Careers in Information Technology – Career Options - Level 2
Computing Code of Practice
Regulation
This regulation has been developed to ensure appropriate and safe use of
computer hardware, software and material by learners and staff.
Programme Specific Requirements
A full copy of the Computing Code of Practice and Computing Venue
Requirements will be visible to learners in every venue.
Computing Code of Practice
- All file and folder searches should be performed in a manner to avoid accessing non-related or sensitive material. For example restrict your search to relevant folders, drives and shares.
- Other people’s files and folders should not be browsed casually or accessed without good reason and proper authority.
- Computer users should only access equipment and resources when authorised to do so, and for work and study purposes only.
- Computer users must show respect and operate within copyright laws. If unsure of your rights you should investigate the rights of the copyright holder.
- Users must not access downloaded software or use any software in breach of antipiracy laws.
- Sensitive or potentially objectionable material should be stored in a manner that avoids it being opened accidentally.
- Illegal or inappropriate material must not be stored or access on computers at your venue at any time.
Computing Venue Requirements
- Files and folders are to be logically structured and named using relevant and recognisable file names and stored in appropriate locations.
- Sensitive files should be protected using passwords where required. Computer users will not share passwords.
- Important files should be saved regularly during editing.
- Important files should be backed up using the most appropriate method available.
- Current and effective antivirus software must be running on all workstations.
- Computer users must avoid exposure to viruses and malicious software.
- Access to workstations should always require a user to sign on using a password.
- All computer users must shutdown their computers at the end of each day.
- Workstations should only operate in secure, lockable areas that can be monitored.
- All power on/power off procedures must be performed in a manner to avoid damage to hardware and software.
- Computers and the computing environment must be kept clutter and dust free using methods provided in training.
- Computer software maintenance must be carried in accordance with the methods and schedules developed by the Programme Manager.