Store all research data and sensitive information in secure locations.

    • Encryption: Use encrypted methods for transferring sensitive data to prevent unauthorised access.

  • Confidentiality

    • Agreements: Comply with all confidentiality agreements related to research data and facility operations.

    • Disclosure: Do not disclose sensitive information to unauthorised individuals or external parties.


Facility Equipment & Network Use

Equipment Use

  • Authorised Use

    • Utilise facility equipment and software only for authorised purposes. Personal devices should adhere to facility guidelines if allowed.

  • External Experimental Device

    • If you intend to bring your device to run an experiment and require network connectivity, please notify us when filling out the ERA

Network Security

  • Access

    • Use the facility network responsibly. Do not attempt to bypass or disable security measures.

  • Reporting

    • Report any unusual network activity or security issues to ISIS Local contact or the IT team immediately.


Support

  • For any questions or issues, please contact your ISIS local contact.

  • Read the ISIS Data Policy



Contact: