Site Loader
Rock Street, San Francisco

ISSC351 – Week
4

Your name:
Brian Poe

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

COMPANY’S COMPUTER LAB OVERVIEW

 

            One of our main objectives is to
provide reasonable access to computer resources provided by the company and to
ensure to maintain a professional atmosphere that is appropriate for the
working environment and its employees. The following policies and procedures
have been approved and applied. In order to provide a consistent standard, the
appropriate security measures for accessing and authentication to the company’s
network is strictly enforced. The company computer labs will be used by company
internal staff and employees for their work-related activities only.

 

COMPUTER LAB PROCESSES

 

            The Lab Liaison will help any
personnel will accessing the computer lab for use. The Lab Liaison and computer
technicians are primarily responsible for the upkeep and maintenance of the
computer lab. They will enforce all policies, procedures, and operations of the computer lab and as staff
and employees, your use of the computer
labs constitutes your consent with following the rules and their instructions.
For any reason, you failed to follow the rules and instructions given,
disciplinary actions will commence and your employee computer access privileges
will be revoked. If you require any assistance during your use of the computer
lab, you are to seek assistance from the Lab Liaison or computer technicians.

 

PROCEDURE FOR ACCESSING THE COMPUTER LAB

 

1)    Request a computer number from the Lab
Liaison for computer use.

 

2)    Provide the Lab Liaison your employee
badge to receive the computer number.

 

3)    Upon receiving the computer number, the
user will access the computer desktop and browser by entering the password
annotated on their computer number.

 

4)    When done with using the computer, the
user will return the computer number in order to receive back their employee
badge.

 

 

RULES OF CONDUCT AND COURTESIES

 

1)    Food, drinks, and tobacco – eating, drinking, or using tobacco products are prohibited.

 

2)    Accessing, downloading, or reading pornographic,
obscene or profane material is strictly prohibited.

 

3)   
Loud
noises – Participating in behavior or activities that disturb other users or
interfere with the operations of the laboratory is not allowed. This includes,
but is not limited to, loud talking, playing music, or unnecessary noise making.
Disruptive, for example, talking loudly,
crying, laughing or cursing is not tolerated. Make your conversations with
others in a quiet way that does not disturb the work of other users in the
computer lab. If you become disruptive, you will be asked to leave.

 

4)   
Cell
Phone Usage – All cell phones must be turned off or silent (vibrate mode) while
in the laboratory. If you receive a phone call, you must exit the computer lab
before answering any mobile phone and continue your conversation somewhere
outside the computer lab.

 

5)    Excessive printing of large documents –
prints not work-related files in the computer lab is prohibited. Printing more
than 10 pages are prohibited.

 

6)    Duplicating software – Unauthorized
copies of software under license from the computer lab hard drives or servers
is a violation of federal copyright laws. Copy right laws and software license
agreements will be strictly applied in the computer
lab.

 

7)   
Saving
files – documents and files of any kind saved on the hard disk of the computer will
be automatically deleted. Data files created in the computer lab must be directly
saved to a floppy disk, USB drive or a CD.

 

8)   
Change
the Hardware Configurations and software – hardware and software changing configurations
in the computer labs are prohibited. This includes changes to the settings, the
printer’s configuration and modification of the software of the system. Those
who violate this policy will be referred to the official authority for suitable
adverse action, which may include the loss of the computer privileges.

 

9)    The following types of activities are
examples of behavior that are unacceptable, and which, in some cases, may
violate federal or state law:

 

a.           
 Access to another account, directory, files
private or email without permission of the
owner.

 

b.           
 Distort its own identity in the electronic
communication. Violate copyright and/or software agreements.

 

c.           
 The use of computing resources to threaten or
harass others. Violate lab and the political systems, procedures, and Protocol. Violation of these rules can lead
to the revocation of the privileges of laboratory and/or disciplinary action

 

CONSEQUENCES:

 

Violations of
rules and regulations that the above will result in disciplinary action.
Disciplinary action will include, but is not limited to:

 

1)   
Given
a verbal warning.

2)   
Asked
to leave the computer lab.

 

3)   
Your
name is given to the competent
authorities of the appropriate measures that could result in loss of privileges
to the computer, or terminated from the company.

 

Reference

 

Post Author: admin

x

Hi!
I'm Jeremy!

Would you like to get a custom essay? How about receiving a customized one?

Check it out