Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Security: Don't attempt to gain unauthorized access to information or facilities. If you don't have access to information resources you feel you need, contact your IT Support person or provider. You are not authorize to copy the data and take with you out of the office premises without the permission from management. The data of the company is an asset for it so copying data for use outside the office is illegal and may result in criminal charges. Don't disclose personal system passwords or other security details to other staff or external agents and don't use anyone else's login. If someone else gets to know your password, ensure you change it or get IT Support to help you. If you leave your PC unattended without logging off/shut down, you are responsible for any misuse/data loss of it while you're away. ALWAYS check removable media for viruses, even if you think they are clean. When you are using internet in the office, then make sure of the following: o o o Do not make actions that are against the interest of company. Obscenities/Pornography: Don't write it, publish it, search for it, bookmark it, access it or download it. Most of the Viruses, Trojans, Malwares, Spams enter in your system from Emails sent from hackers, so never open any link (or download any file) forward to your personal mail or company email without getting the permission from IT, as doing so can result in serious harm to your system and company network.
The windows network environment gives the facility of logging the user activities, so never think of that you can play with it.
Hardware and Software Installation: All purchases regarding Hardware and Software should be approved by the IT Manager. Installing Software: Get permission from IT Support before you install any software(License or Unlicensed) on equipment owned and/or operated by the company.
AJEC Al-Khobar
IT Policy
Data transfer and storage on the network: If you need to download / upload the data for some client always contact IT. If you want to share your data always make use of your share folders created on each of your PCs drive. Dont share your data on Servers shared folder as the Server folders are just for Backup purpose. Saving data on Servers shared folders may eff ect the speed of the network. Any loss to your data stored at Server folders will be your responsibility. Keep master copies of important data on your PC and not solely on your PC's local C: drive. Otherwise it will not be backed up and is therefore at risk. Ask for advice from IT Support if you need to store, transmit or handle large quantities of data, particularly images or audio and video. These large files use up disk space very quickly and can bring your network to a standstill. Dont put any of your personal data on your PC, any misuse of it will not be companys responsibility.
You are not allowed to have any unofficial content like movies, songs or games, if you found guilty strict action will be taken. Care of equipment: Don't re-arrange how equipment is plugged in (computers, power supplies, network cabling, modems etc.) without first contacting IT Support. Don't take food or drink into rooms which contain specialist equipment like servers. Access to such rooms is limited to authorized staff. If you want to have any official equipment like Laptop, HDD or USB you first have to get yourself authorized. Any damage or harm caused to the equipment while in your custody will be your responsibility and you will have to pay for it.
BYOD(Bring your Own Device) Policy: You are not permitted to use the office Wi-Fi on your smartphones. If you bring your laptop/tablet you are not permitted to connect it to office LAN/WLAN.
AJEC Al-Khobar
IT Policy
AJEC Al-Khobar
IT Policy
Don't send a subject header of, say "accounts" to the accountant * Try to keep to one subject per email, especially if the content is complex. It is better for your reader(s) to have several emails on individual issues, which also makes them easy to file and retrieve later. One email covering a large variety of issues is likely to be misunderstood or ignored. * Using asterisks at each end of a word (eg *now*) is common practice for highlighting text. * Capitals (eg NOW) can also be used to emphasise words, but should be used sparingly as it commonly perceived as 'shouting'. * Don't open email unless you have a reasonably good expectation of what it contains, eg Do open report.doc from an Internet colleague you know Don't open explore.zip sent from an address you've never heard of, however tempting. Alert IT Support if you are sent anything like this unsolicited. This is one of the most effective means of protecting <yourorg> against email virus attacks. * Keep email signatures short. Your name, title, phone/fax and web site address may constitute a typical signature. * Understand how forwarding an email works. If you forward mail, it appears (to the reader) to come from the originator (like passing on a sealed envelope). If you forward mail *and edit it* in the process, it appears to come from you - with the originator's details usually embedded in the message. This is to show that the original mail is no longer intact (like passing on an opened envelope).