New Page 1
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website
NCP Official Website

Computing Rules @ NCP


This computer security course addresses the "do's" and "don'ts" of the use of computing resources at NCP. It covers how to protect your computer, how to browse the web and use emails securely, how to protect your password, files and data, and what is and isn't allowed in the NCP computing rules. Many of the items also apply to computer use at home and anywhere in the world.

  • Update Computer Regularly: Update your computer regularly with patches. You must use operating systems installed and managed by NCP IT department, which are securely configured and automatically updated for you
  • Antivirus Software: NCP is using licensed antivirus software to avoid the virus attacks. All client systems are updated regularly with antivirus patches. Clients scanned on weekly basis. Heavily, infected computers need to be reinstalled from scratch.
  • Tighten your local Firewall: Ensure that local firewall is “turned on” on PC. It will block all unwanted connections, which could potentially damage your computer.
  • Do not install un-trusted software: Indeed software from un-trusted sources may infect or compromise your computer, or violate copyrights. Only IT Personnel are allowed to install licensed software on NCP computers to avoid any risk.
  • Suspicious Emails: Do not open unexpected or suspicious emails or attachments or links.
  • Protect your passwords: Users must also ensure due diligence on their part. Do not provide your passwords to web sites you do not trust and do not type them on un-trusted computers e.g. Internet cafe or public computers. Never Share your password with any body and change your password regularly. Choose password which is hard to guess but don't use old password.
  • Restrict access to your documents and folders: Follow the principle of least privilege. Ensure that only people who need to access your files and data can do that.
  • Prohibition of running Peer-to-Peer (P2P) file-sharing applications: Peer-to-Peer (P2P) applications are designed to share content between interconnected participants across the Internet. They are popular for sharing music, video, software and other data. Examples are Bittorrent, Bitlord, eDonkey, Emula, KaZaA etc.

You are committed to do so. In particular, any activity must not be illegal, political, commercial, offensive or detrimental to official duties. It must not violate applicable laws. In particular, the consultation of pornographic or other illicit material is not allowed.