Free Essay

Test

In:

Submitted By balettan
Words 5081
Pages 21
Acceptable IT Usage Policy

Acceptable IT Usage Policy
Capgemini India

The information contained within this document is the property of CAPGEMINI INDIA and is issued in confidence and must not be reproduced in whole or in part.

Acceptable IT Usage Policy

Document Control Revision History Date Version 8th June 2004 ISMS-Annex04/1.0 1.1

Author C. Rai – ISMS Manager C. Rai – ISMS Manager

Description FIRST RELEASE Second Release – Revision of earlier release to adapt QMS guidelines on document controls and classification standard Control 3.9 – “network” was replaced with “network server” Addition of control 3.19 “Network access to temporary staff and visitors” under section 3 Addition of SECTION 8 “Mobile computing and Teleworking Policy” SECOND RELEASE Changes in software copyright compliance, Internet policy, maintaining information security, password policy. THIRD RELEASE Addition of acceptable use policy on Data Card / GPRS / Blackberry

15th Jan 05

28th Jan 05

1.2

C. Rai – ISMS Manager

12th Feb 05

1.3

CRAI – ISMS Manager

3rd March 05

2.0

CRAI – ISMS Manager Chandrashekhar Moharir – ISMS Team

27th September 2.1 05

4th Oct 06 18th 08

3.0

Cmoharir- ISMS team Dmalli- ISMS Team

September 3.1

19th September 3.1 09 22nd April 2010 3.2
Company Confidential

Kamal Seepana- ISMS No changes Team Daksha Malli Policy Revision
Page 2 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

28th June 2011

3.3

Rudraksha Chodankar

Edited the controls 2.4, 2.5, 2.6, 2.7, 2.10 and 2.11 under maintaining information security, 4.1 and 4.2 under clear desk and clear screen policy. Removed the controls 5.2 and 5.7 under system password usage policy. Minor changes to section 3, 6, 7 and 8. Section 9.5 changed

Distribution Name Capgemini India Capgemini India Capgemini India Capgemini India Capgemini India Capgemini India

Title NA NA NA NA NA NA

Document Version ISMS- Annex-04/1.0 2.0 3.0 3.1 3.2 3.3

Date 8th June 04 3rd Mar 05 13th Nov 06 18th Sept 08 20th Aug 10 15th Jul 11

Reviewed & Approved By Name Title Document Version Section Date 7th June 04, 10th Jan 05, 20th Jan 05, 12th March 05, 1st December 05, 16th Oct 06 12th March 05 25th Nov 05, 9th Oct 06 18th September 08
Page 3 of 20

Mr. Amisagadda AD – ITICS Seshaiah

ISMS- Annex- All 04/1.0, 1.1, 1.2, 1.3, 2.0,2.1,3.0 All ALL All

Mr. Atul Srivastava Nilesh Burghate Mithilesh Singh
Company Confidential

Director – 1.3 PRM Manager – 2.1,3.0 ISMS Manager3.1

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

Sudarshan Singh Mithilesh Singh

Sudarshan Singh Sudarshan Singh

ISMS AD-ISMS Information Security Officer Head – ISMS Director – ISMS

3.1 3.2

All All

18th September 08 23rd September 2010 20th Aug 2010 15th Jul 2011

3.2 3.3

All All

Process conformance Standard / Model ISO 27001:2005 Clause / Section / (Key) Process Area Clause A.7, A.8, A.9, A.6 Control Objective A7.3, A.8.7, A.9.3, A.6.3

Company Confidential

Page 4 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

TABLE OF CONTENTS 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Document Purpose & Compliance ................................................................... 6 Maintaining Information Security .................................................................... 7 Copyright Compliance..................................................................................... 9 Clear Desk & Clear Screen Policy ................................................................... 11 System Password Usage Policy ...................................................................... 11 E-MAIL – Acceptable Usage ........................................................................... 13 Internet Usage Policy .................................................................................... 15 Data Backup and Restore Policy .................................................................... 16 Mobile & Tele-working Policy........................................................................ 17 Policy on Data Card / GPRS /Blackberry usage ................................................ 17 Social Networking and Social Media Sites Policy ............................................. 18 Reporting of security incident: ...................................................................... 20 Implication of Non-compliance:..................................................................... 20

Company Confidential

Page 5 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

1.

Document Purpose & Compliance
This “Acceptable IT Usage Policy” is an annexure of the Acceptable IT Usage Policy, compliance to the terms of this document and the ISMS Policy Manual is mandatory. All terms not specifically defined in this Policy but defined in the ISMS Policy Manual shall be deemed to have the same meaning as those defined in the ISMS Policy Manual. Users are requested to consider both documents carefully.

This Policy has been issued with the authority of the Chief Information Security Officer of Capgemini India and compliance with its principles is mandatory for all internal, external and authorized third party users accessing any computing facilities owned or operated by Capgemini India. The Policy applies to all computer Users accessing any Information Systems owned and/ or operated by Capgemini India. Its application extends to the use of all such equipment involved in information processing wherever suited. As stated in the ISMS Policy Manual, all references to “Capgemini India” or “Organization” shall be deemed to refer to “Capgemini India Pvt. Ltd.”; it’s Successors in title, and to any subsidiary or other organization, which it wholly or partly controls. The purpose of the policy is to protect the information assets owned and used by the Capgemini India from all threats, whether internal or external, deliberate or accidental and to meet all regulatory and legislative requirements, including but not limited to those relating to: INFORMATION TECHNOLOGY ACT, 2000 COPYRIGHT ACT, 1957 This document forms part of the Organization’s initiative to achieve compliance with ISO 27001:2005. Any actual or suspected breaches of these guidelines or the provisions of the ISMS Policy Manual within, or affecting, the Capgemini India’s systems will be thoroughly investigated by the Capgemini India’s ITICS
Company Confidential Page 6 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

department. Disciplinary action may be taken which may lead to dismissal in a manner provided in the HR policies. Any action taken internally does not preclude prosecution under relevant laws. In the event of an issue arising from an interpretation of this guideline document, it will be resolved by ISMS Team. This policy document shall be published on the Organization’s Intranet or central repository accessible to all the employees of Capgemini India.

2.

Maintaining Information Security
Capgemini India has procedures and tools in place to deal with malware theft of hardware and software, unauthorized access of data and the maintenance of system security.

2.1 Maintaining Information Security within the local working environment is individual’s responsibility. Individual employee shall understand the security requirement within their functional working domain and strive to protect business information with highest priority. In any case of conflict understanding or loss of understanding, the same should be consulted with ISMS team. 2.2 Employees will not disclose information relating to the Organization’s IT facilities, to anyone outside the Organization without the Organization’s express permission. Any telephone canvassing by outsider for information should be passed directly to an immediate manager or ISMS team. 2.3 Computers logged on to the network should never be left unattended. 2.4 Users are to ensure that their computers are secured from un-authorized access. Any compromise of system security found to be originating from a particular users computer will be traced to the User and he/she will be held responsible for such un-authorized violation. 2.5 It is a criminal offence under the Information Technology Act (Amended) 2008 to deliberately attempt to access a system to which you have no authority
Company Confidential Page 7 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

2.6 ISMS team has right to monitor all systems and all authorised and unauthorized attempts at accessing systems 2.7 Project related data must be saved on a network drive provided to every user. The personal data can be stored on local hard disk but responsibility of the data lies with the end user. The only circumstances where Project related data may be saved to the hard disk, is when a laptop is being taken to a site where the Organization’s network is inaccessible and data is required for business purposes. However the end user will be responsible for safekeeping and security of the data stored on his/her laptop. 2.8 The responsibility of all data on the network server lies with ITICS, who will ensure that regular backups are performed and stored off site. Data stored on desktop or local workstation shall not be backed up as regular practice. ITICS shall not be liable for any loss of data from local workstations, hence it is recommended to the computer users to store all business critical data on central storage facility provided by ITICS. 2.9 Users will assist ITICS department in creating, maintaining and updating backups of their data ( Now we don’t own this procedure) Laptop shall not be left unattended in any public location 2.10 All data taken out of the Organization network, for valid business purpose and with appropriate approval, shall be the responsibility of the user and the user may be held liable for any theft or loss of the data. 2.11 Only members of ITICS department are permitted to move any IT equipment, within an office or to another site. User should not themselves move any IT equipment allocated to them at their original working place .The following may not be installed or configured on any computer other than by ITICS department (a) peripheral devices of any kind (digital cameras, PDA’s, modems, etc.) and (b) removable media devices including CD writers, tape backup, floppy drives, memory sticks, flash cards, USB memory and other devices. The aforementioned list is not exhaustive and includes all other removable memory and media devices.
Company Confidential Page 8 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

2.12 Disposal of IT equipment will be arranged by ITICS with due regard to legal (software compliance) and environmental issues, ensuring that the appropriate hardware and software registers are updated. 2.13 No user shall disable or disrupt the working of any security controls ( Antimalware , GPO , Patch ) put by ITICS 2.14 Capgemini India has deployed encryption solution on all of its laptops, in order to safeguard information stored on laptops. It is the user’s responsibility to inform ITICS / ISMS if his/her laptop is not encrypted. 2.15 No cloud services (drop box /sync) is to be used for Capgemini information, unless and until the same has been approved by ITICS. 2.16 No user shall setup wireless infrastructure or create adhoc network without approval by ITICS.

3.

Copyright Compliance

3.1 Copyright law, which governs the use of intellectual property, including software, is very straightforward – it is illegal to copy or reverse engineer any software unless expressly permitted by the copyright holder. The Organization may face civil and criminal prosecution as consequences of illegal usage of software legitimate copies of software shall be promptly provided to all Users who need it by ITICS, subject to the necessary authorization having been obtained. 3.2 Users of Capgemini India will not make any copies of any software under any circumstances without explicit written permission of the ITICS. 3.3 Organization will not tolerate the use of unauthorized copies of software. Any User illegally reproducing software or using software that is found to have been illegally reproduced may be subject to legal action including all applicable civil and criminal penalties, in addition to the Organization’s disciplinary procedure as established in the HR manual.

Company Confidential

Page 9 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

3.4 No User will give any Organization software to any outsiders, including clients and customers unless authorized in writing by ITICS. 3.5 Any User who determines that there may be a misuse of software within the organization shall notify IT Helpdesk and ISMS team. 3.6 All software must be purchased through ITICS department, who will install the software on the relevant computers or servers. This includes any upgrades to existing applications. 3.7 Users are not permitted to bring software from home, and install it on to any systems of Capgemini India 3.8 The loading of third party applications, games, peer-to-peer file sharing software, freeware, download of bandwidth intensive audio/video files, Chat software other than for business and official use is strictly prohibited. 3.9 All software, information, programs and code developed for and/or on behalf of Capgemini India or with the use of computers and other applications which are the property of Capgemini India by employees/contractor shall remain property of or considered property of the Organization or the client for whom the software was developed at the sole discretion of Capgemini India. Duplication or sale of such software without the prior consent of Capgemini India will be an infringement of the Capgemini India’s copyright and will be dealt with as a disciplinary matter. 3.10 User are not allowed to install software, which is in Blacklisted Software ( Please Refer Blacklisted Software v.1.0) 3.11 No user should be installing any virtual instance of any of the workstation or server without proper approval and authorization from ITICS

Company Confidential

Page 10 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

4.

Clear Desk & Clear Screen Policy

4.1 Each User should maintain CLEAR DESK policy at his/her working place. No printed documents or soft media (CD/DVD/Floppy) classified as Company confidential, Customer confidential or Sensitive information should be kept in public view or open desk while not at work. ( whether this is in tune of new classification scheme) 4.2 All Classified “Company confidential”, “Customer confidential” or “Sensitive information” papers should be shredded before disposal; classified documents including customer-supplied documents shall be kept under lock and key. 4.3 Computer users shall ensure that they lock their computer screen with password before leaving the work desk to avoid unauthorized viewing or access of computer data.

5.

System Password Usage Policy

5.1 All computer Users are given a username and password; these are unique and must not be shared with any other User, third party or Outsider. Passwords should not be written down .The User should ensure that system access passwords given to them by customer should be used in conformity with customer password usage policy and guidelines. At minimum, these passwords shall not be shared with other users within or outside the team until and unless explicit permission is obtained from customer and immediate manager. Such permission should be kept in record and available for audit purpose. 5.2 All project related servers including database whether in test function or production environment, should be configured with unique user id and password. 5.3 Here is a list of "don’ts":  Do not use the same password for internal system’s account (domain account) as for other non-Capgemini India access (customer provided system
Page 11 of 20

Company Confidential

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

account and password) Where possible, do not use the same password for different system access needs.  Do not share your user id and passwords with anyone, including team members. All passwords are to be treated as sensitive and, confidential organization’s information. Do not reveal a password to anyone in any means not limited to phone, email, fax, etc. Do not hint at the format of a password (e.g., "my family name"). Do not reveal a password on questionnaires or security forms. If someone demands a password, refer him or her to this document or have him or her call the ITICS. Do not use the "Remember Password" feature of applications (e.g., Outlook, public email systems, etc). User should not enable “Auto Form Fill” feature of the web browser. These features are vulnerable as they cache the sensitive information on the local machine, if compromised these information can be easily accessed by the unauthorized person User must not disclose their personnel password such as internet banking, ecommerce etc to any unauthentic source requesting password through email, phone or other form. This may be HOAX and an attempt to steal your password and account details. Get it confirm with authentic source before acting. Never use other person’s workstations to access sensitive applications, customer database, internet banking, e-commerce, etc as far as possible. There is a strong possibility that there may be KEYLOGGER or other SPYWARE programs running in stealth mode to capture your account detail and password. Always use your own system.
Page 12 of 20



  









Company Confidential

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

5.4 If an account or password is suspected to have been compromised, report the incident to ISMS team (isms.in@capgemini.com or ITICS helpdesk on 7744 and immediately change all passwords

6.

E-MAIL – Acceptable Usage

6.1 The company provides its own e-mail system to assist employees in the performance of their jobs. Its use should be limited to official company business. However, occasional use of e-mail for personal reasons is permitted by the organization, with the understanding that personal message will be treated the same as business messages and is subject to review. 6.2 Personal use of the e-mail system (web mail) should never affect the normal traffic flow of business related e-mail. Capgemini India reserves the right to purge identifiable personal e-mail to preserve the integrity of the e-mail systems. Users are allowed to access their personal emails from 1pm to 3pm and 10pm to 1am. 6.3 No User will use the Organization’s e-mail system in any way that may be interpreted as insulting, disruptive or offensive by any other person, or company, or which may be harmful to organization ethics. This includes forwarding any received e-mail, sending mass mailing emails for personal reasons, etc Examples of prohibited material and prohibited use of Organization email include:       Sexually explicit messages, images, cartoons, or jokes; Unwelcome propositions, requests for dates, or love letters; Profanity, obscenity, slander, or libel; Ethnic, religious, or racial slurs; Political beliefs or commentary; Other communications which may directly or indirectly result in; - Copyright infringement
Company Confidential Page 13 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

- Disclosure of confidential information - Transmission of computer viruses - A breach of any law - The security of the Organization’s IT system being compromised or expose the Organization to any liability;

Alternatively, any other message that could be constructed as harassment or disparagement of others based on their sex, race, sexual orientation, age, national origin, disability, or religious or political beliefs. 6.4 All e-mail sent or received are logged and stored for future reference. These emails may be opened and read by a duly authorized officer of the company. 6.5 The forwarding of chain letters is strictly forbidden. This includes those purporting to be for charity or other good causes as well as those promising wealth or other personal gain. In addition, virus warning comes under the same inclusion; the majority of these are false, if you wish to check the truth of these messages, talk to ISMS but do not under any circumstances forward these messages to anyone inside or outside the organization. 6.6 No messages of any kind will be sent to multiple external destinations. This may be considered as ‘spamming’, in all messages, it should be remembered that email is not a secure form of communication. The sent messages will pass over networks owned by other entities. If the content of the message can create problems for the Capgemini India on content being known, a more secure method should be used by the User. The same can be consulted with ISMS team. Users will ensure that all outgoing e-mail contains the standard organization disclaimer. 6.7 The User logged in at a computer shall be considered the author of any messages sent from that computer. Users must log-out from or lock their computer, if away from your desk. Under no circumstances you should send e-mail form a computer that you have not logged into.
Company Confidential Page 14 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

6.8 E-Mail addresses should not be unnecessarily disclosed. If the user provides his/her work address when filling in surveys or to other questionnaires, user will be at risk of receiving unwanted junk messages. 6.9 The user shall not subscribe to e-mail lists, which are not in organization’s interest... 6.10 The User should not open attachments to e-mail messages unless they are expecting them or the emails are coming from known source, and even then should exercise extreme caution when doing so. 6.11 The facility to automatically forward e-mails will not be used to forward messages to personal e-mail accounts. Capgemini India provides a number of solutions for accessing the Capgemini India’s e-mail system when away from the office.

7.

Internet Usage Policy

7.1 Capgemini India will provide access to the Internet to all users to assist them in the performance of their jobs. 7.2 No messages will be posted on any Internet message board or other similar web based service or any social networking sites that would bring the organization into disrepute, or which a reasonable person would consider offensive or abusive. The list of prohibited material is the same as those for e-mail. Even though Users may not leave their name, other identification method exists, including the address of the computer they are using, which may still allow others to locate the organization that the User belongs to, and the particular computer used to post a message. The user shall not engage in any illegal activities using the Internet. The system may not be used for personal financial gain, nor will user host a web site on any company’s equipment without formal authorization from ITICS.

Company Confidential

Page 15 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

7.3 The user must not participate in on-line games or have active any web channel that broadcasts frequent updates on user’s computer, such as the news broadcasts, match scores, etc. 7.4 The user will not visit Web sites that display material of a pornographic nature, or which contain material that may be considered offensive. 7.5 The person logged in at a computer will be considered the person browsing the Internet. It is the responsibility of user to logout from or locks their computers. 7.6 For communication with external clients , the usage of the following Instant Messaging systems are allowed: a. Yahoo messenger b. AOL c. MSN d. Web based GTALK However file transfers and webcam facilities on these messengers are blocked. 7.7 Capgemini India monitors and logs all internet accesses by individuals and reserves the right to access and report on this information.

8.

Data Backup and Restore Policy

8.1 Computer users are required to save all business related data on central file server. For security measures and safety of data, User should not keep sensitive business data on local workstation. Such data should be stored on central file server only.

Company Confidential

Page 16 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

8.2 ITICS is not responsible to take any backup of data on user workstations and laptops. 8.3 If user builds a new server as part of project requirement, the data backup requirement of that server should be mentioned in the respective Server Planning Document.

9.

Mobile & Tele-working Policy

9.1 All employees who are allotted mobile computers (Laptop, Smartphone s, etc) by ITICS department or their respective project should ensure the data safety during travel or off-site work. 9.2 Connecting to Organization’s network from remote location shall only be allowed through pre-defined authentication and authorization mechanism established by ITICS. 9.3 User should not attempt to dial-in or connect to Internet using data card when they are connected to Capgemini network. 9.4 Employee shall ensure that while accepting visitor within the company premise, they should help the visitor declare any information materials such as laptop, CD, Floppy media be declared at the security desk. 9.5 Laptops shall not be left on the desk or in the work area overnight. Employee shall not left laptop unattended in cars, in public area like airport and hotel lounge. Laptop shall not be checked-in as baggage

10.
10.1

Policy on Data Card / GPRS /Blackberry usage
Depending upon work responsibilities, you may be assigned internet connection and accessibility of office mail through data card modem or /and GPRS (General

Company Confidential

Page 17 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

Packet Radio Service) or/and Smartphone (Blackberry) or similar technologies by Capgemini India. The controlled use of the facility will be sole responsibility of the employee and any liability arising due to inappropriate use will be of the employee only. 10.2 The mobile connectivity medium (data card / GPRS / Blackberry or equivalent technology) is to be used only for legitimate business purpose.
10.3 The mobile internet connectivity may enable an uncontrolled access to internet. Even in such case, the employees must not publish, display, store, request (download) or transit any information which are offensive in nature. The broad definition of misuse of these facilities is as defined in “Computer Misuse” clause of this policy i.e. “Acceptable IT Usage Policy”. 10.4 The users are responsible for safety and secured use of the medium. If case of missing or stolen device, users are required to notify ISMS team through mail

(isms.in@capgemini.com) and phone (extension: 7744).

11.

Social Networking and Social Media Sites Policy
Social networking sites are online virtual community on the internet sharing common interest or common attributes (like organisation, friends, technology domains etc). Some of the popular social networking sites are Facebook, Yammer, Linkedin, Flickr, YouTube, etc. These sites are gaining popularity and been used as efficient tools for knowledge sharing or opinion sharing on a subject or interest. However, improper use of these will lead to information security breach resulting into reputational or information loss. The employee needs to adhere to the below guideline in using social network sites.

Company Confidential

Page 18 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

11.1

Publishing and social networking must be done in a professional and responsible manner Public statements about Capgemini India, Capgemini Group and Capgemini Group’s vision must be approved by Corporate Communication. The Capgemini Group’s or its customer’s confidential or proprietary information, trade secrets or any other material covered by the Capgemini Group’s or its customer’s confidentiality policies must not be revealed. Employees should not identify themselves as a representative of Capgemini India Any employee representing as Company representative giving public statement about Capgemini vision shall be approved by Corporate Communication. Publications and social networking shall not be detrimental to the Capgemini Group’s , its customer’s and third-parties’ interests, and shall not interfere with any employee's regular work duties Any personal posts and/or referral, recommendations for a friend or employee made by such employees on these sites shall be considered as personal opinions expressed solely by the author and do not represent the view of the company. Capgemini India or its customer’s confidential or proprietary information, trade secrets or any other material covered by the Capgemini India or its customer’s confidentiality information shall not be revealed or discussed. Employees should always comply with Copyright and Fair use of the media

11.2

11.3

11.4 11.5

11.6

11.7

11.8

11.9

11.10 . You should also show proper consideration for others' privacy and for topics that may be considered objectionable or inflammatory for example politics, sexual orientation and religion, ethical, obscenity. 11.11 Company logos and trademarks should not be used without written consent.

Company Confidential

Page 19 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Acceptable IT Usage Policy

12.

Reporting of security incident:

All users (employees, contractors, sub-contractors) are responsible to report any security incident to ISMS team. Few examples of information security incidents are:      Unauthorized access or disclosure Misuse of Information Assets Falsification of Information Theft, damage, or destruction of information assets Breach of security policy

Please report it immediately to ISMS team at isms.in@capgemini.com or you can call the ITICS helpdesk at 2257744.

13.

Implication of Non-compliance:

Where a breach of the Acceptable IT Usage Policy is established, one or more of the following penalties may be imposed on a person responsible for, or involved in the breach:    Warning Formal written warning Restriction or termination of access to Capgemini network , suspension of such and/or rights pending further actions, including disciplinary action the requirement to provide compensation for any improper use of, or damage to assets disciplinary sanctions, which may include dismissal of an employee or termination of a contract . Any action taken internally does not preclude prosecution under relevant laws.



Company Confidential

Page 20 of 20

Printed copies are current on distribution date. Always refer to the electronic version for the current release.

Similar Documents

Free Essay

Test Taking

...you feel about tests in general? I don’t like taking test because I always get of feeling of nervousness. My stomach gets all tied up in knots. The problem with taking test is a feeling of not remembering. It gets uncomfortable every time I have to take a test whether I study or not. 2. What are your first memories of being in a testing situation? What were your feeling, and why? My first memory of being in a testing situation is in high school. It was finals and I needed to pass this one course to graduate. It was a course that I detested, and I was horrible at it. This course was Trigonometry. I am not good in math period, but this course was a requirement. I felt that I was going to fail the course, and it was going to be a setback. It was a depressing feeling. 3. What make a test “good” and “bad” from your perspective? What make a test good is knowing what kind of test it, what is covered and how much a percentage is geared toward that test. How do I know that the test is good is when the instructor lets you know what is going to be on the test. A test is good when much preparation and work goes into it. The format or the structure of the test also make it good. When I think of a bad test, it mean no preparation, no work or study when into taking the test. A bad test is a test that is not put together well. The organization is not good and the test is very confusing. It can be a bad test when the person taking the test is ill-prepared...

Words: 528 - Pages: 3

Premium Essay

Test

...For • Practicality-This is probably by far, the biggest argument in favor of standardized tests. Aspects include: o Standardized tests are less time-consuming than more complicated assessments that need personal time with every student. o Standardized tests are easier to administer. There are explicit directions given and each student is given the same directions in the same way. o They are easier to grade, machines do it for us. o Very easy to use a computer to track progress and levels of achievement for different groups of students in different subjects. (Holloway) • Objectivity-It is very easy for a test to be objective, it doesn't have emotion or moods or biases. When giving more personal assessments, it is very possible that the teacher or person assessing the student can let their emotions or biases affect how they score that student. • Instigator of change-Standardized tests can be a powerful tool to change classroom and school practices (Gardner). We can use testing to tell us whether we have a problem (Gerstner). When we identify a problem in a classroom, school, or district we can then take active steps in correcting that problem. In addition, achievement data from tests provide teachers with valuable information to improve classroom and student learning (Gardner) • Accountability-Setting high expectations for students and holding them accountable for the same standards, leads to achievement gains. High-stakes testing forces students to take education...

Words: 1000 - Pages: 4

Free Essay

Test

...Quantitative research methods in educational planning Series editor: Kenneth N.Ross Module John Izard 6 Overview of test construction UNESCO International Institute for Educational Planning Quantitative research methods in educational planning These modules were prepared by IIEP staff and consultants to be used in training workshops presented for the National Research Coordinators who are responsible for the educational policy research programme conducted by the Southern and Eastern Africa Consortium for Monitoring Educational Quality (SACMEQ). The publication is available from the following two Internet Websites: http://www.sacmeq.org and http://www.unesco.org/iiep. International Institute for Educational Planning/UNESCO 7-9 rue Eugène-Delacroix, 75116 Paris, France Tel: (33 1) 45 03 77 00 Fax: (33 1 ) 40 72 83 66 e-mail: information@iiep.unesco.org IIEP web site: http://www.unesco.org/iiep September 2005 © UNESCO The designations employed and the presentation of material throughout the publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning its frontiers or boundaries. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means: electronic, magnetic tape, mechanical, photocopying, recording or otherwise, without permission ...

Words: 13966 - Pages: 56

Free Essay

Test

...Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category...

Words: 588 - Pages: 3

Free Essay

Test

...Test Automation Criteria Benefit * How often do you believe the test should be run? * How many minutes are required for one tester to execute the test manually? * Will human intervention still be required to execute the test after automation? * Does the execution of the test require the tester to input a large amount of data (e.g. populating many fields or populating the same fields many times) via the gui interface? * Does the test require an inordinate amount of user interface actions (e.g. mouse clicks, validations)? * Will automating the test increase the productivity of the team? * Will automating the test allow us to increase test coverage? * Will automating the test allow us to increase the accuracy (exactness) and precision ( reproducibility or repeatability) of the test? * Is the execution of this test prerequisite to the execution of multiple other tests? Cost * How many hours of data preparation (e.g. querying data, setup within the application, etc.) is required for this test? * Is the test documented in such a way that someone other than the author can execute it, and is it stored in Quality Center? * What is the average number of times the test needs to be updated (e.g to reflect development changes) within a six month span? * Are the manual test steps currently up to date? * Are the systems and environments in which the test is run stable and consistently available? * Are third party systems involved...

Words: 276 - Pages: 2

Free Essay

Standardized Tests

...Standardized Testing Standardized testing has been a key part in education for awhile now, but how effective is it really? Does it truly grasp the students’ individualities to highlight their unique abilities? Of course it does not, how can it? If this is true, however, why are they still vital to earn a high school diploma? Education was once about the students, not about the score. It was about enjoying the time in the classroom, creating a desire to want to know more. Standardized tests have taken this away from classrooms, they have caused many pupils to not enjoy the material they are taught while also taking the individualism, the one on one individual experiences, out of the classrooms. Education is no longer about the individual student. It is about the student body, making everyone the same or “equal”. Education should be fun. It should make the student desire to learn more. Francine Prose discusses this in her essay, I Know Why the Caged Bird Cannot Read. She talks of how each September she is more and more depressed when she receives her sons’ reading lists for the upcoming school year. Not only have the books they are forced to read not the best choices, but the information from the books is forced down the student’s throats. Students are not given the opportunity to read the books and enjoy them. Upon receiving the their assignments, they are also given worksheets and other assignments,outlining the information and key points they are expected understand...

Words: 1053 - Pages: 5

Free Essay

Test

...academic scores and to include the family’s social, culture and educational background. Sandel states that the A 700 score for a student who attended poor public schools in the South Bronx has more meaning than that of a student from an Upper East Side of Manhattan. 2. What is the essence of Richard Dworkin's argument in support of affirmative action university admissions policies? b. Dworkin’s idea of the supporting argument on affirmative action in relations to the universities admission policies is stated that possibly the right at stake should be based according to academic criteria alone. The fact of being good at football, or coming from Idaho, or having volunteered in a soup kitchen. Dworkin views the facts of grades, test scores, and other measures of academic promise land me in the top group of applicants, therefore I should be admitted. One should be considered based on academic merit alone. 3. What does it mean to sever the idea of "moral desert" from our notions of what constitutes justice?  Would this be helpful? c. Severing the idea of “moral desert” signifies that our nation should reject the talents that one has that enable them to compete more successfully than others in not entirely one’s own doing. He also states an equally decisive contingency where the quality of societal values at any given time...

Words: 504 - Pages: 3

Free Essay

Standardized Tests

...Standardized Tests Sections I and II Sammy North DeVry University Standardized Tests Sections I and II Brittany, an honors student in Atlanta, Georgia, had worked hard her entire academic career to celebrate what would be her proudest moment in high school: commencement. She wanted to walk across the stage to the flash of cameras and the smiles of her family just like her classmates, and then journey off to a college in South Carolina where she had already been accepted. So she gathered her proud family members from Chicago and Washington, D.C., to come to share in her joy. Brittany watched as her classmates put on their caps and gowns and walked across the stage to receive their diplomas. But she did not, and instead waited all during the day to get a last-minute waiver signed. She continued to wait through the night, but it never came. She began to realize that if she graduated, it would not be quick or easy. Her problem was that she had not passed one of four subject areas in the state’s graduation test, which students must pass to earn a regular diploma. She is not alone. Thousands of students, such as Brittany, every year do not make it across the stage at graduation due to failing these state tests. And many of them, such as Brittany, were honors students who had fulfilled all the other requirements of graduation except this one (Torres, 2010). Stories such as this one are far too common and should not happen. We have the power to change the status quo, so that...

Words: 2702 - Pages: 11

Premium Essay

Standardized Test

...’ve always thought about attending a school where students don’t have to take tests mandated by the government. I just realized that it is possible. In the article “What Schools Could Use Instead of Standardized Test”, by Anya Kamenetz, it recommends that it might come true in future years. As of right now, attorneys and legislators have been trying to draft a bill that could get rid of the desire for a federal bubble test and dismiss the renewal of the rule that states no child left behind, but switching it with fast state wide evaluations. The debate over the elimination of the federal testing comes in conclusion of the increasing concern of the time amount of these students use to take this test and the increasing number of parents deciding to withdraw their children from these tests. The council of chief state school officers and broad and big school districts were in support of decreasing the number of standardized tests students take. Plenty democratic groups have come out and backed this idea. If Schools do drop the mandated government tests, Kamenetz advice of three different choices measuring national students The first choice that Kamenetz...

Words: 631 - Pages: 3

Free Essay

Test

...P a g e |1 BackTrack 5 guide 4: How to perform stealth actions Karthik R, Contributor You can read the original story here, on SearchSecurity.in. In previous installments of this BackTrack 5 how to tutorial, we have discussed information gathering and vulnerability assessment of the target system; explored network assessment, scanning and gaining access into the target; and, delved into privilege escalation tools. In this installment of the tutorial on BackTrack 5, how to perform stealth actions will be discussed. Why stealth? The objective of penetration testing is to replicate the actions of a malicious attacker. No attacker desires discovery of surreptitious entry into the network, and hence employs stealth techniques to remain unnoticed. The penetration tester needs to adopt the same stealth methods, in order to honestly assess the target network. http://searchsecurity.techtarget.in/tip/BackTrack-5-guide-4-How-to-perform-stealth-actions P a g e |2 Figure 1. The ‘maintaining access’ category in BackTrack 5, with a focus on OS backdoors. This installment of the BackTrack 5 how to tutorial deals with the “Maintaining Access” feature, within which are options for OS backdoors, tunneling and Web backdoors, as shown in Figure 1. OS backdoors > Cymothoa: Cymothoa is a stealth backdooring tool on BackTrack 5 that injects backdoor shell code into an existing process. This tool has been developed by codewizard and crossbower from ElectronicSouls. The general...

Words: 1111 - Pages: 5

Premium Essay

Eco 410 Test Bank

...A++PAPER;http://www.homeworkproviders.com/shop/eco-410-test-bank/ ECO 410 TEST BANK ECO 410 Test Bank, All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 - 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 - 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ...

Words: 471 - Pages: 2

Free Essay

Eco 410 Test Bank

...ECO 410 TEST BANK A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=eco-410-test-bank Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION ECO 410 Test Bank, All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 – 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 – 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO...

Words: 484 - Pages: 2

Premium Essay

Standardized Test Outline

...I. Standardized test give an unfair advantage to some groups, with the contrast only widening throughout the decades. A. The wealthier class are more prepared than the poor class. 1. Since the 1960s, the contrast of standardized test results between those with wealth and those in poverty have widened by 60%. 2. Students in wealthier environments have greater access to methods and classes that help them prepare specifically for standardized tests. B. Whites and Asians have an advantage over Latinos and African Americans. 1. Although the African American and Latino students make up about 70% of the total student body, they are consistent in scoring lower on standardized tests in New York. 2. Schools in Virginia require a smaller percent...

Words: 615 - Pages: 3

Premium Essay

Standardization Test

...these test has become important for teachers since a student may take a least one standardized test per year. And therein lies the problem; relying heavily on standardized test, whether or not these test actually have reliable scores and are worth the extensive focus. Standardized test negatively affect student learning because they focus on certain topics and generate unreliable test scores due to certain factors. These factors include limitation of creativity, narrowing of curriculum, use of outdated methods, repetition, race and gender. In my research I have found significant data supporting my views. But first it is important to understand what standardized tests are. Standardized tests are different from other testing because they have uniform procedure. This means that they have the same time limits, fixed set of questions, and the scoring is also carefully outlined and uniform. Standardized test are usually scored objectively but there can be some questions such as a short answer question or personality questions which can be scored differently. Almost all test can be classified as informal or formal; a test given and create by a teacher is informal, but a standardized test is classified as formal (Mehrens and Lehmannn). There are certain characteristics a test must have to be a standardized test. The first characteristic is that the test must be designed by a specialist. These specialists have been trained in measurement and principles of test development...

Words: 1511 - Pages: 7

Free Essay

Standardized Tests

...Running head: STANDARDIZED TESTS ARE KILLING SOCIETY                  1                Standardized Tests Are Killing Society  Alyssa Masula  Jonathan Alder High School            STANDARDIZED TESTS ARE KILLING SOCIETY                                                            2      ABSTRACT    STANDARDIZED TESTS ARE KILLING SOCIETY     Alyssa Masula          This essay provides an exploration of the harm done to individuals and societies by standardized  testing.  In her studies, the author discovered mixed results, containing both support and rejection  for her original hypothesis. She includes evidence to prove her point true. She provides  information gathered from various sources including published works and studies by Peter  Sacks, Nicholas Lemann, and Jacques Steinberg. As well as these, she has added the support of a  political cartoon and an article from the distinguished newspaper “The Columbus Dispatch”.          STANDARDIZED TESTS ARE KILLING SOCIETY                                                            3  Standardized Tests Are Killing Society  A student sits down at a desk and is given a #2 pencil, a test, and a time limit. Upon him  rests the expectation that his future will will depend on the result of said test.  Overwhelmed by  the idea of failure and a consequential meaningless life, he cannot concentrate and has a panic  attack.  Too much pressure is placed on young people to succeed on tests that are supposed to be  objective, yet in re...

Words: 838 - Pages: 4