Customer Data Safety Policies: Customer Data, Operating Systems, Network Device Settings

Customer Data Safety Policies: Customer Data, Operating Systems, Network Device Settings

Before removing any data belonging to a customer, whether an operating system, an Outlook profile, firewall settings, or simply files or folders, a backup must be created and verified. Generally speaking, we do not wipe anything without a backup.


Policy on Customers with Documents Redirected to Server

Most of our customers with on-premises servers store their user docs folder on the server and users are regularly reminded via an automatic email that any important files should be stored there, not locally on the computer. Users are expected to know this, but reminding them when we move a user to another computer is part of the "new workstation" checklist in Autotask.

Outlook Backups

Before erasing Outlook profiles you should back up the profile. However, you should also remind an Exchange user that they are responsible for saving all their Exchange data on the server, not locally.

Network Devices

When installing network appliances – firewalls, routers, managed and smart switches, etc. – technicians must make backups of the old and new device configuration.  Please back up the settings and upload them to the device's configuration page in IT Glue. You will also receive a reminder in the ticket description for those assignments.


Warning
Failure to follow this policy is grounds for disciplinary measures up to and including termination.


    • Related Articles

    • Checklist for Creating Quote for Data Migration to MS 365 from On-Premises Server

      Verify users' operating systems are compatible with M 365 sync apps and Office apps. Verify path and file names are not too long for Microsoft. Check for illegal characters in file names or blank spaces at end of file names (especially if source is ...
    • Mobile Device Management (draft)

      Monitor, manage, and secure employees' smartphones and tablets. Ensure compliance with company policies and enforces security measures like password requirements, encryption, and remote wipe capabilities to protect sensitive data. Manage applications ...
    • New Prospect and Client Intake Instructions (New Customer)

      This procedure applies to inactive customers in AT as well as to customers that have not opened a ticket or been billed by us in at least one year. They are to be treated as new customers. The only difference is that instead of creating the account ...
    • Computer and Peripheral Sales Policies

      We sell computers, servers and network devices. We are an authorized Dell and Asus reseller. We also purchase computers directly from Carbon Systems. We order Dell business* computers through Dell Premier portal. We only sell business-line computers. ...
    • Customer Reports Workflow

      Workflow On the first of the month we have scheduled all Datto RMM reports to send with "Scheduled RMM Report: " followed by Autotask/Datto Company Name in subject. Recipient: Info@nygeekgirls.com . A PowerAutomate rule (RMMREPORTFIX1) processes the ...