Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Do’s and Don’ts in IT

FPPT.com
Computer Security Do’s and Don’ts
Information Technology Division

Create strong passwords that are at


least eight characters long, and
including at least a
numerical value and a symbol, such as
#, to foil password-cracking software.
Avoid common
words, and never disclose a password
online.
• Change your password every ninety
days.
• Perform regular backups of
important data.
Create a
password for
your files in
order to protect
file sharing
activities.
• Delete any message that refers to groups or
organizations that you are not a part of.
• • Download and install software only from
online sources you trust.
• • Never click on a link from an untrusted
source.
• • Close windows containing pop-up ads or
unexpected warnings by clicking on the
“X” button in the upper most right hand
corner of that window, not by clicking
within the window.
• • Use antivirus software, and update it on a
regular basis to recognize the latest threats.
• DON’TS
• Never write down your password. Especially on a Post-
It note stuck to your computer!
• Never give out your password to anyone, whether you
know them or not.
• Never select the "Remember My Password" option.
Many applications do not store them
• securely.
• Never purchase anything promoted in a spam
message. Even if the offer isn’t a scam, you are
• only helping to finance and encourage spam.
• Please refrain from opening an e-mail attachment,
even from someone you know well, unless
• you were expecting it.
• Avoid creating common passwords such as your
name, social security, UNI, etcetera.
• Do not leave your laptop unattended, even for a
few minutes.
• Never reply to e-mail(s) requesting financial or
personal information.
• Avoid opening e-mail(s) or e-mail attachments from
an unknown sender.
• Please refrain from clicking on the close button
within pop-up ads.
• Under no circumstances should you install or use
pirated copies of software.
• Do not install P2P file sharing programs which can
illegally download copyrighted material.
• Never set your e-mail program to "auto-open"
attachments
DO'S AND DON'TS
These guidelines provide a brief reminder of the key obligations of people using the University's IT facilities. All users must be familiar with, and abide by, the IT Acceptable Use and Security Policy.
DON’TS
DON’TS
Don't access
pornographic or
obscene material or
material that could
offend others.
DON’TS

Don't let anyone else


use any of your
accounts or tell
anyone your
password.
DON’TS
Don't
download
videos, music or
anything else
that's
copyrighted by
other people.
DON’TS
• Don't use IT facilities to bully or
harass other people.
• Don't install unlicensed or malicious
software.
• Don't use IT facilities to advertise
goods or services.
• Don't uninstall security software
from your University-owned devices.
DO’S
• Follow the SecureIT advice about IT security.
• Log out of computer systems when you have finished
using them.
• Only use University IT systems for purposes relating to
your study, research or work at the University.
• Remember that all use of IT facilities is logged and
monitored.
• Remember that every website you visit or page that
you print costs the University money.
• Think carefully about your online conduct to protect
personal information.
• Keep your operating systems and software up to date.
• A comprehensive list of web content do's and don'ts is
maintained by the Marketing and Communications
Team.
• Tips and Dos & Don'ts
• 1. Do not share your passwords
• 2. Turn off electronic devices (monitors, computers,
panels, TVs, projectors, etc...) when not in use to
prolong the life of the device
• 3. Save all your documents/files to your H drive to
avoid losing anything in case your technician has to
image your computer (this will delete everything
including your programs installed locally)
• 4. When logging into a computer use YOUR user
name and password not somebody else's and do not
let anybody else use yours.
• 5. Logoff/Logout when leaving a computer you
have logged in from, including if you are just "going
to be gone for only a couple of minutes".
• 7. Use the "web" for instructional purposes
• 8. Only be logged into one computer at a time.
• 9. We can not put District Software on a personal
equipment/device
• 10. We can not put personal software on Lex2
equipment/devices
• 11. Do not listen to music or watch videos via the web
during your "down time". Videos are bandwidth hogs,
your colleagues may need the bandwidth for
instructional needs.
• 12. Do NOT open email attachments unless you were
expecting it. Email the user back and ask if it is indeed
from them. Hackers will "fake" an email account in an
attempt to trick people into giving out information or
to install viruses.

You might also like