FAQ

General

IT Support

To ensure efficient handling of IT requests and queries, please send an email to helpdesk@aquabt.com or contact extension 999. Requests made through alternative communication channels such as Teams™, SMS or any other E-mail addresses will not be monitored.

Usage of Facilities

Company Access Card Rules – Mandatory Compliance:

  • Mandatory Use:
    Always use your personal access card while inside the building.
  • Register Every Entry/Exit:
    Swipe your card at every card reader when entering or exiting an area within the building, even if someone else opens the door before you. It is important to swipe In and Out when entering or exiting the Kitchen/Dining area.
  • No Sharing:
    Never share or exchange your access card with colleagues.
  • Lost or Stolen Cards:
    Immediately report to all of the following if your card is lost, forgotten or stolen:
    HR Department: hr@aquabt.com
    ICT Department: helpdesk@aquabt.com
    Your Supervisor
  • Card and Keys Must Be Kept Separately:
    Do not keep your swipe card and keys together.
    If both are lost and ICT/HR are not informed immediately, you may be liable to cover the cost of changing the building’s keys.
  • Facility Damage = Disciplinary Action:
    Damaging company property — including access systems, emergency devices, door closers, etc. — will result in HR disciplinary action.

In case of lost or stolen access card you must immediately inform the HR department hr@aquabt.com, ICT department helpdesk@aquabt.com and your supervisor, a replacement fee of ten Euros (€10.00) will be charged for any lost access card.

When a temporary access card (Joker cards) is required, staff members must immediately request them at the ICT office and inform the HR department hr@aquabt.com, and ICT department helpdesk@aquabt.com via e-mail.

Joker cards must be returned in the next 24h after receiving them, Joker cards will be disabled after the first day. They are not a long-term replacement for cards and cannot be shared with another staff member.

Only one joker card use per month is permitted. Staff members repeatedly requesting Joker cards will be sent back home for their access card.

  • Send an email to helpdesk@aquabt.com and Cc hr@aquabt.com
  • Report to ICT office with the damaged access card, so that you can be issued with a new access swipe card.
  • In case of damaged access card (due to non-regular wear and tear) a replacement fee of ten Euros (€10.00) will be charged on your account.

On no account are the swipe card and the keys to be kept together, if they are both lost and ICT/HR are not notified straight away, you will be asked to refund the company the cost of having to change all the front door keys for all the staff members and interns.

Access to certain areas are restricted and will only be granted upon completion of the required training for that specific area.
Requests for access must be submitted via email to the HR department at hr@aquabt.com, and/or the departmental supervisor must certify that you are approved for access.

Important: The IT department will not process any access request unless prior written approval has been received.

3rd floor access is restricted from 5.45 p.m everyday and during weekends, for non-3rd floor staff.

This is due to lack of cleaning staff during these hours.

Company Telephone Communications

  • Staff members are required to use the company-provided SIM / eSIM and have 3CX™ (this does not apply to interns or Innovia personnel) and WhatsApp Business™ installed to be reachable by clients or in cases of emergency, at all times.
  • Every SIM card is delivered with an initial top-up credit of €10.00.
  • All staff members are responsible for making a call or send an SMS at least once every 6 months using the provided mobile nr to keep the line active.
  • Any top-ups made for work purposes, will be refunded by the company upon presentation of receipt.
  • In case of mobile contracts, when the bill exceeds the mobile plan limit, the exceeded amount incurred for personal usage must be paid by the employee.
  • All SIM cards remain property of the company and should be returned to the frontdesk/reception at the end of employment or internship. SIM cards will be cancelled without prior notice when not returned on time.
  • A replacement fee of ten Euros (€10.00) will be charged for any SIM card that is not returned or requires replacement for damage other than normal wear and tear.
  • Staff members must not link any SIM card to an Epic account, try to register the line under their name or try to create an account for this means with their company email address or with any other email address.
  • Employees using devices without dual SIM support, or devices compatible with eSIM technology, may submit a request to the IT department for an eSIM. helpdesk@aquabt.com

On your first day, you will receive a telephone extension number (this does not apply to interns or Innovia personnel).  This number connects and redirects calls to your mobile number via an intercom app 3CX.  You must have 3CX installed on your mobile phone so you are contactable.

To configure the app, an email containing a QR code will be sent to your company e-mail address on your first day. In the event that you do not receive this email, please contact the IT department helpdesk@aquabt.com immediately to ensure that your app is properly set up.

As per our company policy, it is mandatory to use the company-issued mobile number with WhatsApp™ for all official communications. If you are currently using WhatsApp™ with your personal number, we kindly request that you install WhatsApp Business™. This will allow you to use both numbers simultaneously.

  • Go to: https://www.epic.com.mt/SSP/online-top-up
  • Enter your company prepaid mobile nr,
  • Select € amount and click Continue,(Recommended is €15 in order to have enough credit to get the EPIC VALUE deal.
  • Complete the Payment details (enter your personal debit or credit card details) and finally click on Pay.
  • Convenience shops also sells prepaid vouchers.

Once you have successfully loaded the credit

  • Send a SMS containing any character to 16290, confirm the newly loaded credit is active and that you have more than €9.99 in your account.
  • SMS the word VALUE to 16200 and wait for the confirmation SMS from EPIC (You will receive 10GB Data + 200 voice minutes to local numbers + 200 SMS’s)

Company Network and IT Equipment

To request access to a specific network folder or file, follow these general steps:

  1. Identify the Folder or File
    – Note the exact name and location of the folder or file you need access to.
  2. Determine the Owner or Administrator
    – Find out who manages the folder—this could be your IT department, or a specific Department Supervisor.
  3. Submit the request
    Send an email to the desired Staff Member and Cc: helpdesk@aquabt.com. Be sure to include:
    – The path or name of the folder/file
    – The reason you need access
    – The level of access you require (read-only or edit)
  4. Wait for Approval
    – Your request may need to be approved by the folder owner or the departmental supervisor.
  5. Confirmation
    – Once approved, you’ll receive confirmation and the folder or files will be made accessible to you.

If you’re unsure who to contact or how to start the process, reach out to IT helpdesk for guidance on telephone extension 999.

All employees are responsible for maintaining and taking proper care of the IT equipment issued to them for carrying out their day-to-day duties. This includes, but is not limited to, laptops, desktop computers, monitors, printers, network devices, and any other IT-related assets.

  1. Responsibility for Equipment
    – Employees are expected to use all equipment responsibly and in accordance with company guidelines. In cases where damage occurs due to negligence, misuse, or unauthorized handling, the employee may be held accountable and liable for the repair or replacement costs.
  2. Reporting Damage
    – Any damage, malfunction, or loss of equipment—such as computers, monitors, printers, screens, or network-related items—must be reported immediately to the IT department: helpdesk@aquabt.com. Timely reporting helps prevent further issues and ensures proper resolution.
  3. Prohibited Actions
    – Moving, exchanging, or using equipment assigned to another employee without authorization.
    – Connecting or disconnecting any IT or network cables, devices, or accessories without prior approval from the IT department.
    – Modifying, tampering with, or attempting to repair company IT equipment on your own.
    Any violation of the above may result in disciplinary action and the employee may be held liable for any damage caused to company infrastructure or equipment.
  4. IT Department Authority
    Only authorized personnel from the IT department are permitted to:
    – Move or reassign IT equipment.
    – Install or uninstall IT hardware.
    – Modify or handle network connections and infrastructure.

All staff are expected to cooperate with the IT department and follow instructions regarding the use and handling of company equipment.

To ensure efficient access to shared presentation laptops and to maintain accurate inventory records, all staff members are required to adhere to the following procedures:

  1. Booking Procedure:
    Presentation laptops must be booked through the equipment’s Outlook calendar, similar to room bookings.
    – Requests should not be submitted directly to the IT department.
    – Bookings must be made well in advance of the intended date of use.
  2. Confirmation of Booking:
    If a laptop is available, an automatic confirmation email will be sent.
    – It is the employee’s responsibility to verify that the booking has been ACCEPTED and not DECLINED.
    – Laptops can be collected from the front office at the designated time
  3. Return of Equipment:
    – 
    The presentation laptop must be returned to the front office at the end of the loan period.
    – Timely return is mandatory to ensure availability for other staff members and to support IT inventory accuracy.
  4. Reporting Issues:
    Any incidents, technical issues, or damage to the laptop must be reported immediately to the IT department: helpdesk@aquabt.com
  5. Responsibilities of Staff Members:
    Staff are expected to handle the laptops with care and use them only for work-related presentations or tasks.
    – All employees must respect the loan period and ensure the equipment is returned on time in good condition.
    – Adhering to these procedures helps ensure that all employees have equal access to shared resources and supports the efficient operation of company services.

If you require a presentation laptop for travelling, it should be requested at least one (1) week in advance to your supervisor for approval, IT department helpdesk@aquabt.com will not process any request without a previous written approval.

Before travelling, staff member should log in to their account on the company network, check that any software/configuration required is working and in case, a VPN connection is needed to work remotely with server files, everything is updated. Failing to follow this policy will make the laptop blocked from logging in outside the company and users will not be able to use it during their travel.

Staff members must return any presentation laptops, used for travelling, on the first day upon their return to the office to be inspected by the IT department, before delivering it to the front office.

It is mandatory for the head of department or supervisor to provide written confirmation to ICT at least 15 days in advance when a staff member is leaving the company. This confirmation should include important details such as the assignment of the e-mail shared mailbox, transfer of any mobile number, and resolution of any other related IT matters.

Additionally, it is the responsibility of the supervisor to schedule a hardware inspection with the ICT department on the day before the staff member’s departure. Failure to adhere to this procedure may hold the supervisor liable for any missing or damaged equipment.

It is important to note that the ICT department is not responsible for any information handover. Therefore, it is crucial for the supervisor to ensure that all necessary data and knowledge transfer occurs prior to the staff member’s departure.

Internet Service

Internet use brings the possibility of breaches to the security and potential risks to confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorised individuals outside the Company, potential access to Company passwords and other confidential information.

Prohibited uses of internet include but are not limited to:

  • Forwarding of any confidential work-related messages to external non-work related
  • Forwarding of any company files to your personal email.
  • Bypassing any system security.
  • Any usage to conduct personal business or any other commercial purposes which are not related to work.
  • Any computer Games.
  • Web browsing which is not related to work.
  • Copying or using copyrighted information in any way that infringes the owner’s copyright.
  • Using another staff member account.
  • Viewing internet sites which contain any level of obscene or pornographic content.
  • Sending or soliciting obscene, profane, or offensive material.
  • Mentioning of any unsolicited personal opinions on social, political, religious or other non-work-related matters in any form of communication
  • Sending messages or jokes that contain discriminating or sexually harassing material through TEAMS, E-Mail or any other communication platform is totally forbidden and subject to HR disciplinary action.

It is totally forbidden to try to use alternative methods of connecting to the Internet other than through the authorised means of connection, including but not limited to external modems, cable connections, VPN, proxies, etc.

Users must not attempt to obscure the origin of any transmission or download material under an assumed Internet address.

Any breach to this policy will result in HR disciplinary action, which may include but not limited to immediate termination.

The company strictly prohibits the use of personal e-mail accounts, including but not limited to Gmail, Outlook.com, Yahoo, GMX, or any other free or paid service.

Any personal information found on the company computers including but not limited to desktop and documents folders, will be deleted and reported to HR.

Company policies restrict access to any social network application and related websites/services for all users, with only HR and IT having the authority to determine work-related activities that may require access to these apps.

Voice mail, E-mail, Teams™ and Internet usage assigned to an employee’s computer or telephone extensions are solely for the purpose of conducting Company business.

Users should try to confine reasonable personal use of computing and telecommunications to non-working times such as lunches and breaks or before and after regular working hours, only if it does not interfere with the company’s business or incur additional costs to the company.

Permitted personal use does not include uses related to a personal business, political, union or similar activity.

Users must not knowingly access web sites that might bring the Company into disrepute, such as those which contain material which violates any general usage policies or by-laws or contain pornography, hate literature, or any material which contravenes the countries’ Human Rights Act, Criminal Code or any other Federal or Provincial law.

Accessing newsgroups or chatting on-line other than for business purposes, using social networking sites like Facebook for non-business purposes is prohibited.

Playing online games, including online gambling or accessing online entertainment, is strictly prohibited.

Adhering to company email policies and procedures is crucial for effective communication in order to maintain a clear and professional image within the organisation.

  • Company Signature must always be used. Modifying the job title or any other information is not permitted. For any change, you should request in advance approval from HR hr@aquabt.comand your supervisor, as the IT department will not process any request without previous written approval.
  • Do Pay Attention to The Subject Line.
  • Include a clear subject matter and update it so that the subject matter is relevant.
  • Always include the Project Code in all emails and information.
  • Only put the email addresses of people in the “To” line if they need to do something. People who just need to know but have no required action should be placed in the “Cc” line.
  • Unless everyone needs to know, always check that you are only communicating with the people you need to communicate to.
  • Do Reply Expediently.
  • Replying within 24 hours is a common courtesy, even if it is to acknowledge an email and explain that you will revert with an appropriate response within a defined timescale.
  • For internal communications, alwaysuse the file link to the server location instead of attaching the original file to the email. In order to create the file link, you will need to right-click, hold and drag the file to your email, and click on the ‘’Create Hyperlink Here’’ option from the drop-down menu that will appear.
  • Emails containing attachments such as Word Documents, Excel files, PowerPoint Presentations etc. will be flaggedby IT and will not be approved. Only PDF documents can be sent via email.
  • Company confidential information and/or original files must not be sharedoutside of the company without prior authorisation at any time. Forwarding any file and/or confidential work-related messages to your personal email is strictly forbidden.
  • Do not use Company Email for Personal Matters.
  • Any usage to conduct personal business or any other commercial purposes which are not related to work is strictly forbidden.
  • Do Proofread what you are sending before you press send.
  • Check and recheck for spelling and grammatical errors in your email body text and your file attachments. Email software like Outlook comes with many professional tools such as spell check that could aid in formatting a message in a more professional way, use them.
  • For external emails (when applies) always check you attached the file before sending.

When sending any email to mass users or “All Users”, the “BCC” must be used instead of the “TO” field and the HR email address (hr@aquabt.com) must be used in the “TO” field. Following company rules, any email containing “All Users” list will be rejected immediately.

Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender’s; mail sent in reply to that address may bounce or be delivered to an unrelated party whose identity has been faked.

Email phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication. A phishing attack aims to trick the recipient into falling for the attacker’s desired action, such as revealing financial information, system login credentials, or other sensitive information.

You must always take care of phishing and spoofing emails. Never click on links or open attachments unless you recognise the sender and know the content is safe. If in doubt, contact the IT Department immediately at helpdesk@aquabt.com so that they can conduct a safety scan.

If you tried to open any link and used your user/password, change your password immediately and report it to the IT department helpdesk@aquabt.com, failure to report any incident related to this policy, will make the staff member liable for any damage to but not limited to any company information, system or infrastructure.

  • IT Department will NEVER send a request for “reset” passwords or “reactivate” your account.
  • Report and confirm before opening any e-mail that requests you use your user account and password to be opened. It doesn’t matter if you know the sender of the e-mail, if in doubt, please check directly with the sender or contact the IT department for assistance.
  • Be wary if you get an unexpected email from your supervisor or management asking for this kind of help:
  • Don’t buy or pay anything related to gift cards. If anyone asks you to buy or pay a gift card, it’s a scam.
  • Double-check with your supervisor. Contact immediately your supervisor via e-mail or using a known contact number, never through any contact information that was written in the email.
  • Use common sense and if in doubt contact IT department helpdesk@aquabt.com before opening, sharing or paying any request.
  • Open Outlook>Calendar
  • Click “New Meeting” in the ribbon at the top
  • Title: Enter Meeting Details
  • Add Required staff attendees by typing names or email addresses including a Presentation Laptop and Meeting Room if needed.
  • Subject: Enter a short description or title for the meeting in the Subject Line
  • Location: Type the meeting room name or click on the Location button: select your desired room that can host all the meeting internal attendees.
  • Start Time / End Time: Set the start / end times and dates for the meeting (Shortened meetings are set as default 25 min / 50 min).
  • Body: Add agenda, instructions, links, or other meeting details.

    If you need external attendees to join:

  • In the top ribbon,Click on:
  • Microsoft Teams, click “Teams Meeting”
  • Set Recurrence (Optional): If this is a recurring meeting, click “Recurrence” in the ribbon, then choose frequency (daily, weekly, etc.).
  • Send the Invitation: Click “Send” in the top-left corner. This will send the invite to all attendees and place it in your calendar.
  • Ensure you receive the confirmation for the laptop and or meeting room booking in your Inbox stating: Accepted

Before a staff member mobile device is approved for free Wi-Fi, the following steps must be taken:

  • Staff members must use the company SIM card.
  • The mobile device must have WhatsApp Business™ and 3CX™ installed and activated (3CX™ is only mandatory for staff with a dedicated internal telephone extension)
  • Set a device lock code on smartphones.
  • Report to the ICT office with your mobile phone so that the device MAC address can be whitelisted on the firewall for security and controlled access.
  • When using your personal mobile device in the office you are still expected to follow the company’s policies.
  • If a mobile device (personal or company-owned), which was used to access any company information including but not limited to company e-mail, OneDrive™, and SharePoint™ is stolen, this should be reported immediately to hr@aquabt.com and helpdesk@aquabt.com.
  • Personal laptops, tablets and any other devices are totally forbidden to be used on any AquaBioTech Group WiFi, Lan network or facilities.

To ensure the security of our network, access to the guest Wi-Fi is only granted through a secure token. Prior to accessing the guest’s Wi-Fi, staff members receiving visitors must request the tokens in advance through the front office. Upon receiving the token, the requester should write their staff member initials, event name, and date on the back of each used token.

It is the responsibility of the staff member to return both used and unused tokens to the front office. Any attempt by a staff member to use unauthorised tokens or bypass the limitations of any Wi-Fi network will be duly subject to disciplinary actions.

Security

Employees are responsible for saving their work on designated local shared network drives to facilitate regular backups. Only the ‘Desktop’ and ‘Documents’ folders will be included in the company computer backups, staff members must check regularly that those folders are being synchronized. You can see these results by clicking on the Sync Centre icon located next to the “date and time” bottom right hand corner of your primary screen.

In case of any accident which might corrupt or destroy the data, AquaBioTech Group ICT infrastructure has two levels of backup systems to ensure data security.

  • Level 1: Daily “Shadow Copies” of data stored on the FILESRV @ 7am and 12pm
  • Level 2: Daily Incremental backups of all server’s data to a local NAS device.

As per company policy, it is strictly prohibited to store personal files, photos, or any other personal information on the servers. The company will not be responsible for backing up such data. Any personal information that poses a risk to network security or company information will hold the staff member liable. Additionally, any personal information found on the server including but not limited to desktop and documents folders, will be deleted and reported to HR.

Data saved/stored anywhere else on the local computer/laptop will not be backed up.

Any software needed, in addition to the Microsoft Office suite of products, must be authorised by the departmental supervisor and downloaded by the ICT Department staff. If access is needed to extra software, which is not currently available on the Company network, kindly consult with the ICT department helpdesk@aquabt.com

  • Access to company software and applications is granted based on job roles and responsibilities.
  • Any software to be installed within the organisation must first be approved by the ICT Department. No software will be installed without the previous written request from the staff member’s supervisor.
  • The ICT Department must be informed in advance of any new software required for certain projects. This is essential for proper arrangements to be made for the procurement of the software in a reasonable amount of time.
  • Staff members must not try to install software themselves at any time. Failure to comply with this policy will be immediately flagged and stopped by the IT department.

I am receiving requests to accept the Windows 11 update. Should I accept these requests?

Report these prompts to helpdesk@aquabt.com so that ICT can complete the installation of Windows 11.

In order to get access to specific shared files or folders, it is necessary to follow the proper procedure. You must first request a written confirmation from your supervisor and then contact the IT Department helpdesk@aquabt.com, the IT department will not process any request without a previous written approval.

If your need is urgent there are key members of senior staff who have the ability to send files directly, you may seek their support.

The use of any file sharing platform, including Dropbox, Google Drive, Box, WeTransfer, or similar, is strictly forbidden and will result in disciplinary action.

Emails containing attachments such as Word Documents, Excel files, PowerPoint Presentations etc. will be flagged by IT and will not be approved. Only PDF documents can be sent via email and the total attachment size cannot exceed 10 megabytes.

In order to share files with external individuals, it is necessary to follow the proper procedure. You must first request permission from your supervisor and then contact the IT Department helpdesk@aquabt.com. They will assist you in creating a designated folder specifically for this purpose. This ensures that file sharing is conducted in a secure and controlled manner, IT department will not process any request without a previous written approval.

If your need is urgent there are key members of senior staff who have the ability to send files directly, you may seek their support.

Personal storage devices, such as external hard drives or USB devices, are not permitted for transferring or storing company data. To mitigate security risks, access to USB devices is blocked for all employees. This measure helps prevent the introduction of malware or unauthorised data transfers.

  • Mobile and storage devices also include notebook, netbooks, smartphones, tablets, USB devices, external hard drives, USB flash drives and any other device which connects to any point of AquaBioTech Group offices’ network both wirelessly or with a cable.
  • Any mobile and storage devices which will be holding or retrieving any files, information and/or emails from AquaBioTech Group must first be approved by the IT department prior to connecting.

Computers must never be left unlocked while unattended. Always ‘Sign Out’ or ‘Lock'(Windows key + L) your computer before leaving your desk.

  • It is crucial to prioritise the security of passwords. Clear text passwords should never be written down or shared with any other staff member.
  • To ensure strong password security, it is recommended to follow IT security guidelines. These guidelines typically include using passwords with a minimum of 10 characters, incorporating a combination of uppercase and lowercase letters, numbers, and special characters. It is important to avoid using common or easily guessable passwords such as “ABTG,” “aquabt,” staff member “initials”, consecutive numbers “123456”, or any other unsecured password “password123”. By adhering to these guidelines, you can enhance the overall security of your passwords.

Employees are encouraged to store and access company data on approved platforms and systems. Internet E-mail generally travels unencrypted through many networks where it is vulnerable to interception and/or loss. While this is not a common occurrence, users should keep this in mind when composing messages.

  • Sensitive information must be encrypted when being sent to recipients outside of the company. In the event that encryption is unavailable or cannot be coordinated with the receiving party, this information must not be transmitted via e-mail.
  • Users who require encryption should contact the ICT department helpdesk@aquabt.com.
  • To reduce the risk of unintentional or accidental release of information a user must not implement rules which automatically forward his or her Email to an external or personal Email address.
  • Users are responsible for ensuring that Email is not transmitted to unnecessary or unintended recipients. Each user should be aware of who is on the address list before using the “Reply to All” function of E-mail.
  • Each user should also be aware of the content of all previous Emails which are attached to their reply and ensure that they are only included when necessary and appropriate.

Formatting and Templates

  • Do not add anything after the date.

Example:   ABTG~XYZ01/YY~Mt~TechOfferBoQ~01-Dec-11

  • Please never modify a shared or read only file until previous user finish working on it or save a file as a copy of the original.

Example:   Copy of ABTG~XYZ01/YY~Mt ~TechOfferBoQ~01-Dec-11

ABTG~XYZ01~TechOfferBoQ~01-Dec-11 Copy

  • Group, Company and Department Name Abbreviations

ABTG              =          AquaBioTech Group

ABTL               =          AquaBioTech Limited

AqCi                =          AquaCirc Limited

  • Project Code Format

Client 3 letter name / Year project started ~ ISO 3166 Country Code

Example:   XYZ 01 / 22 ~ Mt

  • The length of filenames should never exceed 50 characters. Filenames exceeding 50 characters will cause problems to backup software and must be shortened by staff members.
  • Date Format

_ _-_ _ _-_ _            (DD-MMM-YY)

Date 2x Numbers

Month 3x Letters

Year 2x Numbers

Example: 01-Dec-11

  • File Path Lengths
    • The maximum file path length for Windows is 260 characters including spaces, special characters, and the file name.
    • File structures must be kept simple and well-organized to ensure that historical data can be easily located and that network backups run correctly and efficiently.
    • Below is an example of a long file path and a shorter simplified version.

Examples:

299 characters, Too Long

W:\ABTGClientResearchProjects\2015Projects\EuropeanUnionProjects\MonitorControlandSurveillance Projects 2020\DataReportsDocumentationResearchPapers\Reports\VesselMonitoringSystem\Thisisversion1 ontheReportontheHoursLoggedontheVesselMonitoringSystemPerVesselType.docx

94 characters

W:\Projects\2020\EU\MCS2020\Data\VMS\ReportOnHrsLoggedOnVMSPerVesselType~01-Jan-20.docx

General Examples

ABTG~CFF01/YY~Mt ~FarmEquipmentRequirements~21-May-08.doc   (57 characters)

Should be abbreviated to

ABTG~CFF01/YY~Mt ~FarmEquipReq~21-May-08.doc                               (44 characters)

ABTT~AKK01/YY~Mt ~VegetationCoverageMap~03-Jan-07.jpg               (53 characters)

Should be abbreviated to

ABTT~AKK01/YY~Mt ~VegCoverMap~03-Jan-07.jpg                                  (43 characters)

ABTL~ANC03/YY~Mt ~SiteSurveyReport~02-Jun-07.doc                          (48 characters)

ABTI~EVS01/YY~Mt ~TrialData~23-Oct-07.xls                                              (41 characters)

ABTL~CFF02/YY~Mt ~ReCircTankLayouts-Vs1~Feb-08.dwg                     (50 characters)

ABTL~CFF01/YY~Mt ~OxygenTanks-TopView~Nov-07.dwg                      (48 characters)

ABTG~MSWordHelpGuide~15~FEB~24

ABTG~FormattingStyles2024~15~Feb~24

Word, Excel and PowerPoint have their own templates pre-installed, and they must be used all the time. If you need support, please consult IT Department.

Using the company templates for all documents are mandatory, they are located in the Templates folder T:\ABTG Office Templates and also could be accessible through the ABTG Templates shortcut in your desktop.

If in doubt please contact ICT department helpdesk@aquabt.com for assistance about this matter.

Using the Teams company backgrounds are mandatory, they are located in the Templates folder T:\ABTG Office Templates\Teams Backgrounds.

If in doubt please contact ICT department helpdesk@aquabt.com for assistance about this matter.