Using public (and company) PCs, Internet connection usage
Using computer technologies usually conforms to the rules which are placed in computer rooms, company websites or are published some other way. Details and support are usually provided by appointed IT experts.
Unauthorized use prohibition. It is not usually allowed to manipulate the computers. It is forbidden to disconnect computers from the network (internet) or connect your own devices/computers (this can be allowed in some places). If it is allowed to use private computers, they are usually connected via a Wi-Fi device and are identified and connected upon different conditions to a "security zone" so that the network is better protected from virus-attacked and potentially dangerous computers. Some computers can only be accessible by particular users or administrators. Using presentation devices may require special training, as the devices can easily get damaged (e.g. lamps in data-projectors get damaged when they are not turned off in a proper way).
Computer activity restrictions. Using HW, SW or certain rules, some activities on computers can be limited (playing games, service limitations, P2P networks usage prohibition, non-business usage prohibition).
Computers in the network are usually protected by various HW or SW devices from unauthorized use. Attempts to breeching the security are considered very serious and may result in criminal offence procedures.
Program installation prohibition. Installation and using of private programs is not allowed. This way, administrators protect themselves from breaking copyright law and to lower the security hazards.
Log off the computer when leaving. If a user name and password are required in company networks for each user, it is important to always log off or lock the computer before leaving. Without logging off, there is a risk of abusing the computer and the owner of the login name is guilty.
Passwords. Password should be changed regularly and should always be a "strong password". Never tell, lend or share your user name and password and protect it from being revealed (do not use any written forms). Password is usually never passed to administrators. If it is necessary from a serious reason, do that personally, not on phone or via e-mail.
Consideration to others. Do not bother or interrupt other users in any way.
Data in computers. Data in computers are usually not backed up and administrators do not provide any guarantees. Valuable data is saved in network drives or can be a part of the user profile. It is suitable to use a flash memory disk or other media. Always save your data in several separate places.
No food and drinks..
Always consult all technical or other problems as soon as possible.
Internet connection usage
Bandwidth - Bandwidth and data downloads does not necessarily need to be unlimited. The faster connection, with or without limited downloads, the higher the price for the connection. If the bandwidth is being wasted, the internet connection providers or network administrators can penalize such users. The options usually differ according to the provider, location (or country) and particular companies. In simple words - particular users should not be disadvantaged. If somebody extremely overloads the connection and limits other users, it is not right. Some providers solve this by increasing the connection capacity or limit some services. E.g. P2P networks are forbidden in some companies.
Respect other users. Internet connection is usually shared by multiple users. If you download larger amounts of data, try not to limit other users. Sometimes, it is recommended that you leave large downloads for overnight because some ISPs give users privilege to overnight downloads.