SlideShare a Scribd company logo
1 of 7
Download to read offline
Six Senses Hideaway Samui
                                       December 14, 2009
Computer use policy: Policy restricting personal use of resort’s computer and/or
resort’s network




IT request form

    •   Information Technology Department has provided IT request form for all users
        to register before using the resort’s computer and e-mail, the intranet and the
        internet. The user are group by department and be monitored by Department
                .              grouped
        Head.

Basic computer assessment

    •   New computer user is required to do basic computer assessment and be
        permitted by IT Manager prior to have the right for using resort’s computer
                                                                     ort’s
        equipment.

User password

    •   For security purpose, each user is issued an account and password. This
        password will grant the user access to information based on their job
        requirements and security level. Hosts are required to change their network
        password every 90 days. Hosts may change their password at any time. If they
        believe their password is know by another user, they should change it
        immediately. If they require assistance please contact Department Head or IT
        Department. In addition, using another’s account or representing another user is
        prohibiting. They may be held responsible for any activities of that other person
        while using that password.

Internet/intranet

    •   IT department will provide approved staff with ability to use the intern as
                                                                          internet
        source of global communication and research. Prior to access the internet /
        intranet users are required to put their user name and password as strictly by
        law. The user must assume responsibility for using internet in an appropriate
        manner. The user must remember to focus only on information contained within
        the scope of the job function. IT Department will review the information or site
        a user has visited.


        Any user action that violates the appropriate usage policy may result in revoking
                                lates
        network privileges and may lead to legal action.
                    ileges



Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
Six Senses Hideaway Samui
                                       December 14, 2009
        Pornographic Material and Vulgarity – Posting, uploading, or downloading of
        pornographic or vulgar message, photos, images, sound files, text files, video
        files or related materials is strictly prohibited.


        Access to internet user must not remember their username and password for
                            ser
        access to internet to avoid any responsible that was made by other.

    Copyrighted

    •   Unauthorized copying of copyrighted material and installation of any
        copyrighted software for user does not have an active license is strictly
        prohibited.



    Downloading software

    •   User should be aware that downloading or transmitting software could lead to
        civil or criminal actions against the user and the resort

    Company confidential information

    •   Resort confidential information should never be transmitted or forwarded to
        outside individuals or companies not authorized to receive that information.

    Using laptop or installing computer related hardware

    •   User may not use laptop and connect to resort network without permission of
                                                      network
        Department Head or IT Manager. Connecting laptop to resort network may
                                                                      work
        present a security risk or impede operations of resort network, due to the
        system was limited of the number of computer.


    •   Handy drive USB, camera is not all
                                       allowed to use for network security and protect
        any damage from virus. Disciplinary action will occur whenever the IT
                      m
        department has found where virus from.

Should some computer equipments are not work properly or damage please inform to
your Department Head or directly report to IT department for further action.

In Addition, if you are unsure as to items appropriateness, consult the Information
Technology Department and / or Department Head. This policy can be amended any
time in order to support the user the work as smooth as possible and to ensure it will
                                                ooth
not effect to the network system.




Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
F                                                                                       F F                                                                                                                              F                                                                                           F
                                                                                                        F               F                                                                       F                                F                   F                                               F F                                                                                           F
         F                                                         F                                                                                                                        F (IT Request form)                                                                                                                      F               F                             F                                         F

     F F                                                                                                                                    F F                 F                                                                                                            F                             F (Computer basic)                                                                                                            F
                                       F                                                                                            F F                             F                                                                                    F                                                                       F                                               F F           F

                               F                                                                    F                                       F                                           F                                                                            FF

                                                                   F F F                                        F                                                               F                                                                            F                                       F “Handy drive USB; Camera;
             F F                                                                           F                                            F                                                                                                                            virus                                                                                                   F                                                                                        FF
                                                                                                                                                                                                                                         F

                       F           F                               Internet                                                                                                                                 F                        F                                           F                           F                           F                                                                       F                                                F
 F                                                                         F                                                F                                                               F F                                              F                   F                       F                                                                                                                                                       F
                                                               F               F                                    F                                                                                                                                                                        F                                                                                                                                                               F F           F
                                                                       F           F                                                        F F                                                                     F                                                                                                                                                    F             F                                 F
                                                   F                                                                                                                                                                                                                     F

                                                                                               F F                                                          F                                                                   F F F                                F                                                                                   (                                                                                   F                F
                                               F                                                                                                                                                                                                                                                                                             F                                                         F                         F
                                           F                                                                        F F                                                                                 F                                                                            F                               F                           F           F                                                 F F
     F                                                     F                       ) F                                              F               F                                               F                                                                                            F                                                       F       F                         F
                                                       F                                                                                                                    F                                                                    F                                                               F                                                                                                                                       F



                           F                                                                                                                                            F                   F                   F                                                                                     F                                                                                                    F                                         F
                                                                                                            F                                           F                                                               F       F F                                                                                          F                                       F                                                               F                                         F
                   F                                                                   F                                        F               F                                   F                                       F




Computer user policy create by Danai Thongsin http://vaohama.multiply.com Allowed changes to suit your personal
Six Senses Hideaway Samui




           Information systems manager Job description
Job description

 An information systems manager is responsible for the computer systems within a company,
overseeing installation, back up systems operate effectively, purchasing hardware and software,
providing the ICT technology infrastructures for an organization, and contributing to
organizational policy regarding quality standards and strategic planning.

 Information systems managers work in every size of organization in industry and the service
sector, usually with a staff of technicians, programmers and database administrators reporting
to them.

 Although the title of information systems manager is becoming more commonly used within the
ICT sector, job titles may vary, for example, you might be a service delivery manager in a non-
profit organization and a function manager in a financial institution.

Typical work activities

 Information systems managers are responsible for the implementation of technology within an
organization and direct the work of systems/business analysts, computer programmers, support
specialists, and other computer-related workers. The post holder will usually be an experienced
worker with technical expertise coupled with an understanding of business and management
principles. Duties within the role are ultimately dependent on the employing organization and the
complexity of its information systems.


Standard activities are likely to include:

    •   evaluating user needs and system functionality and ensuring that ICT facilities meet
        these needs;
    •   planning, developing and implementing the ICT budget, obtaining competitive prices from
        suppliers where appropriate, to ensure cost effectiveness;
    •   scheduling upgrades and security backups of hardware and software systems;
    •   researching and installing new systems;
    •   ensuring the smooth running of all ICT systems, including anti-virus software, print
        services and email provision;
    •   ensuring that software licensing laws are adhered to;
    •   providing secure access to the network for remote users;
    •   ensuring the security of data from internal and external attack;
    •   providing users with appropriate support and advice;
    •   managing crisis situations, which may involve complex technical hardware or software
        problems;

Danai Thongsin IT Manager 2008                                                              Page 1
Six Senses Hideaway Samui


    •   mentoring and training new ICT support staff;
    •   Keeping up to date with the latest technologies.

Companies going through business process re-engineering may well look to the information
systems manager to deal with change management. This requires an understanding of the
capabilities and constraints of technology and resource implications in terms of budgets, plus
the training and recruitment of specialist staff.




Danai Thongsin IT Manager 2008                                                              Page 2
Six Senses Hideaway Samui



       IT technical support Job description and activities
       IT technical support officers monitor and maintain the computer systems and networks
of an organization. They install and configure computer systems, diagnose hardware/software
faults and solve technical problems, either over the phone or face-to-face.


       Organizations rely on accessing information via computers. Problems may arise through
systems failure, operator error or user misunderstanding. Businesses cannot afford to be
without the whole system, or individual workstations, for more than the minimum time taken to
repair or replace them.

Technical support officers are sometimes known as help desk operators, technicians or
maintenance engineers. The work is as much about understanding how packages are used as
applying detailed technical knowledge.


Typical work activities

In essence, technical support officers are responsible for ensuring the smooth running of
computer systems. Tasks vary depending on the size and structure of the organization, but will
typically include:

   •    installing and configuring computer systems;
   •    monitoring and maintaining computer systems and networks;
   •    talking staff/clients through a series of actions, either face to face or over the
        telephone;
   •    troubleshooting system and network problems and diagnosing and solving
        hardware/software faults;
   •    finding solutions to problems, be it through creating a desktop shortcut or fixing a
        major fault on the operating system;
   •    replacing parts as required;
   •    providing support, including procedural, documentation;
   •    following diagrams and written instructions to repair a fault or set up a system;
   •    running network applications to support systems and users; Helpdesk support
   •    supporting new applications;
   •    setting up new users;
   •    responding within agreed time limits to call-outs;
   •    working continuously on a task until completion (or referral to third parties, if
        appropriate);
   •    prioritizing and managing several open cases at one time;
   •    rapidly establishing a good working relationship with other professionals (e.g., contract
        businesses) in order to make necessary repairs;
   •    testing and evaluating new technology;
   •    Conducting electrical safety checks on computer equipment.
   •    Provide client support and technical issue resolution via E-Mail, phone and other
        electronic medium.



Danai Thongsin IT Manager 2008
Six Senses Hideaway Samui


    •   Configuration of client's equipment to connect to the Internet via modem/DSL Router
        (Dialup/DSL customers only).
    •   Configure software to connect to Internet application servers.
    •   Provide training to clients in the use of system and applications as related to Internet.
    •   Obtain general understanding of OS and application operations related to company
        offered services.
    •   Identify and correct or advise, on operational issues in client computer systems.
    •   Perform light lifting 25lbs.
    •   Perform creation of new accounts using company provide software tools.


Computer Skills:
    To perform this job successfully, an individual should have knowledge of Contact
Management systems; Database software; Internet software; Word Processing software, and
Firewall network protect system,

Qualifications:

    To perform this job successfully, an individual must be able to perform each essential duty
satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or
ability required.




Danai Thongsin IT Manager 2008

More Related Content

What's hot

Microsoft word แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
Microsoft word   แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อยMicrosoft word   แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
Microsoft word แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
นิตยา ทองดียิ่ง
 
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าวแบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
นิตยา ทองดียิ่ง
 
Microsoft word ข้อสอบปลายภาคที่ 1 มอหกปี2555
Microsoft word   ข้อสอบปลายภาคที่  1 มอหกปี2555Microsoft word   ข้อสอบปลายภาคที่  1 มอหกปี2555
Microsoft word ข้อสอบปลายภาคที่ 1 มอหกปี2555
นิตยา ทองดียิ่ง
 
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
krunok2555
 
เซลล์ของสิ่งมีชีวิต
เซลล์ของสิ่งมีชีวิตเซลล์ของสิ่งมีชีวิต
เซลล์ของสิ่งมีชีวิต
Thanyamon Chat.
 
15ไฟฟ้าสถิต
15ไฟฟ้าสถิต15ไฟฟ้าสถิต
15ไฟฟ้าสถิต
Doc Edu
 
16ไฟฟ้าและแม่เหล็ก1
16ไฟฟ้าและแม่เหล็ก116ไฟฟ้าและแม่เหล็ก1
16ไฟฟ้าและแม่เหล็ก1
Doc Edu
 
Power pointvanakade
Power pointvanakadePower pointvanakade
Power pointvanakade
phatchareeya
 
2ข้อเสนอควบคุมค่ายาcsmbs131109
2ข้อเสนอควบคุมค่ายาcsmbs1311092ข้อเสนอควบคุมค่ายาcsmbs131109
2ข้อเสนอควบคุมค่ายาcsmbs131109
Nithimar Or
 
โครงงานกระเช้าสบู่ไล่ยุง
โครงงานกระเช้าสบู่ไล่ยุงโครงงานกระเช้าสบู่ไล่ยุง
โครงงานกระเช้าสบู่ไล่ยุง
wirasinee06
 

What's hot (18)

Microsoft word แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
Microsoft word   แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อยMicrosoft word   แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
Microsoft word แบบฝึกอ่านนิทานเรื่องธาตุก่องข้าวน้อย
 
Microsoft word แบบฝึกตำรา
Microsoft word   แบบฝึกตำราMicrosoft word   แบบฝึกตำรา
Microsoft word แบบฝึกตำรา
 
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าวแบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
แบบฝึกทักษะการอ่านอย่างมีวิจารณญาณจากข่าว
 
Microsoft word ข้อสอบปลายภาคที่ 1 มอหกปี2555
Microsoft word   ข้อสอบปลายภาคที่  1 มอหกปี2555Microsoft word   ข้อสอบปลายภาคที่  1 มอหกปี2555
Microsoft word ข้อสอบปลายภาคที่ 1 มอหกปี2555
 
Microsoft word หนึ่งแสนครูดี
Microsoft word   หนึ่งแสนครูดีMicrosoft word   หนึ่งแสนครูดี
Microsoft word หนึ่งแสนครูดี
 
พื้นฐานการออกแบบโปรแกรม
พื้นฐานการออกแบบโปรแกรมพื้นฐานการออกแบบโปรแกรม
พื้นฐานการออกแบบโปรแกรม
 
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
แบบฝึกหัดเรื่องการเคลื่อนที่ ชุดที่ 1 และ 2
 
การคัดออก
การคัดออกการคัดออก
การคัดออก
 
เซลล์ของสิ่งมีชีวิต
เซลล์ของสิ่งมีชีวิตเซลล์ของสิ่งมีชีวิต
เซลล์ของสิ่งมีชีวิต
 
Thai
ThaiThai
Thai
 
15ไฟฟ้าสถิต
15ไฟฟ้าสถิต15ไฟฟ้าสถิต
15ไฟฟ้าสถิต
 
16ไฟฟ้าและแม่เหล็ก1
16ไฟฟ้าและแม่เหล็ก116ไฟฟ้าและแม่เหล็ก1
16ไฟฟ้าและแม่เหล็ก1
 
Power pointvanakade
Power pointvanakadePower pointvanakade
Power pointvanakade
 
20100623 hla-b1502
20100623 hla-b150220100623 hla-b1502
20100623 hla-b1502
 
9789740329398
97897403293989789740329398
9789740329398
 
2ข้อเสนอควบคุมค่ายาcsmbs131109
2ข้อเสนอควบคุมค่ายาcsmbs1311092ข้อเสนอควบคุมค่ายาcsmbs131109
2ข้อเสนอควบคุมค่ายาcsmbs131109
 
โครงงานกระเช้าสบู่ไล่ยุง
โครงงานกระเช้าสบู่ไล่ยุงโครงงานกระเช้าสบู่ไล่ยุง
โครงงานกระเช้าสบู่ไล่ยุง
 
Microsoft word ระบบสุริยะ
Microsoft word   ระบบสุริยะMicrosoft word   ระบบสุริยะ
Microsoft word ระบบสุริยะ
 

Viewers also liked (18)

TY08BSOoverview
TY08BSOoverviewTY08BSOoverview
TY08BSOoverview
 
Java易犯错误
Java易犯错误Java易犯错误
Java易犯错误
 
CV Luiz Souza
CV Luiz SouzaCV Luiz Souza
CV Luiz Souza
 
oops09
oops09oops09
oops09
 
Compete for London 2012 Contracts
Compete for London 2012 ContractsCompete for London 2012 Contracts
Compete for London 2012 Contracts
 
New Study Of Gita Nov 9 Dr Shriniwas J Kashalikar
New Study Of Gita Nov 9  Dr  Shriniwas J  KashalikarNew Study Of Gita Nov 9  Dr  Shriniwas J  Kashalikar
New Study Of Gita Nov 9 Dr Shriniwas J Kashalikar
 
My Top New Year’S Resolution Animoto
My Top New Year’S Resolution   AnimotoMy Top New Year’S Resolution   Animoto
My Top New Year’S Resolution Animoto
 
M A L E A N D F E M A L E D R S H R I N I W A S K A S H A L I K A R
M A L E  A N D  F E M A L E  D R  S H R I N I W A S  K A S H A L I K A RM A L E  A N D  F E M A L E  D R  S H R I N I W A S  K A S H A L I K A R
M A L E A N D F E M A L E D R S H R I N I W A S K A S H A L I K A R
 
可及性——化龙
可及性——化龙可及性——化龙
可及性——化龙
 
Consuelo garcia garcia miguel hernandez valladolid
Consuelo garcia garcia miguel hernandez valladolidConsuelo garcia garcia miguel hernandez valladolid
Consuelo garcia garcia miguel hernandez valladolid
 
Java安全性编程实例
Java安全性编程实例Java安全性编程实例
Java安全性编程实例
 
Java优化编程
Java优化编程Java优化编程
Java优化编程
 
php-and-zend-framework-getting-started
php-and-zend-framework-getting-startedphp-and-zend-framework-getting-started
php-and-zend-framework-getting-started
 
Making%20R%20Packages%20Under%20Windows
Making%20R%20Packages%20Under%20WindowsMaking%20R%20Packages%20Under%20Windows
Making%20R%20Packages%20Under%20Windows
 
InSTEDD
InSTEDDInSTEDD
InSTEDD
 
roundtrip_edit
roundtrip_editroundtrip_edit
roundtrip_edit
 
M A R R I A G E & M U T U A L B L O S S O M I N G D R
M A R R I A G E &  M U T U A L  B L O S S O M I N G   D RM A R R I A G E &  M U T U A L  B L O S S O M I N G   D R
M A R R I A G E & M U T U A L B L O S S O M I N G D R
 
Reporteeeeeeee finaaaaaaaallll
Reporteeeeeeee finaaaaaaaallllReporteeeeeeee finaaaaaaaallll
Reporteeeeeeee finaaaaaaaallll
 

Similar to Six Senses It Policy

Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
Danai Thongsin
 
วารสารทันตภูธร เล่ม2 ปี2551
วารสารทันตภูธร เล่ม2 ปี2551วารสารทันตภูธร เล่ม2 ปี2551
วารสารทันตภูธร เล่ม2 ปี2551
Nithimar Or
 
2553 3-dr kalaya-policy
2553 3-dr kalaya-policy2553 3-dr kalaya-policy
2553 3-dr kalaya-policy
ps-most
 
4.plan of-the nationaleconomicandsocial
4.plan of-the nationaleconomicandsocial4.plan of-the nationaleconomicandsocial
4.plan of-the nationaleconomicandsocial
ps-most
 
2553 5-planof national economicandsocial
2553 5-planof national economicandsocial2553 5-planof national economicandsocial
2553 5-planof national economicandsocial
ps-most
 
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาลบทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
Sll Somchang
 
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
Nithimar Or
 
วารสารทันตภูธร 1-2550
วารสารทันตภูธร 1-2550วารสารทันตภูธร 1-2550
วารสารทันตภูธร 1-2550
Nithimar Or
 
15 ไฟฟ้าสถิต
15 ไฟฟ้าสถิต15 ไฟฟ้าสถิต
15 ไฟฟ้าสถิต
topofzeed
 
วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551
Nithimar Or
 
วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551
Nithimar Or
 
สุดยอดความสำเร็จขององค์กร
สุดยอดความสำเร็จขององค์กรสุดยอดความสำเร็จขององค์กร
สุดยอดความสำเร็จขององค์กร
DrDanai Thienphut
 
วารสารทันตภูธร เล่ม1 ปี2553
วารสารทันตภูธร เล่ม1 ปี2553วารสารทันตภูธร เล่ม1 ปี2553
วารสารทันตภูธร เล่ม1 ปี2553
Nithimar Or
 

Similar to Six Senses It Policy (20)

Thailand Internet User Profile 2009
Thailand Internet User Profile 2009Thailand Internet User Profile 2009
Thailand Internet User Profile 2009
 
Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
 
Nsl No 99
Nsl No 99Nsl No 99
Nsl No 99
 
Fair use
Fair useFair use
Fair use
 
วารสารทันตภูธร เล่ม2 ปี2551
วารสารทันตภูธร เล่ม2 ปี2551วารสารทันตภูธร เล่ม2 ปี2551
วารสารทันตภูธร เล่ม2 ปี2551
 
2553 3-dr kalaya-policy
2553 3-dr kalaya-policy2553 3-dr kalaya-policy
2553 3-dr kalaya-policy
 
4.plan of-the nationaleconomicandsocial
4.plan of-the nationaleconomicandsocial4.plan of-the nationaleconomicandsocial
4.plan of-the nationaleconomicandsocial
 
2553 5-planof national economicandsocial
2553 5-planof national economicandsocial2553 5-planof national economicandsocial
2553 5-planof national economicandsocial
 
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาลบทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
บทที่ 1การบริหารงานบุคคลสำหรับพนักงานครูเทศบาล
 
15448 1
15448 115448 1
15448 1
 
Charismatic Marketing 2
Charismatic Marketing 2Charismatic Marketing 2
Charismatic Marketing 2
 
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
1แผนพัฒนามาตรการควบคุมค่าใช้จ่ายด้านยาและรุปแบบการจ่าย
 
Hoan ngoc
Hoan ngocHoan ngoc
Hoan ngoc
 
วารสารทันตภูธร 1-2550
วารสารทันตภูธร 1-2550วารสารทันตภูธร 1-2550
วารสารทันตภูธร 1-2550
 
Climate Variability
Climate VariabilityClimate Variability
Climate Variability
 
15 ไฟฟ้าสถิต
15 ไฟฟ้าสถิต15 ไฟฟ้าสถิต
15 ไฟฟ้าสถิต
 
วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551
 
วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551วารสารทันตภูธร เล่ม1 ปี2551
วารสารทันตภูธร เล่ม1 ปี2551
 
สุดยอดความสำเร็จขององค์กร
สุดยอดความสำเร็จขององค์กรสุดยอดความสำเร็จขององค์กร
สุดยอดความสำเร็จขององค์กร
 
วารสารทันตภูธร เล่ม1 ปี2553
วารสารทันตภูธร เล่ม1 ปี2553วารสารทันตภูธร เล่ม1 ปี2553
วารสารทันตภูธร เล่ม1 ปี2553
 

More from Danai Thongsin

สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อ
Danai Thongsin
 
Delete the email id to deny access of emails
Delete the email id to deny access of emailsDelete the email id to deny access of emails
Delete the email id to deny access of emails
Danai Thongsin
 
Creating email id for access the emails
Creating email   id for access the emailsCreating email   id for access the emails
Creating email id for access the emails
Danai Thongsin
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284
Danai Thongsin
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อ
Danai Thongsin
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยว
Danai Thongsin
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
Danai Thongsin
 

More from Danai Thongsin (20)

3CX Powerful APP
3CX Powerful APP3CX Powerful APP
3CX Powerful APP
 
3cx interface
3cx interface3cx interface
3cx interface
 
สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อ
 
DNSSystemServicesLTD
DNSSystemServicesLTDDNSSystemServicesLTD
DNSSystemServicesLTD
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgement
 
social media policy
social media policysocial media policy
social media policy
 
Delete the log in id
Delete the log in idDelete the log in id
Delete the log in id
 
Delete the email id to deny access of emails
Delete the email id to deny access of emailsDelete the email id to deny access of emails
Delete the email id to deny access of emails
 
Creating email id for access the emails
Creating email   id for access the emailsCreating email   id for access the emails
Creating email id for access the emails
 
Creating log in id to access the server
Creating log in id to access the serverCreating log in id to access the server
Creating log in id to access the server
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedure
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284
 
Cctv
CctvCctv
Cctv
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อ
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจ
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยว
 
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
ภัยจากเครื่องคัดลอกข้อมูลบัตรอิเล็กทรอนิกส์
 
ระเบียบ
ระเบียบระเบียบ
ระเบียบ
 
It samui club letter
It samui club   letterIt samui club   letter
It samui club letter
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Six Senses It Policy

  • 1. Six Senses Hideaway Samui December 14, 2009 Computer use policy: Policy restricting personal use of resort’s computer and/or resort’s network IT request form • Information Technology Department has provided IT request form for all users to register before using the resort’s computer and e-mail, the intranet and the internet. The user are group by department and be monitored by Department . grouped Head. Basic computer assessment • New computer user is required to do basic computer assessment and be permitted by IT Manager prior to have the right for using resort’s computer ort’s equipment. User password • For security purpose, each user is issued an account and password. This password will grant the user access to information based on their job requirements and security level. Hosts are required to change their network password every 90 days. Hosts may change their password at any time. If they believe their password is know by another user, they should change it immediately. If they require assistance please contact Department Head or IT Department. In addition, using another’s account or representing another user is prohibiting. They may be held responsible for any activities of that other person while using that password. Internet/intranet • IT department will provide approved staff with ability to use the intern as internet source of global communication and research. Prior to access the internet / intranet users are required to put their user name and password as strictly by law. The user must assume responsibility for using internet in an appropriate manner. The user must remember to focus only on information contained within the scope of the job function. IT Department will review the information or site a user has visited. Any user action that violates the appropriate usage policy may result in revoking lates network privileges and may lead to legal action. ileges Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
  • 2. Six Senses Hideaway Samui December 14, 2009 Pornographic Material and Vulgarity – Posting, uploading, or downloading of pornographic or vulgar message, photos, images, sound files, text files, video files or related materials is strictly prohibited. Access to internet user must not remember their username and password for ser access to internet to avoid any responsible that was made by other. Copyrighted • Unauthorized copying of copyrighted material and installation of any copyrighted software for user does not have an active license is strictly prohibited. Downloading software • User should be aware that downloading or transmitting software could lead to civil or criminal actions against the user and the resort Company confidential information • Resort confidential information should never be transmitted or forwarded to outside individuals or companies not authorized to receive that information. Using laptop or installing computer related hardware • User may not use laptop and connect to resort network without permission of network Department Head or IT Manager. Connecting laptop to resort network may work present a security risk or impede operations of resort network, due to the system was limited of the number of computer. • Handy drive USB, camera is not all allowed to use for network security and protect any damage from virus. Disciplinary action will occur whenever the IT m department has found where virus from. Should some computer equipments are not work properly or damage please inform to your Department Head or directly report to IT department for further action. In Addition, if you are unsure as to items appropriateness, consult the Information Technology Department and / or Department Head. This policy can be amended any time in order to support the user the work as smooth as possible and to ensure it will ooth not effect to the network system. Computer use policy create by Mr. Danai Thongsin @ Six Senses Hideaway Samui
  • 3. F F F F F F F F F F F F F F F F (IT Request form) F F F F F F F F F F F (Computer basic) F F F F F F F F F F F F F F FF F F F F F F F “Handy drive USB; Camera; F F F F virus F FF F F F Internet F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F ( F F F F F F F F F F F F F F F F F F ) F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F Computer user policy create by Danai Thongsin http://vaohama.multiply.com Allowed changes to suit your personal
  • 4. Six Senses Hideaway Samui Information systems manager Job description Job description An information systems manager is responsible for the computer systems within a company, overseeing installation, back up systems operate effectively, purchasing hardware and software, providing the ICT technology infrastructures for an organization, and contributing to organizational policy regarding quality standards and strategic planning. Information systems managers work in every size of organization in industry and the service sector, usually with a staff of technicians, programmers and database administrators reporting to them. Although the title of information systems manager is becoming more commonly used within the ICT sector, job titles may vary, for example, you might be a service delivery manager in a non- profit organization and a function manager in a financial institution. Typical work activities Information systems managers are responsible for the implementation of technology within an organization and direct the work of systems/business analysts, computer programmers, support specialists, and other computer-related workers. The post holder will usually be an experienced worker with technical expertise coupled with an understanding of business and management principles. Duties within the role are ultimately dependent on the employing organization and the complexity of its information systems. Standard activities are likely to include: • evaluating user needs and system functionality and ensuring that ICT facilities meet these needs; • planning, developing and implementing the ICT budget, obtaining competitive prices from suppliers where appropriate, to ensure cost effectiveness; • scheduling upgrades and security backups of hardware and software systems; • researching and installing new systems; • ensuring the smooth running of all ICT systems, including anti-virus software, print services and email provision; • ensuring that software licensing laws are adhered to; • providing secure access to the network for remote users; • ensuring the security of data from internal and external attack; • providing users with appropriate support and advice; • managing crisis situations, which may involve complex technical hardware or software problems; Danai Thongsin IT Manager 2008 Page 1
  • 5. Six Senses Hideaway Samui • mentoring and training new ICT support staff; • Keeping up to date with the latest technologies. Companies going through business process re-engineering may well look to the information systems manager to deal with change management. This requires an understanding of the capabilities and constraints of technology and resource implications in terms of budgets, plus the training and recruitment of specialist staff. Danai Thongsin IT Manager 2008 Page 2
  • 6. Six Senses Hideaway Samui IT technical support Job description and activities IT technical support officers monitor and maintain the computer systems and networks of an organization. They install and configure computer systems, diagnose hardware/software faults and solve technical problems, either over the phone or face-to-face. Organizations rely on accessing information via computers. Problems may arise through systems failure, operator error or user misunderstanding. Businesses cannot afford to be without the whole system, or individual workstations, for more than the minimum time taken to repair or replace them. Technical support officers are sometimes known as help desk operators, technicians or maintenance engineers. The work is as much about understanding how packages are used as applying detailed technical knowledge. Typical work activities In essence, technical support officers are responsible for ensuring the smooth running of computer systems. Tasks vary depending on the size and structure of the organization, but will typically include: • installing and configuring computer systems; • monitoring and maintaining computer systems and networks; • talking staff/clients through a series of actions, either face to face or over the telephone; • troubleshooting system and network problems and diagnosing and solving hardware/software faults; • finding solutions to problems, be it through creating a desktop shortcut or fixing a major fault on the operating system; • replacing parts as required; • providing support, including procedural, documentation; • following diagrams and written instructions to repair a fault or set up a system; • running network applications to support systems and users; Helpdesk support • supporting new applications; • setting up new users; • responding within agreed time limits to call-outs; • working continuously on a task until completion (or referral to third parties, if appropriate); • prioritizing and managing several open cases at one time; • rapidly establishing a good working relationship with other professionals (e.g., contract businesses) in order to make necessary repairs; • testing and evaluating new technology; • Conducting electrical safety checks on computer equipment. • Provide client support and technical issue resolution via E-Mail, phone and other electronic medium. Danai Thongsin IT Manager 2008
  • 7. Six Senses Hideaway Samui • Configuration of client's equipment to connect to the Internet via modem/DSL Router (Dialup/DSL customers only). • Configure software to connect to Internet application servers. • Provide training to clients in the use of system and applications as related to Internet. • Obtain general understanding of OS and application operations related to company offered services. • Identify and correct or advise, on operational issues in client computer systems. • Perform light lifting 25lbs. • Perform creation of new accounts using company provide software tools. Computer Skills: To perform this job successfully, an individual should have knowledge of Contact Management systems; Database software; Internet software; Word Processing software, and Firewall network protect system, Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Danai Thongsin IT Manager 2008