2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines

Size: px
Start display at page:

Download "2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines"

Transcription

1 2017 HSC Information and Digital Technology Networking and Hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 D 13 B 14 C 15 C 16 A 17 A 18 D 19 C 20 B 1

2 Section II Question 21 (a) Identifies the purpose of a file extension and provides an example 2 Identifies the purpose of a file extension OR 1 Provides an example A file extension identifies the application required to open the particular file, eg.doc. Question 21 (b) Outlines TWO accessibility features of an operating system 2 Outlines ONE accessibility feature of an operating system OR Names TWO accessibility features Text to speech narration allows people with visual impairments to access written text by having it read out loud. Sticky keys makes it possible to use keyboard shortcuts without needing to press more than one key at once. Magnifier Voice control. 1 2

3 Question 21 (c) Explains the effect that the convergence of technologies has had on the ICT industry 4 Provides relevant examples Outlines the effect that the convergence of technologies has had on the ICT industry 3 Provides at least one relevant example Identifies some features of the convergence of technologies OR 2 Outlines ONE features of the convergence of technologies Shows a basic understanding of convergence 1 The incorporation of multiple functions within a single device has led to major changes in the ICT industry. Devices are now more complex and greater training is required for staff providing service and support for these devices. It has also led to a growth in the demand for software applications that run on mobile platforms. For example the smartphone usually includes a camera, a GPS, web browsing, ecommerce payment facilities, music, video and game player as well as a telephone. Other examples include multi-function printers that also scan, fax and copy. Question 22 Provides a description of the role of SafeWork NSW 2 Identifies a function of SafeWork NSW 1 SafeWork NSW is responsible for providing advice to organisations on improving work health and safety, investigating workplace incidents and enforcing WHS laws in NSW. Its main purpose is to help organisations to meet their WHS obligations. Licensing and registration for dangerous work. 3

4 Question 23 (a) Explains how a business may be affected by malicious software 2 Provides some relevant information 1 Malicious software such as viruses can cause corruption of files, leading to employee downtime or inability to work effectively while repairs are made. Data loss Security breaches Slow loading times / processing speeds. Question 23 (b) Provides a list of relevant troubleshooting steps 3 Identifies some relevant troubleshooting steps 2 Identifies a relevant troubleshooting step 1 Check: there is power to the device the keyboard is plugged in username and password are correct Caps Lock key not on Wi-Fi on / network connectivity cable in server is running networking equipment proxy settings if applicable. 4

5 Question 24 (a) Outlines TWO relevant factors 2 Outlines ONE relevant factor OR identifies relevant factors 1 To ensure adequate signal strength, the distance between the router and the furthest user should be less than 30 metres and the path between users and the router should have minimum obstacles, eg walls. Number of users Physical placement eg ceiling Power over ethernet Proximity to power / data points. Question 24 (b) Identifies circumstances when satellite is the most effective option for a SOHO to access the internet Identifies a circumstance when satellite is effective for a SOHO to access the internet 2 1 Office may be in a remote or rural area where other services may not be available, eg NBN, fibre, ADSL. Office may be in an area where the cost of such other services is prohibitive. 5

6 Question 24 (c) Explains how the long-term reliability of networked desktop computers 4 can be improved Outlines how the long-term reliability of networked desktop computers 3 can be improved Outlines a way of improving the long-term reliability of desktop computers OR 2 Identifies ways of improving the long-term reliability of desktop computers Identifies a way of improving the long-term reliability of desktop 1 computers Regular updates of operating system software to overcome security vulnerabilities and be compatible with relevant hardware and software. Use preventative maintenance tools such as defrag, disk cleanup and check disk to maintain efficiency of the hard drive. Ensure antivirus updates and scans are regularly performed to identify and remove potential threats. Ensure hardware components are kept appropriately clean and free of dust and dirt to prevent physical damage. Question 25 Explains the role of port assignment when configuring a firewall 3 Shows some understanding of port assignment and/or firewalls 2 Provides some relevant information 1 Individual software applications require specific ports to be available in order to operate, eg Port 80 is used by HTTP. Ports that are not required are normally closed to reduce the risk of unauthorised access or virus activity. 6

7 Question 26 Clearly shows how Bluetooth and Wi-Fi technologies are different 4 Identifies features of Bluetooth and Wi-Fi technologies showing some 3 understanding of their differences Identifies features of Bluetooth and/or Wi-Fi technologies 2 Identifies a feature of Bluetooth or Wi-Fi 1 Bluetooth is normally one-to-one connection and Wi-Fi is capable of a one-to-many connection. Bluetooth has a simple authentication with low security whereas Wi-Fi has more security options. Wi-Fi allows for file sharing between devices on the same network. Bluetooth (V4) is capable of long-range connections and higher data rates. Older versions (BR/EDR V2) of Bluetooth had a shorter range than Wi-Fi and were often used for streaming audio. Bluetooth (BR/EDR V2) uses a lower bandwidth that makes data transfer slower than Wi-Fi. 7

8 Section III Question 27 (a) Explains the benefits of entering into a vendor contract for the company 3 Shows some understanding of vendor contracts 2 Provides some relevant information 1 A benefit of a vendor contract is guaranteed support from the specific supplier within an agreed timeframe. Usually a specific technician is assigned to your business for continuity and familiarity. Also training is provided to users to allow them to quickly troubleshoot common problems. Preferential pricing (discounts) Replacement of faulty parts/equipment Software/product customisation. Question 27 (b) Explains how to efficiently achieve the required file sharing 4 Outlines how to achieve the required file sharing 3 Shows some understanding of file sharing 2 Provides some relevant information 1 Appropriate groups need to be created, for example staff and managers. A shared folder needs to be created on a network drive. The file needs to be saved in this shared folder and staff group members are allocated read only permission while members of the managers group have full permissions that allow them read/write/delete access. 8

9 Question 27 (c) Outlines ways to reduce problems with the printer showing thorough understanding of the issues indicated by the log 8 Justifies all the ways Outlines ways to reduce problems with the printer showing sound understanding of the issues indicated by the log 6 7 Justifies some of the ways Identifies ways to reduce problems with the printer in the scenario 4 5 Provides some justification for at least one of the ways Shows some understanding of how to reduce printer problems 2 3 Provides some relevant information 1 Page count (approximately 5000 per week) is too high for a small laser printer. This results in frequent toner cartridge changes. Moving to a higher capacity printer would enable longer periods between cartridge changes and lower maintenance costs. Toner cartridges are needed frequently yet each time they are required, a member of the service staff is required to order a single replacement. This means that the printer is unavailable for up to three days. Estimating the usage and ensuring there is always an adequate stock of cartridges on hand would reduce the downtime. A networked printer would be able to alert support staff when consumables such as toner and drums would need to be replaced. This would enable service staff to be proactive and undertake the replacements prior to the toner becoming exhausted. There appears to be no regular preventative maintenance taking place on this printer. If this was implemented issues such as drum replacement and cleaning could be undertaken before they cause the printer to fail. 9

10 Section IV Question 28 Addresses all components of the question Provides a cohesive, well-reasoned, sequenced response that reflects a high level of organisation, judgement, synthesis and problem-solving skills Demonstrates an in-depth understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Consistently uses relevant industry terminology Addresses most components of the question Provides a reasoned, sequenced response that reflects a high level of organisation and problem-solving skills Demonstrates a detailed understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Uses relevant industry terminology Addresses the majority of the components of the question Provides a response displaying sound organisation and problem-solving skills Demonstrates a sound understanding of how to raise awareness on the importance of consultation and participation in WHS processes with reference to the scenario Uses some relevant industry terminology Addresses some components of the question Provides a response displaying some organisation and problem-solving skills Demonstrates some understanding of how to assist the organisation in the scenario Addresses at least one component of the question Provides a response displaying basic organisation Demonstrates a basic understanding of concerns in the scenario Facilitate a supportive workplace culture Cater for the needs of people with disabilities Address language and literacy levels of participants Promote a systematic approaches to work Improve poor communication skills Cater for cultural differences Encourage communication between workers on different shifts Improve workplace procedures Understand employer and staff roles and responsibilities relating to WHS Need to comply with WHS regulations. 10

11 2017 HSC Information and Digital Technology Networking and hardware Mapping Grid Section I Question HSC content focus area Section II 1 1 (Mandatory) Working in the industry nature of the industry page (Mandatory) Safety safe work practices and procedures pages (Mandatory) Operating system software operating systems page (Mandatory) Operating system software operating systems page (Mandatory) Diagnostic testing troubleshooting page (Mandatory) Safety risk management page (Mandatory) Diagnostic testing destructive and malicious software protection pages (Mandatory) Operating system software operating systems page (Mandatory) Working in the industry nature of the industry page (Mandatory) Diagnostic testing preventative maintenance page (Stream) Networking and hardware components, protocols and standards page 48 (Stream) Networking and hardware components, protocols and standards page (Stream) Networking and hardware network security page (Stream) Networking and hardware network security page (Stream) Networking and hardware determining requirements page 49 (Stream) Networking and hardware components, protocols and standards page 49 (Stream) Networking and hardware components, protocols and standards page (Stream) Networking and hardware network security page (Stream) Networking and hardware network and hardware testing page 51 (Stream) Networking and hardware network and hardware testing page 51 Question HSC content focus area 21 (a) 2 21 (b) 2 (Mandatory) Operating system software configuring an operating system page 30 (Mandatory) Operating system software selecting an operating system page (c) 4 (Mandatory) Working in the industry nature of the industry page (Mandatory) Safety WHS page (a) 2 (Mandatory) Diagnostic testing client business context page (b) 3 (Mandatory) Diagnostic testing troubleshooting page 45 11

12 24 (a) 2 24 (b) 2 24 (c) (Stream) Networking and hardware network and hardware installation page 50 (Stream) Networking and hardware determining requirements page 49 (Stream) Networking and hardware network and hardware installation page 50 (Stream) Networking and hardware components, protocols and standards page 49 (Stream) Networking and hardware components, protocols and standards page 49 Section III Question HSC content focus area 27 (a) 3 (Stream) Networking and hardware provision of client/user support services page (b) 4 (Stream) Networking and hardware network security page (c) 8 (Stream) Networking and hardware documentation, logs of client/user problems page 52 Networking and hardware provision of client/user support services page 52 Section IV Question HSC content focus area (Mandatory) Working in the industry working with others pages (Mandatory) Safety WHS consultation and participation page 39 12

2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines

2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines 2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 B 13 D

More information

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines

2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines 2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 B 12 C 13 A 14 C

More information

2016 HSC Information and Digital Technology Web and software applications Marking Guidelines

2016 HSC Information and Digital Technology Web and software applications Marking Guidelines 2016 HSC Information and Digital Technology Web and software applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 C 12 D 13 C

More information

2013 HSC Information Technology Marking Guidelines

2013 HSC Information Technology Marking Guidelines 201 HSC Information Technology Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 A 2 B D 4 A 5 C 6 B 7 D 8 B 9 B 10 D 11 C 12 A 1 C 14 A 15 C 1 Section II Question 16 (a) Identifies

More information

Information and Digital Technology

Information and Digital Technology 2017 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Web and software applications General Instructions Reading time 5 minutes Working time 2 hours Write using black pen NESA approved

More information

ESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices

ESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices Overview This is the ability to set up and use mobile or handheld devices such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange and

More information

UMD: Using mobile IT devices

UMD: Using mobile IT devices UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange

More information

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0 BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1 Version 5.0 March 2009 2.1 Operating System 2.2 File Management 2.1.1 First Steps 2.1.1.1 Start the computer

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

To use centralised systems for remote control of computers and deployment of software, system images and security updates.

To use centralised systems for remote control of computers and deployment of software, system images and security updates. JOB DESCRIPTION POST: First Line Support Desk Analyst GRADE: Support Staff Grade 2/3 RESPONSIBLE TO: KEY PURPOSE: IT Manager To work as part of the ilrc team to provide on-going proactive technical and

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY September, 2016 GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY As a reminder for counties, and refresher on good cyber hygiene practices, DOS recommends the following procedures in the preparation

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

Get to know your Modem 1. Modem Technical Overview 3

Get to know your Modem 1. Modem Technical Overview 3 User Manual Get to know your Modem 1 Modem Technical Overview 3 Managing your Modem Settings How to view your Modem settings 5 Understanding the front page 6 Changing your Modem login password 7 Upgrading

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Cyber Security Guidelines for Public Wi-Fi Networks

Cyber Security Guidelines for Public Wi-Fi Networks Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description

More information

Unit 11: Computer Networks

Unit 11: Computer Networks Unit 11: Computer Networks Level: 1 and 2 Unit type: Mandatory or Optional specialist Guided learning hours: 60 Assessment type: Internal Unit introduction Computer networking is an important part of our

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

Setting up an IT Network

Setting up an IT Network Unit 16: Setting up an IT Network Unit code: M/601/3274 QCF Level 2: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose This unit enables learners to understand the role of IT networks

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1. London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and

More information

Salary Scale in accordance with the school s support staff structure and/or any local agreements that are in place.

Salary Scale in accordance with the school s support staff structure and/or any local agreements that are in place. ICT TECHNICIAN: JOB DESCRIPTION Salary Scale 14-18 in accordance with the school s support staff structure and/or any local agreements that are in place. Line of responsibility The ICT technician will

More information

Network Services Enterprise Broadband

Network Services Enterprise Broadband Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as: Unit Title: OCR unit number 38 Level: 3 Credit value: 12 Guided learning hours: 100 Unit reference number: Security of ICT Systems D/500/7220 Candidates undertaking this unit must complete real work activities

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H1EM 34 Superclass: CD Publication date: June 2013 Source: Scottish Qualifications Authority Version: 03 Unit purpose This Unit is designed

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

Physician Office Name Ambulatory EHR Security Risk Analysis

Physician Office Name Ambulatory EHR Security Risk Analysis Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).

More information

BSO CLEAR DESK AND SCREEN POLICY (version 1.0)

BSO CLEAR DESK AND SCREEN POLICY (version 1.0) BSO CLEAR DESK AND SCREEN POLICY (version 1.0) Approved at BSO Board on 25 th February 2010 CONTENT 1. PURPOSE...3 2. DATA CLASSIFICATION...3 3. THE DESK / OFFICE ENVIRONMENT...3 4. THE PC ENVIRONMENT...4

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

CompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh

CompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh CompTIA A+ Complete Study Guide (Exams 220-801/220-802). Text with CD- ROM for Windows and Macintosh Docter, Q ISBN-13: 9781118324059 Table of Contents Introduction xxxi Assessment Test liv Part I 220-801

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

Network Services ADSL Managed Service

Network Services ADSL Managed Service Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY Introduction The college offer an extensive range of IT systems across campuses and online for course related activities and drop-in purposes. This policy applies

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

Standards and Competencies ITS 1.0 Perform maintenance on systems and components

Standards and Competencies ITS 1.0 Perform maintenance on systems and components Skill Performance This portion of the contest will be a series of modules through which each contestant will rotate on a fixed time schedule to troubleshoot or complete tasks with client, server, or end

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

AVANTUS TRAINING PTE LTD

AVANTUS TRAINING PTE LTD [ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

Credentials Policy. Document Summary

Credentials Policy. Document Summary Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy

More information

Network Services BT Internet Connect

Network Services BT Internet Connect Contents 1. 2. Network Services Customer responsibilities 3. Network Services General 4. Domain Name Registration 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Preparing for the NBN. Fixed Wireless Connections

Preparing for the NBN. Fixed Wireless Connections Preparing for the NBN Fixed Wireless Connections Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class high speed broadband.

More information

F9A0 04 (ESKINT2): Using the Internet 2

F9A0 04 (ESKINT2): Using the Internet 2 F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each

More information

Preparing for the NBN. Fixed Wireless Connections

Preparing for the NBN. Fixed Wireless Connections Preparing for the NBN Fixed Wireless Connections Preparing for the NBN Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class

More information

ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology

ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Form 4 ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

SonicWALL Network Anti-Virus

SonicWALL Network Anti-Virus SonicWALL Network Anti-Virus Contents Copyright Notice...2 Limited Warranty...2 Introduction...4 Managing Network Anti-Virus...5 Activating the Network Anti-Virus Subscription...6 Configuring Network Anti-Virus...7

More information

ECDL / ICDL IT Security. Syllabus Version 2.0

ECDL / ICDL IT Security. Syllabus Version 2.0 ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

Welcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide

Welcome to Cogeco UltraFibre Internet. UltraFibre Internet User Guide Welcome to Cogeco UltraFibre Internet UltraFibre Internet User Guide Hi there. Thanks for joining us. Welcome to your new UltraFibre Internet service from Cogeco. This User Guide is a reference tool for

More information

CAPPELLA NOVOCASTRIENSIS Data Protection Policy

CAPPELLA NOVOCASTRIENSIS Data Protection Policy CAPPELLA NOVOCASTRIENSIS Data Protection Policy Overview Key details Policy prepared by: Sarah Lawrance, Choir Secretary Approved by committee on: 02/05/2018 Next review date: 01/10/2018 Introduction In

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

INFORMATION GOVERNANCE. Caldicott Approval Procedure

INFORMATION GOVERNANCE. Caldicott Approval Procedure NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

SECURE USE OF IT Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0 ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

CompTIA A+ Complete Lab Manual

CompTIA A+ Complete Lab Manual CompTIA A+ Complete Lab Manual Pyles, J ISBN-13: 9781118324073 Table of Contents Introduction xxxi Phase 1 Installing Hardware and Software 1 Task 1.1: Preventing ESD Damage 2 Objective 3 Scenario 3 Scope

More information

Entry Level Assessment Blueprint Computer Technology

Entry Level Assessment Blueprint Computer Technology Entry Level Assessment Blueprint Computer Technology Test Code: 4122 / Version: 01 Specific Competencies and Skills Tested in this Assessment: Professional Standards, Ethics, and Business Practices Identify

More information

OPEN INTERNET POLICY

OPEN INTERNET POLICY OPEN INTERNET POLICY Inland Networks adopts this Open Internet Policy to promote the Internet as an open platform enabling customer choice, freedom of expression, end-user control, competition, and the

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Systems and Principles Unit Syllabus

Systems and Principles Unit Syllabus Systems and Principles Unit Syllabus Level 3 Testing ICT systems 3 7540-321 www.cityandguilds.com September 2010 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider of vocational

More information

NCH Swift Sound Office Intercom: Audio Communication Software

NCH Swift Sound Office Intercom: Audio Communication Software NCH Swift Sound Office Intercom: Audio Communication Software This manual is intended for use with OfficeIntercom Version 4.01. More information on other versions of OfficeIntercom can be found at www.nch.com.au/oi/index.html.

More information

Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES

Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES 2017 35 Crawford Road Brighton-Le-Sands NSW 2216 9567 5449 brightonle-p.school@det.nsw.edu.au www.brightonle-p.schools.nsw.edu.au

More information

Module 1 Concepts of Information and Communication Technology (ICT)

Module 1 Concepts of Information and Communication Technology (ICT) Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for

More information

The Eight Rules of Security

The Eight Rules of Security The Eight Rules of Security The components of every security decision. Understanding and applying these rules builds a foundation for creating strong and formal practices through which we can make intelligent

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information