SlideShare a Scribd company logo
1 of 14
Presentation by Arashdeep Kaur
Policies of
Infrastructure
Management
Enterprise Architecture
01
1706834 | Arashdeep Kaur
Today's
Presentation
Discussion Points
• Infrastructure Management(IM)
• Policy Management
• IT Infrastructure Policies
1706834 | Arashdeep Kaur
02
Infrastructure
Management
Definition
Infrastructure management (IM) is
the management of essential
operation components, such as
policies, processes, equipment,
data, human resources, and external
contacts, for overall effectiveness.
Categories
Application Management,
network management, and
storage management.
03
1706834 | Arashdeep Kaur
Policy Management
1. Policy management is the process of creating,
communicating, and maintaining policies and
procedures within an organization.
2. An effective policy management system can mitigate
risk in two ways.:
a. First, it makes policies more quickly accessible to
direct care staff, guiding care and safety
decisions.
b. Second, it can protect an organization from
litigation by staying up to date on accreditation
standards and creating an audit trail in the case of
legal action.
04
1706834 | Arashdeep Kaur
IT Infrastructure
Policies and
Procedures
One of the best ways to communicate and understand a company
and its operating culture is through its policies.
- Designing and writing policy and communicating it effectively is an
essential skill for professionals to have.
- By having policy carefully developed and communicated,
employees will clearly know what the organization expects from
them, the degree of control and independence they will have, and
what the benefits and consequences are in regard to adhering to
policy.
05
1706834 | Arashdeep Kaur
06
Infrastructure
Policies
1. Backup Retention Policy
2. Google Glass Policy
3. Incident Plan Policy
4. Privacy Compliance Policy
5. Social Networking Policy
6. Sensitive Information Policy
7. Technology Acquisition Policy
8. Wearable Device Policy
9. WFH and Telecommuting Policy
1706834 | Arashdeep Kaur
07
Backup
Retention Policy
 This policy refers to backups of user data that are
copied onto tape (or any backup media, including
disk-to-disk storage). User data is stored on disks
on our computer systems.
 This is useful in case of a system failure (and files
have to be restored from the backup media) or in
the case of a user accidentally erasing one of their
files (and again, that file can be restored from the
backup media).
1706834 | Arashdeep Kaur
08
Factors that IT professionals need
to consider for backup retention
include:
1. Business and regulatory requirements - regulatory
compliance and data preservation
2. Economic and budgetary concerns - doing more with
less
3. Data loss prevention and information protection -
protect, preserve and serve
4. Environmental and business sustainment - green and
economically efficient
5. Maximize IT resource effectiveness and return on
investment (ROI)
6. Reduce total cost ownership (TCO) of IT resources and
service delivery
1706834 | Arashdeep Kaur
• The purpose of the Technology Acquisition policy is to
establish guidelines for the acquisition of technology
including hardware, software, computer-related
components, and services purchased with enterprise
funds.
• This policy sets the road map for how new and existing
technology is implemented throughout the enterprise.
09
Technology
Acquisition
Policy
1706834 | Arashdeep Kaur
Enterprise
Technology
resources
10
•Cloud processing services
•Desktops, laptops,
tablets, SmartPhones/PDAs,
cell phones, and servers
•Backup and recovery
services
•Web-hosted services
including blogs and websites
•Peripheral equipment, such
as printers and scanners
1706834 | Arashdeep Kaur
11
• A work from home policy is nothing but an agreement
between the employer and the employees who prefer to
have the work from home privileges.
• The policy defines the expectations, responsibilities, the
eligibility and the other work from home guidelines. In
short, it ensures that all employees understand what is
required of them when they choose to work from home.
WFH POLICY AND
TELECOMMUTING
1706834 | Arashdeep Kaur
12
Key Elements Of A
Work From Home
Policy
1706834 | Arashdeep Kaur
13
• With identify theft and cyberattacks on the rise, you're facing new
pressures to protect sensitive information These laws are designed to
protect residents against identity theft by mandating security practices
such as:
• Implementing an information security program
• Encrypting data
• Notifying customers in the event of a security breach that compromises
unencrypted personal information
• To protect sensitive information, many states are now required to
implement security programs that include capabilities for incident
monitoring and alerting, trend reporting, logging, security information
management (SIM), and other prudent security controls and practices.
Sensitive
Information
Policy
1706834 | Arashdeep Kaur
20
For more policies
https://www.e-janco.com/products-policies.html
1706834 | Arashdeep Kaur
THANK
YOU

More Related Content

What's hot

Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer Experience
Alan McSweeney
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
Alan McSweeney
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Alan McSweeney
 

What's hot (20)

3D Data Strategy Framework
3D Data Strategy Framework3D Data Strategy Framework
3D Data Strategy Framework
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer Experience
 
Business-IT Alignment
Business-IT AlignmentBusiness-IT Alignment
Business-IT Alignment
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
 
Dimensional modeling primer - SQL Saturday Madison - April 11th, 2015
Dimensional modeling primer - SQL Saturday Madison - April 11th, 2015Dimensional modeling primer - SQL Saturday Madison - April 11th, 2015
Dimensional modeling primer - SQL Saturday Madison - April 11th, 2015
 
Health Information Analytics: Data Governance, Data Quality and Data Standards
Health Information Analytics:  Data Governance, Data Quality and Data StandardsHealth Information Analytics:  Data Governance, Data Quality and Data Standards
Health Information Analytics: Data Governance, Data Quality and Data Standards
 
Difference Between TOGAF 9 and TOGAF 10
Difference Between TOGAF 9 and TOGAF 10Difference Between TOGAF 9 and TOGAF 10
Difference Between TOGAF 9 and TOGAF 10
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Data Governance Intro.pptx
Data Governance Intro.pptxData Governance Intro.pptx
Data Governance Intro.pptx
 
Real Time Data Strategy and Architecture
Real Time Data Strategy and ArchitectureReal Time Data Strategy and Architecture
Real Time Data Strategy and Architecture
 
IT Strategy
IT StrategyIT Strategy
IT Strategy
 
Data Warehouse Designing: Dimensional Modelling and E-R Modelling
Data Warehouse Designing: Dimensional Modelling and E-R ModellingData Warehouse Designing: Dimensional Modelling and E-R Modelling
Data Warehouse Designing: Dimensional Modelling and E-R Modelling
 
How to Implement Data Governance Best Practice
How to Implement Data Governance Best PracticeHow to Implement Data Governance Best Practice
How to Implement Data Governance Best Practice
 
IT Strategy & Planning
IT Strategy & PlanningIT Strategy & Planning
IT Strategy & Planning
 
Enterprise architecture framework business case
Enterprise architecture framework business caseEnterprise architecture framework business case
Enterprise architecture framework business case
 
RWDG Slides: What is a Data Steward to do?
RWDG Slides: What is a Data Steward to do?RWDG Slides: What is a Data Steward to do?
RWDG Slides: What is a Data Steward to do?
 
How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model
 
MAPPING TOGAF® ADM AND AGILE APPROACH
MAPPING TOGAF® ADM AND AGILE APPROACHMAPPING TOGAF® ADM AND AGILE APPROACH
MAPPING TOGAF® ADM AND AGILE APPROACH
 

Similar to Policies of Infrastructure Management

Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
Prashant Singh
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
Presentation week 5
Presentation week 5Presentation week 5
Presentation week 5
ryjackson
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 

Similar to Policies of Infrastructure Management (20)

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
12 security policies
12 security policies12 security policies
12 security policies
 
Presentation week 5
Presentation week 5Presentation week 5
Presentation week 5
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
Green it and audit
Green it and auditGreen it and audit
Green it and audit
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 

Recently uploaded

Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 

Recently uploaded (20)

Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
BORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfBORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Online book store management system project.pdf
Online book store management system project.pdfOnline book store management system project.pdf
Online book store management system project.pdf
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdf
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 

Policies of Infrastructure Management

  • 1. Presentation by Arashdeep Kaur Policies of Infrastructure Management Enterprise Architecture 01 1706834 | Arashdeep Kaur
  • 2. Today's Presentation Discussion Points • Infrastructure Management(IM) • Policy Management • IT Infrastructure Policies 1706834 | Arashdeep Kaur 02
  • 3. Infrastructure Management Definition Infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness. Categories Application Management, network management, and storage management. 03 1706834 | Arashdeep Kaur
  • 4. Policy Management 1. Policy management is the process of creating, communicating, and maintaining policies and procedures within an organization. 2. An effective policy management system can mitigate risk in two ways.: a. First, it makes policies more quickly accessible to direct care staff, guiding care and safety decisions. b. Second, it can protect an organization from litigation by staying up to date on accreditation standards and creating an audit trail in the case of legal action. 04 1706834 | Arashdeep Kaur
  • 5. IT Infrastructure Policies and Procedures One of the best ways to communicate and understand a company and its operating culture is through its policies. - Designing and writing policy and communicating it effectively is an essential skill for professionals to have. - By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy. 05 1706834 | Arashdeep Kaur
  • 6. 06 Infrastructure Policies 1. Backup Retention Policy 2. Google Glass Policy 3. Incident Plan Policy 4. Privacy Compliance Policy 5. Social Networking Policy 6. Sensitive Information Policy 7. Technology Acquisition Policy 8. Wearable Device Policy 9. WFH and Telecommuting Policy 1706834 | Arashdeep Kaur
  • 7. 07 Backup Retention Policy  This policy refers to backups of user data that are copied onto tape (or any backup media, including disk-to-disk storage). User data is stored on disks on our computer systems.  This is useful in case of a system failure (and files have to be restored from the backup media) or in the case of a user accidentally erasing one of their files (and again, that file can be restored from the backup media). 1706834 | Arashdeep Kaur
  • 8. 08 Factors that IT professionals need to consider for backup retention include: 1. Business and regulatory requirements - regulatory compliance and data preservation 2. Economic and budgetary concerns - doing more with less 3. Data loss prevention and information protection - protect, preserve and serve 4. Environmental and business sustainment - green and economically efficient 5. Maximize IT resource effectiveness and return on investment (ROI) 6. Reduce total cost ownership (TCO) of IT resources and service delivery 1706834 | Arashdeep Kaur
  • 9. • The purpose of the Technology Acquisition policy is to establish guidelines for the acquisition of technology including hardware, software, computer-related components, and services purchased with enterprise funds. • This policy sets the road map for how new and existing technology is implemented throughout the enterprise. 09 Technology Acquisition Policy 1706834 | Arashdeep Kaur
  • 10. Enterprise Technology resources 10 •Cloud processing services •Desktops, laptops, tablets, SmartPhones/PDAs, cell phones, and servers •Backup and recovery services •Web-hosted services including blogs and websites •Peripheral equipment, such as printers and scanners 1706834 | Arashdeep Kaur
  • 11. 11 • A work from home policy is nothing but an agreement between the employer and the employees who prefer to have the work from home privileges. • The policy defines the expectations, responsibilities, the eligibility and the other work from home guidelines. In short, it ensures that all employees understand what is required of them when they choose to work from home. WFH POLICY AND TELECOMMUTING 1706834 | Arashdeep Kaur
  • 12. 12 Key Elements Of A Work From Home Policy 1706834 | Arashdeep Kaur
  • 13. 13 • With identify theft and cyberattacks on the rise, you're facing new pressures to protect sensitive information These laws are designed to protect residents against identity theft by mandating security practices such as: • Implementing an information security program • Encrypting data • Notifying customers in the event of a security breach that compromises unencrypted personal information • To protect sensitive information, many states are now required to implement security programs that include capabilities for incident monitoring and alerting, trend reporting, logging, security information management (SIM), and other prudent security controls and practices. Sensitive Information Policy 1706834 | Arashdeep Kaur