ISSC351 Lab Liaison and computer technicians are primarily

ISSC351 – Week4Your name:Brian Poe COMPANY’S COMPUTER LAB OVERVIEW             One of our main objectives is toprovide reasonable access to computer resources provided by the company and toensure to maintain an atmosphere that is appropriate for the working environmentand its employees.

The following policies and procedures have been approved andapplied. In order to provide a consistent standard, the appropriate securitymeasures for accessing and authentication to the company’s network is strictlyenforced. The company computer labs will be used by company staff and employeesfor their work-related activities only.  COMPUTER LAB PROCESSES             The Lab Liaison will help anypersonnel will accessing the computer lab for use. The Lab Liaison and computertechnicians are primarily responsible for the upkeep and maintenance of thecomputer lab.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

They will enforce all policies, procedures and operations of thecomputer lab and as staff and employees your use of the computer labsconstitutes your consent with following the rules and their instructions. Forany reason, you failed to follow the rules and instructions given, disciplinaryactions will commence and your employee computer access privileges will berevoked. If you require any assistance during your use of the computer lab, youare to seek assistance from the Lab Liaison or computer technicians. PROCEDURE FOR ACCESSING THE COMPUTER LAB 1)    Request a computer number from the LabLiaison for computer use. 2)    Provide the Lab Liaison your employeebadge to receive the computer number.

 3)    Upon receiving the computer number, theuser will access the computer desktop and browser by entering the passwordannotated on their computer number. 4)    When done with using the computer, theuser will return the computer number in order to receive back their employeebadge.  RULES OF CONDUCT AND COURTESIES 1)    Food, drinks and tobacco – eating,drinking, or using tobacco products is prohibited.

 2)    Accessing, downloading, or reading pornographic,profane or obscene material is strictly prohibited. 3)   Loudnoises – Participating in behavior or activities that disturb other users orinterfere with the operations of the laboratory is not allowed. This includes,but is not limited to loud, talking music, or using computer labs to makemeetings. Disruptive, for example talking loudly, crying, laughing or cursingis not tolerated. Make your conversations with others in a quiet way that doesnot disturb the work of other users in the computer lab.

If you becomedisruptive, you will be asked to leave. 4)   CellPhone Usage – All cell phones must be turned off or silent (vibrate mode) whilein the laboratory. If you receive a phone call, you must exit the computer labbefore answering your mobile phone and continue your conversation somewhereoutside the computer lab. 5)    Excessive printing of large documents -prints not work-related files in the computer lab is prohibited. Printing morethan 10 pages are prohibited. 6)    Duplicating software – Unauthorizedcopies of software under license from the computer lab hard drives or serversis a violation of federal copyright laws. Software license agreements andcopyright laws will be strictly applied in computer lab.

 7)   Savingfiles – documents and files of any kind saved on the hard disk of the computer willbe automatically deleted. Data files created in the computer lab must be directlysaved to a floppy disk, USB drive or a CD. 8)   Changethe Hardware Configurations and software – hardware and software changing configurationsin the computer labs are prohibited. This includes changes to the settings, theprinter’s configuration and modification of the software of the system. Thosewho violate this policy will be referred to the competent authority forappropriate action, which may include the loss of the computer privileges. 9)    The following types of activities areexamples of behavior that are unacceptable, and which, in some cases, mayviolate state law or federal: a.            Access to another account, directory, filesprivate or e ? mailwithout permission of the owner. b.

            Distort its own identity in the electroniccommunication. Violate copyright and/or software agreements. c.            The use of computing resources to threaten orharass others. Violate lab and the political systems, procedures and Protocol. Violationof these rules can lead to the revocation of the privileges of laboratoryand/or disciplinary action CONSEQUENCES: Violations ofrules and regulations that the above will result in disciplinary action.Disciplinary action will include, but is not limited to: 1)   Givena verbal warning.2)   Askedto leave the computer lab.

 3)   Yourname being given to the competent authorities of the appropriate measures thatcould result in loss of privileges to the computer, or terminated from thecompany. Reference