Presentation is loading. Please wait.

Presentation is loading. Please wait.

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)

Similar presentations


Presentation on theme: "The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)"— Presentation transcript:

1 The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)

2 Current status In your new job, you should familiarise yourself with your surroundings, location of people, computers and equipment. In your new job, you should familiarise yourself with your surroundings, location of people, computers and equipment. Investigate any service agreements which are in place. Investigate any service agreements which are in place. Identify what hardware, software and operating systems the organisation uses. Identify what hardware, software and operating systems the organisation uses.

3 Current status Large organisations generally have an equipment register which identifies the type and location of the equipment and software. Computers and peripherals are usually barcoded for identification purposes. Large organisations generally have an equipment register which identifies the type and location of the equipment and software. Computers and peripherals are usually barcoded for identification purposes.

4 Downloading & Installing It is important that you understand the laws governing the use of IT equipment to ensure that you are working in an ethical manner. It is important that you understand the laws governing the use of IT equipment to ensure that you are working in an ethical manner. You should never install or use software which is not properly licensed. You should never install or use software which is not properly licensed.

5 Downloading & Installing Be aware of the dangers in downloading material or installing software which is not from a trusted source. It may infect your computer system with a virus. Be aware of the dangers in downloading material or installing software which is not from a trusted source. It may infect your computer system with a virus. Observe copyright laws. Copying material from the Internet without permission may result in a breach of copyright – personally liable for fines. Observe copyright laws. Copying material from the Internet without permission may result in a breach of copyright – personally liable for fines.

6 Security Unauthorised access – hackers bypassing the security systems in place, may result violation of privacy and confidentiality of business records. Unauthorised access – hackers bypassing the security systems in place, may result violation of privacy and confidentiality of business records. Unauthorised use – Hacker deliberately enters system to use or damage it in some way, e.g. use service without paying, change or delete files etc. Unauthorised use – Hacker deliberately enters system to use or damage it in some way, e.g. use service without paying, change or delete files etc.

7 Personal Information Personal information stored in a database within your organisation should never be used inappropriately. Personal information stored in a database within your organisation should never be used inappropriately. Be aware your personal details (including your credit card number) could be misused. Only provide these details to reputable organisations. Be aware your personal details (including your credit card number) could be misused. Only provide these details to reputable organisations.

8 Email Be aware that email is not always secure. Be aware that email is not always secure. Avoid emailing material which may be deemed offensive. Avoid emailing material which may be deemed offensive. You should take care to only use work email facilities for work business and within organisational guidelines. You should take care to only use work email facilities for work business and within organisational guidelines. You should never access someone elses files or read another persons email without their permission. You should never access someone elses files or read another persons email without their permission.


Download ppt "The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)"

Similar presentations


Ads by Google