3. Infrastructure
Management
Definition
Infrastructure management (IM) is
the management of essential
operation components, such as
policies, processes, equipment,
data, human resources, and external
contacts, for overall effectiveness.
Categories
Application Management,
network management, and
storage management.
03
1706834 | Arashdeep Kaur
4. Policy Management
1. Policy management is the process of creating,
communicating, and maintaining policies and
procedures within an organization.
2. An effective policy management system can mitigate
risk in two ways.:
a. First, it makes policies more quickly accessible to
direct care staff, guiding care and safety
decisions.
b. Second, it can protect an organization from
litigation by staying up to date on accreditation
standards and creating an audit trail in the case of
legal action.
04
1706834 | Arashdeep Kaur
5. IT Infrastructure
Policies and
Procedures
One of the best ways to communicate and understand a company
and its operating culture is through its policies.
- Designing and writing policy and communicating it effectively is an
essential skill for professionals to have.
- By having policy carefully developed and communicated,
employees will clearly know what the organization expects from
them, the degree of control and independence they will have, and
what the benefits and consequences are in regard to adhering to
policy.
05
1706834 | Arashdeep Kaur
6. 06
Infrastructure
Policies
1. Backup Retention Policy
2. Google Glass Policy
3. Incident Plan Policy
4. Privacy Compliance Policy
5. Social Networking Policy
6. Sensitive Information Policy
7. Technology Acquisition Policy
8. Wearable Device Policy
9. WFH and Telecommuting Policy
1706834 | Arashdeep Kaur
7. 07
Backup
Retention Policy
This policy refers to backups of user data that are
copied onto tape (or any backup media, including
disk-to-disk storage). User data is stored on disks
on our computer systems.
This is useful in case of a system failure (and files
have to be restored from the backup media) or in
the case of a user accidentally erasing one of their
files (and again, that file can be restored from the
backup media).
1706834 | Arashdeep Kaur
8. 08
Factors that IT professionals need
to consider for backup retention
include:
1. Business and regulatory requirements - regulatory
compliance and data preservation
2. Economic and budgetary concerns - doing more with
less
3. Data loss prevention and information protection -
protect, preserve and serve
4. Environmental and business sustainment - green and
economically efficient
5. Maximize IT resource effectiveness and return on
investment (ROI)
6. Reduce total cost ownership (TCO) of IT resources and
service delivery
1706834 | Arashdeep Kaur
9. • The purpose of the Technology Acquisition policy is to
establish guidelines for the acquisition of technology
including hardware, software, computer-related
components, and services purchased with enterprise
funds.
• This policy sets the road map for how new and existing
technology is implemented throughout the enterprise.
09
Technology
Acquisition
Policy
1706834 | Arashdeep Kaur
10. Enterprise
Technology
resources
10
•Cloud processing services
•Desktops, laptops,
tablets, SmartPhones/PDAs,
cell phones, and servers
•Backup and recovery
services
•Web-hosted services
including blogs and websites
•Peripheral equipment, such
as printers and scanners
1706834 | Arashdeep Kaur
11. 11
• A work from home policy is nothing but an agreement
between the employer and the employees who prefer to
have the work from home privileges.
• The policy defines the expectations, responsibilities, the
eligibility and the other work from home guidelines. In
short, it ensures that all employees understand what is
required of them when they choose to work from home.
WFH POLICY AND
TELECOMMUTING
1706834 | Arashdeep Kaur
13. 13
• With identify theft and cyberattacks on the rise, you're facing new
pressures to protect sensitive information These laws are designed to
protect residents against identity theft by mandating security practices
such as:
• Implementing an information security program
• Encrypting data
• Notifying customers in the event of a security breach that compromises
unencrypted personal information
• To protect sensitive information, many states are now required to
implement security programs that include capabilities for incident
monitoring and alerting, trend reporting, logging, security information
management (SIM), and other prudent security controls and practices.
Sensitive
Information
Policy
1706834 | Arashdeep Kaur