SlideShare a Scribd company logo
1 of 14
Presentation by Arashdeep Kaur
Policies of
Infrastructure
Management
Enterprise Architecture
01
1706834 | Arashdeep Kaur
Today's
Presentation
Discussion Points
• Infrastructure Management(IM)
• Policy Management
• IT Infrastructure Policies
1706834 | Arashdeep Kaur
02
Infrastructure
Management
Definition
Infrastructure management (IM) is
the management of essential
operation components, such as
policies, processes, equipment,
data, human resources, and external
contacts, for overall effectiveness.
Categories
Application Management,
network management, and
storage management.
03
1706834 | Arashdeep Kaur
Policy Management
1. Policy management is the process of creating,
communicating, and maintaining policies and
procedures within an organization.
2. An effective policy management system can mitigate
risk in two ways.:
a. First, it makes policies more quickly accessible to
direct care staff, guiding care and safety
decisions.
b. Second, it can protect an organization from
litigation by staying up to date on accreditation
standards and creating an audit trail in the case of
legal action.
04
1706834 | Arashdeep Kaur
IT Infrastructure
Policies and
Procedures
One of the best ways to communicate and understand a company
and its operating culture is through its policies.
- Designing and writing policy and communicating it effectively is an
essential skill for professionals to have.
- By having policy carefully developed and communicated,
employees will clearly know what the organization expects from
them, the degree of control and independence they will have, and
what the benefits and consequences are in regard to adhering to
policy.
05
1706834 | Arashdeep Kaur
06
Infrastructure
Policies
1. Backup Retention Policy
2. Google Glass Policy
3. Incident Plan Policy
4. Privacy Compliance Policy
5. Social Networking Policy
6. Sensitive Information Policy
7. Technology Acquisition Policy
8. Wearable Device Policy
9. WFH and Telecommuting Policy
1706834 | Arashdeep Kaur
07
Backup
Retention Policy
 This policy refers to backups of user data that are
copied onto tape (or any backup media, including
disk-to-disk storage). User data is stored on disks
on our computer systems.
 This is useful in case of a system failure (and files
have to be restored from the backup media) or in
the case of a user accidentally erasing one of their
files (and again, that file can be restored from the
backup media).
1706834 | Arashdeep Kaur
08
Factors that IT professionals need
to consider for backup retention
include:
1. Business and regulatory requirements - regulatory
compliance and data preservation
2. Economic and budgetary concerns - doing more with
less
3. Data loss prevention and information protection -
protect, preserve and serve
4. Environmental and business sustainment - green and
economically efficient
5. Maximize IT resource effectiveness and return on
investment (ROI)
6. Reduce total cost ownership (TCO) of IT resources and
service delivery
1706834 | Arashdeep Kaur
• The purpose of the Technology Acquisition policy is to
establish guidelines for the acquisition of technology
including hardware, software, computer-related
components, and services purchased with enterprise
funds.
• This policy sets the road map for how new and existing
technology is implemented throughout the enterprise.
09
Technology
Acquisition
Policy
1706834 | Arashdeep Kaur
Enterprise
Technology
resources
10
•Cloud processing services
•Desktops, laptops,
tablets, SmartPhones/PDAs,
cell phones, and servers
•Backup and recovery
services
•Web-hosted services
including blogs and websites
•Peripheral equipment, such
as printers and scanners
1706834 | Arashdeep Kaur
11
• A work from home policy is nothing but an agreement
between the employer and the employees who prefer to
have the work from home privileges.
• The policy defines the expectations, responsibilities, the
eligibility and the other work from home guidelines. In
short, it ensures that all employees understand what is
required of them when they choose to work from home.
WFH POLICY AND
TELECOMMUTING
1706834 | Arashdeep Kaur
12
Key Elements Of A
Work From Home
Policy
1706834 | Arashdeep Kaur
13
• With identify theft and cyberattacks on the rise, you're facing new
pressures to protect sensitive information These laws are designed to
protect residents against identity theft by mandating security practices
such as:
• Implementing an information security program
• Encrypting data
• Notifying customers in the event of a security breach that compromises
unencrypted personal information
• To protect sensitive information, many states are now required to
implement security programs that include capabilities for incident
monitoring and alerting, trend reporting, logging, security information
management (SIM), and other prudent security controls and practices.
Sensitive
Information
Policy
1706834 | Arashdeep Kaur
20
For more policies
https://www.e-janco.com/products-policies.html
1706834 | Arashdeep Kaur
THANK
YOU

More Related Content

What's hot

Information systems in Organizations
Information systems in OrganizationsInformation systems in Organizations
Information systems in Organizationsmulugetaa
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy FrameworkVishal Sharma
 
Chapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmChapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmPratik Pradhan
 
Principles Of Multimedia
Principles Of MultimediaPrinciples Of Multimedia
Principles Of Multimediadborcoman
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbmsDaisy Joy
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
erp and related technologies
erp and related technologieserp and related technologies
erp and related technologiesMadan Kumawat
 
Implementation of MIS and its methods
Implementation of MIS and its methodsImplementation of MIS and its methods
Implementation of MIS and its methodsPoojith Chowdhary
 
computer based information system
computer based information systemcomputer based information system
computer based information systemjandian
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managersAbdulQadir Koitewale
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Leo Shuster
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 

What's hot (20)

IT Strategy
IT StrategyIT Strategy
IT Strategy
 
Information systems in Organizations
Information systems in OrganizationsInformation systems in Organizations
Information systems in Organizations
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Ch03 prescriptive process models
Ch03 prescriptive process modelsCh03 prescriptive process models
Ch03 prescriptive process models
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
 
Chapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmChapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over Atm
 
Principles Of Multimedia
Principles Of MultimediaPrinciples Of Multimedia
Principles Of Multimedia
 
Multimedia
MultimediaMultimedia
Multimedia
 
Erp
ErpErp
Erp
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbms
 
IT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to BusinessIT Infrastructure - Importance of IT to Business
IT Infrastructure - Importance of IT to Business
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
erp and related technologies
erp and related technologieserp and related technologies
erp and related technologies
 
Implementation of MIS and its methods
Implementation of MIS and its methodsImplementation of MIS and its methods
Implementation of MIS and its methods
 
computer based information system
computer based information systemcomputer based information system
computer based information system
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
 
ERP And Enterprise Architecture
ERP And Enterprise ArchitectureERP And Enterprise Architecture
ERP And Enterprise Architecture
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 

Similar to Policies of Infrastructure Management

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001PECB
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentationIgor Swann
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Presentation week 5
Presentation week 5Presentation week 5
Presentation week 5ryjackson
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Green it and audit
Green it and auditGreen it and audit
Green it and auditKAMLESH SONI
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxHillaryObomighie
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxnoraelstela1
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 

Similar to Policies of Infrastructure Management (20)

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
12 security policies
12 security policies12 security policies
12 security policies
 
Presentation week 5
Presentation week 5Presentation week 5
Presentation week 5
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
Green it and audit
Green it and auditGreen it and audit
Green it and audit
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Policies of Infrastructure Management

  • 1. Presentation by Arashdeep Kaur Policies of Infrastructure Management Enterprise Architecture 01 1706834 | Arashdeep Kaur
  • 2. Today's Presentation Discussion Points • Infrastructure Management(IM) • Policy Management • IT Infrastructure Policies 1706834 | Arashdeep Kaur 02
  • 3. Infrastructure Management Definition Infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness. Categories Application Management, network management, and storage management. 03 1706834 | Arashdeep Kaur
  • 4. Policy Management 1. Policy management is the process of creating, communicating, and maintaining policies and procedures within an organization. 2. An effective policy management system can mitigate risk in two ways.: a. First, it makes policies more quickly accessible to direct care staff, guiding care and safety decisions. b. Second, it can protect an organization from litigation by staying up to date on accreditation standards and creating an audit trail in the case of legal action. 04 1706834 | Arashdeep Kaur
  • 5. IT Infrastructure Policies and Procedures One of the best ways to communicate and understand a company and its operating culture is through its policies. - Designing and writing policy and communicating it effectively is an essential skill for professionals to have. - By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy. 05 1706834 | Arashdeep Kaur
  • 6. 06 Infrastructure Policies 1. Backup Retention Policy 2. Google Glass Policy 3. Incident Plan Policy 4. Privacy Compliance Policy 5. Social Networking Policy 6. Sensitive Information Policy 7. Technology Acquisition Policy 8. Wearable Device Policy 9. WFH and Telecommuting Policy 1706834 | Arashdeep Kaur
  • 7. 07 Backup Retention Policy  This policy refers to backups of user data that are copied onto tape (or any backup media, including disk-to-disk storage). User data is stored on disks on our computer systems.  This is useful in case of a system failure (and files have to be restored from the backup media) or in the case of a user accidentally erasing one of their files (and again, that file can be restored from the backup media). 1706834 | Arashdeep Kaur
  • 8. 08 Factors that IT professionals need to consider for backup retention include: 1. Business and regulatory requirements - regulatory compliance and data preservation 2. Economic and budgetary concerns - doing more with less 3. Data loss prevention and information protection - protect, preserve and serve 4. Environmental and business sustainment - green and economically efficient 5. Maximize IT resource effectiveness and return on investment (ROI) 6. Reduce total cost ownership (TCO) of IT resources and service delivery 1706834 | Arashdeep Kaur
  • 9. • The purpose of the Technology Acquisition policy is to establish guidelines for the acquisition of technology including hardware, software, computer-related components, and services purchased with enterprise funds. • This policy sets the road map for how new and existing technology is implemented throughout the enterprise. 09 Technology Acquisition Policy 1706834 | Arashdeep Kaur
  • 10. Enterprise Technology resources 10 •Cloud processing services •Desktops, laptops, tablets, SmartPhones/PDAs, cell phones, and servers •Backup and recovery services •Web-hosted services including blogs and websites •Peripheral equipment, such as printers and scanners 1706834 | Arashdeep Kaur
  • 11. 11 • A work from home policy is nothing but an agreement between the employer and the employees who prefer to have the work from home privileges. • The policy defines the expectations, responsibilities, the eligibility and the other work from home guidelines. In short, it ensures that all employees understand what is required of them when they choose to work from home. WFH POLICY AND TELECOMMUTING 1706834 | Arashdeep Kaur
  • 12. 12 Key Elements Of A Work From Home Policy 1706834 | Arashdeep Kaur
  • 13. 13 • With identify theft and cyberattacks on the rise, you're facing new pressures to protect sensitive information These laws are designed to protect residents against identity theft by mandating security practices such as: • Implementing an information security program • Encrypting data • Notifying customers in the event of a security breach that compromises unencrypted personal information • To protect sensitive information, many states are now required to implement security programs that include capabilities for incident monitoring and alerting, trend reporting, logging, security information management (SIM), and other prudent security controls and practices. Sensitive Information Policy 1706834 | Arashdeep Kaur