© 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 10 1 Chapter 11: The IT Professional IT Essentials v5.0.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch10. Communication Skills.
Chapter 10: Communication Skills
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
PC Support & Repair Chapter 10 Communication Skills.
© 2011 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of The Complete A+ Guide to PC Repair 5/e Chapter 5 Logical Trobleshooting.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
ICAICT202A - Work and communicate effectively in an IT environment
INTERNET and CODE OF CONDUCT
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
The Do’s and Don’ts of Online Communication
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Methods of communication
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 10 1 Chapter 10: Communication Skills IT Essentials: PC Hardware and Software.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 10: Communication Skills IT Essentials: PC Hardware and Software.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 16 1 Chapter 10: Communication Skills IT Essentials: PC Hardware and Software.
PC Support & Repair Chapter 10 Communication Skills.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Communication in the construction industry
The Complete A+ Guide to PC Repair 5/e Update Chapter 5 Logical Trobleshooting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
To navigate the slide presentation, use the navigation bar on the left OR use your right and left arrow keys. Move your mouse over the key terms throughout.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Computer Forensics Principles and Practices
IT Technical Support 1. Introduction Technical support personnel offer support for individual and organizations in a variety of ways. This module focuses.
CHAPTER 6 The Professional PC Technician Suraya Alias.
According to netiquette simply refers to our behavior the internet.
Unit 4 Legal and Ethical Responsibilities. 4:1 Legal Responsibilities Copyright © 2004 by Thomson Delmar Learning. ALL RIGHTS RESERVED. 2 Introduction.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
+ netiquette. + Objectives Understand the meaning of the term “Digital Citizen” Demonstrate an understanding of the need to practice cyber safety, cyber.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
IT Essentials: PC Hardware and Software v4.0. Chapter 4 Objectives 4.1 Explain the purpose of preventive maintenance 4.2 Identify the steps of the troubleshooting.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 4 1 Chapter 4: Basics of Preventive Maintenance and Troubleshooting IT.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Unit 1: Communications. Telephone Skills at Work To use your telephone effectively, you need to manage its use. Once you are using the telephone you need.
Course ILT Troubleshooting Unit objectives Describe methods to help prioritize network problems List basic troubleshooting steps to be followed when working.
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
© 2007 The McGraw-Hill Companies, Inc. All rights reserved The Complete PC Tech Chapter 24.
By: Julianna Leach.  PC Support Technician- They work on site and are responsible for in general maintenance.  PC Service Technician- Goes to customer.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
Systems Analysis & Design 7 th Edition Systems Analysis & Design 7 th Edition Toolkit 1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Systems Analysis and Design 9 th Edition Toolkit A Communication Tools By: Prof. Lili Saghafi.
Professional Behavior What Supervisors Need to Know.
I T Essentials I Chapter 10 IT Competition 2006 JEOPARDY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Help Desk Working at a Small-to-Medium Business or ISP – Chapter.
Effective Customer Support IT Essentials v5.0. Introduction  Troubleshooting is as much about communicating with the customer as it is about knowing.
INTRODUCTION TO DESKTOP SUPPORT
Internet Etiquette or Netiquette
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
Chapter 13 The IT Professional
Chapter 10: Communication Skills
Chapter 10: Communication Skills
The Issues with Technology in education
Chapter 13: The IT Professional
Presentation transcript:

© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 10 1 Chapter 11: The IT Professional IT Essentials v5.0

ITE PC v4.1 Chapter 10 2 © Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 11 Objectives  11.1 Explain the relationship between communication and troubleshooting  11.1 Describe good communication skills and professional behavior  11.2 Explain the ethics and legal aspects of working with computer technology including computer forensics and cyber law  11.3 Describe call center environment and technician responsibilities

ITE PC v4.1 Chapter 10 3 © Cisco Systems, Inc. All rights reserved. Cisco Public Introduction  Troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer.  Learn to use good communication skills as confidently as you use a screwdriver.

ITE PC v4.1 Chapter 10 4 © Cisco Systems, Inc. All rights reserved. Cisco Public Communication and Troubleshooting  A knowledgeable technician who uses good communication skills will always be in demand in the jobs market. As technical knowledge increases, so does ability to quickly determine a problem and find a solution.  A technician should establish a good rapport with the customer since a relaxed customer is better able to explain the details of the problem.  The technician has access to several communication and research tools. Any of these resources can be used to help gather information for the troubleshooting process.

ITE PC v4.1 Chapter 10 5 © Cisco Systems, Inc. All rights reserved. Cisco Public Communication and Professionalism  A technician’s professionalism and good communication skills will enhance their creditability with the customer.  Successful technicians control their own reactions and emotions from one customer call to the next.

ITE PC v4.1 Chapter 10 6 © Cisco Systems, Inc. All rights reserved. Cisco Public Determine the Problem  Know - Call the customer by name.  Relate - Use brief communication to create a one-to-one connection between you and your customer.  Understand - Determine what the customer knows about the computer to effectively communicate with the customer.  Practice active listening skills. Listen carefully and let the customer finish speaking.  After the customer has explained the problem, clarify what the customer has said.  Ask follow-up questions, if needed.  Use all the information to complete the work order.

ITE PC v4.1 Chapter 10 7 © Cisco Systems, Inc. All rights reserved. Cisco Public Holds and Transfers Putting a customer on hold:  Let the customer finish speaking.  Explain that you will put the customer on hold and why.  Ask for their permission to do so.  Explain how long they will be on hold and what you will be doing during that time. Transferring a customer:  Let the customer finish speaking.  Explain that you will transfer their call, to whom, and why.  Tell them the number you are transferring them to.  Ask for their permission to do so.  Thank the customer and explain the details of the transfer.  Tell the new technician the details of the case.

ITE PC v4.1 Chapter 10 8 © Cisco Systems, Inc. All rights reserved. Cisco Public Types of Difficult Customers Recognize traits to manage a call accordingly.  A talkative customer discusses everything except the problem and uses the call to socialize.  A rude customer complains during the call, makes negative comments, may be abusive and uncooperative, and may be easily aggravated.  An angry customer talks loudly, tries to speak when the technician is talking, is usually frustrated and upset that they have to call somebody to fix the problem.  A knowledgeable customer wants to speak with a technician that is equally experienced in computers and usually tries to control the call.  An inexperienced customer has difficulty describing the problem and may not able to follow directions correctly.

ITE PC v4.1 Chapter 10 9 © Cisco Systems, Inc. All rights reserved. Cisco Public Proper Netiquette  Be pleasant and polite.  Open with an appropriate greeting.  Check grammar and spelling.  Remember you are dealing with people.  Follow the standards of behavior that you follow in the rest of your life.  Know where you are in cyberspace.  Respect other’s time and bandwidth.  Be ethical.  Share expert knowledge.  Respect the privacy of others.  Forgive other’s mistakes.  Use mixed case lettering. All upper case lettering is considered SHOUTING.  Never send chain letters through .  Do not send or reply to flames.  If you would not say it to their face, then do not send or post.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Workstation Ergonomics  Make sure that your desk layout works well.  Have your headset and phone in a position that is easy to reach and easy to use.  Adjust your chair to a comfortable height.  Adjust your monitor to a comfortable angle.  Place your keyboard and mouse in a comfortable position.  Minimize external distractions such as noise.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Service Level Agreements (SLA)  A contract defining expectations between an organization and the service vendor to provide an agreed upon level of support.  A legal agreement that contains the responsibilities and liabilities of all parties involved.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Business Policies Be aware of all business policies about customer calls.  Maximum time on call  Maximum time in queue  Number of calls per day  How to pass calls  Promises to customer  Follow SLA  When to escalate

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Ethics and Legal Considerations  Respect the customers and their property including their equipment and their data: s Phone lists Records or data on the computer Hard copies of files, information, or data left on desk  Obtain customer’s permission before accessing their account.  Divulging any customer information is unethical, and may be illegal.  Do not send unsolicited messages or mass s to customers.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Ethics and Legal Considerations  Actions such as the following are generally considered illegal. It is not permissible to make any changes to system software or hardware configurations without customer permission. It is not permissible to access a customer’s or co-worker’s accounts, private files, or messages without permission. It is not permissible to install, copy, or share digital content (including software, music, text, images, and video) in violation of copyright and software agreements or the applicable law. It is not permissible to use a customer’s company IT resources for commercial purposes. It is not permissible to make a customer’s IT resources available to unauthorized users. It is not permissible to knowingly use a customer’s company resources for illegal activities. It is not permissible to share sensitive customer information.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Legal Procedures Overview  Computer Forensics is the collection and analysis of data from computer systems, networks wireless communications, and storage devices as part of a criminal investigation.  Illegal computer or network usage may include: Identity theft Using a computer to sell counterfeit goods Using pirated software Using a computer or network to create or sell unauthorized copies of copyrighted materials Pornography  Two basic types of data are collected: Persistent Data –Stored on a local drive, when computer turned off this data is preserved. Volatile Data – Stored in Ram and cache, disappears when computer is turned off.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Cyber Law  Cyber Law is a term to describe the international, regional, country, and state laws that affect computer security professionals  Cyber law explain the circumstances under which data (evidence) can be collected from computers, data storage devices, networks, and wireless communications  IT professionals should be aware of the cyber laws in their country, region, or state.  In the United States, cyber law has three primary elements: Wiretap Act Pen/Trap and Trace Statute Stored Electronic Communication Act  First Response is the term used to describe the official procedures employed by those people who are qualified to collect evidence. System administrators are usually the first responders at potential computer crime scenes.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Documentation and Chain of Custody  The following, at a minimum, should be documented if illegal activity is discovered: Initial reason for accessing the computer or network Time and date Peripherals that are connected to the computer All network connections Physical area where the computer is located Illegal material found Illegal activity that you have witnessed (or you suspect has occurred) Which procedures you have executed on the computer or network  Chain of Custody - For evidence to be admitted, it must be authenticated. A system administrator should be able to prove how this evidence was collected, where it has been physically stored, and who has had access to it between the time of collection and its entry into the court proceedings..

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public A Call Center  Usually very professional and fast-paced  A help desk system  Customers call in and are placed on a callboard  Available technicians take the customer calls  All the computers in a call center have help desk software. The technicians use this software to manage many of their job functions.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Level-one Technician Responsibilities  Gather pertinent information from the customer.  Document all information in the ticket or work order.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Level-two Technician Responsibilities  Usually more knowledgeable about technology.  May have been working for the company for a longer period of time.  Receives escalated work orders from level-one technicians.  Calls the customer back to ask any additional questions.  May use remote access software to access the customer’s computer to diagnose the problem and possibly to resolve the issue.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 11 Summary  To be a successful technician, you will need to practice good communication skills with customers and coworkers. These skills are as important as technical expertise.  You should always conduct yourself in a professional manner with your customers and coworkers. Professional behavior increases customer confidence and enhances your credibility. You should also learn to recognize the classic signs of a difficult customer and learn what to do and what not to do when you are on a call with them.  There are a few techniques that you can use to focus a difficult customer during a call. Primarily, you must remain calm and ask pertinent questions in an appropriate fashion. These techniques keep you in control of the call.  There is a right way and a wrong way to put a customer on hold, or transfer a customer to another technician. Learn and use the right way every time. Doing either of these operations incorrectly can cause serious damage to your company's relationship with its customers.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 11 Summary (Continued)  Netiquette is a list of rules to use whenever you communicate through e- mail, text messaging, instant messaging, or blogs. This is another area where doing things the wrong way can cause damage to your company's relationship with its customers.  You must understand and comply with your customer's service level agreement (SLA). If the problem falls outside the parameters of the SLA, you need to find positive ways of telling the customer what you can do for them, rather than what you cannot do. In special circumstances, you may decide to escalate the work order to management.  In addition to the SLA, you must follow the business policies of the company. These policies will include how your company prioritizes calls, how and when to escalate a call to management, and when you are allowed to take breaks and lunch.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 11 Summary (Continued)  A computer technician's job is stressful. You will rarely get to meet a customer who is having a good day. You can alleviate some of the stress by setting up your workstation in the most ergonomically beneficial way possible. You should practice time and stress management techniques every day.  There are ethical and legal aspects of working in computer technology. You should be aware of your company's policies and practices. In addition, you may need to familiarize yourself with your state or country's trademark and copyright laws.  Collecting and analyzing data from computer systems, networks, wireless communications, and storage devices is called computer forensics.  Cyber laws explain the circumstances under which data (evidence) can be collected from computers, data storage devices, networks, and wireless communications. First response is the term used to describe the official procedures employed by those people who are qualified to collect evidence.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public Chapter 11 Summary (Continued)  Even if you are not a system administrator or computer forensics expert, it is a good habit to create detailed documentation of all the work that you do. Being able to prove how evidence was collected and where it has been between the time of collection and its entry into the court proceeding is known as the chain of custody.  The call center is a fast-paced environment. Level-one technicians and level-two technicians each have specific responsibilities. These responsibilities may vary slightly from one call center to another.

ITE PC v4.1 Chapter © Cisco Systems, Inc. All rights reserved. Cisco Public