Q. When I am out of the office is it ok to let someone else use my computer and userid and password?
A. You should never share your userid and password with anyone. Everyone who has access to sensitive data has been granted a level of access to the database. If you have update privileges and someone gets access to the database via your account, records can be copied, modified, or destroyed. In most cases, access log files are maintained and you would be held responsible for this unauthorized activity.
Q. If I need to leave my workstation for a short time and do not log off, how can I stay connected yet keep someone from using my computer?
A. Sometimes you will need to step away from your computer to assist someone. Leaving your computer logged on when you step away for any length of time can present an opportunity for a breach in security. At minimum you should set your password protected screensaver to come on within a short period of time when there is no activity. With Windows, it is as simple as pressing Control-Alt-Delete and then pressing Enter to lock your computer.
Q. Should I use anti-virus software on my computer?
A. In most cases when your CSU computer was installed, the helpdesk (the HUB) installed the campus licensed anti-virus software and configured it to check for updates each time you turn computer on. If you have any questions about the software, contact the HUB at 678-466-HELP.
Q. Is it ok to store student related data on my webpage?
A. Remember that a simple search of a web can produce unwanted results. Please protect yourself and your students by not posting student related data on your website.
Q. If I receive an email telling me about the latest computer virus, where can I go to verify that it indeed is a real virus and not a hoax?
A. There are several ways to check the validity of this message. You can contact the HUB, or you can access websites set up just for this kind of information. Some examples are:
Note: Forwarding an email that says “send this to everyone you know” is accomplishing its goal of denial of services (DOS) attack. Not only does it reduce your credibility, it also wastes limited resources.