Learner Resources Learner Resources


Careers in Information Technology – Career Options - Level 2   


Computing Code of Practice


This regulation has been developed to ensure appropriate and safe use of
computer hardware, software and material by learners and staff.


Programme Specific Requirements

A full copy of the Computing Code of Practice and Computing Venue
Requirements will be visible to learners in every venue.


Computing Code of Practice

  • All file and folder searches should be performed in a manner to avoid accessing non-related or sensitive material. For example restrict your search to relevant folders, drives and shares.
  • Other people’s files and folders should not be browsed casually or accessed without good reason and proper authority.
  • Computer users should only access equipment and resources when authorised to do so, and for work and study purposes only.
  • Computer users must show respect and operate within copyright laws. If unsure of your rights you should investigate the rights of the copyright holder.
  • Users must not access downloaded software or use any software in breach of antipiracy laws.
  • Sensitive or potentially objectionable material should be stored in a manner that avoids it being opened accidentally.
  • Illegal or inappropriate material must not be stored or access on computers at your venue at any time.


Computing Venue Requirements

  • Files and folders are to be logically structured and named using relevant and recognisable file names and stored in appropriate locations.
  • Sensitive files should be protected using passwords where required. Computer users will not share passwords.
  • Important files should be saved regularly during editing.
  • Important files should be backed up using the most appropriate method available.
  • Current and effective antivirus software must be running on all workstations.
  • Computer users must avoid exposure to viruses and malicious software.
  • Access to workstations should always require a user to sign on using a password.
  • All computer users must shutdown their computers at the end of each day.
  • Workstations should only operate in secure, lockable areas that can be monitored.
  • All power on/power off procedures must be performed in a manner to avoid damage to hardware and software.
  • Computers and the computing environment must be kept clutter and dust free using methods provided in training.
  • Computer software maintenance must be carried in accordance with the methods and schedules developed by the Programme Manager.