KEMBAR78
ARO Computer Use Policy Guide | PDF | Computer File | Computer Virus
0% found this document useful (0 votes)
47 views1 page

ARO Computer Use Policy Guide

This document outlines the computer use policy for the Admission and Records Office (ARO). It defines that computers owned by ARO are only to be used for official transactions by employees. It provides specific policies for computer access, electronic file storage and access, approved computer software, printing and scanning privileges, and restricted internet access. Any external devices or downloaded files must be scanned by the system administrator due to security risks of viruses.

Uploaded by

Napster D. Pmahc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views1 page

ARO Computer Use Policy Guide

This document outlines the computer use policy for the Admission and Records Office (ARO). It defines that computers owned by ARO are only to be used for official transactions by employees. It provides specific policies for computer access, electronic file storage and access, approved computer software, printing and scanning privileges, and restricted internet access. Any external devices or downloaded files must be scanned by the system administrator due to security risks of viruses.

Uploaded by

Napster D. Pmahc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ARO COMPUTER USE POLICY

The objective of this policy is to define policies when employing the use of computer available through the Admission and Records
Office. These computers include, but not limited to, electronic files and software’s.

General Policy

All IT equipments specifically computers owned by ARO that is designated to its specific employee should be used only for official
transactions.

Specific Policy for:

Computer Access

1. All computers should be member to domain created and administered by MISO.


2. Every user is given a username and password to access the computer. Users are given a privilege to set his/her password as
well as to change it anytime. Individual user accounts must be kept confidential.
3. Every user accounts have a privilege to access the computer based only to his/her defined functions or duties to perform.
4. Computer users have no privilege to access the computer locally but instead in the domain.
5. The computer should not be used for storage of personal files or for entertainment purposes.
6. Any external devices to be inserted in any computer (i.e usb drive storage) should be notified to System Administrator for
virus scanning. USB drives storage is common carrier of worms and viruses.

Electronic File Storage and Access

1. All electronic files used for business transaction of the office should be store in File Server provided and maintained by MISO.
This means that the there is centralized file storage and accessed.
2. Every user accounts can accessed only his/her owned files.
3. There is a public folder to be provided for commonly used files.
4. In the absence of a user, privilege to access the files can be given to another user for urgent need.
5. No users are allowed to copy files from the file server and save it to any external drives unless with permission.

Computer Software

1. Only software that is needed to perform the function and duties of users are installed on the computer.
2. If need arises to install new software, the user should notify the System Administrator to facilitate the installation.
3. Games, audio and video files that are not used for official transaction are not allowed to be installed on computer.

Printing and Scanning

1. Only privilege users have the right to access the shared printer and scanner.
2. Printer and scanner are for official use only.

Internet Access

1. The internet access privilege is given only to a user that is necessary to perform his/her function.
2. Internet is like a public place, it should be used responsibly because it is common source of worms and viruses that may
infiltrate the computer and the entire system as well.
3. In case of downloading any file from the internet and the user is hesitant about the content of the files; he/she may
immediately seek the help from the system administrator.

You might also like