ISSC351 Lab Liaison and computer technicians are primarily

ISSC351 – Week
4

Your name:
Brian Poe

 

COMPANY’S COMPUTER LAB OVERVIEW

 

            One of our main objectives is to
provide reasonable access to computer resources provided by the company and to
ensure to maintain an atmosphere that is appropriate for the working environment
and its employees. The following policies and procedures have been approved and
applied. In order to provide a consistent standard, the appropriate security
measures for accessing and authentication to the company’s network is strictly
enforced. The company computer labs will be used by company staff and employees
for their work-related activities only.

 

COMPUTER LAB PROCESSES

 

            The Lab Liaison will help any
personnel will accessing the computer lab for use. The Lab Liaison and computer
technicians are primarily responsible for the upkeep and maintenance of the
computer lab. They will enforce all policies, procedures and operations of the
computer lab and as staff and employees your use of the computer labs
constitutes your consent with following the rules and their instructions. For
any reason, you failed to follow the rules and instructions given, disciplinary
actions will commence and your employee computer access privileges will be
revoked. If you require any assistance during your use of the computer lab, you
are to seek assistance from the Lab Liaison or computer technicians.

 

PROCEDURE FOR ACCESSING THE COMPUTER LAB

 

1)    Request a computer number from the Lab
Liaison for computer use.

 

2)    Provide the Lab Liaison your employee
badge to receive the computer number.

 

3)    Upon receiving the computer number, the
user will access the computer desktop and browser by entering the password
annotated on their computer number.

 

4)    When done with using the computer, the
user will return the computer number in order to receive back their employee
badge.

 

 

RULES OF CONDUCT AND COURTESIES

 

1)    Food, drinks and tobacco – eating,
drinking, or using tobacco products is prohibited.

 

2)    Accessing, downloading, or reading pornographic,
profane or obscene material is strictly prohibited.

 

3)   
Loud
noises – Participating in behavior or activities that disturb other users or
interfere with the operations of the laboratory is not allowed. This includes,
but is not limited to loud, talking music, or using computer labs to make
meetings. Disruptive, for example talking loudly, crying, laughing or cursing
is not tolerated. Make your conversations with others in a quiet way that does
not disturb the work of other users in the computer lab. If you become
disruptive, you will be asked to leave.

 

4)   
Cell
Phone Usage – All cell phones must be turned off or silent (vibrate mode) while
in the laboratory. If you receive a phone call, you must exit the computer lab
before answering your mobile phone and continue your conversation somewhere
outside the computer lab.

 

5)    Excessive printing of large documents –
prints not work-related files in the computer lab is prohibited. Printing more
than 10 pages are prohibited.

 

6)    Duplicating software – Unauthorized
copies of software under license from the computer lab hard drives or servers
is a violation of federal copyright laws. Software license agreements and
copyright laws will be strictly applied in computer lab.

 

7)   
Saving
files – documents and files of any kind saved on the hard disk of the computer will
be automatically deleted. Data files created in the computer lab must be directly
saved to a floppy disk, USB drive or a CD.

 

8)   
Change
the Hardware Configurations and software – hardware and software changing configurations
in the computer labs are prohibited. This includes changes to the settings, the
printer’s configuration and modification of the software of the system. Those
who violate this policy will be referred to the competent authority for
appropriate action, which may include the loss of the computer privileges.

 

9)    The following types of activities are
examples of behavior that are unacceptable, and which, in some cases, may
violate state law or federal:

 

a.           
 Access to another account, directory, files
private or e ? mail
without permission of the owner.

 

b.           
 Distort its own identity in the electronic
communication. Violate copyright and/or software agreements.

 

c.           
 The use of computing resources to threaten or
harass others. Violate lab and the political systems, procedures and Protocol. Violation
of these rules can lead to the revocation of the privileges of laboratory
and/or disciplinary action

 

CONSEQUENCES:

 

Violations of
rules and regulations that the above will result in disciplinary action.
Disciplinary action will include, but is not limited to:

 

1)   
Given
a verbal warning.

2)   
Asked
to leave the computer lab.

 

3)   
Your
name being given to the competent authorities of the appropriate measures that
could result in loss of privileges to the computer, or terminated from the
company.

 

Reference