Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Six Senses It Policy
1. Six Senses Hideaway Samui
December 14, 2009
Computer use policy: Policy restricting personal use of resort’s computer and/or
resort’s network
IT request form
• Information Technology Department has provided IT request form for all users
to register before using the resort’s computer and e-mail, the intranet and the
internet. The user are group by department and be monitored by Department
. grouped
Head.
Basic computer assessment
• New computer user is required to do basic computer assessment and be
permitted by IT Manager prior to have the right for using resort’s computer
ort’s
equipment.
User password
• For security purpose, each user is issued an account and password. This
password will grant the user access to information based on their job
requirements and security level. Hosts are required to change their network
password every 90 days. Hosts may change their password at any time. If they
believe their password is know by another user, they should change it
immediately. If they require assistance please contact Department Head or IT
Department. In addition, using another’s account or representing another user is
prohibiting. They may be held responsible for any activities of that other person
while using that password.
Internet/intranet
• IT department will provide approved staff with ability to use the intern as
internet
source of global communication and research. Prior to access the internet /
intranet users are required to put their user name and password as strictly by
law. The user must assume responsibility for using internet in an appropriate
manner. The user must remember to focus only on information contained within
the scope of the job function. IT Department will review the information or site
a user has visited.
Any user action that violates the appropriate usage policy may result in revoking
lates
network privileges and may lead to legal action.
ileges
Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
2. Six Senses Hideaway Samui
December 14, 2009
Pornographic Material and Vulgarity – Posting, uploading, or downloading of
pornographic or vulgar message, photos, images, sound files, text files, video
files or related materials is strictly prohibited.
Access to internet user must not remember their username and password for
ser
access to internet to avoid any responsible that was made by other.
Copyrighted
• Unauthorized copying of copyrighted material and installation of any
copyrighted software for user does not have an active license is strictly
prohibited.
Downloading software
• User should be aware that downloading or transmitting software could lead to
civil or criminal actions against the user and the resort
Company confidential information
• Resort confidential information should never be transmitted or forwarded to
outside individuals or companies not authorized to receive that information.
Using laptop or installing computer related hardware
• User may not use laptop and connect to resort network without permission of
network
Department Head or IT Manager. Connecting laptop to resort network may
work
present a security risk or impede operations of resort network, due to the
system was limited of the number of computer.
• Handy drive USB, camera is not all
allowed to use for network security and protect
any damage from virus. Disciplinary action will occur whenever the IT
m
department has found where virus from.
Should some computer equipments are not work properly or damage please inform to
your Department Head or directly report to IT department for further action.
In Addition, if you are unsure as to items appropriateness, consult the Information
Technology Department and / or Department Head. This policy can be amended any
time in order to support the user the work as smooth as possible and to ensure it will
ooth
not effect to the network system.
Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
3. F F F F F
F F F F F F F F
F F F (IT Request form) F F F F
F F F F F F F (Computer basic) F
F F F F F F F F F
F F F F FF
F F F F F F F “Handy drive USB; Camera;
F F F F virus F FF
F
F F Internet F F F F F F F
F F F F F F F F F
F F F F F F F
F F F F F F F F
F F
F F F F F F F ( F F
F F F F
F F F F F F F F F F
F F ) F F F F F F F F
F F F F F
F F F F F F F
F F F F F F F F F
F F F F F F
Computer user policy create by Danai Thongsin http://vaohama.multiply.com Allowed changes to suit your personal
4. Six Senses Hideaway Samui
Information systems manager Job description
Job description
An information systems manager is responsible for the computer systems within a company,
overseeing installation, back up systems operate effectively, purchasing hardware and software,
providing the ICT technology infrastructures for an organization, and contributing to
organizational policy regarding quality standards and strategic planning.
Information systems managers work in every size of organization in industry and the service
sector, usually with a staff of technicians, programmers and database administrators reporting
to them.
Although the title of information systems manager is becoming more commonly used within the
ICT sector, job titles may vary, for example, you might be a service delivery manager in a non-
profit organization and a function manager in a financial institution.
Typical work activities
Information systems managers are responsible for the implementation of technology within an
organization and direct the work of systems/business analysts, computer programmers, support
specialists, and other computer-related workers. The post holder will usually be an experienced
worker with technical expertise coupled with an understanding of business and management
principles. Duties within the role are ultimately dependent on the employing organization and the
complexity of its information systems.
Standard activities are likely to include:
• evaluating user needs and system functionality and ensuring that ICT facilities meet
these needs;
• planning, developing and implementing the ICT budget, obtaining competitive prices from
suppliers where appropriate, to ensure cost effectiveness;
• scheduling upgrades and security backups of hardware and software systems;
• researching and installing new systems;
• ensuring the smooth running of all ICT systems, including anti-virus software, print
services and email provision;
• ensuring that software licensing laws are adhered to;
• providing secure access to the network for remote users;
• ensuring the security of data from internal and external attack;
• providing users with appropriate support and advice;
• managing crisis situations, which may involve complex technical hardware or software
problems;
Danai Thongsin IT Manager 2008 Page 1
5. Six Senses Hideaway Samui
• mentoring and training new ICT support staff;
• Keeping up to date with the latest technologies.
Companies going through business process re-engineering may well look to the information
systems manager to deal with change management. This requires an understanding of the
capabilities and constraints of technology and resource implications in terms of budgets, plus
the training and recruitment of specialist staff.
Danai Thongsin IT Manager 2008 Page 2
6. Six Senses Hideaway Samui
IT technical support Job description and activities
IT technical support officers monitor and maintain the computer systems and networks
of an organization. They install and configure computer systems, diagnose hardware/software
faults and solve technical problems, either over the phone or face-to-face.
Organizations rely on accessing information via computers. Problems may arise through
systems failure, operator error or user misunderstanding. Businesses cannot afford to be
without the whole system, or individual workstations, for more than the minimum time taken to
repair or replace them.
Technical support officers are sometimes known as help desk operators, technicians or
maintenance engineers. The work is as much about understanding how packages are used as
applying detailed technical knowledge.
Typical work activities
In essence, technical support officers are responsible for ensuring the smooth running of
computer systems. Tasks vary depending on the size and structure of the organization, but will
typically include:
• installing and configuring computer systems;
• monitoring and maintaining computer systems and networks;
• talking staff/clients through a series of actions, either face to face or over the
telephone;
• troubleshooting system and network problems and diagnosing and solving
hardware/software faults;
• finding solutions to problems, be it through creating a desktop shortcut or fixing a
major fault on the operating system;
• replacing parts as required;
• providing support, including procedural, documentation;
• following diagrams and written instructions to repair a fault or set up a system;
• running network applications to support systems and users; Helpdesk support
• supporting new applications;
• setting up new users;
• responding within agreed time limits to call-outs;
• working continuously on a task until completion (or referral to third parties, if
appropriate);
• prioritizing and managing several open cases at one time;
• rapidly establishing a good working relationship with other professionals (e.g., contract
businesses) in order to make necessary repairs;
• testing and evaluating new technology;
• Conducting electrical safety checks on computer equipment.
• Provide client support and technical issue resolution via E-Mail, phone and other
electronic medium.
Danai Thongsin IT Manager 2008
7. Six Senses Hideaway Samui
• Configuration of client's equipment to connect to the Internet via modem/DSL Router
(Dialup/DSL customers only).
• Configure software to connect to Internet application servers.
• Provide training to clients in the use of system and applications as related to Internet.
• Obtain general understanding of OS and application operations related to company
offered services.
• Identify and correct or advise, on operational issues in client computer systems.
• Perform light lifting 25lbs.
• Perform creation of new accounts using company provide software tools.
Computer Skills:
To perform this job successfully, an individual should have knowledge of Contact
Management systems; Database software; Internet software; Word Processing software, and
Firewall network protect system,
Qualifications:
To perform this job successfully, an individual must be able to perform each essential duty
satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or
ability required.
Danai Thongsin IT Manager 2008