31
JSCS IT-Policy Aman ullah IT Coordinator April 15, 2015 Information Technology Policy-JS Consultancy Services

Jscs it policy presentations

Embed Size (px)

Citation preview

Page 1: Jscs it policy presentations

JSCS IT-Policy

Aman ullah

IT Coordinator

April 15, 2015

Information Technology Policy-JS Consultancy Services

Page 2: Jscs it policy presentations

INTRODUCTION:

IT-POLICY:

1. JS Consultancy Services IT-POLICY as a guide for best

practices within IT as well as providing essential principles

guiding use of equipments, software and IT systems security.

April 15, 2015

Information Technology Policy-JS Consultancy Services

2

Page 3: Jscs it policy presentations

IT EQUIPMENTS

April 15, 2015

Information Technology Policy-JS Consultancy Services

3

Page 4: Jscs it policy presentations

OUTLINES IT EQUIPMENTS1. SYSTEM PROTECTIONS

2. EQUIPMENT PROCUREMENT

3. USE OF LAPTOP AND DESKTOP COMPUTERS

4. USE OF PRINTERS

5. USE OF SCANNERS

6. USE OF LCD PROECTOR

7. USE OF DIGITAL PHOTO & VIDEO CAMERAS

8. USE OF FLASH DISK (MEMORY STICK)

9. USE OF CD-R/RW & DVD-R/RW DISC

10. USE OF EXTERNAL HARD DRIVE (HDDS)

11. Consumables

April 15, 2015

Information Technology Policy-JS Consultancy Services

4

Page 5: Jscs it policy presentations

IT Equipments

1. System Protection:

2. Keeping IT equipment safe & clean is the responsibility of

every user.

3. For cleaning Spray will be provided.

4. New installation is prohibited in JSCS IT Equipments.

5. By receiving of IT equipment Assets Assignment Form Must be

sign.

6. By damaging of IT equipment 10% cost will be cut off.

7. 75% cost will be cut off by losing equipment.

April 15, 2015

Information Technology Policy-JS Consultancy Services

5

Page 6: Jscs it policy presentations

RECOMMENDATIONS:

1. Connecting IT Equipment with safe power supply in/out of

the office.

2. All IT Equipment should be covered with plastic.

3. Equipment should be clean with soft wipes and spray.

4. Off devices safely before leaving to home or out of the

office more than 1 hour, unexpectedly or shutting down from button is prohibited.

5. All loan equipment should be return to JSCS before resign.

April 15, 2015

Information Technology Policy-JS Consultancy Services

6

Page 7: Jscs it policy presentations

EQUIPMENT PROCUREMENT:

Policies:

1. Purchasing locally or internationally.

2. IT equipments less than US$100 can be purchased using

petty cash. And equipments over

3. US$100 follow the finance procurement policies.

April 15, 2015

Information Technology Policy-JS Consultancy Services

7

Page 8: Jscs it policy presentations

USE OF LAPTOP AND DESKTOP COMPUTERS

Policies:

1. IT Equipment should be use for official work.

2. Temporary IT Equipment can also be provided according to

need.

USE OF PRINTERS:

1. IT Unit will monitors all staff

2. Staff members are only allowed to print official data not

personal data.

April 15, 2015

Information Technology Policy-JS Consultancy Services

8

Page 9: Jscs it policy presentations

Recommendations:

1. Color/black and white printers will be used according to

need.

USE OF SCANNERS:

Policies:

1. Every staff member should care about his/her scanning &

Printing.

Recommendations:

1. Always print according to your need.

2. If a Scan size is more than 10MB should be send through

share drive or compressed it.

April 15, 2015

Information Technology Policy-JS Consultancy Services

9

Page 10: Jscs it policy presentations

April 15, 2015

Information Technology Policy-JS Consultancy Services

10

USE OF LCD PROJECTOR

Policies:

1. Request before 24 hours for an IT Equipments and protect it

after receiving.

2. Projector should be put on standby mode while not use.

USE OF DIGITAL PHOTO AND VIDEO CAMERAS

Policies:

1. Request before 24 hours for Camera.

2. After receiving camera take care.

Page 11: Jscs it policy presentations

April 15, 2015

Information Technology Policy-JS Consultancy Services

11

USE OF FLASH DISK (MEMORY STICK)

Policies:

1. IF a person feel that he/she require USB than they should

submit request form.

2. USB insertion to other devices is strongly prohibited.

Recommendations:

1. It is recommended that Share Drive should be use instead of USB to reduce Virus threat.

2. Suspicious USB should be scan before data transformation.

Page 12: Jscs it policy presentations

USE OF CD-R/RW, DVD-R/RW DISC

Policies:

1. Staff should fill up logbook before getting CDs from IT Unit.

2. Staff are not allowed to use CD/DVDs Drives for personal use.

Recommendations:

1. Reduce the use of CD-RW/DVD-RW.

2. Staff are not allowed to backup official data for their personal use.

April 15, 2015

Information Technology Policy-JS Consultancy Services

12

Page 13: Jscs it policy presentations

USE OF EXTERNAL HARD DRIVES (HDDS)

1. JSCS IT-POLICY is to backup data in external (HDD)

CONSUMABLES

Policies:

1. User should submit request form for Cartridge/Toners to IT

Unit.

2. Cartridge/Toners refilling is prohibited.

3. Printers/Photocopiers shall be installed with original

cartridge/toner

April 15, 2015

Information Technology Policy-JS Consultancy Services

13

Page 14: Jscs it policy presentations

Recommendations:

1. Cartridges/Toners should be purchased per quarter basis

2. Empty (used) cartridges and toners should be disposed

THANKS FOR JOINING!

April 15, 2015

Information Technology Policy-JS Consultancy Services

14

Page 15: Jscs it policy presentations

MANAGING & USING OF SOFTWARE

April 15, 2015

Information Technology Policy-JS Consultancy Services

15

Page 16: Jscs it policy presentations

MANAGING & USING OF SOFTWARE

1. USE OF SOFTWARE

2. FILING SYSTEM

3. ARCHIVING OFFICIAL DATA

4. USE OF E-MAIL & OUTLOOK

5. VIRUS PROTECTION

6. SYSTEM PERFORMANCE

April 15, 2015

Information Technology Policy-JS Consultancy Services

16

OUTLINE

Page 17: Jscs it policy presentations

MANAGING AND USING OF SOFTWARE

USE OF SOFTWARE:

Policies:

1. Only license software will be installed on JSCS systems. JSCS

license software is not allowed to installed on home systems.

2. software will be use under license.

3. Users are not allowed install, uninstall the preinstall and modify the install software.

4. Illegal & unlicensed software are not allowed to install on

official systems. User need a software submit request for it.

April 15, 2015

Information Technology Policy-JS Consultancy Services

17

Page 18: Jscs it policy presentations

1. All IT related software, Media, CDs and other equipment

should be store with IT Unit.

FILING SYSTEM

Policies:

1. All official and nonofficial data is prohibited to store on

desktop and C: Drive (Windows D:).

Recommendations:

1. File name should be less than 40 characters.

2. Folder structure path shouldn’t exceed 10 folders.

3. Clear and meaning full name.

April 15, 2015

Information Technology Policy-JS Consultancy Services

18

Page 19: Jscs it policy presentations

ARCHIVING OFFICIAL DATA

Policies:1. Each member will have maximum space of 10Gigabits space

2. Only official data will be backup.

Recommendations:

1. Exceeding space limit consult IT Unit.

2. Deleting of unnecessary data.

USE OF E-MAIL AND OUTLOOK

Policies:

1. All official E-mails account can be link to outlook.

2. Sending of large email causing problem large email can be

send through share drive or Drop box.

April 15, 2015

Information Technology Policy-JS Consultancy Services

19

Page 20: Jscs it policy presentations

Recommendations:

1. Delete unnecessary messages from inbox.

2. Official email will be close after 24 hours of an employee

resignation.

E-mail etiquette:

1. Always think for a while when sending message.

VIRUS PROTECTION

1. New viruses are being constantly developed

Policies:

1. Anti-virus programs provide good protection, but only if the

latest updates have been installed.

April 15, 2015

Information Technology Policy-JS Consultancy Services

20

Page 21: Jscs it policy presentations

2. JS Consultancy Services uses AVAST Anti-Virus program with

the latest virus definitions

3. Keeping the computer free of the viruses is the responsibility

of computer user.

4. Always contact the IT unit to give you updates and

information on new technology to protect

computers from virus.

5. Multi Anti-virus programs are prohibited, as they conflict each other.

6. IT Unit can’t protect IT Equipment without users help.

April 15, 2015

Information Technology Policy-JS Consultancy Services

21

Page 22: Jscs it policy presentations

April 15, 2015

Information Technology Policy-JS Consultancy Services

22

Recommendations:

1. Get the very latest anti-virus update

2. Perform a complete scan of all hard disk drives e.g. C: D: etc.

SYSTEM PERFORMANCE

Policies:

Installation of many programs/applications:1. Staff is not allowed to install irrelevant

programs/applications on office computers

Recommendations:1. Scan computer.

2. Avoid a high resolution screen saver it consume power.

3. Avoid hibernation.

THANKS FOR JOINING!

Page 23: Jscs it policy presentations

IT & NETWORK SECURITY POLICY

April 15, 2015

Information Technology Policy-JS Consultancy Services

23

Page 24: Jscs it policy presentations

OUTLINE IT & NETWORK SECURITY POLICY

1. Network Topology & Infrastructure

2. LOCAL USERS RIGHTS & ASSIGNMENT

3. WORKGROUP SECURITY POLICY

4. PASSWORD POLICY

5. ACCOUNT LOCKOUT POLICY

6. SECURITY OPTIONS (TRUST RELATIONSHIP)

7. USE OF NETWORK DRIVES

8. INTERNET USAGE

9. Technical Review-

April 15, 2015

Information Technology Policy-JS Consultancy Services

24

Page 25: Jscs it policy presentations

IT AND NETWORK SECURITY POLICY

NETWORK TOPOLOGY AND INFRASTRUCTURE

Policies:

1. Network administrator has the right to modify pwd.

2. Staff must use the network resources under their

specific terms and policies

3. Staff can use network resources by one computer

or equivalent devices at any time

Recommendations:

1. All network users have the responsibility to keep

their office network out of reach of direct

2. heat, sunshine, water, etc.

April 15, 2015

Information Technology Policy-JS Consultancy Services

25

Page 26: Jscs it policy presentations

LOCAL USERS RIGHTS AND ASSIGNMENTS

Policies:

1. Staff member are not allowed to login to other

person system.

2. Account password secret.

3. Rights and restrictions in network.

4. Shared Drive is restricted and allowed for some

persons.

5. Password must be change after 180 days.

6. Computer user account will be log out after 10

minutes when not in use.

7. All computers are password protected.

April 15, 2015

Information Technology Policy-JS Consultancy Services

26

Page 27: Jscs it policy presentations

Recommendations:

1. Staff should inform the IT unit if they out of the

office for more than 7 business days for

security reasons.

1. It is recommended that staff members lock their

2. computers while not in use

WORKGROUP SECURITY POLICY

Policies:

1. Only authenticated users allowed to access

shared drive.

Change the system time

April 15, 2015

Information Technology Policy-JS Consultancy Services

27

Page 28: Jscs it policy presentations

1. Staff are not allowed to change the security

Settings & timings.

Changing the local user’s name/password

PASSWORD POLICY

Policies:

1. Passwords are good for 180 days.

2. Passwords must be at least eight characters long

and contain numbers and symbols.

3. For security reasons, passwords shall not contain

your user name or any part of your full.

April 15, 2015

Information Technology Policy-JS Consultancy Services

28

Page 29: Jscs it policy presentations

April 15, 2015

Information Technology Policy-JS Consultancy Services

29

ACCOUNT LOCKOUT POLICY

Policies:

1. Account lockout threshold

2. Account lockout duration

SECURITY OPTIONS (TRUST RELATIONSHIP)

1. If a staff member plans to be out of the office for

at least 30 days, they are advised to change

their password before leaving the office.

2. The HR unit must inform the IT Unit when an

employee is terminated or resigned before

24hours.

Page 30: Jscs it policy presentations

USE OF NETWORK DRIVES

Policies:

1. Saving personal data to any of the network

backup drives is prohibited.

2. Users are not allowed to save a database file to

the Share Drive or Outlook backup drive.

3. Shared, databases and Outlook backup drives

have a standard structure.

INTERNET USAGE

Policies:

1. Social media during office time is prohibited.

2. Downloading pirated software are prohibited.

April 15, 2015

Information Technology Policy-JS Consultancy Services

30

Page 31: Jscs it policy presentations

3. Staff can use internet for unofficial use before 8:00

AM and after 2:30 PM.

4. No one is allowed to download official and

unofficial software without the permission of IT Unit.

5. Uploading is prohibited.

6. Chatting and Instant Messaging software for

unofficial purposes is prohibited.

7. Staff can use Skype as IM.

8. Skype must be sign in during the office hours.

THANKS FOR JOINING

April 15, 2015

Information Technology Policy-JS Consultancy Services

31