The introduction of information technology and its vast role in every aspects of human activity has raised potential to new ethical issues and problems. Many organizations nowadays recognized the need to incorporate policy on the use of IT resources if not to create a new one, to protect from legal actions and also against abuses. However, it is important to start from our own backyard. Hence, this activity requires you to participate in the creation (drafting) of an IT Usage Policy of the college. The ff. is the mechanics:
• Each class section should come up with one IT usage policy for the college
• This activity should be self faced but online. I will begin the proposal, then each of you should make significant updates by adding sections, adding provisions or items, editing entries, recommending for deletion of entries and so on. This is by using Google Docs. For guidance, you need to consult the policy checklist (attached ITPolicyChecklist) from time to time.
• Each one of you is required to participate at least 10 times to draft the proposal.
• You have to record your participation using Google Docs which contents is in accordance to attached participation log sheet”..and should be shared to yn.ethics@gmail.com as soon as you created the online document for me to monitor and check your entries.
DOSCST IT Usage Policy
1. All Users will be lawful, efficient, economical and ethical in their use of the DOCST Resources, which are provided to create, preserve, transmit and apply knowledge through teaching, research, creative works and other forms of scholarship.
2. Supported email access methods are Outlook and Outlook Web Access Every three months all mail items older than 18 months will be removed from the current mail box and stored in an archive location.
3. All system access will be by unique user account
4. Staff will not permit anyone to access IT resources under this named account
5. A Password is a personal key to a computer system and;
* Must not be written down or provided to any other staff member
* Must be at least 5 characters in length
* Passwords should consist of some alphabetical letters (a-z), numbers, punctuation and capitalisation
6.All Internet users are expected to be familiar with and comply with the University Internet & Intranet Conditions of Use Guidelines.
7.Local Area Network
* Staff are only permitted to connect client workstations and client software to the Faculty network.
* Staff are not permitted to add any hardware or software without approval from Faculty Information Technology
* Non-Faculty owned computers will not be supported by Faculty IT
* Faculty IT may, without notice, disconnect any piece of equipment posing a threat to the security, stability or performance of the local area network
8.Anti Virus
Anti-virus software is provided and installed for all Faculty owned desktops and laptops and must be operational;
9.Faculty Owned & Supported Desktops & Laptops
* Faculty users will be responsible to ensure that data is not loaded, saved or otherwise stored on local drives
* Faculty IT will not be responsible for any data lost whilst re-imaging local drives, including profile data such as Outlook/Office settings etc
* Only licensed software is to be loaded to Faculty desktops and laptops
10.Faculty Owned but Not Fully Supported Laptops
* This applies to but is not limited to Apple Macintosh, Toshiba, Sony
* Faculty IT will not be responsible for any data lost
11.Non-Faculty Owned Laptops
* Non-Faculty owned laptops connected to the Faculty network must have current anti-virus software loaded, operational and using the latest available virus signatures.
* Non-Faculty owned laptops will not be supported by Faculty IT

No comments:
Post a Comment