On daily basis, both business owners and workers make use of various computer information systems infrastructure. At a basic level, what does computer information system mean? Computer information systems consist of things like computer hardware & software, networking, databases, programming, the Internet, etc. No doubt, the successful integration of these IT systems remains a key component of good business transformation strategy.
A typical computer information system focuses on essential information technologies that provide specific tools for job processing, analysis, and development. It can be integrated into business processes across different sectors. Nevertheless, there are rules and principles guiding the use of this important company resources. In this write-up, we shall explore the Information System best practices that workers are to follow. These acceptable best practices when using any company’s IT infrastructure will be x-rayed.
Computer Information Systems Acceptable Usage Rules and Priciples
Securing corporate information systems infrastructure is a shared responsibility. Businesses, IT administrators and users have a role to play in order to safeguard the integrity of the communication systems. Here are some of the rules that should govern the use of IT infrastructure resources by workers in any organization:
1. Keep your Password Private
Do not share your password with your colleagues or friends. When you share your password, it may trigger a chain reaction that will expose your password known to all your colleagues or friends. This is commonplace with persons who have exclusive access right to certain company IT resources that others would like to have.
2. Treat Corporate Accordingly
No company data whether user-generated or not should reside on the user’s local system but on the network file server for storage, backup, availability and business continuity purpose.
3. No Password Caching
Do not allow your password to be cached on a computer system or saved by the application you use. This always leads to automatic login whenever you start the application. This practice is a security risk because anyone on your computer can impersonate you into the application.
The email resources of the company must never be used to distribute spam emails, hoaxes, etc.
5. Installation of Unauthorized Third-Party Softwares
Users of corporate IT infrastructure should not create, run, download or install on any computer system or network, third-party applications such as music files, video files. This also includes all unauthorized computer programs intended to damage or overwhelm processing, storage and bandwidth capacities of corporate IT infrastructure.
6. Keep Computer Screens Always Locked.
Computer Screens should be locked with a screensaver or you log off your computer system when not in use.
7. Computer Systems Integrity
The integrity of computer systems must be respected at all times. Users of systems should not divulge security tokens or pins, private keys or any similar elements to anyone else. Workers should not exploit sessions left open or otherwise misappropriate or steal the “identity” of another employee.
8. Computer Information Systems Licenses
Organizations acquire different licenses for a number of applications and proprietary programs. Users are not to redistribute such software or applications without approval from the relevant authorities. This prevents a breach of copyright laws and licensing agreement.