Wake Forest University How To Care For Your New ThinkPad AND Computer Usage Policies.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Laptop Responsibilities Memorial Middle School Laredo ISD.
Florence High School 1:1 Laptop Initiative Parent Training July 2010.
Northside I.S.D. Acceptable Use Policy
Computer Care. The Power Cord Dont drop your laptop.
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Clovers Connected Classroom Welcome to Our district mission is to prepare each child for a successful, productive and responsible future. Mobile devices.
Hart District Acceptable Use Policy Acceptable Use Policy.
Baltic High School Classroom Connections Presentation.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
The Woodlands High School
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Boyertown Area School District Acceptable Use Policy.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Riverside Community School District
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
INTERNET and CODE OF CONDUCT
10 Essential Security Measures PA Turnpike Commission.
ThinkPad Twist Convertible Laptops and Cart. Set Up and Clean Up Cleanly remove and return computers. Carefully unplug laptops without yanking power cords.
Student Guide to Laptop Use GETTING READY: The Basic Steps in Using the Laptop Computers!
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
HIPAA PRIVACY AND SECURITY AWARENESS.
Elementary GCCISD Agreement for Computing and Electronic Communications.
Employee Guidelines for Acceptable Use of Technology Resources.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Student Guide to Laptop Use GETTING READY: The Basic Steps in Using the Laptop Computers!
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Washington County Public Schools Helpful Technology Tips Technology Department Presented by Rhonda Orndorff Senior HelpDesk
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
COMPUTER LAB Orientation and Ethics Competency 1.
Grinnell High School Laptop Roll-Out: August 21, 2014 PURPOSE: To inform students of the expectations, policies, protections, care & maintenance information,
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Knowledge and Consequences MCPS COMPUTER USE LESSONS.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Lesson 01: Computer Lab Regulations Lab Organisation
Secondary GCCISD Agreement for Computing and Electronic Communications.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
Laptop Overview Jackie Sizemore Instructional Technology Specialist.
1 COMPUTER LAB REGULATION
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
Computer Information Science (TIK201) Class Rules & Regulations.
Woodland Hills School District Computer Network Acceptable Use Policy.
LAPTOP USE & POLICIES Laptop Acceptable Use Policy Everyone signed a copy of this policy when you received your laptop, therefore you have.
Ticket Training Tuesday Properly Safeguarding Personally Identifiable Information (PII)
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
COMPUTER SAFETY AND CARE
Enfield Public Schools Teacher Laptop Program. Special thanks to Paul Russell and the Town of Enfield Information Technology Department.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Computer Use Guidelines
Chromebook Student User guide
Everything You Need to Know about the Chromebook
Onslow County Schools Jacksonville Commons Elementary 1:1 Initiative
Instructional Technology
Chromebook Student User guide
Responsible Use Policy
Student User Agreement and Policy 2022
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Wake Forest University How To Care For Your New ThinkPad AND Computer Usage Policies

Care of the ThinkPad Do Not load any unauthorized software on the ThinkPad. Do Not attempt to disassemble the ThinkPad. Do Not drop your ThinkPad. Do Not expose your ThinkPad to extreme temperatures.

Care of the ThinkPad Your display will function properly if kept at room temperature. Clean the display ONLY with a soft moist cloth. Never use cleaners. Always unplug the modem cord from the wall jack when not in use. Unplug the modem when a storm is approaching.

Care of the ThinkPad Never scratch, hit, twist or push the surface of the display. The screen is the most expensive component of the computer! Transport the ThinkPad as little as possible while in use. Carry the ThinkPad in a carrying case. Never turn on a wet computer. To shut down the ThinkPad, select Shutdown from the Start menu and follow those instructions.

Maximizing Battery Life Adjust the display contrast control to the lowest viewable level. Close display when it is not being used. Use the ThinkPad power saving options. Remove any CDs from the CD drive when possible.

Travel Tips Never leave the ThinkPad unattended. DO NOT take the ThinkPad through the metal detector. Send the ThinkPad through the x-ray machine only when you are ready to go through.

Travel Tips Always carry the ThinkPad on board - NEVER check it in with your luggage. DO NOT put the ThinkPad in the overhead compartment. Store the ThinkPad under the seat when not in use. If traveling in a small private plane, do not use the ThinkPad in-flight. If traveling internationally see Chpt. 10 of your Technology guide for warranty information.

Security If you must leave the ThinkPad unattended in study rooms, lock it down! Do Not leave your ThinkPad unattended and visible in a car. Do Not lend your ThinkPad to anyone. Call University Police to report ThinkPad theft ( )

Insurance Your ThinkPad is insured. The fee is built in. The policy covers all damage (except in the case of negligence). The policy has a deductible for each incident. The deductible is the personal responsibility of the USER!

Insurance The ThinkPad is not insured for theft from an unlocked vehicle or intentional damage. The ThinkPad is not covered if it is loaned to another person.

Computer Usage Policy This policy is intended to promote responsible, ethical use of the computing resources of Wake Forest University. This policy applies to all computer and computer communication facilities owned, leased, operated, or contracted by the University.

General Principles AC (Academic Computing) is for the instructional and research use of WFU students, Faculty & Staff. Authorized users only. Users are responsible for the proper use of the accounts. Users are responsible for protecting their login IDs and passwords.

These I Must Remember …. Prohibited Activities

Prohibited Activities: Using the computer access privileges of others. Providing any unauthorized users access to your personal login. Illegal copying of software or data. Harassing others in any way.

Prohibited Activities Accessing, copying or modifying the files of others without permission. Intentionally creating, modifying or copying files to or from areas to which you have no access. Disguising one’s identity in any way; sending falsified messages, etc.

Prohibited Activities The establishment of any function which provides unauthorized access via the internet connection or otherwise. Any use not consistent with instructional and research purposes, such as commercial activity.

Disciplinary Actions If you violate any of the above prohibited activities, your user access will be immediately SUSPENDED

Disciplinary Actions Review Process IS will notify you in writing. You have 7 days to respond. You may be reinstated; or –Possible one year suspension. –Possible civil and criminal actions.

System Monitoring This policy statement serves as notice to all users of the Academic Computing System that regular monitoring of system activities occurs. Staff routinely monitor the following information:

System Monitoring System log files. System directories, storage areas, work areas and all outsiders use of users’ home directories. Mail messages with invalid recipient or sender fields.

System Monitoring All directories are searched for the presence of “setuid” and “hidden” files. Unsuccessful attempts to log in. Attempts to disguise the source of E- mail. Any activity which appears to compromise security. A complaint brought by another user will result in examination of relevant information.

Take Care of your Think Pad! Read the Technology Guide. Have a safe and happy year!