Operational Procedures: Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts Flashcards
While working on a user’s computer, you notice files that violate the Acceptable Usage Agreement the user signed when employed by the company. The IT department has specific policies for dealing with violations. What should you do?
Follow the procedures for dealing with this violation
A user asks you to install a new software application. It’s not approved by the company, and is on a compact disc with the application name written on it. What should you do?
Instruct the user that he must obtain installation approval and a licensed copy of the software
What should you do if you discover inappropriate material on a company owned computer and a company use policy exists that addresses this specific situation?
Follow the procedures for dealing with this violation
You find out a user has given her password to two coworkers, which violates the company’s security policy. What should you do?
Inform your supervisor of the department’s violation of the security policy.
Installing software from the same installation CD using multiple licenses is an example of pirated software.
True or false?
False
As long as a company has purchased multiple licenses, you can use the same CD however many times you want (til you run out of licenses)
You notice several offensive files on a user’s computer. Your company does not have an Acceptable Use Policy. What should you do?
Contact your supervisor
What should you do if you arrive at a house and only a child is present?
Explain that you must have an adult present to do work.
Offer to reschedule the service call if possible.
What should you do if you find inappropriate material on a company owned computer, but no specific company computer use policy exists?
Inform your supervisor of the inappropriate material