Topic 4: Working With ICT - CODE OF CONDUCT

Henry Cookson
Mind Map by Henry Cookson, updated more than 1 year ago
Henry Cookson
Created by Henry Cookson about 6 years ago


Topic 4: Working with ICT, Code of Conduct guidelines

Resource summary

Topic 4: Working With ICT - CODE OF CONDUCT
1 Responsibilites
1.1 All ICT users must act responsibly and should be responsible for the security and integrity of resources under their control, and cimply with licese and contractual agreements
1.2 Networks can provide access to rescource in and outside of the organisations. This sould be respected as a privilege and used responsibly
1.3 Users must ensure viruses are not introduced through their faliure to scan media
2 Respecting rights of others
2.1 All ICT users have rights that must be respected. Systemts such as e-mail, clogs and chat rooms can be misused by other people
2.2 False rumours may be spread around ICT to bully someone
2.3 Employees need to feel safe in their workplace, so employees must respect each other
3 Abiding by current legislation
3.1 There are many laws which cover the way ICT can be used and employees must comply with these laws. Includes the DPA, CMA and copyright
3.1.1 Faliure to comply with laws is serious and could lead to dismissal
4 Portecting hardware and software from malicious damage
4.1 Employees must not leave systems in unlocked rooms to prevent intruders or disgruntled colleagues damaging hardware
4.2 Need to ensure copies of software are kept in a secure location e.g. fire-proof safe
4.3 Loss of hardware could be costly for an organisation
5 Complying with licensing agreements
5.1 Buying software buys the LICENCE, not the software itself
5.1.1 Networked software licences allow the user to run software on a specified number of computers at the same time Important these specified numbers are respected and not abused
6 Permissions on data access
6.1 Employees shouldn't access data or files unless they're permitted to do so
6.1.1 Access to files related and essential for their job should only be accessed
7 Security policy
7.1 Passwords shouldn't be disclosed or company data to any third party
7.2 Printouts of work and data souldn't be left lying around
7.3 Passwords should be changed regularly to ensure security is maintained
7.4 No inappropriate access to the Internet e.g. social network access during work hours
8 Authorisation
8.1 Access to rescourced without proper authorisation from a security manager
8.2 No missing information or intetional corruption of data by employees
9 Consequences
9.1 Informal verbal warning e.g. for badly chosen passwords
9.2 Formal written warnings e.g. records on an employees file for serious infringements
9.3 Dismissal of an employee e.g. for very serious infringements
9.4 Prosecution of an employee e.g. for actions that are illegal like fraud
Show full summary Hide full summary


The Weimar Republic, 1919-1929
Sociology: Crime and Deviance Flash cards
Beth Morley
Globalisation Case Studies
John O'Driscoll
Types and Components of Computer Systems
Jess Peason
Using GoConqr to study geography
Sarah Egan
Using GoConqr to teach French
Sarah Egan
Using GoConqr to study Economics
Sarah Egan
Using GoConqr to learn French
Sarah Egan
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study English literature
Sarah Egan