six senses it policy
DESCRIPTION
IT PolicyTRANSCRIPT
![Page 1: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/1.jpg)
Six Senses Hideaway Samui
Computer use policy create by Mr. Danai Thongsin
Computer use policy: Policy restricting personal use of resort’s computer and/or
resort’s network
IT request form
• Information Technology Department has provided IT request form for all users
to register before using the
internet. The user are group
Head.
Basic computer assessment
• New computer user is required to do basic computer assessment
permitted by IT Manager prior to have
equipment.
User password
• For security purpose, each user is issued an account and password. This
password will grant the user access to information based on their job
requirements and security level.
password every 90 days.
believe their password is know by another user, they should change it
immediately. If they require assistance please contact Department Head or IT
Department. In addition,
prohibiting. They may be held responsible for any activities of that other person
while using that password.
Internet/intranet
• IT department will provide
source of global communication and research.
intranet users are required to put their user name and
law. The user must assume responsibility for using internet in an appropriate
manner. The user must remember to focus only on information contained within
the scope of the job function. IT Department will review the information or site
a user has visited.
Any user action that violates the appropriate usage policy may result in revoking
network privileges and may lead to legal action.
Six Senses Hideaway Samui
December 14, 2009
Mr. Danai Thongsin @ Six Senses Hideaway Samui
Policy restricting personal use of resort’s computer and/or
Information Technology Department has provided IT request form for all users
using the resort’s computer and e-mail, the intranet and the
. The user are grouped by department and be monitored by Department
New computer user is required to do basic computer assessment and be
permitted by IT Manager prior to have the right for using resort’s computer
each user is issued an account and password. This
password will grant the user access to information based on their job
requirements and security level. Hosts are required to change their
days. Hosts may change their password at any time. If they
believe their password is know by another user, they should change it
immediately. If they require assistance please contact Department Head or IT
Department. In addition, using another’s account or representing another user is
They may be held responsible for any activities of that other person
while using that password.
IT department will provide approved staff with ability to use the intern
source of global communication and research. Prior to access the internet /
intranet users are required to put their user name and password as
The user must assume responsibility for using internet in an appropriate
must remember to focus only on information contained within
function. IT Department will review the information or site
lates the appropriate usage policy may result in revoking
ileges and may lead to legal action.
Policy restricting personal use of resort’s computer and/or
Information Technology Department has provided IT request form for all users
intranet and the
by Department
and be
ort’s computer
each user is issued an account and password. This
password will grant the user access to information based on their job
Hosts are required to change their network
Hosts may change their password at any time. If they
believe their password is know by another user, they should change it
immediately. If they require assistance please contact Department Head or IT
using another’s account or representing another user is
They may be held responsible for any activities of that other person
use the internet as
Prior to access the internet /
strictly by
The user must assume responsibility for using internet in an appropriate
must remember to focus only on information contained within
function. IT Department will review the information or site
lates the appropriate usage policy may result in revoking
![Page 2: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/2.jpg)
Six Senses Hideaway Samui
Computer use policy create by Mr. Danai Thongsin
Pornographic Material and Vulgarity
pornographic or vulgar message, photos, images, sound files, text files, video
files or related materials is strictly prohibited.
Access to internet user must not remember their username
access to internet to avoid
Copyrighted
• Unauthorized copying of copyrighted material and installation of any
copyrighted software for user does not have
prohibited.
Downloading software
• User should be aware that downloading or transmitting software could lead to
civil or criminal actions against the user and the resort
Company confidential information
• Resort confidential information should never be transmitted or forwarded to
outside individuals or companies not authorized to receive that information.
Using laptop or installing computer related hardware
• User may not use laptop and connect to resort ne
Department Head or IT Manager.
present a security risk or impede operations of resort network, due to the
system was limited of the number of computer.
• Handy drive USB, camera is not all
any damage from virus. Disciplinary action will occur whenever
department has found where
Should some computer equipments are not work properly or damage please inform to
your Department Head or directly report to IT department for further action.
In Addition, if you are unsure as to items appropriateness, consult the Information
Technology Department and / or Department Head.
time in order to support the user the
not effect to the network system.
Six Senses Hideaway Samui
December 14, 2009
Mr. Danai Thongsin @ Six Senses Hideaway Samui
Pornographic Material and Vulgarity – Posting, uploading, or downloading of
pornographic or vulgar message, photos, images, sound files, text files, video
files or related materials is strictly prohibited.
ser must not remember their username and password for
access to internet to avoid any responsible that was made by other.
Unauthorized copying of copyrighted material and installation of any
copyrighted software for user does not have an active license is strictly
User should be aware that downloading or transmitting software could lead to
civil or criminal actions against the user and the resort
Company confidential information
Resort confidential information should never be transmitted or forwarded to
outside individuals or companies not authorized to receive that information.
Using laptop or installing computer related hardware
User may not use laptop and connect to resort network without permission of
Department Head or IT Manager. Connecting laptop to resort network may
present a security risk or impede operations of resort network, due to the
system was limited of the number of computer.
camera is not allowed to use for network security and protect
m virus. Disciplinary action will occur whenever the IT
department has found where virus from.
Should some computer equipments are not work properly or damage please inform to
or directly report to IT department for further action.
In Addition, if you are unsure as to items appropriateness, consult the Information
Technology Department and / or Department Head. This policy can be amended any
time in order to support the user the work as smooth as possible and to ensure
not effect to the network system.
Posting, uploading, or downloading of
pornographic or vulgar message, photos, images, sound files, text files, video
and password for
any responsible that was made by other.
Unauthorized copying of copyrighted material and installation of any
an active license is strictly
User should be aware that downloading or transmitting software could lead to
Resort confidential information should never be transmitted or forwarded to
outside individuals or companies not authorized to receive that information.
twork without permission of
work may
present a security risk or impede operations of resort network, due to the
security and protect
the IT
Should some computer equipments are not work properly or damage please inform to
or directly report to IT department for further action.
In Addition, if you are unsure as to items appropriateness, consult the Information
This policy can be amended any
ooth as possible and to ensure it will
![Page 3: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/3.jpg)
Computer user policy create by Danai Thongsin http://vaohama.multiply.com Allowed changes to suit your personal
���������� ������ ����� ���������������� ������� ���� �����
������������ ������ �� �������������� ���� ������� ���������� ������� ��!����"��#!�� ���
�� � �$��"!%&����#������� � ������ �� (IT Request form) "�' �� �� �(�� �� �������� "(��
������� "!%��!%����#� ������ �� �� �(�����"�$ # � ������ ���#)' ��� (Computer basic) ���&����# �*+���
��� �� �������� ������ �� �( ��"(���'� ����$������� ���)% � ������ �� �) *,��-��(�.&��
����/��� ���� ���� �) �� ��������� �� �$���"!% &�(�(���-!���0��� �) �,1��������
����/� *,��-� �( �(��(�. "!% ��"/�� ����������$!� ���( ��## �(� “Handy drive USB; Camera; ���
&�(&����# �*+��� ���� ��"/�� ����������$!� �� �) �/���2�% virus "!%�������� *,��-� 2�%$����� ����$ #&���(� ���
��������)% � ����) �,1�������#��� #� �� ���������'�.
����������� Internet ������"!%�!�/��,1��� ���� ���� ����0���)% ��� ��� ��������"/��� �) ����"�����
$(�$����������(�. ���� �!��� �)% ����� ��� � �$�(�� �( ����� 2�% ���,1�&,��� ��# "�� ������ �� ��� �!���
����������������,"!%&�(� ���$� ��� ���,1���,"!%�,1� �������( ��##� ����� �) $/���������!���)% ���������
������������������ ����'�������� �������� ��!��� ���/� )% ��� � �$����� ��"/�� ��!�������"!%&�(� ���$����
�,1�)% � "(�� ���!�������"�'�3� ����� ����3 ���&��
����/� � ������ ��$(��#*�������������� ���&�(&����� � �"��#�) �,1�������� (����� ����� ��������� ��������
��� ����� ���� ������� �������� ���!�� "�#������$����������������������� �������# ��������� ���
���%&��'( ����������()��������� �� �%&��'(�*���������)��������� ��)����+�)���������%&��'(����, ��&-�
*���������.����) ��� *,��-�"!%�����/����&�(��!�� �) #���( �$!� ��������� ���# �� �������"��#��)%
�/������������������� � ������ �� ��)% �/������������� �) ���%����� � � ���$���#���,3�#������ ����
�0������������ ������ ���*��� *����1#��#%��)�� ��������������*1�� � $!������������*��������� ����� ��� ���)����� ��������
�*�#��#������� ��� )��*����&!�� ��������!�����$!� ����.����# ��������+�� ��������&-����� �����������$ ������������(*����1���*��)��
���)���&-�)&���������� ������&-����� ���� 2��������&-� 2������'�
![Page 4: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/4.jpg)
Six Senses Hideaway Samui
Danai Thongsin IT Manager 2008 Page 1
Information systems manager Job description
Job description
An information systems manager is responsible for the computer systems within a company,
overseeing installation, back up systems operate effectively, purchasing hardware and software,
providing the ICT technology infrastructures for an organization, and contributing to
organizational policy regarding quality standards and strategic planning.
Information systems managers work in every size of organization in industry and the service
sector, usually with a staff of technicians, programmers and database administrators reporting
to them.
Although the title of information systems manager is becoming more commonly used within the
ICT sector, job titles may vary, for example, you might be a service delivery manager in a non-
profit organization and a function manager in a financial institution.
Typical work activities
Information systems managers are responsible for the implementation of technology within an
organization and direct the work of systems/business analysts, computer programmers, support
specialists, and other computer-related workers. The post holder will usually be an experienced
worker with technical expertise coupled with an understanding of business and management
principles. Duties within the role are ultimately dependent on the employing organization and the
complexity of its information systems.
Standard activities are likely to include:
• evaluating user needs and system functionality and ensuring that ICT facilities meet
these needs;
• planning, developing and implementing the ICT budget, obtaining competitive prices from
suppliers where appropriate, to ensure cost effectiveness;
• scheduling upgrades and security backups of hardware and software systems;
• researching and installing new systems;
• ensuring the smooth running of all ICT systems, including anti-virus software, print
services and email provision;
• ensuring that software licensing laws are adhered to;
• providing secure access to the network for remote users;
• ensuring the security of data from internal and external attack;
• providing users with appropriate support and advice;
• managing crisis situations, which may involve complex technical hardware or software
problems;
![Page 5: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/5.jpg)
Six Senses Hideaway Samui
Danai Thongsin IT Manager 2008 Page 2
• mentoring and training new ICT support staff;
• Keeping up to date with the latest technologies.
Companies going through business process re-engineering may well look to the information
systems manager to deal with change management. This requires an understanding of the
capabilities and constraints of technology and resource implications in terms of budgets, plus
the training and recruitment of specialist staff.
![Page 6: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/6.jpg)
Six Senses Hideaway Samui
Danai Thongsin IT Manager 2008
IT technical support Job description and activities
IT technical support officers monitor and maintain the computer systems and networks
of an organization. They install and configure computer systems, diagnose hardware/software
faults and solve technical problems, either over the phone or face-to-face.
Organizations rely on accessing information via computers. Problems may arise through
systems failure, operator error or user misunderstanding. Businesses cannot afford to be
without the whole system, or individual workstations, for more than the minimum time taken to
repair or replace them.
Technical support officers are sometimes known as help desk operators, technicians or
maintenance engineers. The work is as much about understanding how packages are used as
applying detailed technical knowledge.
Typical work activities
In essence, technical support officers are responsible for ensuring the smooth running of
computer systems. Tasks vary depending on the size and structure of the organization, but will
typically include:
• installing and configuring computer systems;
• monitoring and maintaining computer systems and networks;
• talking staff/clients through a series of actions, either face to face or over the
telephone;
• troubleshooting system and network problems and diagnosing and solving
hardware/software faults;
• finding solutions to problems, be it through creating a desktop shortcut or fixing a
major fault on the operating system;
• replacing parts as required;
• providing support, including procedural, documentation;
• following diagrams and written instructions to repair a fault or set up a system;
• running network applications to support systems and users; Helpdesk support
• supporting new applications;
• setting up new users;
• responding within agreed time limits to call-outs;
• working continuously on a task until completion (or referral to third parties, if
appropriate);
• prioritizing and managing several open cases at one time;
• rapidly establishing a good working relationship with other professionals (e.g., contract
businesses) in order to make necessary repairs;
• testing and evaluating new technology;
• Conducting electrical safety checks on computer equipment.
• Provide client support and technical issue resolution via E-Mail, phone and other
electronic medium.
![Page 7: Six Senses It Policy](https://reader030.vdocuments.us/reader030/viewer/2022020206/5464101db4af9f4e3f8b4806/html5/thumbnails/7.jpg)
Six Senses Hideaway Samui
Danai Thongsin IT Manager 2008
• Configuration of client's equipment to connect to the Internet via modem/DSL Router
(Dialup/DSL customers only).
• Configure software to connect to Internet application servers.
• Provide training to clients in the use of system and applications as related to Internet.
• Obtain general understanding of OS and application operations related to company
offered services.
• Identify and correct or advise, on operational issues in client computer systems.
• Perform light lifting 25lbs.
• Perform creation of new accounts using company provide software tools.
Computer Skills: To perform this job successfully, an individual should have knowledge of Contact
Management systems; Database software; Internet software; Word Processing software, and
Firewall network protect system,
Qualifications:
To perform this job successfully, an individual must be able to perform each essential duty
satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or
ability required.