Topic 4: Working With ICT - CODE OF CONDUCT

Description

Topic 4: Working with ICT, Code of Conduct guidelines
Henry Cookson
Mind Map by Henry Cookson, updated more than 1 year ago
Henry Cookson
Created by Henry Cookson about 10 years ago
88
3

Resource summary

Topic 4: Working With ICT - CODE OF CONDUCT
  1. Responsibilites
    1. All ICT users must act responsibly and should be responsible for the security and integrity of resources under their control, and cimply with licese and contractual agreements
      1. Networks can provide access to rescource in and outside of the organisations. This sould be respected as a privilege and used responsibly
        1. Users must ensure viruses are not introduced through their faliure to scan media
        2. Respecting rights of others
          1. All ICT users have rights that must be respected. Systemts such as e-mail, clogs and chat rooms can be misused by other people
            1. False rumours may be spread around ICT to bully someone
              1. Employees need to feel safe in their workplace, so employees must respect each other
              2. Abiding by current legislation
                1. There are many laws which cover the way ICT can be used and employees must comply with these laws. Includes the DPA, CMA and copyright
                  1. Faliure to comply with laws is serious and could lead to dismissal
                2. Portecting hardware and software from malicious damage
                  1. Employees must not leave systems in unlocked rooms to prevent intruders or disgruntled colleagues damaging hardware
                    1. Need to ensure copies of software are kept in a secure location e.g. fire-proof safe
                      1. Loss of hardware could be costly for an organisation
                      2. Complying with licensing agreements
                        1. Buying software buys the LICENCE, not the software itself
                          1. Networked software licences allow the user to run software on a specified number of computers at the same time
                            1. Important these specified numbers are respected and not abused
                        2. Permissions on data access
                          1. Employees shouldn't access data or files unless they're permitted to do so
                            1. Access to files related and essential for their job should only be accessed
                          2. Security policy
                            1. Passwords shouldn't be disclosed or company data to any third party
                              1. Printouts of work and data souldn't be left lying around
                                1. Passwords should be changed regularly to ensure security is maintained
                                  1. No inappropriate access to the Internet e.g. social network access during work hours
                                  2. Authorisation
                                    1. Access to rescourced without proper authorisation from a security manager
                                      1. No missing information or intetional corruption of data by employees
                                      2. Consequences
                                        1. Informal verbal warning e.g. for badly chosen passwords
                                          1. Formal written warnings e.g. records on an employees file for serious infringements
                                            1. Dismissal of an employee e.g. for very serious infringements
                                              1. Prosecution of an employee e.g. for actions that are illegal like fraud
                                              Show full summary Hide full summary

                                              Similar

                                              The Weimar Republic, 1919-1929
                                              shann.w
                                              Random German A-level Vocab
                                              Libby Shaw
                                              Globalisation Case Studies
                                              annie
                                              Sociology: Crime and Deviance Flash cards
                                              Beth Morley
                                              Functionalist Theory of Crime
                                              A M
                                              Types and Components of Computer Systems
                                              Jess Peason
                                              Using GoConqr to teach French
                                              Sarah Egan
                                              Using GoConqr to teach science
                                              Sarah Egan
                                              Using GoConqr to study geography
                                              Sarah Egan
                                              Using GoConqr to study Economics
                                              Sarah Egan
                                              Using GoConqr to study English literature
                                              Sarah Egan