ISSC351 – Week
COMPANY’S COMPUTER LAB OVERVIEW
One of our main objectives is to
provide reasonable access to computer resources provided by the company and to
ensure to maintain a professional atmosphere that is appropriate for the
working environment and its employees. The following policies and procedures
have been approved and applied. In order to provide a consistent standard, the
appropriate security measures for accessing and authentication to the company’s
network is strictly enforced. The company computer labs will be used by company
internal staff and employees for their work-related activities only.
COMPUTER LAB PROCESSES
The Lab Liaison will help any
personnel will accessing the computer lab for use. The Lab Liaison and computer
technicians are primarily responsible for the upkeep and maintenance of the
computer lab. They will enforce all policies, procedures, and operations of the computer lab and as staff
and employees, your use of the computer
labs constitutes your legal consent and understanding of the following rules
and their instructions. For any reason, you failed to follow the rules and
instructions given, disciplinary actions will commence and your employee
computer access privileges will be revoked. If you require any assistance
during your use of the computer lab, you are to seek assistance from the Lab
Liaison or computer technicians.
PROCEDURE FOR ACCESSING THE COMPUTER LAB
1) Request a computer number from the Lab
Liaison for computer use.
2) Provide the Lab Liaison your employee
badge to receive the computer number.
3) Upon receiving the computer number, the
user will access the computer desktop and browser by entering the password
annotated on their computer number.
4) When done with using the computer, the
user will return the computer number in order to receive back their employee
RULES OF CONDUCT AND COURTESIES
1) Food, drinks, and tobacco products of any kind are
strictly prohibited from the computer lab.
2) Accessing, downloading, or reading pornographic,
obscene or profane material is strictly prohibited.
noises – Participating in behavior or activities that disturb other users or
interfere with the operations of the laboratory is not allowed. This includes,
but is not limited to, loud talking, playing music, or unnecessary noise making.
Disruptive, for example, talking loudly,
crying, laughing or cursing is not tolerated. Make your conversations with
others in a quiet way that does not disturb the work of other users in the
computer lab. If you become disruptive, you will be asked to leave.
Phone Usage – All cell phones must be turned off or silent (vibrate mode) while
in the laboratory. If you receive a phone call, you must exit the computer lab
before answering any mobile phone and continue your conversation somewhere
outside the computer lab.
5) Excessive printing of large documents –
prints not work-related files in the computer lab is prohibited. Printing more
than 10 pages are prohibited.
6) Duplicating software – Unauthorized
copies of software under license from the computer lab hard drives or servers
is a violation of federal copyright laws. Copyright
laws and software license agreements will be strictly applied in the computer lab.
saving – documents and files of any kind saved on the hard disk of the computer
will be automatically deleted. Data files created in the computer lab must be directly
saved to a floppy disk, USB drive or a CD.
and Hardware Configurations changes – any changes to the configurations of the
computer configuration is forbidden. This includes changes to the settings, the
printer’s configuration and modification of the software of the system. Those
who violate this policy will be referred to their direct supervisor, HR
department and the official authority for suitable adverse action, which may
include the loss of the computer privileges or employment termination.
9) The following types of activities are
examples of behavior that are unacceptable, and which, in some cases, may
violate federal or state law:
Access to another account, directory, files
private or email without permission of the
Distort its own identity in the electronic
communication. Violate copyright and/or software agreements.
The use of computing resources to threaten or
harass others. Violate lab and the political systems, procedures, and Protocol. Violation of these rules can lead
to the revocation of the privileges of laboratory and/or disciplinary action
rules and regulations that the above will result in disciplinary action.
Disciplinary action will include, but is not limited to:
a verbal warning.
to leave the computer lab.
name is given to the competent
authorities of the appropriate measures that could result in loss of privileges
to the computer, or terminated from the company.