1. User responsibilities policy
Jigyanshu Jangid
14030142064
Purpose-
Objective: - Employers have responsibilities for the health and safety of their
employees. They are also responsible for any visitors to their premises such
as customers, suppliers and the general public.
To make users accountable for safeguarding their authentication
information.
It is the purposeof all computing Services' policies to ensure a safe, reliable
and fit for purposecomputing and IT infrastructure
Control
User should be required to follow the organizations practices in the use of secret
authentication information.
Policies-
Computer Roomand Office PCs-
Never leave computers unattended while logged-in.
Never unplug the network cable from the rear of the computer and/or wall
socket.
Regularly backup your data.
2. Do not store data locally. This will prevent loss of data in instances of
hardware failure and facilitate the safe re-cloning of the computers.
Copyrighted Materials-
Do not distribute (share) copyrighted materials like music, videos/movies,
software, (electronic) data (such as datasets, books, journals, etc.).
Passwords
The login/password combination identifies a single individual and is
reserved for that individual, who is personally responsible for it.
when passwords are used as secret authentication information, select quality
passwords with sufficient minimum length which are
- Easy to remember
- If temporary, changed at the first log-on.
- Not based on anything somebodyelse could easily guess or obtain using
personrelated information, e.g. names, telephone number and date of birth
etc.
- Using alphabetic and numeric characters.
Not use the same secret authentication information for business and non –
business purposes.
Ensure that plant and machinery is safe to use.
Make sure that all materials are handled, stored and used safely.
Provide adequate first aid facilities.
Tell you about any potential hazards from the work you do - chemicals and
other substances used by the firm - and give you information, instructions,
training and supervision as needed.
Set up emergency plans.
Make sure that ventilation, temperature, lighting, toilet, washing and rest
facilities all meet health, safety and welfare requirement.
Check that the right work equipment is provided and is properly used and
regularly maintained.
3. Take precautions against the risks caused by flammable or explosive
hazards, electrical equipment, noise and radiation.
Never to store any data locally onto the machine (drives C: and D:).
Not to stop any ongoing update process, should this not be running
"silently“.
Users have an obligation to install virus scanning software and keep it
updated.
Employee is be punctual on your time, for better coordination.
Not to use P2P or any other (sharing) software which may hinder bandwidth
and/or breach security.