Premium Essay

Is3230 Human Resources Risk Mitigation Policy

In:

Submitted By r1chard
Words 512
Pages 3
Equipment
• Always get permission before installing, attempting to install or storing programs of any type on the computers.
• Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk, and will cut short your time with the ICT equipment.
• Only use the computers for educational purposes. Activities such as buying or selling goods are inappropriate.
• Always check files brought in on removable media (such as floppy disks, CDs, flash drives etc.) with antivirus software and only use them if they are found to be clean of viruses.
• Always check mobile equipment (e.g. laptops, tablet PCs, PDAs etc.) with antivirus software, and ensure they have been found to be clean of viruses, before connecting them to the network.
• Protect the computers from spillages by eating or drinking well away from the ICT equipment.

Security and Privacy
• Protect your work by keeping your password to yourself; never use someone else’s logon name or password.
• Always get permission before revealing your home address, telephone number, school name, or picture to people you meet on the Internet.
• Other computer users should be respected and should not be harassed, harmed, offended or insulted.
• To protect yourself and the systems, you should respect the security on the computers; attempting to bypass or alter the settings may put you or your work at risk.
• Computer storage areas and floppy disks will be treated like school lockers. Staff may review your files and communications to ensure that you are using the system responsibly.

Internet
• You should access the Internet only for study or for school authorised/supervised activities.
• Only access suitable material – Using the Internet to obtain, download, send, print, display or otherwise transmit or gain access to materials which are unlawful,

Similar Documents