SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
STANDARD OPERATING
PROCEDURE
DEPARTMENT : " IT Department"
PROCEDURE NO: none REVISION : 1/2014
EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 1
TITLE : Delete the email ID to Deny access of emails.
PURPOSE/ SCOPE
To describe Delete email id for Users to deny access emails.
RESPONSIBILITY
1. IT Head is responsible to approve for delete this email id.
2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure.
MATERIALS AND EQUIPMENT
1. Desktop or Laptop and Mail Server
FREQUENCY
1. When needed.
PROCEDURES
1. IT Requisition form with dually signed by Department Head and HR Head and submit to IT
dept.
2. IT Head will check the form whether all necessary details are fill in the form.
3. Form will sent to IT Service Engineer/ Data center team / IT help desk team of IT Dept.
4. IT Service Engineer/ Data center team / IT help desk team will delete or suspend as the email id
from mail server per approved by IT Head.
PREPAID BY:
"IN CHARGE IT"
CHECKED BY:
"HEAD IT"
APPROVED BY:
"HEAD QA"
"Signature"

Contenu connexe

En vedette

ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgementDanai Thongsin
 
Session 2 Breakout Group 2 Discussion Results
Session 2   Breakout Group 2 Discussion ResultsSession 2   Breakout Group 2 Discussion Results
Session 2 Breakout Group 2 Discussion Resultswbeap
 
สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อDanai Thongsin
 

En vedette (6)

DNSSystemServicesLTD
DNSSystemServicesLTDDNSSystemServicesLTD
DNSSystemServicesLTD
 
social media policy
social media policysocial media policy
social media policy
 
ss sma policy acknowledgement
ss sma policy acknowledgementss sma policy acknowledgement
ss sma policy acknowledgement
 
Delete the log in id
Delete the log in idDelete the log in id
Delete the log in id
 
Session 2 Breakout Group 2 Discussion Results
Session 2   Breakout Group 2 Discussion ResultsSession 2   Breakout Group 2 Discussion Results
Session 2 Breakout Group 2 Discussion Results
 
สินเชื่อ
สินเชื่อสินเชื่อ
สินเชื่อ
 

Similaire à Delete the email id to deny access of emails

Recognition of need for a Jute Mill in Software & Information Systems
Recognition of need for a Jute Mill in Software & Information SystemsRecognition of need for a Jute Mill in Software & Information Systems
Recognition of need for a Jute Mill in Software & Information SystemsSuman Mia
 
GLPI - Help desk
GLPI - Help deskGLPI - Help desk
GLPI - Help deskSharath R
 
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdfDorinNguema
 
Effective e mail writing techniques
Effective e mail writing techniquesEffective e mail writing techniques
Effective e mail writing techniquesAhmedSamir774
 
Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year ProjectAkshay Iyer
 

Similaire à Delete the email id to deny access of emails (6)

Creating IT wing in Kerala Government Departments-GOMS 17/2018
Creating IT wing in Kerala Government Departments-GOMS 17/2018Creating IT wing in Kerala Government Departments-GOMS 17/2018
Creating IT wing in Kerala Government Departments-GOMS 17/2018
 
Recognition of need for a Jute Mill in Software & Information Systems
Recognition of need for a Jute Mill in Software & Information SystemsRecognition of need for a Jute Mill in Software & Information Systems
Recognition of need for a Jute Mill in Software & Information Systems
 
GLPI - Help desk
GLPI - Help deskGLPI - Help desk
GLPI - Help desk
 
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf
2019MS EXAM REPORT20161K_unit14_pef_20190313 (1).pdf
 
Effective e mail writing techniques
Effective e mail writing techniquesEffective e mail writing techniques
Effective e mail writing techniques
 
Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year Project
 

Plus de Danai Thongsin

Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedureDanai Thongsin
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284Danai Thongsin
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อDanai Thongsin
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านDanai Thongsin
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจDanai Thongsin
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยวDanai Thongsin
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานDanai Thongsin
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance payDanai Thongsin
 
พระมหาชนก
พระมหาชนกพระมหาชนก
พระมหาชนกDanai Thongsin
 
มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์Danai Thongsin
 
มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์Danai Thongsin
 
4th six chefs charity dinner in the nation
4th six chefs charity dinner in the nation4th six chefs charity dinner in the nation
4th six chefs charity dinner in the nationDanai Thongsin
 
2 night package for six chefs six courses charity dinner
2 night package for six chefs six courses charity dinner2 night package for six chefs six courses charity dinner
2 night package for six chefs six courses charity dinnerDanai Thongsin
 

Plus de Danai Thongsin (20)

3CX Powerful APP
3CX Powerful APP3CX Powerful APP
3CX Powerful APP
 
3cx interface
3cx interface3cx interface
3cx interface
 
Standard operating procedure
Standard operating procedureStandard operating procedure
Standard operating procedure
 
Ban kaew villas koh samui 0881096284
Ban kaew villas   koh samui 0881096284Ban kaew villas   koh samui 0881096284
Ban kaew villas koh samui 0881096284
 
Cctv
CctvCctv
Cctv
 
จดหมายจากพ่อ
จดหมายจากพ่อจดหมายจากพ่อ
จดหมายจากพ่อ
 
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้านคำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
คำวินิจฉัยฉบับเต็มศาล รธน. พรบ. เงินกู้สองล้านล้าน
 
หนังสือทิพยอำนาจ
หนังสือทิพยอำนาจหนังสือทิพยอำนาจ
หนังสือทิพยอำนาจ
 
Aec กับการท่องเที่ยว
Aec กับการท่องเที่ยวAec กับการท่องเที่ยว
Aec กับการท่องเที่ยว
 
ระเบียบ
ระเบียบระเบียบ
ระเบียบ
 
It samui club letter
It samui club   letterIt samui club   letter
It samui club letter
 
Rights and duty
Rights and dutyRights and duty
Rights and duty
 
แบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงานแบบ ข้อบังคับเกี่ยวกับการทำงาน
แบบ ข้อบังคับเกี่ยวกับการทำงาน
 
Termination of employment and severance pay
Termination of employment and severance payTermination of employment and severance pay
Termination of employment and severance pay
 
Internet system plan
Internet system planInternet system plan
Internet system plan
 
พระมหาชนก
พระมหาชนกพระมหาชนก
พระมหาชนก
 
มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์
 
มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์มนุษย์ ชาติ เผ่าพันธ์
มนุษย์ ชาติ เผ่าพันธ์
 
4th six chefs charity dinner in the nation
4th six chefs charity dinner in the nation4th six chefs charity dinner in the nation
4th six chefs charity dinner in the nation
 
2 night package for six chefs six courses charity dinner
2 night package for six chefs six courses charity dinner2 night package for six chefs six courses charity dinner
2 night package for six chefs six courses charity dinner
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Delete the email id to deny access of emails

  • 1. STANDARD OPERATING PROCEDURE DEPARTMENT : " IT Department" PROCEDURE NO: none REVISION : 1/2014 EFFECTIVE DATE: "June 2014" PAGE NO : 1 OF 1 TITLE : Delete the email ID to Deny access of emails. PURPOSE/ SCOPE To describe Delete email id for Users to deny access emails. RESPONSIBILITY 1. IT Head is responsible to approve for delete this email id. 2. IT Service Engineer/ Data center team / IT help desk team is responsible to implement this procedure. MATERIALS AND EQUIPMENT 1. Desktop or Laptop and Mail Server FREQUENCY 1. When needed. PROCEDURES 1. IT Requisition form with dually signed by Department Head and HR Head and submit to IT dept. 2. IT Head will check the form whether all necessary details are fill in the form. 3. Form will sent to IT Service Engineer/ Data center team / IT help desk team of IT Dept. 4. IT Service Engineer/ Data center team / IT help desk team will delete or suspend as the email id from mail server per approved by IT Head. PREPAID BY: "IN CHARGE IT" CHECKED BY: "HEAD IT" APPROVED BY: "HEAD QA" "Signature"