|
|
|
IT News |
|
Are You Beign Tracked? |
|
Security Policies |
|
Technology Myths |
|
The Season’s Fresh Apples |
|
What’s new @ Gmail, Hotmail, Mail & Yahoo Mail |
|
Google Search-Tips & Tricks |
|
ipad Applications for Teachers |
|
Tech products Review |
|
E-Scrap |
|
Tech Tools for Teachers |
|
Technologies for Educators |
|
|
|
|
|
|
|
Security Policies
As a part of the Information Security Awareness Drive, we feature
your role in protecting yourself and your School/ Office from Information Security Breaches. These breaches can be caused by Virus, Worms, Hackers, Data Information Leakage, and many other causes.
In your School/ Office, you can implement several controls to provide information security. To keep your information safe, adhere to the following policies at all times:
- Do not send any chain mails, jokes or attach multimedia files with e-mails.
- Do not download or play song, movies (MP3/MPEG) or pornographic material.
- Internet Access should be used only for Educational/ official purpose, only at the defined locations.
- Wherever, you have important data on the system, internet access on those machines should be prohibited.
- Access to non-official e-mail sites (HOTMAIL, YAHOO, GMAIL etc.) or online chat should be strictly prohibited.
- Do not share your Password with anyone.
- Avoid using external source of Data through CD/ DVD/ USB Drive: if required, use it only on limited machines. But one cannot assure data protection on these machines.
- Personal hardware or software should not be installed or used on any of the School/ Office computer or network (specially your mobile/ ipod/ camera/or any such device).
- Use of School/Office hardware for personal use should be prohibited.
- Users are responsible to ensure that anti-virus client is running with latest definition file on their system.
- Do restart your computer everyday.
- Keep on saving the work in between (use Ctrl + S), while you work.
- Take weekly/monthly backup as per your requirement.
- Unauthorized/unlicensed software should not be downloaded or installed.
- Never leave your computer unlocked. Use CTRL+ALT+ DEL or Window Key + L
- Do not leave hard copies of confidential or sensitive information unattended. Follow Clear-Desk and Clear-Screen methodology.
- Do not open any suspicious e-mails or attachments. Delete them immediately.
- Teachers must ensure that Students are aware of Information Security policies and procedures.
- Usage of administrative privileges and local shares should be prohibited.
|
|
|
|
|
|