IT Technical Support Policies and Procedures South Nottingham College.

Slides:



Advertisements
Similar presentations
ER Tutorial 2 Chapter 9 - Questions 3, 4 and 5 V3.0 Napier University Dr Gordon Russell.
Advertisements

2 3 There are two basic areas where there is a need to have resources available. Internal:  Financial  Personnel  Assets  Time External  Consultants.
Budget for an IT Strategy. Use of the Guide The introduction of an IT strategy into a business is a very important step and needs to be considered very.
SERVICE LEVEL AGREEMENTS The Technical Contract Within the Master Agreement.
Organisational policies
ICAICT202A - Work and communicate effectively in an IT environment
Functional areas Retail Business.
Be An Effective Manager
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Higher Administration
Introduction to Business Organisations
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Computers & Employment By Andrew Attard and Stephen Calleja.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
The Cost of Cheap Understanding Your IT Investment Options.
G041: Lecture 16 Section B Revision Questions
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
What is the purpose of this task? To understand the fundamental aspects of how businesses work What will you learn from this task? Define the main types.

Unit 25 – task 3 [1/3].
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
14.1 – Policy and Strategy Issues
CHAPTER 6 Business-to-Business Markets: How and Why Organizations Buy M A R K E T I N G Real People, Real Choices Fourth Edition.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Information: Policy, Strategy and Systems Module Overview
Btec National - Principles of Software Development 1 Principles of Software Design and Development More On Choosing a Language.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
ProMan asp Beyond software, it’s… SYSTEM! Application and Infrastructure SERVICE! Network professionals, application experts STRUCTURE! Proven methods.
PLANNING ENGINEERING AND PROJECT MANAGEMENT By Lec. Junaid Arshad 1 Lecture#03 DEPARTMENT OF ENGINEERING MANAGEMENT.
Business Functions, Processes, and Data Requirements
Life cycle services for automation products
Lecture 4. IS Planning & Acquisition To be covered: To be covered: – IS planning and its importance Cost-benefit analysis Cost-benefit analysis Funding.
Brief Overview: Options for Licence & Support Open Source Job Scheduler Software- und Organisations-Service GmbH 
7-1 Computerized Accounting Systems Electronic Presentation by Douglas Cloud Pepperdine University Chapter F7.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Unit 22 People in Computing
1 IT Technical Support The impact of organisational policies on diagnosis and repair.
Grid Operations Centre LCG SLAs and Site Audits Trevor Daniels, John Gordon GDB 8 Mar 2004.
Unit 13: IT Trouble Shooting and Repair
1 Chapter 13 (Week 13) SYSTEMS MAINTENANCE AND EVALUATION Chapter 13: SYSTEMS MAINTENANCE AND EVALUATION Throughout its life, a system should operate effectively.
LABORATORY MANAGEMENT Lecture 4. Planning at the Departmental Level The laboratory director must determine both laboratory goals and objectives, as well.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Appendix B: Getting Started in Systems Analysis and Design.
Implementation of legislation (Chapter 47) By Haley Court.
In Spain we have basically three profiles in computer science vocational training:  MIDDLE-GRADE DEGREES ◦ Microcomputer systems and networks technician.
Safety Training - Unit Management Why it is essential, who needs it and how to go about it February 2015 Dr Emer Bell Integrated Risk Solutions.
The main functional areas within business organisations OCR Diploma.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
Effects of Online Services. Learning Objectives To understand the effects of the use of online services on society.
BTEC L3 Unit 1 – Communication and Employability Skills for IT.
Dr Gordon Russell, Napier University Tutorial - ER2 - V2.0 1 ER Tutorial 2 Questions 3, 4 and 5.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
RACHELLE BERRY COLLECTING INFORMATION TO PROVIDE SUPPORT TO CUSTOMERS.
 SOFTCON SYSTEMS PVT. LTD. (SSPL) offers unique, creative and practical automation solutions in the field of Process & Power on an LSTK / EPC basis with.
1 Determining a client’s peripheral requirements  Determine current business practices  Determine peripheral requirements  Analyse and document existing.
1 Team Skill 1 Analyzing the Problem … Part 1: 5 steps in Problem Analysis Based on “Software Requirements Management, A use case approach”, by Leffingwell.
INTRODUCTION TO DESKTOP SUPPORT
ISMS Information Security Management System
Chapter 7: Manufacturing Processes
Chapter 7. Identifying Assets and Activities to Be Protected
Information Technology (IT) Department
Insert Product Photograph Here
The Basics of Information Systems
Communication and Employability Skill for IT
The Basics of Information Systems
Radiopharmaceutical Production
Session 11: Finance Function
Presentation transcript:

IT Technical Support Policies and Procedures South Nottingham College

Aims Look into the impact of organisational policies and procedures

Introduction As a support technician you will work within an organisation and this organisation will have working procedures and policies that you will have to adopt and follow. The organisation will have drawn up policy documents which set out the rules on the reporting of faults, Internet use and security, etc. For example, it may be organisational policy that all requests for help desk support are ed to the support team. If that is beyond your powers, you may pass the call on to a more senior technician, i.e. escalate the incident. Escalation – the referral of a problem higher up the chain of command.

Service level agreements - SLA A service level agreement (SLA) may be an internal document drawn up between the support department and other departments within an organisation, or an SLA may apply between an organisation and an external supplier of support services. The SLA will specify service obligations, for example: response times, downtimes, schedules for work to be completed and/or security arrangements. A service level agreement (SLA) sets out what level of support is expected – for example, the speed of response for particular types of problem.

Confidentiality There are a number of safeguards, both in terms of legislation and in terms of your contract of employment, which exist to protect the confidentiality of personal data, and you will be expected to abide by those rules and regulations. In particular, the information revealed to you by end users may give you access to their private data. You must not reveal this information to anyone else, nor use it yourself for any purpose other than the one for which it was supplied. Failure to abide by the given rules could result in disciplinary action and termination of contract. For more serious offences, you might face a fi ne or a term of imprisonment.

Sensitivity of information Some of the information you need to carry out your job may be sensitive. It may relate to future plans for upgrading hardware or software, or relocation plans. As with any job, as an employee, you are expected to respect the sensitivity of such information. To reveal highly sensitive information, for example to a rival organisation, may well result in dismissal.

Organisational constraints Costs of resources required Although the costs of IT equipment tend to fall over time, they still represent a large capital investment. The person responsible for buying IT equipment will be careful to place orders with manufacturers who have a proven track record and will seek favourable rates through bulk purchases. It is important to keep records of faults attributed to hardware. If a particular choice of hard drive, for example, is found to be unreliable, this will inform the next round of purchasing. With software, the buyer will need to know exactly how many personnel require access to particular packages and to ensure site licences are purchased accordingly. A record of what software is installed on each computer then needs to be maintained so that it can be shown that the terms of the licence have not been broken.

Organisational constraints - continued The support team needs to be on hand whenever other employees are on-site. The team also needs to undertake tasks overnight, like backups and essential network maintenance. For this reason, the support technicians tend to have to work on a shift basis. One week, you may be on ‘earlies’, starting at 8 a.m. and finishing at 4 p.m. The next week, you may be on ‘lates’, starting at noon and finishing at 8 p.m. The third week, you may be on nights, working from 8 p.m. till 8 a.m. Since coverage may be needed seven days a week, you might also have to work weekends. The pattern of hours worked can therefore become quite complex, with days off built in to make up for working overtime or at weekends.

Organisational constraints - continued User expertise The level of support needed for a particular organisation depends very much on the level of expertise among the employees. For example, in a company that specialises in web designing services for other organisations, nearly all the employees will be competent in using computers and languages such as HTML and Java™. Compare this with an engineering company which has a large sales force, all using laptops, or in a factory where process control is used to create a range of products. These employees might need far more support to make the best use of computers on a day-to-day basis. The technicians working in the support team need to be trained to become expert users of the software that the employees have to use, as well as competent in maintaining the hardware.

Conclusion Looked into the impact of organisational policies and procedures