Office of Diversity and Inclusion Management Information Systems Network Orientation and Policies

Slides:



Advertisements
Similar presentations
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
Advertisements

File Server Organization and Best Practices IT Partners June, 02, 2010.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Back Up and Recovery Sue Kayton February 2013.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
>> Press Enter to go to the Next Slide Backup Express Speed Backup Express Speed "Backup Express" will backup all your important files.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
November 2009 Network Disaster Recovery October 2014.
Data Security GCSE ICT.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
systemhound © Raxco Software Belgium systemhound PC inventory software.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Essential CCHS Computing Information Computer Applications September 2009.
CS101 Lecture 15 Keeping your computer healthy. How to keep your computer healthy You can’t! It is not a matter of if it will all go wrong, it is a matter.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Computer Basics   Active Directory and Domain   Profiles   Storage Services   Naming Conventions and File Management   Laptop Use.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Network Operating Systems versus Operating Systems Computer Networks.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Files and Folders What’s the difference?. What are files ? Collections of digital information created on or for computers click the mouse or press the.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Web Space CIS 141 – Basic Computer Literacy Western Kentucky University Bowling Green, KY.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Mail Attender for Exchange Technical Overview Presentation Introduction Sherpa Software Group Narrated by Thomas Hand Approximate Time 15 minutes.
SDK Moving Target David Turner. Folder Structure ArenaSDK folder as root Subfolder for each targeted version (i.e , , ) Create a Base,
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
MIS Team MIS. MIS Management Information Systems provide Infrastructure and Support to the Delivery and support teams.
Tech Competencies for the 21st-Century Librarian Starr Hoffman Librarian for Digital Collections University of North Texas Libraries San Antonio Public.
archiving. archiving is for downloading, keeping and protecting all sent and received messages (including attachments)so they can be.
Chapter 2 Securing Network Server and User Workstations.
Organizing Your Financial Records
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
Backup. What to back up? Pictures Documents (include s if using Off Line Program) Video’s Music System Image – Programs – Registry – Operating System.
Backing up By Betsy Weaver 8H. What is backup, and why should you do it? w So that you don’t lose all your files if you are attacked by a virus or hackers,
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Sydney Region Servers. Windows 2003 Standard Configuration Able to be supported remotely Antivirus updates managed from server.
Managing Data & Information Procedures & Techniques.
Copyright © 2005 Identi-Kit Solutions Faculty Quarterly Schedule of Events WhatWhoWhenNotes 1. Bulk usernames/ passwords ed to campus POC Identi-KitNot.
Operating systems What is an operating system? A program that: Controls hardware Controls software Creates an interface between the hardware and the user.
U1. Daily Operations of Computer Network Presented by: Law Hing Man.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Product Training 1 JetFlash Software Application.
Computer Security Sample security policy Dr Alexei Vernitski.
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
Presented by Peter Oldreive ICT Consultant in English Language Art, Social Studies, Fine Arts Eric Therrien ICT Consultant in Mathematics & Sciences Getting.
Computer Security Keeping you and your computer safe in the digital world.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Membership Updates.
Basic Guide to Computer Backups
PowerPoint presentation
Chapter 6 Application Hardening
Backing Up Your Computer
Back Up and Recovery Sue Kayton October 2015.
Jeopardy Data Hardware & Software Files and Folders Networking Q $100
Presentation transcript:

Office of Diversity and Inclusion Management Information Systems Network Orientation and Policies

ODI Management Information Systems Organizational Chart Norris Freeman Systems Operations Manager Al Stockard Systems Engineer Vincent Briley MIS GAA

Structure Restrictions Efficient Network Resource Usage Restart Policy for Security Updates ODI MIS Policies

Structure Separate drive mappings for units and personal directories All personal folders (H: Drives) are private. Only you can access your H: drive. Each unit has a folder on the W: drive. Users should save all work related files to there units’ folder on the W: drive. Within the W: drive is a folder called ODI_Common. Staff from different units can share files and see MIS databases in this folder.

Restrictions (aka Don’ts) 500MB server disk space limit for each user No personal pictures/graphics unless commonly used for work (i.e. ODI Logo) No personal software or music files on servers Do NOT save files to your computers hard drive (i.e. My Documents), instead save them to your network drives

Efficient Network Usage (aka Do’s) Save all non-restricted work related files to the W: drive When possible the location of big files not the files themselves to other ODI staff members Link Format is: drive letter\unit\folder example W:\ODI_Common\oma_pictures example W:\ODI_Common\oma_pictures

ODI MIS Policies Users must adhere to all US and state of Ohio computer laws Users must adhere to OSU and OMA computer policies Users must protect and secure student information Policies are outlined via websites :

Identity and Data Security Do not store data on Non-ODI owned servers or computers Never copy data with SSNs to flash drives or other portable media (ODI owned or personal) Do not send s with SSNs in them or include attachments with SSNs to Non- ODI personnel.

Backup Strategy Daily backups (incremental) Weekly backups (full) Monthly backups for 1 year (full)

Restart Policy for Security Updates Do not Shutdown PC at the end of the day. Instead restart PC and do not log back in. This allows your computer to receive up to date security patches

Questions CCCC oooo nnnn tttt aaaa cccc tttt M M M M IIII SSSS