Page 476 - Using MIS
P. 476
444 Chapter 11 Information Systems Management
You have a right to reliable network and Internet services. Reliable means that you can
process without problems almost all of the time. It means that you never go to work wondering,
“Will the network be available today?” Network problems should be a rare occurrence.
You also have a right to a secure computing environment. The organization should protect
your computer and its files, and you should not normally even need to think about security.
From time to time, the organization might ask you to take particular actions to protect your
computer and files, and you should take those actions. But such requests should be rare and
related to specific outside threats.
You have a right to participate in requirements meetings for new applications that you will
use and for major changes to applications that you currently use. You may choose to delegate
this right to others, or your department may delegate that right for you, but if so, you have a right
to contribute your thoughts through that delegate.
You have a right to reliable systems development and maintenance. Although schedule
slippages of a month or 2 are common in many development projects, you should not have to
endure schedule slippages of 6 months or more. Such slippages are evidence of incompetent
systems development.
Additionally, you have a right to receive prompt attention to your problems, concerns, and
complaints about information services. You have a right to have a means to report problems and
to know that your problem has been received and at least registered with the IS department. You
have a right to have your problem resolved, consistent with established priorities. This means
that an annoying problem that allows you to conduct your work will be prioritized below an-
other’s problem that interferes with his ability to do his job.
Finally, you have a right to effective training. It should be training that you can understand
and that enables you to use systems to perform your particular job. The organization should
provide training in a format and on a schedule that is convenient to you.
Your User Responsibilities
With the popularity of mobile You also have responsibilities toward the IS department and your organization. Specifically, you
devices, you must also follow have a responsibility to learn basic computer skills and to learn the techniques and procedures
your organization’s policy on for the applications you use. You should not expect hand-holding for basic operations. Nor
the use of mobile devices at should you expect to receive repetitive training and support for the same issue.
work. See the Security Guide on
pages 446–447. You have a responsibility to follow security and backup procedures. This is especially im-
portant because actions that you fail to take might cause problems for your fellow employees
and your organization as well as for you. In particular, you are responsible for protecting your
password(s). This is important not only to protect your computer but, because of intersystem
authentication, also to protect your organization’s networks and databases.
You have a responsibility for using your computer resources in a manner that is consistent
with your employer’s policy. Many employers allow limited email for critical family matters
while at work but discourage frequent and long casual email. You have a responsibility to know
your employer’s policy and to follow it. Further, if your employer has a policy concerning use of
personal mobile devices at work, you are responsible for following it.
You also have a responsibility to make no unauthorized hardware modifications to your
computer and to install only authorized programs. One reason for this policy is that your
IS department constructs automated maintenance programs for upgrading your computer.
Unauthorized hardware and programs might interfere with these programs. Additionally, the
installation of unauthorized hardware or programs can cause you problems that the IS depart-
ment will have to fix.
You have a responsibility to install computer updates and fixes when asked to do so. This
is particularly important for patches that concern security and backup and recovery. When
asked for input to requirements for new and adapted systems, you have a responsibility to take
the time necessary to provide thoughtful, complete responses. If you do not have that time, you
should delegate your input to someone else.