4
User responsibilities policy Jigyanshu Jangid 14030142064 Purpose- Objective: - Employers have responsibilities for the health and safety of their employees. They are also responsible for any visitors to their premises such as customers, suppliers and the general public. To make users accountable for safeguarding their authentication information. It is the purpose of all computing Services' policies to ensure a safe, reliable and fit for purpose computing and IT infrastructure Control User should be required to follow the organizations practices in the use of secret authentication information. Policies-

User responsibilities policy

Embed Size (px)

Citation preview

Page 1: User responsibilities policy

User responsibilities policyJigyanshu Jangid

14030142064

Purpose-

Objective: - Employers have responsibilities for the health and safety of their employees. They are also responsible for any visitors to their premises such as customers, suppliers and the general public.

To make users accountable for safeguarding their authentication information.

It is the purpose of all computing Services' policies to ensure a safe, reliable and fit for purpose computing and IT infrastructure

Control

User should be required to follow the organizations practices in the use of secret authentication information.

Policies- Computer Room and Office PCs-

Never leave computers unattended while logged-in.

Never unplug the network cable from the rear of the computer and/or wall socket.

Regularly backup your data.

Page 2: User responsibilities policy

Do not store data locally. This will prevent loss of data in instances of hardware failure and facilitate the safe re-cloning of the computers.

Copyrighted Materials-

Do not distribute (share) copyrighted materials like music, videos/movies, software, (electronic) data (such as datasets, books, journals, etc.).

Passwords

The login/password combination identifies a single individual and is reserved for that individual, who is personally responsible for it.

when passwords are used as secret authentication information, select quality passwords with sufficient minimum length which are

- Easy to remember

- If temporary, changed at the first log-on.

- Not based on anything somebody else could easily guess or obtain using person related information, e.g. names, telephone number and date of birth etc.

- Using alphabetic and numeric characters.

Not use the same secret authentication information for business and non – business purposes.

Ensure that plant and machinery is safe to use.

Make sure that all materials are handled, stored and used safely.

Provide adequate first aid facilities.

Tell you about any potential hazards from the work you do - chemicals and other substances used by the firm - and give you information, instructions, training and supervision as needed.

Set up emergency plans.

Make sure that ventilation, temperature, lighting, toilet, washing and rest facilities all meet health, safety and welfare requirement.

Check that the right work equipment is provided and is properly used and regularly maintained.

Page 3: User responsibilities policy

Take precautions against the risks caused by flammable or explosive hazards, electrical equipment, noise and radiation.

Never to store any data locally onto the machine (drives C: and D:).

Not to stop any ongoing update process, should this not be running "silently“.

Users have an obligation to install virus scanning software and keep it updated.

Employee is be punctual on your time, for better coordination.

Not to use P2P or any other (sharing) software which may hinder bandwidth and/or breach security.