COMPUTER: PRECAUTIONARY MEASURES

Using a computer is very essential to all mankind so we should be familiarize to all it’s parts. Another thing that we must know is the OHS Policies and Procedures. 

What is OHS Policies and Procedures?

     Occupational Health and Safety. These are some ways or some things to do before, during and after using a computer. We must know this because it’ll keep us safe when using a computer. It is designed to prevent injuries, calamities, illness, etc. when performing some task related to computer. We also need to know some hazards. Here are some steps to do when you encounter a hazard.

Procedure

1. Identify the hazard
2. Clear the area close to the hazard
3. Partition the hazard off or clearly identify the area to protect other people from harm
4. If the hazard is easily and safely cleared, then do so
If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance
6. Following clearing of the hazard fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards.

In order to be keep safe while using or doing some installation on your computer, we also need to have some PPE.

What is PPE?

     Personal Protective Equipment. It refers to the protective clothing, goggles, helmets or other gear that can keep one safe when encountering some hazards like electrical hazards and heat.

Here are some PPEs:

Goggles

A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.

Rubber Sole

A special type of shoes used to prevent electrical shock and for waterproofing and insulating purposes.

Apron

A garment worn over the front of the body as a protection for one’s cloth.

Face Mask

A covering for the face to prevent the inhaling or absorbing dust and other chemicals

Gloves

The covering material with a separate sheath for each finger used for hand protection.
These are some precautionary measures we need to know:

Safety and Anti-Static Rules

  • Always use an anti-static wrist strap when working on a computer (except when working on monitors)
  • Always disconnect a computer from the AC power and from any powered peripherals while you are working on it.
  •  Always grasp a metal part of the computer chassis with your bare hand before you touch anything inside. Do this even if you are wearing an anti-static wristband.
  •  Always handle electronic components by a non-conducting (non-metallic) edge. Don’t touch the pins or other connectors.
  •  Never plug an ATX power supply into AC power unless it is connected either to a computer’s motherboard or to a dummy test load.
  •  Always use a UL-approved surge protector or an Uninterruptible Power Supply that incorporates surge and spike protection.
  • Never eat, drink, or smoke while working on a computer.

10 Tips while using the internet:

  1. Patch, Patch, PATCH!
    An unpatched machine is more likely to have software vulnerabilities that can be exploited. Turn on automatic updates.
  2. Install protective software.
    Sophos is available as a free download from IS&T’s software grid. Once installed, schedule Sophos to regularly scan and update your virus definitions automatically.
  3. Choose strong passwords.
    Strong passwords use a combination of letters, numbers, and special characters. Create a unique password for each account. LastPass can manage all of your passwords for you—and it’s free.
  4. Back up on a regular basis.
    Scheduling routine backups can protect you from the unexpected. Always keep a few months’ worth of retrievable backup. Download and install CrashPlan and learn how to back up your system.
  5. Control access to your machine.
    Don’t leave your computer in an unsecured, public area, especially if you’re logged on. This includes Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.
  6. Use email and the internet safely.
    Ignore unsolicited emails. Be wary of attachments, links, and forms in emails that come from people you don’t know, or which seem “phishy.” Avoid untrustworthy (often free) downloads. Learn more about dealing with spam at MIT.
  7. Use secure connections.
    When connected to the internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.
  8. Protect sensitive data.
    Securely remove sensitive data files from your hard drive, especially when recycling or repurposing your computer. Protect sensitive files using the encryption tools built into your operating system.
  9. Use desktop firewalls.
    Mac and Windows computers use basic desktop firewalls to protect your computer files from being scanned. Make sure they are properly configured.
  10. Most importantly, stay informed.
    Stay current with the latest developments: Follow IS&T on Facebook and Twitter. Bookmark IS&T Secure Computing.

 Always put safety first!


REFERENCES:

  1. https://ist.mit.edu/security/tips

Leave a comment