+66 7791 3372 ist@sru.ac.th Mon-Fri : 8.30am - 4.30pm

Select your language

Select your language

Data Management Policy - Part 3: User Responsibilities and Device Protection

Article Index

Part 3: User Responsibilities and Device Protection

3.1 Use of User Accounts and Passwords

3.1.1 Users must protect and maintain the confidentiality of their user accounts and passwords. Each individual must use their own personal account and must not share or disclose their password to others.

3.1.2 Users must change their password immediately if they suspect it may have been exposed or compromised.

 

3.2 Password Usage

3.2.1 Users must change their password periodically as specified by the University.

3.2.2 Passwords must not be based on identifiable personal information, such as first or last names, nicknames, parent names, department names, or dictionary words. Passwords must contain at least 8 characters, combining letters (uppercase/lowercase), numbers, and special symbols.

3.2.3 Do not use automatic password-saving features in software applications.

3.2.4 Do not write down or store passwords in visible or easily accessible places.

3.2.5 Avoid using the same password across multiple systems with access privileges.

3.2.6 Keep your account credentials strictly confidential.

 

3.3 Device Protection When Unattended

3.3.1 Users must enable screen saver or screen lock mechanisms requiring a password after inactivity.

3.3.2 Users must lock their device or computer when unattended.

3.3.3 System administrators must raise awareness among users regarding protective measures.

 

3.4 Equipment Placement and Protection

 

3.4.1 Devices must be placed in suitable areas to prevent loss or unauthorized use.

3.4.2 Sensitive equipment should be stored in secure locations.

3.4.3 Regular inspections of IT environments must be conducted, including monitoring temperature and humidity levels to protect equipment integrity.

 

3.5 Information Asset Control and Computer Usage

3.5.1 Documents, data, storage media, and computers must be stored securely.

3.5.2 Access to data or information assets must be restricted to owners or designated individuals with written authorization.

3.5.3 Measures must be taken to securely erase or overwrite sensitive data on storage devices before allowing others to use them.

3.5.4 Back up and delete stored data before sending a computer for repair to prevent unauthorized access.

3.5.5 Users may apply encryption for confidential information, following the Official Secrets Act B.E. 2544.

3.5.6 Establish guidelines for data/document retention and destruction in compliance with applicable laws and University regulations.

3.5.7 All software installed on University computers must be legally licensed. Users are prohibited from copying or using the software for personal devices or sharing it with others.

3.5.8 Important University data must not be stored on personal computers or devices.

3.5.9 Data stored on any media must be cleared before replacement or transfer.

3.5.10 Data must be securely deleted or formatted before equipment is destroyed, replaced, or disposed of.

Read Time: 34 mins
Hits: 26
Contact Info

272 International School of Tourism, Chalerm Phra Kiat 80th Anniversary Building, 7th Floor, Suratthani Rajabhat University
Khuntale, Muang, Surat Thani
Post code : 84100
ist@sru.ac.th
+66 77 913 372

About Us
Hall of Fame
Documents & E-Services
Our Programs
Follow Us