Uploaded by Ahmed El Shaer

IT Guide

advertisement
Protection of IT Property.
staff and students should take reasonable care of the School property, including computers, printers,
.
communication links, recording media and other associated devices and cannot, use it outside of defined
exceptions, copy or use copyright material without permission.
General Restrictions of Use
• Only authorized staff are to operate or otherwise use the school IT systems.
• All such staff will be issued with unique User Identifications and passwords to access those systems that they
are authorized to use it.
• Authorized users are only to access data and run programs that they are authorized to use;
• The unauthorized use of software, including the unauthorized reading, modification and deletion of data, may
constitute a breach of both these rules and the Computer Misuse Act.
• At the end of duty all employees have to shut down the system and the PC, s before leave.
Authorized Software Usage

Authorized users are to load and run only software that has been properly purchased,
licensed and supplied by the IT department or an approved supplier for use on its IT
Systems.

Under any condition users not allowed to install, any unauthorized programs (without
informing the IT department and get approval.
Authorized Hardware Usage

Authorized users are not allowed to modify, change or otherwise alter the hardware
without permission from the IT Department.
Access Control


All IT systems in company should be protected from unauthorized use by the application of an approved access control program or facility.
.
Authorized users are to select personal passwords comprising at least eight characters and numbers (which do not form a name, characteristics of the user or easily
guessed word), and users are to change in-use passwords when prompted by the System(s).

Authorized users are responsible for the security of their password(s), which are not to be expose to any other person. A temporary password should be provided to any
authorized user required to access any systems on your behalf whilst you are on vacation. This password should be changed immediately upon your return. Attempting
to access systems that you are not authorized to do so by using other people’s passwords or generic passwords is strictly forbidden and will be deemed in breach of
these operating rules..

Supervisory passwords for business critical applications is in high Security level and the Authorized Users must know that this user rights use only in the business need..

Whenever PC’s and workstations are left unattended, authorized users are have to log-out from the system then Log – In after coming back.
Virus Controls

All IT Systems should be protected by an approved and correctly configured and updated anti-virus
software;
authorized users are not to deactivate such controls. Authorized users are responsible for
.
ensuring that all recording media and software received from third parties (other than previously unused
media obtained from the manufacturer) is virus scanned using approved software, prior to it being used
on any Company IT System.
Printer Usage
• All Printing out must be black and white and printed on both sides for all the Departments, color only used for
government (MOI) or learning documents.
• Each employee should has username and password provided from IT department for using multifunction printers’
Back-up & User Data
• Authorized users of PC’s and Workstations should in principal save their work on their very important data in Network Server. Or in the local PC
storage. such as D :\ H or: L\ drives Local saved documents will not be backed-up automatically, and so it is in its entire the responsibility of the
authorized User to make sure a backup is being made.
• The IT Department will back up only the most important data that user save at the Network Server drives.
• Laptop Users who work outside the companies for a lot of days must do locally backup for the important data on external Hard Disk or CD.
External Storage Media
• Authorized users are responsible for the security of removable storage media used on their System(s).
• All USB. ports will be blocked for all users in the organization because the USB Is very dangerous and it can transfer virus to all the network
by using it with unprofessional way in case any employee need to use USB he should contact the IT Department for support.
Email Usage
• Email is to be used for School related to business only. It is NOT to be used for chain letters, seasonal holiday greetings or other personal use.
• All users should adhere to the current Email guidelines which are available from the HR department and are published at regular intervals.
• Authorized users are not allowed to use the personal emails such as Gmail, Yandex , Hotmail Etc.. in work communication.
Removal and Add of IT Equipment
• Authorized users are only to remove IT Systems (including Personal Computers (PC’s), Laptops and notebooks) from School Premises with the
. of their head of department. Users authorized to remove IT equipment for home or remote work are responsible for the physical security
approval
of the System away from Company premises, and the Company reserves the right to seek recovery of any loss attributable to the user’s negligence
If moving a Computer by car, it is recommended that it is placed on the floor in the rear of the car. If the car is to be left unattended, either take the
computer with you or place it out of sight in the lockable car boot.
•
it’s not allowed for any employee to use his personal (PC, laptop, printer, etc.) inside the company network.
• It is not allowed for anyone to purchase any IT equipment without getting approval from the management
Download