Download presentation
Presentation is loading. Please wait.
Published byDwayne Henry Modified over 9 years ago
1
Technology Updates RCAS vs. State System Email Vault Email Overload Security Policies In/Out Board H1N1 IT and Financial Office Preparedness Lesa Quinn, Chief Information Officer HELPDESK Number: 515-252-4782
4
State IT vs. RCAS Pros and Cons Pros: No Background Checks and stringent security requirements No approval from Unions to perform checks Able to load specialty software Electronic transfers to State Systems No CAC Cards Downtime is drastically reduced Manage your own IT personnel Cons: Cannot see global address list for entire Army Guard. Can see guard employees if manually entered. Cannot access some NG systems Cannot access policies and regulations through Guard Intranet Expensive – new hires, helpdesk requirements, software and hardware licenses If you were a COL would you want your employees on a different system than you are on?
5
Email Vault Email Vault System - Symantec Allows for backing up all email, deletion of emails, incoming and outgoing emails.
6
Tips for Mastering Email Overload Checking email too often is a significant productivity drain. Assign times you want to check your email during the day. Turn off automatic email notification. Inbox should be used as a “Tickler” file. Only handle email once Folders are very important to manage email accounts. Pick up the phone ! Email will be monitored and space requirements may have to be implemented. Do not use work email for personal ads.
7
Security Important to keep passwords to yourself. Never allow another person to use your password. Downloads should be limited to business use only. Laptop Encryption Software “WinMagic” is installed on every laptop in the Department. Family members using laptops at home. We do security spot checks every 6 months
8
Departmental Policies Internet Policy Acceptable Use Policy Password Policy Email Retention Policy
9
Department Internet Policy Internet Usage – privilege – work tool Avoid uses of the network that reflect poorly on the Department or on State government. Respect privacy, sending pictures, etc. Downloading Listening to radios, music, etc. Limits our bandwidth and is very costly to the Department.
10
Acceptable Use Policy (Details Unacceptable Use) Excessive Personal Use Chain Letters Gambling Engaging in Unlawful Activities Knowingly harming our network or using network for spam or other unlawful activity. Use for personal profit.
14
Disaster Preparedness – H1N1
15
DISASTER PREPAREDNESS – H1N1
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.