The document discusses safety issues in information and communication technology (ICT) and outlines policies, guidelines, and procedures. It defines policy as a course of action adopted by governments and explains that ICT policies lay out a roadmap for organizations and agencies to follow. Guidelines and procedures instruct users to only use computers and networks for study or work, keep access codes and passwords personal and secure, avoid circulating offensive material, prevent virus spreading, and refrain from sending spam.
The document discusses safety issues in information and communication technology (ICT) and outlines policies, guidelines, and procedures. It defines policy as a course of action adopted by governments and explains that ICT policies lay out a roadmap for organizations and agencies to follow. Guidelines and procedures instruct users to only use computers and networks for study or work, keep access codes and passwords personal and secure, avoid circulating offensive material, prevent virus spreading, and refrain from sending spam.
The document discusses safety issues in information and communication technology (ICT) and outlines policies, guidelines, and procedures. It defines policy as a course of action adopted by governments and explains that ICT policies lay out a roadmap for organizations and agencies to follow. Guidelines and procedures instruct users to only use computers and networks for study or work, keep access codes and passwords personal and secure, avoid circulating offensive material, prevent virus spreading, and refrain from sending spam.
Safety Issues in ICT: Policies, Guidelines and Procedures
Policies
-Policy is a course of action, adopted and pursued by a government.
-ICT policies are required to layout a road map or plan of action for different states organization, and agencies involved with ICT to follow.
Guidelines and Procedures
Use of computer and network is intended for study or work
Access code are personal; leading is for bidden Change your password regularly Do not circulate defamatory or offensive material Do not install any software yourself Prevent the spreading of computer viruses Do not send unsolicited (spam)