Instructions For Computer Users
Instructions For Computer Users
INSTRUCTIONS:
End users are responsible for keeping their computer clean and in good working
condition. They should get continuous training. They have to make regular backup of
their important data files. They have to protect computer from virus and avoid
unauthorized usage of computer. Avoid dusty environment. Cleaning of computer is
carried out on monthly basis. However, they are not supposed to open the CPU/
peripherals and fix hardware problems at their own.
The user of each computer shall observe the following:
Accession for servicing.
Avoid damage to the computer.
Ensuring proper connection and power supply before switching on.
Ensuring the proper shutdown of the computers.
Neither smoke nor take any meal while operating or sitting closer to his desk.
Never leave the computer unattended.
For acceptable use of resources one must:
Use resource only for authorized purposes.
Protect user ID and system from unauthorized use.
Access only information that is owned, that is publicly available, or to which being
authorized.
Use only recommended versions of software.
Be considerate for shared resources. Refrain from monopolizing systems, overloading
networks with excessive data, degrading services, or wasting computer time, connection
time, disk space, printer paper, manuals, or other resources.
For acceptable use of resources one must not:
Use another person’s system, files, or data without permission (note that permission
from an individual user may not be sufficient- some systems may require additional
authorization)
Give password to another person.
Use computer programs to decode passwords or access-control information.
Attempt to circumvent or subvert system or network security measures.
Engage in any activity that might be purposefully harmful to systems or to any
information stored thereon, such as creating or propagating viruses, worms, or “Trojan
horse” programs; disrupting services; damaging files; or making unauthorized
modifications.
Use mail or messaging services to harass or intimidate another person, broadcasting
unsolicited messages, by repeatedly sending unwanted mail, or by using someone else’s
name or user-ID.
Waste shared computing or network resources, by intentionally placing a program in an
endless loop, printing excessive amounts of paper, or by sending chain letters or
unsolicited mass mailings.
Use the MetaApp’s systems or networks for commercial purposes; by performing work
for profit with MetaApp resources in a manner not authorized by the MetaApp.