six senses it policy

7
S Computer use policy create by Mr. Dan Computer use policy: Policy res resort’s network IT request form Information Technology to register before using internet. The user are gr Head. Basic computer assessment New computer user is re permitted by IT Manage equipment. User password For security purpose, eac password will grant the u requirements and securit password every 90 days. believe their password is immediately. If they req Department. In addition, prohibiting. They may be while using that password Internet/intranet IT department will provid source of global communi intranet users are requir law. The user must assum manner. The user must re the scope of the job fun a user has visited. Any user action that viol network privileges and m Six Senses Hideaway Samui December 14, 2009 nai Thongsin @ Six Senses Hideaway Samui stricting personal use of resort’s computer a Department has provided IT request form the resort’s computer and e-mail, the intra rouped by department and be monitored by equired to do basic computer assessment and er prior to have the right for using resort’s c ch user is issued an account and password. T user access to information based on their jo ty level. Hosts are required to change their Hosts may change their password at any tim s know by another user, they should change quire assistance please contact Department , using another’s account or representing an e held responsible for any activities of that d. de approved staff with ability to use the in ication and research. Prior to access the int red to put their user name and password as me responsibility for using internet in an app emember to focus only on information conta nction. IT Department will review the inform lates the appropriate usage policy may resul may lead to legal action. and/or for all users anet and the Department d be computer This ob network me. If they it Head or IT nother user is other person nternet as ternet / strictly by propriate ained within mation or site lt in revoking

Upload: danai-thongsin

Post on 12-Nov-2014

589 views

Category:

Technology


3 download

DESCRIPTION

IT Policy

TRANSCRIPT

Page 1: Six Senses It Policy

Six Senses Hideaway Samui

Computer use policy create by Mr. Danai Thongsin

Computer use policy: Policy restricting personal use of resort’s computer and/or

resort’s network

IT request form

• Information Technology Department has provided IT request form for all users

to register before using the

internet. The user are group

Head.

Basic computer assessment

• New computer user is required to do basic computer assessment

permitted by IT Manager prior to have

equipment.

User password

• For security purpose, each user is issued an account and password. This

password will grant the user access to information based on their job

requirements and security level.

password every 90 days.

believe their password is know by another user, they should change it

immediately. If they require assistance please contact Department Head or IT

Department. In addition,

prohibiting. They may be held responsible for any activities of that other person

while using that password.

Internet/intranet

• IT department will provide

source of global communication and research.

intranet users are required to put their user name and

law. The user must assume responsibility for using internet in an appropriate

manner. The user must remember to focus only on information contained within

the scope of the job function. IT Department will review the information or site

a user has visited.

Any user action that violates the appropriate usage policy may result in revoking

network privileges and may lead to legal action.

Six Senses Hideaway Samui

December 14, 2009

Mr. Danai Thongsin @ Six Senses Hideaway Samui

Policy restricting personal use of resort’s computer and/or

Information Technology Department has provided IT request form for all users

using the resort’s computer and e-mail, the intranet and the

. The user are grouped by department and be monitored by Department

New computer user is required to do basic computer assessment and be

permitted by IT Manager prior to have the right for using resort’s computer

each user is issued an account and password. This

password will grant the user access to information based on their job

requirements and security level. Hosts are required to change their

days. Hosts may change their password at any time. If they

believe their password is know by another user, they should change it

immediately. If they require assistance please contact Department Head or IT

Department. In addition, using another’s account or representing another user is

They may be held responsible for any activities of that other person

while using that password.

IT department will provide approved staff with ability to use the intern

source of global communication and research. Prior to access the internet /

intranet users are required to put their user name and password as

The user must assume responsibility for using internet in an appropriate

must remember to focus only on information contained within

function. IT Department will review the information or site

lates the appropriate usage policy may result in revoking

ileges and may lead to legal action.

Policy restricting personal use of resort’s computer and/or

Information Technology Department has provided IT request form for all users

intranet and the

by Department

and be

ort’s computer

each user is issued an account and password. This

password will grant the user access to information based on their job

Hosts are required to change their network

Hosts may change their password at any time. If they

believe their password is know by another user, they should change it

immediately. If they require assistance please contact Department Head or IT

using another’s account or representing another user is

They may be held responsible for any activities of that other person

use the internet as

Prior to access the internet /

strictly by

The user must assume responsibility for using internet in an appropriate

must remember to focus only on information contained within

function. IT Department will review the information or site

lates the appropriate usage policy may result in revoking

Page 2: Six Senses It Policy

Six Senses Hideaway Samui

Computer use policy create by Mr. Danai Thongsin

Pornographic Material and Vulgarity

pornographic or vulgar message, photos, images, sound files, text files, video

files or related materials is strictly prohibited.

Access to internet user must not remember their username

access to internet to avoid

Copyrighted

• Unauthorized copying of copyrighted material and installation of any

copyrighted software for user does not have

prohibited.

Downloading software

• User should be aware that downloading or transmitting software could lead to

civil or criminal actions against the user and the resort

Company confidential information

• Resort confidential information should never be transmitted or forwarded to

outside individuals or companies not authorized to receive that information.

Using laptop or installing computer related hardware

• User may not use laptop and connect to resort ne

Department Head or IT Manager.

present a security risk or impede operations of resort network, due to the

system was limited of the number of computer.

• Handy drive USB, camera is not all

any damage from virus. Disciplinary action will occur whenever

department has found where

Should some computer equipments are not work properly or damage please inform to

your Department Head or directly report to IT department for further action.

In Addition, if you are unsure as to items appropriateness, consult the Information

Technology Department and / or Department Head.

time in order to support the user the

not effect to the network system.

Six Senses Hideaway Samui

December 14, 2009

Mr. Danai Thongsin @ Six Senses Hideaway Samui

Pornographic Material and Vulgarity – Posting, uploading, or downloading of

pornographic or vulgar message, photos, images, sound files, text files, video

files or related materials is strictly prohibited.

ser must not remember their username and password for

access to internet to avoid any responsible that was made by other.

Unauthorized copying of copyrighted material and installation of any

copyrighted software for user does not have an active license is strictly

User should be aware that downloading or transmitting software could lead to

civil or criminal actions against the user and the resort

Company confidential information

Resort confidential information should never be transmitted or forwarded to

outside individuals or companies not authorized to receive that information.

Using laptop or installing computer related hardware

User may not use laptop and connect to resort network without permission of

Department Head or IT Manager. Connecting laptop to resort network may

present a security risk or impede operations of resort network, due to the

system was limited of the number of computer.

camera is not allowed to use for network security and protect

m virus. Disciplinary action will occur whenever the IT

department has found where virus from.

Should some computer equipments are not work properly or damage please inform to

or directly report to IT department for further action.

In Addition, if you are unsure as to items appropriateness, consult the Information

Technology Department and / or Department Head. This policy can be amended any

time in order to support the user the work as smooth as possible and to ensure

not effect to the network system.

Posting, uploading, or downloading of

pornographic or vulgar message, photos, images, sound files, text files, video

and password for

any responsible that was made by other.

Unauthorized copying of copyrighted material and installation of any

an active license is strictly

User should be aware that downloading or transmitting software could lead to

Resort confidential information should never be transmitted or forwarded to

outside individuals or companies not authorized to receive that information.

twork without permission of

work may

present a security risk or impede operations of resort network, due to the

security and protect

the IT

Should some computer equipments are not work properly or damage please inform to

or directly report to IT department for further action.

In Addition, if you are unsure as to items appropriateness, consult the Information

This policy can be amended any

ooth as possible and to ensure it will

Page 3: Six Senses It Policy

Computer user policy create by Danai Thongsin http://vaohama.multiply.com Allowed changes to suit your personal

���������� ������ ����� ���������������� ������� ���� �����

������������ ������ �� �������������� ���� ������� ���������� ������� ��!����"��#!�� ���

�� � �$��"!%&����#������� � ������ �� (IT Request form) "�' �� �� �(�� �� �������� "(��

������� "!%��!%����#� ������ �� �� �(�����"�$ # � ������ ���#)' ��� (Computer basic) ���&����# �*+���

��� �� �������� ������ �� �( ��"(���'� ����$������� ���)% � ������ �� �) *,��-��(�.&��

����/��� ���� ���� �) �� ��������� �� �$���"!% &�(�(���-!���0��� �) �,1��������

����/� *,��-� �( �(��(�. "!% ��"/�� ����������$!� ���( ��## �(� “Handy drive USB; Camera; ���

&�(&����# �*+��� ���� ��"/�� ����������$!� �� �) �/���2�% virus "!%�������� *,��-� 2�%$����� ����$ #&���(� ���

��������)% � ����) �,1�������#��� #� �� ���������'�.

����������� Internet ������"!%�!�/��,1��� ���� ���� ����0���)% ��� ��� ��������"/��� �) ����"�����

$(�$����������(�. ���� �!��� �)% ����� ��� � �$�(�� �( ����� 2�% ���,1�&,��� ��# "�� ������ �� ��� �!���

����������������,"!%&�(� ���$� ��� ���,1���,"!%�,1� �������( ��##� ����� �) $/���������!���)% ���������

������������������ ����'�������� �������� ��!��� ���/� )% ��� � �$����� ��"/�� ��!�������"!%&�(� ���$����

�,1�)% � "(�� ���!�������"�'�3� ����� ����3 ���&��

����/� � ������ ��$(��#*�������������� ���&�(&����� � �"��#�) �,1�������� (����� ����� ��������� ��������

��� ����� ���� ������� �������� ���!�� "�#������$����������������������� �������# ��������� ���

���%&��'( ����������()��������� �� �%&��'(�*���������)��������� ��)����+�)���������%&��'(����, ��&-�

*���������.����) ��� *,��-�"!%�����/����&�(��!�� �) #���( �$!� ��������� ���# �� �������"��#��)%

�/������������������� � ������ �� ��)% �/������������� �) ���%����� � � ���$���#���,3�#������ ����

�0������������ ������ ���*��� *����1#��#%��)�� ��������������*1�� � $!������������*��������� ����� ��� ���)����� ��������

�*�#��#������� ��� )��*����&!�� ��������!�����$!� ����.����# ��������+�� ��������&-����� �����������$ ������������(*����1���*��)��

���)���&-�)&���������� ������&-����� ���� 2��������&-� 2������'�

Page 4: Six Senses It Policy

Six Senses Hideaway Samui

Danai Thongsin IT Manager 2008 Page 1

Information systems manager Job description

Job description

An information systems manager is responsible for the computer systems within a company,

overseeing installation, back up systems operate effectively, purchasing hardware and software,

providing the ICT technology infrastructures for an organization, and contributing to

organizational policy regarding quality standards and strategic planning.

Information systems managers work in every size of organization in industry and the service

sector, usually with a staff of technicians, programmers and database administrators reporting

to them.

Although the title of information systems manager is becoming more commonly used within the

ICT sector, job titles may vary, for example, you might be a service delivery manager in a non-

profit organization and a function manager in a financial institution.

Typical work activities

Information systems managers are responsible for the implementation of technology within an

organization and direct the work of systems/business analysts, computer programmers, support

specialists, and other computer-related workers. The post holder will usually be an experienced

worker with technical expertise coupled with an understanding of business and management

principles. Duties within the role are ultimately dependent on the employing organization and the

complexity of its information systems.

Standard activities are likely to include:

• evaluating user needs and system functionality and ensuring that ICT facilities meet

these needs;

• planning, developing and implementing the ICT budget, obtaining competitive prices from

suppliers where appropriate, to ensure cost effectiveness;

• scheduling upgrades and security backups of hardware and software systems;

• researching and installing new systems;

• ensuring the smooth running of all ICT systems, including anti-virus software, print

services and email provision;

• ensuring that software licensing laws are adhered to;

• providing secure access to the network for remote users;

• ensuring the security of data from internal and external attack;

• providing users with appropriate support and advice;

• managing crisis situations, which may involve complex technical hardware or software

problems;

Page 5: Six Senses It Policy

Six Senses Hideaway Samui

Danai Thongsin IT Manager 2008 Page 2

• mentoring and training new ICT support staff;

• Keeping up to date with the latest technologies.

Companies going through business process re-engineering may well look to the information

systems manager to deal with change management. This requires an understanding of the

capabilities and constraints of technology and resource implications in terms of budgets, plus

the training and recruitment of specialist staff.

Page 6: Six Senses It Policy

Six Senses Hideaway Samui

Danai Thongsin IT Manager 2008

IT technical support Job description and activities

IT technical support officers monitor and maintain the computer systems and networks

of an organization. They install and configure computer systems, diagnose hardware/software

faults and solve technical problems, either over the phone or face-to-face.

Organizations rely on accessing information via computers. Problems may arise through

systems failure, operator error or user misunderstanding. Businesses cannot afford to be

without the whole system, or individual workstations, for more than the minimum time taken to

repair or replace them.

Technical support officers are sometimes known as help desk operators, technicians or

maintenance engineers. The work is as much about understanding how packages are used as

applying detailed technical knowledge.

Typical work activities

In essence, technical support officers are responsible for ensuring the smooth running of

computer systems. Tasks vary depending on the size and structure of the organization, but will

typically include:

• installing and configuring computer systems;

• monitoring and maintaining computer systems and networks;

• talking staff/clients through a series of actions, either face to face or over the

telephone;

• troubleshooting system and network problems and diagnosing and solving

hardware/software faults;

• finding solutions to problems, be it through creating a desktop shortcut or fixing a

major fault on the operating system;

• replacing parts as required;

• providing support, including procedural, documentation;

• following diagrams and written instructions to repair a fault or set up a system;

• running network applications to support systems and users; Helpdesk support

• supporting new applications;

• setting up new users;

• responding within agreed time limits to call-outs;

• working continuously on a task until completion (or referral to third parties, if

appropriate);

• prioritizing and managing several open cases at one time;

• rapidly establishing a good working relationship with other professionals (e.g., contract

businesses) in order to make necessary repairs;

• testing and evaluating new technology;

• Conducting electrical safety checks on computer equipment.

• Provide client support and technical issue resolution via E-Mail, phone and other

electronic medium.

Page 7: Six Senses It Policy

Six Senses Hideaway Samui

Danai Thongsin IT Manager 2008

• Configuration of client's equipment to connect to the Internet via modem/DSL Router

(Dialup/DSL customers only).

• Configure software to connect to Internet application servers.

• Provide training to clients in the use of system and applications as related to Internet.

• Obtain general understanding of OS and application operations related to company

offered services.

• Identify and correct or advise, on operational issues in client computer systems.

• Perform light lifting 25lbs.

• Perform creation of new accounts using company provide software tools.

Computer Skills: To perform this job successfully, an individual should have knowledge of Contact

Management systems; Database software; Internet software; Word Processing software, and

Firewall network protect system,

Qualifications:

To perform this job successfully, an individual must be able to perform each essential duty

satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or

ability required.