The following instructions apply to the SLAC-VISITOR wireless network, which is open to all visitors to the Lab. It provides three months of access to the Internet, but no privileged access to SLAC internal content, servers, or mission-critical applications.
Note: In accordance with US Federal Government directives Huawei and ZTE devices are not allowed on SLAC Visitor Network.
To connect to SLAC’s visitor wireless network:
Select “SLAC-VISITOR” from the list of available networks, then connect.
Are you working for SLAC?
If you are a SLAC employee, sub-contractor, intern, etc. using the visitor network to perform work for SLAC, click the Employee Login button to log in with your SLAC credentials.

login with your employee credentials and accept Acceptable Use Policy

Already registered as a visitor?
If you have already registered as a guest user, enter your credentials, read the Policy Statement and Privacy Notice, then check the acknowledgement box and click Sign On to connect.

Registrations are valid for 90 days.
Not registered yet?
1. If you have not registered yet, click Register for Visitor Access

2. Complete the registration information, then click Register.

3. At the Registration Success screen, you can choose to print the confirmation with your PIN, or simply check the agreement box and click Sign On.

Full Terms and Conditions:
========================================================================================================
Before you can proceed to the Internet, please review and accept the Policy Statement and Privacy Notice below.
Use of SLAC Information Resources
From: John Sarrao, SLAC Director
=============================
As Director of the Laboratory, I want to remind everyone of responsibilities associated with the use of SLAC information resources. SLAC information technology resources are government assets for SLAC-related business use. Unauthorized use is prohibited. Inappropriate use exposes SLAC to risks including malware, compromise of network systems and services, and legal issues. Use of SLAC information resources is subject to Department of Energy Order 203.1, Limited Personal Use of Government Office Equipment including Information Technology, which can be found at
www.directives.doe.gov; the Stanford University Computer and Network Usage Policy (adminguide.stanford.edu/chapter-6); and other relevant policies, which can be found at policies.slac.stanford.edu. These policies outline appropriate use requirements and provide examples of misuse of IT resources.
Additional guidelines apply with respect to computer hardware, software, and electronic communications, which are provided below.
Computer Hardware and Software
* SLAC computer accounts are normally intended for use only by the individual assigned to that account. Each account holder is responsible for the resources used by that account and for taking necessary precautions to prevent others from using the account. Shared accounts require adequate justification and explicit authorization. Users shall not seek to gain or enable unauthorized access to information resources.
* Passwords must be chosen with care and not divulged to anyone. Different classes of systems, for example business systems, scientific computing systems and accelerator control systems have different requirements on user passwords. Users are responsible for following the password policies for the systems on which they have accounts.
* Users shall not interfere with the intended use of SLAC information resources or without authorization: destroy, alter, dismantle, disfigure, prevent rightful access to, or otherwise interfere with the integrity of computer-based information and/or information resources.
* Unauthorized copying of copyrighted software is strictly prohibited.
Electronic Communications
* Because electronic communications (e-mail, instant messaging, news group contributions, etc.) pertain to SLAC business, their content reflects on SLAC. Therefore, it is important that such items be professional and not personal in nature. Use of SLAC's electronic communication facilities to send fraudulent, harassing, obscene, threatening, racial, sexual or other unlawful messages is prohibited and illegal, as is use of SLAC information resources for lobbying of any kind.
* Electronic communication files such as e-mail are not intended for general dissemination. Unauthorized perusal of such files is not permitted. Sensitive data should not be sent as e-mail without secure transmission.
* SLAC's contract with the government makes virtually all information on SLAC computer systems, including e-mail, available to the government. It is not SLAC policy to routinely monitor e-mail. However, SLAC cannot and does not guarantee the privacy of e-mail communications.
* E-mail and other electronically stored information (ESI) is routinely discoverable in legal proceedings; ESI, and in some circumstances, all related metadata, may be retrievable and producible in litigation even after it has been "deleted". SLAC requires that users act in accordance with these responsibilities, SLAC policy, University policy, and relevant laws and contractual obligations. In order to assure all relevant parties that no misuse of resources occurs, SLAC reserves the right to sample stored or in-transit data at any time. Improper use of computing facilities may lead to disciplinary actions up to and including termination and/or legal action.
John Sarrao, Director
SLAC National Accelerator Laboratory
Privacy Notice
===========
Your contact information will be transmitted over a secure connection. It will not be shared with anyone beyond the SLAC Visitor Network support staff or used for anything but contacting you in case of problems with your computer, except when required by law enforcement investigation or the Stanford/DoE contract. Together with the information you provide, we also record:
* the Internet Protocol (IP) address(es) we assigned to your system
* the date and time you submitted this form
* dates and times you connect to and disconnect from the Visitor Network
* the browser version and operating system version your computer reports (HTTP_USER_AGENT)
* the MAC ("hardware") address of your computer
Usage information is not generally shared outside of the cyber security and network support staff, except when required by law enforcement investigation or the Stanford/DOE contract.
After the initial logon, it is your responsibility to protect your communications, e.g. by using a Virtual Private Network (VPN). Do *NOT* use applications (such as POP/unencrypted IMAP/FTP/telnet) that will put unencrypted passwords onto the network.
=========================================================================================================
See Also:
SLAC Visitor Wireless FAQ
SLAC Secure Wireless FAQ