Information Technology Policy
|
|
|
- Sabina Washington
- 10 years ago
- Views:
Transcription
1 Faculty of Computer Science & Information Technology Information Technology Policy Introduction: Faculty of Computer Science and Information Technology mission is to be a Centre of Excellence, internationally acknowledged in the field of computer science and information technology. This policy aims to a provide support for the effective use of technology resources for all Faculty members; including undergraduate students, postgraduate students and researchers. Registration: Undergraduate All registered Undergraduate Students will be given the access to the labs upon submitting all necessary forms and includes the signing of this IT Policy. Postgraduate, Researchers Each Postgraduate Student and Researcher will be given the access to the labs and lab resources filled in the necessary forms and submit it to the Faculty s Admin Office. Hardware: There are two types of equipments; networked or non-networked items. Networked equipments: Desktop Computers and other accessories connected to the Faculty s server. Non-networked equipments: Cameras, Notebooks, Tablets, Stand Alone Printers, Faxes and Photocopiers, and other related ICT equipments that is not connected to the Faculty s Server. IT equipment allocations are listed as below for different users in the Faculty: i. Staffs: Desktop Computer 500 GB External Hard Disk USB Flash Drive Calculator USB Slide Presenter Head of Programme Notebook Management Notebook B&W Laser Printer
2 ii. Postgraduate Students and Researchers Desktop Computer iii. Undergraduate Students Able to use any Desktop Computers in any Undergraduate Labs according to daily Lab Opening Hours timetable. ONLY Staffs, Postgraduate Students and Researchers are given access to the Faculty s Printing Facilities. Each user is being given 1 access id to the photocopier machine located on certain floors. Postgraduate Students and Researchers are provided with printing facilities according to requirements of Project Grants or Project Leaders. Each staff is entitled 1 rim of paper per month. An inventory of technology equipment will be maintained. Staffs, students, researchers and others are not to move or change locations/connections of equipment without the authorization of the administrator. Each of the user (staff) is required to sign the KEW.PA-2/3 and KEW.PA-6 or other form whenever needed, for any IT equipments entitled to them when needed. For any Asset or Inventory items that need to be relocated or need to be borrowed by the user, the Faculty s Tatacara Peminjaman Peralatan rules and regulations will apply. The administrator is responsible, in consultation with the Faculty s Technical Committee, to determine the number and type of technology units needed, and to maintain them in good operating condition. Older equipments WILL be upgraded or replaced each year in order to ensure that equipment remains functional and compatible with changes in technology. Software updates WILL be downloaded as necessary by the administrator to ensure that individual units are equipped with the latest revisions. All of the IT equipments in this Faculty are being maintained by the Faculty s Technical Unit unless stated otherwise on the inventory of the items itself. For any needs for maintenance/troubleshooting of IT equipments, users are requested to consult the Faculty s technicians. Security and Privacy Issues: The administrator is responsible for determining which computer units are connected and maintained on the network, and the number and nature of user accounts. Users WILL be informed of user account information applicable to their approved use.
3 Password based security WILL be established and maintained to provide system security. Users will be categorized into 2 domains; the staff domains and the student domains. Authorized users of networked computers will be required to log on to the domain using their user name and password. To prevent access by others when temporarily away from their desk, a lock screen password will be employed. Users should not share password with others. Upon completion of the work day, or work session, users SHOULD log off and make sure to turn off all units are turned off to avoid any mishaps. All users SHOULD exercise precautions when sending or receiving information over the Internet to prevent viruses, worms, Trojan horses and other potentially damaging software from being received. Users scan your external storage devices before opening them. The administrator should be contacted immediately in the event a unit becomes infected, or develops other operational problems. Some areas in the Faculty are being monitored by CCTV. If you found any suspicious person or activities, please inform the Faculty members. Server Access: The Faculty operates a few types of server for internal usage such as: i. File Server Each Student will be given a total of 200MB file storage in the Student s Server. ONLY Staff is authorized to access the Staff s file server. Users are NOT allowed to save any personal pictures, personal audio and video files that is not related to research/teaching and learning activities in the Faculty. If any files were to be found, the administrator WILL delete it immediately. Each user is given 500MB of personal folder storage. Access to the group folders and public folders are given according to department. ONLY administrator is allowed to delete folders in the main folder path. ii. Print Server ONLY Staffs, Postgraduate Students and Researchers are authorized to access. iii. Web Server and Multimedia Server Depending on the web system, access is given to only authorize users. The administrator is responsible for ensuring that the network server is backed up at the conclusion of each last day of working day (Friday).
4 Users SHOULD be aware that computer files are NOT private in any Faculty s servers and CAN be accessed or quarantined at any time by the administrator. Employees or volunteers who resign, retire or are terminated will have their access restricted immediately. Failure to comply with these security and privacy policies is grounds for Faculty disciplinary action, including future access can be denied based on abuse of these policies. (staff): Each staff is entitled for 1 UNIMAS address. For FCSIT, the address would appear as: [email protected]. Administrator will help to configure your account once you completely submitted the necessary forms during registration. Your archive will be set to your local hard disk. NOTE: This archive need to be saved together with your id files before you format your PC. Network Access: All users are given 24 hour network access by these 2 forms: Network through Socket Outlet Box - Each room has at least 1 Network Connection, if you need more, please consult the administrator. - Each lab has at least 20 Network Connection depending on the size of the lab. Network through Wireless Access Point - Undergraduate Students are being given a username and password to enable them to access the UNIMAS wireless connection. For in-house wireless access, the Faculty only provides it in the Student Interaction Room (SIR). **Please note that ONLY FCSIT Undergraduate Students are allowed to use it. - Other Faculty members have the same access with additional in-house wireless access to each floor. Please consult the administrator for the in-house access. Use of Computer Lab: There are 29 labs mainly for the usage of the Undergraduate Students, Postgraduate Students and Researchers. Access to the labs is listed below: Labs Name Open Source Lab System Lab Spatial Info 1 Lab Spatial Info 2 Lab Multimedia 1 Lab Multimedia 2 Lab Access
5 Network 1 Lab Network 2 Lab Artificial Intelligence Lab Software Engineering Lab Teaching 1 Lab Teaching 2 Lab General1 1 Lab General 2 Lab Computational System Lab Information System Lab FYP Lab MAIT Lab Info Infra Lab Knowledge System Core Lab Image Processing Lab MAIT Lab PG1 Lab PG2 Lab PG3 Lab Fellow Room IMAST1 Lab IMAST2 Lab IMAST Office Users are NOT ALLOWED to: *Bring any cooked foods inside the labs. This is to avoid unpleasant odours inside the labs. Note that the labs are supplied with centralized air-conditioning systems. *Unplugged any network cables connected to the Desktop PCs in the lab. *Installing any additional hardware such as Access Point, Switches, PC, Notebook, Server and others related, to perform any testing or running projects without any written permission from the Faculty s Technical Committee. *Modify/Install any Operating System/Application Software within the Desktop Computers without the permission from the administrator. *Bringing outsiders into any of the Computer Labs facilities. *Accessing inappropriate web sites and the downloading of offensive materials or restricted files such as multimedia files not relate to teaching/learning on the Internet. * Use the Instructor s PC unless allowed by the administrator or staff on duty. *Make noise or distract others with loud unpleasant PC s sound.
6 Users MUST wear proper attire whenever possible within the University premises as being stressed in the Tatacara Berpakaian UNIMAS rules and regulations. Users MUST wear their ID card at all times in any labs. Users MUST always keep the lab clean at all time and the user is the last person to leave a room, is required to ensure that all electrical outlets are switched off. Purposes for the lab include: *to educate users about computer hardware, software, and file management through hands-on classes and tutoring *to provide access to computers by individuals or any organizations *to provide access to library of computer books, periodicals, and catalogs for user usage *to provide access *to provide Internet access *to enhance learning and program opportunities for all users The labs are ONLY available for use by Faculty of Computer Science and Information Technology registered members or UNIMAS staffs whose staff/student ID, names or personal details have been recorded on file with the office. The administrator WILL schedule the use of the lab for classes, demonstrations and special projects. The lab is open for use when no scheduled activity has been arranged and the resources are available. ONLY staffs with permission from the administrator are allowed access to the keys of all labs. Undergraduate Students WILL NOT be allowed to use the lab without supervision, except for General Lab 1 Lab. Users are NOT permitted to install software onto hard disk drives or remove/change/delete software or files that they did not create. This includes any third party downloading software, any P2P software and other related software. You MUST request from the administrator if you need to install any software that needs administrator privileges on your machine. Users are subject to copyright laws and software license restrictions. Users SHOULD exercise precautions when sending or receiving information over the Internet to prevent viruses, worms, Trojan horses and other potentially damaging software from being transmitted into our network. The access of inappropriate web sites and the downloading of offensive materials on the Internet WILL NOT be tolerated and will subject offenders to suspension of access to the lab.
7 The Faculty MAY change the IT Policy whenever needed with the approval from the Management, with or without notice stating reason for such action.
STCC Hardware & Equipment Policy
STCC Hardware & Equipment Policy The Help Desk will be the primary point of contact for all related support requests. The preferred method of contact is via email at [email protected] or, if email is unavailable,
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
Hardware and Software
Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems
Yale School of Art Digital Technology Office Information
Yale School of Art Digital Technology Office Information Online: http://art.yale.edu/diglab/ Email: [email protected] Phone: 203-432- 9120 Edgewood Email: [email protected] The Digital Technology
Common Student Computing Environment
Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Wimba Pronto. Version 3.1. Administrator Guide
Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring
ResNet services Roles and responsibilities
ResNet services Roles and responsibilities Suppliers: Information and Communication Technology Services (ICTS), Student Housing and Residence Life (SH&RL) Customer: Residents in UCT accommodation managed
Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook
Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES 2012 2013 Program Review
INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES 2012 2013 Program Description Technical Services is a service unit in Information Technology Services. The unit: 1. Acquires and distributes new computing
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy Due to the ever-increasing need for integrated technology and data sharing, and because of legal and ethical
Setup guide. Solution series MG3 Software GENIUSPRO installation
Setup guide Solution series MG3 Software GENIUSPRO installation Solution series MG3 Software GENIUSPRO installation Software installation 2 Printer driver installation 7 Required configuration: Drive
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Law College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
Essentials. IT services for undergraduate and. taught postgraduate students 2015/16
Essentials IT services for undergraduate and taught postgraduate students 2015/16 Getting Started Activate your computing account This guide will help you to get started with the IT services you will use
ICT Acceptable Use Policy
ICT Acceptable Use Policy Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for PLACEMENT TESTING LAB
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for PLACEMENT TESTING LAB IT Services Service Level Agreement:Placement Testing Lab This service level agreement
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC
How to Connect to the SPSS Server (HUSPSS) Using Remote Desktop on a PC What is Remote Desktop? Remote Desktop allows multiple users to access a remote computer or server as if they were sitting in front
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Connecting to the University Wireless Network
Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded
INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
MSD IT High Compliance system Fact sheet
MSD IT High Compliance system Fact sheet The MSD IT High Compliance system is a service for Clinical Trials Units (CTUs) and Medical Division Departments or Units who need to securely access critical applications,
Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar. Network Security Policy
Mountain Ash Comprehensive School Ysgol Gyfun Aberpennar Network Security Policy Updated: September 2010 Next update: September 2013 Table of Contents: Supervised Use page 1 Privacy...page 1 User Access..page
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Before You Begin Installing Your Scanner
Before You Begin Installing Your Scanner We recommend that you confirm the following before installing your scanner: MINIMUM SYSTEM REQUIREMENTS Review the following system and Internet requirements to
CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Imaging Computing Server User Guide
Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E [email protected]
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
Please apply to the DIOS Helpdesk (see Information and communication at the end of this document) for further assistance.
Student manual FSW Secure Access Portal Faculty of Social and Behavioural Sciences FSW Secure Access Portal The FSW Secure Access Portal (short: Portal) provides safe access from outside to the Faculty
Dresden International School Computer and IT Use Policy
Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided
Countering and reducing ICT security risks 1. Physical and environmental risks
Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of
1. Getting Started 2. Installing the Client 3. Logging On 4. Connecting to a Virtual Machine 5. Changing User Preferences 6.
1. Getting Started 2. Installing the Client 3. Logging On 4. Connecting to a Virtual Machine 5. Changing User Preferences 6. Troubleshooting AUM Virtual Lab User Guide -2 Getting Started You will first
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
NetSupport School: Classroom Management
NetSupport School: Classroom Management NetSupport School is a class leading training software solution, providing Teachers with the ability to instruct, monitor and interact with their Students either
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
Information Technology (I.T.)
Location: The Juilliard School Irene Diamond Building Main Office Room: 248 Phone: 212-799-5000 ext. 7121 Email: [email protected] Website: Information Technology Computer Labs There are two computer
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Ohio University Office of Information Technology
Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels
ICT Damage Assessment and Recovery Plan after Cyclone Heta in Niue Islands
ICT Damage Assessment and Recovery Plan after Cyclone Heta in Niue Islands Background Tropical Cyclone Heta (5 January 2004) left behind severe physical damage in Niue, especially in the coastal areas
Updated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: April 2010 Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 8 2. Installing the
Workstation Management
Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described
Print Server Application Guide
Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.
1 Purpose The purpose of this document is to set out the College's policy and provide guidance relating to the responsible use of the College's ICT resources and systems. 2 General 2.1 Belfast Metropolitan
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM
REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM INTRODUCTION In accordance with the 2009 work plan, this report summarizes the results of the Audit & Review Division s annual review of
Comodo LoginPro Software Version 1.5
Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
TECHNICAL SUPPORT. and HARDWARE/SOFTWARE/NETWORK MAINTENANCE. for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS
IT Services Service Level Agreement TECHNICAL SUPPORT and HARDWARE/SOFTWARE/NETWORK MAINTENANCE for LEARNING RESOURCE CENTER MOBILE AND FIXED CLASSROOM WORKSTATIONS IT Services Service Level Agreement:LRC
Procedure Manual. Number: A6Hx2-8.01a. Title: College Network and Software Usage by Employees. Policy Number: 6Hx2-8.01 1 of 21
Policy 6Hx2-8.01 1 of 21 Broward College provides all of its employees with College Network and Internet access so that they can obtain up-to-date information useful to them for the performance of their
