Upload
aman-ullah
View
66
Download
0
Embed Size (px)
Citation preview
JSCS IT-Policy
Aman ullah
IT Coordinator
April 15, 2015
Information Technology Policy-JS Consultancy Services
INTRODUCTION:
IT-POLICY:
1. JS Consultancy Services IT-POLICY as a guide for best
practices within IT as well as providing essential principles
guiding use of equipments, software and IT systems security.
April 15, 2015
Information Technology Policy-JS Consultancy Services
2
IT EQUIPMENTS
April 15, 2015
Information Technology Policy-JS Consultancy Services
3
OUTLINES IT EQUIPMENTS1. SYSTEM PROTECTIONS
2. EQUIPMENT PROCUREMENT
3. USE OF LAPTOP AND DESKTOP COMPUTERS
4. USE OF PRINTERS
5. USE OF SCANNERS
6. USE OF LCD PROECTOR
7. USE OF DIGITAL PHOTO & VIDEO CAMERAS
8. USE OF FLASH DISK (MEMORY STICK)
9. USE OF CD-R/RW & DVD-R/RW DISC
10. USE OF EXTERNAL HARD DRIVE (HDDS)
11. Consumables
April 15, 2015
Information Technology Policy-JS Consultancy Services
4
IT Equipments
1. System Protection:
2. Keeping IT equipment safe & clean is the responsibility of
every user.
3. For cleaning Spray will be provided.
4. New installation is prohibited in JSCS IT Equipments.
5. By receiving of IT equipment Assets Assignment Form Must be
sign.
6. By damaging of IT equipment 10% cost will be cut off.
7. 75% cost will be cut off by losing equipment.
April 15, 2015
Information Technology Policy-JS Consultancy Services
5
RECOMMENDATIONS:
1. Connecting IT Equipment with safe power supply in/out of
the office.
2. All IT Equipment should be covered with plastic.
3. Equipment should be clean with soft wipes and spray.
4. Off devices safely before leaving to home or out of the
office more than 1 hour, unexpectedly or shutting down from button is prohibited.
5. All loan equipment should be return to JSCS before resign.
April 15, 2015
Information Technology Policy-JS Consultancy Services
6
EQUIPMENT PROCUREMENT:
Policies:
1. Purchasing locally or internationally.
2. IT equipments less than US$100 can be purchased using
petty cash. And equipments over
3. US$100 follow the finance procurement policies.
April 15, 2015
Information Technology Policy-JS Consultancy Services
7
USE OF LAPTOP AND DESKTOP COMPUTERS
Policies:
1. IT Equipment should be use for official work.
2. Temporary IT Equipment can also be provided according to
need.
USE OF PRINTERS:
1. IT Unit will monitors all staff
2. Staff members are only allowed to print official data not
personal data.
April 15, 2015
Information Technology Policy-JS Consultancy Services
8
Recommendations:
1. Color/black and white printers will be used according to
need.
USE OF SCANNERS:
Policies:
1. Every staff member should care about his/her scanning &
Printing.
Recommendations:
1. Always print according to your need.
2. If a Scan size is more than 10MB should be send through
share drive or compressed it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
9
April 15, 2015
Information Technology Policy-JS Consultancy Services
10
USE OF LCD PROJECTOR
Policies:
1. Request before 24 hours for an IT Equipments and protect it
after receiving.
2. Projector should be put on standby mode while not use.
USE OF DIGITAL PHOTO AND VIDEO CAMERAS
Policies:
1. Request before 24 hours for Camera.
2. After receiving camera take care.
April 15, 2015
Information Technology Policy-JS Consultancy Services
11
USE OF FLASH DISK (MEMORY STICK)
Policies:
1. IF a person feel that he/she require USB than they should
submit request form.
2. USB insertion to other devices is strongly prohibited.
Recommendations:
1. It is recommended that Share Drive should be use instead of USB to reduce Virus threat.
2. Suspicious USB should be scan before data transformation.
USE OF CD-R/RW, DVD-R/RW DISC
Policies:
1. Staff should fill up logbook before getting CDs from IT Unit.
2. Staff are not allowed to use CD/DVDs Drives for personal use.
Recommendations:
1. Reduce the use of CD-RW/DVD-RW.
2. Staff are not allowed to backup official data for their personal use.
April 15, 2015
Information Technology Policy-JS Consultancy Services
12
USE OF EXTERNAL HARD DRIVES (HDDS)
1. JSCS IT-POLICY is to backup data in external (HDD)
CONSUMABLES
Policies:
1. User should submit request form for Cartridge/Toners to IT
Unit.
2. Cartridge/Toners refilling is prohibited.
3. Printers/Photocopiers shall be installed with original
cartridge/toner
April 15, 2015
Information Technology Policy-JS Consultancy Services
13
Recommendations:
1. Cartridges/Toners should be purchased per quarter basis
2. Empty (used) cartridges and toners should be disposed
THANKS FOR JOINING!
April 15, 2015
Information Technology Policy-JS Consultancy Services
14
MANAGING & USING OF SOFTWARE
April 15, 2015
Information Technology Policy-JS Consultancy Services
15
MANAGING & USING OF SOFTWARE
1. USE OF SOFTWARE
2. FILING SYSTEM
3. ARCHIVING OFFICIAL DATA
4. USE OF E-MAIL & OUTLOOK
5. VIRUS PROTECTION
6. SYSTEM PERFORMANCE
April 15, 2015
Information Technology Policy-JS Consultancy Services
16
OUTLINE
MANAGING AND USING OF SOFTWARE
USE OF SOFTWARE:
Policies:
1. Only license software will be installed on JSCS systems. JSCS
license software is not allowed to installed on home systems.
2. software will be use under license.
3. Users are not allowed install, uninstall the preinstall and modify the install software.
4. Illegal & unlicensed software are not allowed to install on
official systems. User need a software submit request for it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
17
1. All IT related software, Media, CDs and other equipment
should be store with IT Unit.
FILING SYSTEM
Policies:
1. All official and nonofficial data is prohibited to store on
desktop and C: Drive (Windows D:).
Recommendations:
1. File name should be less than 40 characters.
2. Folder structure path shouldn’t exceed 10 folders.
3. Clear and meaning full name.
April 15, 2015
Information Technology Policy-JS Consultancy Services
18
ARCHIVING OFFICIAL DATA
Policies:1. Each member will have maximum space of 10Gigabits space
2. Only official data will be backup.
Recommendations:
1. Exceeding space limit consult IT Unit.
2. Deleting of unnecessary data.
USE OF E-MAIL AND OUTLOOK
Policies:
1. All official E-mails account can be link to outlook.
2. Sending of large email causing problem large email can be
send through share drive or Drop box.
April 15, 2015
Information Technology Policy-JS Consultancy Services
19
Recommendations:
1. Delete unnecessary messages from inbox.
2. Official email will be close after 24 hours of an employee
resignation.
E-mail etiquette:
1. Always think for a while when sending message.
VIRUS PROTECTION
1. New viruses are being constantly developed
Policies:
1. Anti-virus programs provide good protection, but only if the
latest updates have been installed.
April 15, 2015
Information Technology Policy-JS Consultancy Services
20
2. JS Consultancy Services uses AVAST Anti-Virus program with
the latest virus definitions
3. Keeping the computer free of the viruses is the responsibility
of computer user.
4. Always contact the IT unit to give you updates and
information on new technology to protect
computers from virus.
5. Multi Anti-virus programs are prohibited, as they conflict each other.
6. IT Unit can’t protect IT Equipment without users help.
April 15, 2015
Information Technology Policy-JS Consultancy Services
21
April 15, 2015
Information Technology Policy-JS Consultancy Services
22
Recommendations:
1. Get the very latest anti-virus update
2. Perform a complete scan of all hard disk drives e.g. C: D: etc.
SYSTEM PERFORMANCE
Policies:
Installation of many programs/applications:1. Staff is not allowed to install irrelevant
programs/applications on office computers
Recommendations:1. Scan computer.
2. Avoid a high resolution screen saver it consume power.
3. Avoid hibernation.
THANKS FOR JOINING!
IT & NETWORK SECURITY POLICY
April 15, 2015
Information Technology Policy-JS Consultancy Services
23
OUTLINE IT & NETWORK SECURITY POLICY
1. Network Topology & Infrastructure
2. LOCAL USERS RIGHTS & ASSIGNMENT
3. WORKGROUP SECURITY POLICY
4. PASSWORD POLICY
5. ACCOUNT LOCKOUT POLICY
6. SECURITY OPTIONS (TRUST RELATIONSHIP)
7. USE OF NETWORK DRIVES
8. INTERNET USAGE
9. Technical Review-
April 15, 2015
Information Technology Policy-JS Consultancy Services
24
IT AND NETWORK SECURITY POLICY
NETWORK TOPOLOGY AND INFRASTRUCTURE
Policies:
1. Network administrator has the right to modify pwd.
2. Staff must use the network resources under their
specific terms and policies
3. Staff can use network resources by one computer
or equivalent devices at any time
Recommendations:
1. All network users have the responsibility to keep
their office network out of reach of direct
2. heat, sunshine, water, etc.
April 15, 2015
Information Technology Policy-JS Consultancy Services
25
LOCAL USERS RIGHTS AND ASSIGNMENTS
Policies:
1. Staff member are not allowed to login to other
person system.
2. Account password secret.
3. Rights and restrictions in network.
4. Shared Drive is restricted and allowed for some
persons.
5. Password must be change after 180 days.
6. Computer user account will be log out after 10
minutes when not in use.
7. All computers are password protected.
April 15, 2015
Information Technology Policy-JS Consultancy Services
26
Recommendations:
1. Staff should inform the IT unit if they out of the
office for more than 7 business days for
security reasons.
1. It is recommended that staff members lock their
2. computers while not in use
WORKGROUP SECURITY POLICY
Policies:
1. Only authenticated users allowed to access
shared drive.
Change the system time
April 15, 2015
Information Technology Policy-JS Consultancy Services
27
1. Staff are not allowed to change the security
Settings & timings.
Changing the local user’s name/password
PASSWORD POLICY
Policies:
1. Passwords are good for 180 days.
2. Passwords must be at least eight characters long
and contain numbers and symbols.
3. For security reasons, passwords shall not contain
your user name or any part of your full.
April 15, 2015
Information Technology Policy-JS Consultancy Services
28
April 15, 2015
Information Technology Policy-JS Consultancy Services
29
ACCOUNT LOCKOUT POLICY
Policies:
1. Account lockout threshold
2. Account lockout duration
SECURITY OPTIONS (TRUST RELATIONSHIP)
1. If a staff member plans to be out of the office for
at least 30 days, they are advised to change
their password before leaving the office.
2. The HR unit must inform the IT Unit when an
employee is terminated or resigned before
24hours.
USE OF NETWORK DRIVES
Policies:
1. Saving personal data to any of the network
backup drives is prohibited.
2. Users are not allowed to save a database file to
the Share Drive or Outlook backup drive.
3. Shared, databases and Outlook backup drives
have a standard structure.
INTERNET USAGE
Policies:
1. Social media during office time is prohibited.
2. Downloading pirated software are prohibited.
April 15, 2015
Information Technology Policy-JS Consultancy Services
30
3. Staff can use internet for unofficial use before 8:00
AM and after 2:30 PM.
4. No one is allowed to download official and
unofficial software without the permission of IT Unit.
5. Uploading is prohibited.
6. Chatting and Instant Messaging software for
unofficial purposes is prohibited.
7. Staff can use Skype as IM.
8. Skype must be sign in during the office hours.
THANKS FOR JOINING
April 15, 2015
Information Technology Policy-JS Consultancy Services
31