SlideShare a Scribd company logo
1 of 3
User responsibilities policy
Jigyanshu Jangid
14030142064
Purpose-
Objective: - Employers have responsibilities for the health and safety of their
employees. They are also responsible for any visitors to their premises such
as customers, suppliers and the general public.
To make users accountable for safeguarding their authentication
information.
It is the purposeof all computing Services' policies to ensure a safe, reliable
and fit for purposecomputing and IT infrastructure
Control
User should be required to follow the organizations practices in the use of secret
authentication information.
Policies-
Computer Roomand Office PCs-
 Never leave computers unattended while logged-in.
 Never unplug the network cable from the rear of the computer and/or wall
socket.
 Regularly backup your data.
 Do not store data locally. This will prevent loss of data in instances of
hardware failure and facilitate the safe re-cloning of the computers.
Copyrighted Materials-
 Do not distribute (share) copyrighted materials like music, videos/movies,
software, (electronic) data (such as datasets, books, journals, etc.).
Passwords
 The login/password combination identifies a single individual and is
reserved for that individual, who is personally responsible for it.
 when passwords are used as secret authentication information, select quality
passwords with sufficient minimum length which are
- Easy to remember
- If temporary, changed at the first log-on.
- Not based on anything somebodyelse could easily guess or obtain using
personrelated information, e.g. names, telephone number and date of birth
etc.
- Using alphabetic and numeric characters.
 Not use the same secret authentication information for business and non –
business purposes.
 Ensure that plant and machinery is safe to use.
 Make sure that all materials are handled, stored and used safely.
 Provide adequate first aid facilities.
 Tell you about any potential hazards from the work you do - chemicals and
other substances used by the firm - and give you information, instructions,
training and supervision as needed.
 Set up emergency plans.
 Make sure that ventilation, temperature, lighting, toilet, washing and rest
facilities all meet health, safety and welfare requirement.
 Check that the right work equipment is provided and is properly used and
regularly maintained.
 Take precautions against the risks caused by flammable or explosive
hazards, electrical equipment, noise and radiation.
 Never to store any data locally onto the machine (drives C: and D:).
 Not to stop any ongoing update process, should this not be running
"silently“.
 Users have an obligation to install virus scanning software and keep it
updated.
 Employee is be punctual on your time, for better coordination.
 Not to use P2P or any other (sharing) software which may hinder bandwidth
and/or breach security.

More Related Content

Similar to User responsibilities policy

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructurePallavi Agarwal
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdfLakshyaKhowala
 
Lesson 3
Lesson 3Lesson 3
Lesson 3MrsNunn
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)sentmery5
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...RIYAJAIN179446
 

Similar to User responsibilities policy (20)

Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
IT Policy
IT Policy IT Policy
IT Policy
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
Computer security
Computer securityComputer security
Computer security
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 

User responsibilities policy

  • 1. User responsibilities policy Jigyanshu Jangid 14030142064 Purpose- Objective: - Employers have responsibilities for the health and safety of their employees. They are also responsible for any visitors to their premises such as customers, suppliers and the general public. To make users accountable for safeguarding their authentication information. It is the purposeof all computing Services' policies to ensure a safe, reliable and fit for purposecomputing and IT infrastructure Control User should be required to follow the organizations practices in the use of secret authentication information. Policies- Computer Roomand Office PCs-  Never leave computers unattended while logged-in.  Never unplug the network cable from the rear of the computer and/or wall socket.  Regularly backup your data.
  • 2.  Do not store data locally. This will prevent loss of data in instances of hardware failure and facilitate the safe re-cloning of the computers. Copyrighted Materials-  Do not distribute (share) copyrighted materials like music, videos/movies, software, (electronic) data (such as datasets, books, journals, etc.). Passwords  The login/password combination identifies a single individual and is reserved for that individual, who is personally responsible for it.  when passwords are used as secret authentication information, select quality passwords with sufficient minimum length which are - Easy to remember - If temporary, changed at the first log-on. - Not based on anything somebodyelse could easily guess or obtain using personrelated information, e.g. names, telephone number and date of birth etc. - Using alphabetic and numeric characters.  Not use the same secret authentication information for business and non – business purposes.  Ensure that plant and machinery is safe to use.  Make sure that all materials are handled, stored and used safely.  Provide adequate first aid facilities.  Tell you about any potential hazards from the work you do - chemicals and other substances used by the firm - and give you information, instructions, training and supervision as needed.  Set up emergency plans.  Make sure that ventilation, temperature, lighting, toilet, washing and rest facilities all meet health, safety and welfare requirement.  Check that the right work equipment is provided and is properly used and regularly maintained.
  • 3.  Take precautions against the risks caused by flammable or explosive hazards, electrical equipment, noise and radiation.  Never to store any data locally onto the machine (drives C: and D:).  Not to stop any ongoing update process, should this not be running "silently“.  Users have an obligation to install virus scanning software and keep it updated.  Employee is be punctual on your time, for better coordination.  Not to use P2P or any other (sharing) software which may hinder bandwidth and/or breach security.