SlideShare a Scribd company logo
1 of 14
AORA IT POLICY
The Practical Approach
V.1.4
TECHNOLOGY DIVISION
By: Julian Hutabarat - June 2013
Policy vs. Procedure
Principles
Acceptable Use Policy
Principles
The purpose of the IT Policy is to ensure the effective protection and proper usage of the computer systems
within The Company. The IT investment of the organization is considerable, and the dependency on computer
technology in the delivery of the company services is high. The IT Policy will assist in maintaining systems at
operational level. Contraventions of the IT Policy could seriously disrupt the operation of the company and any
breaches will be treated seriously.
To ensure all IT equipment and software at AORA TV is procured in the most cost effective way and meets
minimum Company operating standards. A standardized network system, standard software and administrative
computing systems are essential for this, as is the standardization of the hardware that will run these systems.
This will result in lower IT costs for the Company.
The Company encourages the use of IT facilities to make work processes more efficient and effective. The
company IT assets, infrastructure and equipment remain the property of the companies at all times. The
Company provides these facilities in order to improve the productivity of employees in the course of executing
their job functions.
The company IT assets, infrastructure and equipment remain the property of the Companies at all times. The
Companies provides these facilities in order to improve the productivity of employees in the course of executing
their job functions.
The company IT facilities are intended to be for business purposes only and not for private/personal work. The
access to and use of Companies IT facilities is a privilege and not a right.
The standardization of PC and Notebook Computer Equipment assists in the optimization of company
investments and the supportability of our IT desktop standard environment including efficient operation and
provision of this system. Technology Division/IT Department is responsible for establishing standard
configurations of PC, Notebook Computer and Printer Equipment for the Company employees.
Guideline Acceptable Use Policy
Role of The Information Technology (IT)
1. The purchase, installation, configuration and maintenance of computer equipment are the
responsibility of the IT Department.
2. No new computers, printers, and/or any computer equipment shall be bought without
approval and authorization from the Technology Division/IT Department.
3. No software package is to be purchased and loaded without the approval and authorization
from the Technology Division/IT Department.
4. IT Department MUST ALWAYS be advised of :
a) All computer faults before anyone or any service provider from outside is called to fix
the problem.
b) Any computer equipment which is being moved from one location to another.
5. IT Department does not carry an inventory of extra hardware nor is it cost effective to have
hardware maintenance personnel on staff (Maintenance).
6. IT Department maintains an inventory of equipment and software. An annual inspection will
determine the equipment location, type, software applications, and operating systems
(Inventory).
7. IT Department will coordinate maintenance services, be the primary contact for making
service calls, monitor service levels, and recommend for the costs of maintenance.
8. IT Department will install standard equipment and software in the requesting department,
verify that it functions properly, and instruct the clients in its basic operation. Additional
training is the responsibility of the department (Installation & Testing).
Acceptable Use Policy for
Desktop, Laptop & Printer
This policy defines end-user acceptable use of company IT equipment. The policy applies to
desktops, laptops, printers, and other equipment provided by the Companies. Acceptable use
applies to proper care, handling and maintenance of equipment use.
User Responsibilities.
1. Users shall use company- provided IT equipment responsibly and for company business
purposes only. Appropriate use policies are;
2. Company information displayed on screens or on reports shall be treated as confidential
and private. Users must guard company information from unauthorized access or use. Any
employee-signed confidentiality agreement shall fully apply to information accessed with
company IT equipment.
3. Managers are responsible to ensure that their employees are adequately trained on
appropriate use of IT equipment and that they adhere to this policy.
4. Users may not grant access to non-employees, including vendors or contractors, without
approval of their manager or approval by the IT Department.
5. Users shall keep their equipment clean and free from dust. Users shall maintain “breathing
space” around equipment in accordance with equipment installation instructions.
6. Users shall not eat or drink at their workstation.
7. Desktop acceptable use policies apply equally to portable devices, including laptops and
notebooks.
Acceptable Use Policy for
Desktop & Laptop
User Responsibilities.
8. All acceptable use polices apply equally to non-company provided equipment if the
equipment accesses company information or company networks.
9. Users who access company information and computer systems from remote locations
must adhere to this policy..
10. Users should not store company information or files locally only. The use of shared or
network drives for all company information is required.
11. Users are responsible for backing up files stored on their desktop or laptop. The
Companies does not provide backups at the desktop level.
12. Costs incurred from damages or total loss of a desktop/notebook computer may be the
responsibility of the employee if the circumstances are caused by intentional damage,
improper care or neglect.
13. Users must be held accountable for unauthorized or illegal use of the company owned
personal computers.
14. Managers are responsible to ensure that their employees are adequately trained on
appropriate use of IT equipment and that they adhere to this policy.
Acceptable Use Policy for
Desktop & Laptop
Prohibited Practices
Any activity, action, or lack of action on the part of a user that damages the companies or
compromises security or confidentiality is prohibited. Examples of prohibited practices include:-
1. Installing new desktops or equipment without prior approval by the IT Department.
2. Upgrading equipment or adding peripheral equipment without prior approval of the IT
Department.
3. Downloading and/or installing programs that are not specifically approved by the IT
Department.
4. Using unlicensed software. Users may not copy and share software that is installed on
their desktops or laptops with other users.
5. Using programs or Internet web sites that compromise the privacy of customers or
employees.
6. Removing or compromising desktop virus protection programs.
7. Opening email attachments that are inappropriate or from someone you do not know.
8. Using company-provided IT equipment for non-business reasons or for personal gain.
9. Unauthorized attempts to break into any workstation.
10. Unauthorized access to company files, programs, databases, or confidential information.
11. Sending or posting confidential files to unauthorized persons.
12. Allowing co-workers or other users to use your desktop without approval of your manager
or by the IT Department.
13. Sharing password information or displaying it in plain view on or around your desktop.
Users must secure their passwords and not reveal them to others.
Guideline:
1. Shutdown your computer unit properly before leaving your working area.
2. Logout of finish session and lock computer when left unattended or should need to
be in locked offices when not in use.
3. Place Desktop on a flat and stable surfaces.
4. Always keep your computer clean and dry, avoid using it with wet hands.
5. Always disconnect the Desktop from the power outlet and disconnect peripherals
before attempting to clean your Desktop of its component.
6. Implement Anti-Virus software.
7. Protect confidential and sensitive information.
8. Regularly check for and apply vendor security updates for your operating system and
applications.
9. User is responsible for backing up any files from the desktop computer.
10. Data must be backed up on a regular basis, and the backups held in a secure location.
Proper handling of PC
Guideline:
1. Physically secure your machine or never leave an unsecured laptop computer
unattended.
2. Implement anti-virus software.
3. Protect confidential and sensitive information.
4. Scan email attachments before opening them
5. Use both hands when lifting and moving your laptop.
6. Close the screen and unplug the power supply when moving the laptop.
7. Keep food away from your laptop.
8. Always keep your hands clean while using your laptop.
9. Regularly check for and apply vendor security updates for your operating system and
applications.
10. Users is responsible for backing up and files from the notebook computer.
11. Data must be backed up on a regular basis, and the backups held in a secure location.
Proper handling of Notebook
Acceptable Use Policy for
Desktop, Laptop & Printer
Not each department will have a dedicated printer or networked printer. Full support is
provided for these printers. Departmental staff should be familiar with basic printer operation
(i.e. how to power the printer down/up, how to clear paper jams, etc.). The Help Desk provides
the first level of support for problems with these printers. Before calling for help, the individual
should check to see if others are able to print successfully to the printer so it can be determined
whether the problem lies with the printer or an individual's computer.
Guidelines
1. Laser Printers are cost effective for printing office documents and letters. The toner
cartridges can also be refilled at a lower cost than purchasing a new toner.
2. Dot Matrix printers are required for printing salary bills, Receipt payment and other
documents which require large sheets and carbonize of paper.
3. Inkjet Printers can be used wherever the volume of printouts required are low and also
when there is a need to take high resolution colored printouts.
4. To optimize the use of printers, a single heavy duty printer can be shared over a network
and used as a shared network printer by 2 or more officers thus reducing the cost for
maintenance and resulting in the optimum use of the printer.
1. SMT & Manager (3rd Gen i5-3320M, Memory 4 Gb, 12.5 Inch, 320
GB HDD).
2. Engineer's (3rd Gen i5-3320M,
Memory 8 Gb, 14 Inch, 500 GB HDD).
3. Staff & Supervisor
(Intel® i3, Memory 4 GB, 14 Inch, 250 GB HDD).
Hardware Notebook Policy
Memory
1. Minimum Memory 4 GB for Standard Users
2. Minimum Memory 8 GB for Engineer Users
Operating System Windows
1. Windows 7 Home Basic for Regular Users
2. Windows 7 Pro, upon request
Computer Equipment Repair (Warranty):
1. Notebook for SMT and Manager Level are 3 years
2. Notebook for Staff or Supervisor are 1 years.
Hardware Notebook Policy
1. Group Printer (HQ & Branches)
a) Xerox DocuPrint P255 dw
b) HP Laser Jet HP LaserJet (M1132 MFP)
c) HP Laser Jet HP LaserJet Pro (M1536DNF)
d) Epson Stylus Home Small-in-One Printers
e) Epson TM U220 ( Printer Payment )
f) Multifunction Copiers
Hardware Printer Policy
Document proposed by IT Infrastructure
Prepared by Julian Hutabarat

More Related Content

What's hot

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT PolicyClarknuber
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Troubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsTroubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsDevyani Chaudhari
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyDivyank Jindal
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Information security
Information securityInformation security
Information securityMustahid Ali
 

What's hot (20)

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
 
Information security
Information securityInformation security
Information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Troubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsTroubleshooting methods of computer peripherals
Troubleshooting methods of computer peripherals
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Information security
Information securityInformation security
Information security
 

Similar to IT Policy

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
POLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptxPOLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptxJebsKwan
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Lesson 3
Lesson 3Lesson 3
Lesson 3MrsNunn
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Jerry Pollio
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNLuis Antonio Bustillos López
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxjeanettehully
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
HAVEN Computer Use Guidelines
HAVEN Computer Use GuidelinesHAVEN Computer Use Guidelines
HAVEN Computer Use GuidelinesAce McGinnis
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTcheyennedaisy
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 

Similar to IT Policy (20)

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
POLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptxPOLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptx
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
Byod
ByodByod
Byod
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
HAVEN Computer Use Guidelines
HAVEN Computer Use GuidelinesHAVEN Computer Use Guidelines
HAVEN Computer Use Guidelines
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
 
Capstone Finished
Capstone FinishedCapstone Finished
Capstone Finished
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 

More from Julian Hutabarat

Presentation laporan jasa testing Pihak Ketiga
Presentation laporan jasa testing Pihak KetigaPresentation laporan jasa testing Pihak Ketiga
Presentation laporan jasa testing Pihak KetigaJulian Hutabarat
 
Commercial presentation for liputan6.com Fightback
Commercial presentation for liputan6.com FightbackCommercial presentation for liputan6.com Fightback
Commercial presentation for liputan6.com FightbackJulian Hutabarat
 
Reborn liputan6.com Portal presentation
Reborn liputan6.com Portal presentation Reborn liputan6.com Portal presentation
Reborn liputan6.com Portal presentation Julian Hutabarat
 
Presentation Overview liputan6.com Performances
Presentation Overview liputan6.com PerformancesPresentation Overview liputan6.com Performances
Presentation Overview liputan6.com PerformancesJulian Hutabarat
 
Solution technology for Sky Garden Jakarta Setiabudi
Solution technology for Sky Garden Jakarta SetiabudiSolution technology for Sky Garden Jakarta Setiabudi
Solution technology for Sky Garden Jakarta SetiabudiJulian Hutabarat
 
Sop Installation For Out Door Unit (ODU)
Sop Installation For Out Door Unit (ODU)Sop Installation For Out Door Unit (ODU)
Sop Installation For Out Door Unit (ODU)Julian Hutabarat
 
aora 2 project metrasat-infrakom
aora 2 project metrasat-infrakomaora 2 project metrasat-infrakom
aora 2 project metrasat-infrakomJulian Hutabarat
 
IT infrastructure workshop technology 2013
IT infrastructure workshop technology 2013IT infrastructure workshop technology 2013
IT infrastructure workshop technology 2013Julian Hutabarat
 
Presentation user privilege
Presentation user privilege Presentation user privilege
Presentation user privilege Julian Hutabarat
 
Executive Competitive Selling Process - ECSP
Executive Competitive Selling Process - ECSPExecutive Competitive Selling Process - ECSP
Executive Competitive Selling Process - ECSPJulian Hutabarat
 

More from Julian Hutabarat (11)

Presentation laporan jasa testing Pihak Ketiga
Presentation laporan jasa testing Pihak KetigaPresentation laporan jasa testing Pihak Ketiga
Presentation laporan jasa testing Pihak Ketiga
 
Commercial presentation for liputan6.com Fightback
Commercial presentation for liputan6.com FightbackCommercial presentation for liputan6.com Fightback
Commercial presentation for liputan6.com Fightback
 
Reborn liputan6.com Portal presentation
Reborn liputan6.com Portal presentation Reborn liputan6.com Portal presentation
Reborn liputan6.com Portal presentation
 
Presentation Overview liputan6.com Performances
Presentation Overview liputan6.com PerformancesPresentation Overview liputan6.com Performances
Presentation Overview liputan6.com Performances
 
Solution technology for Sky Garden Jakarta Setiabudi
Solution technology for Sky Garden Jakarta SetiabudiSolution technology for Sky Garden Jakarta Setiabudi
Solution technology for Sky Garden Jakarta Setiabudi
 
Sop Installation For Out Door Unit (ODU)
Sop Installation For Out Door Unit (ODU)Sop Installation For Out Door Unit (ODU)
Sop Installation For Out Door Unit (ODU)
 
aora 2 project metrasat-infrakom
aora 2 project metrasat-infrakomaora 2 project metrasat-infrakom
aora 2 project metrasat-infrakom
 
Broadcast and IT Roadmap
Broadcast and IT RoadmapBroadcast and IT Roadmap
Broadcast and IT Roadmap
 
IT infrastructure workshop technology 2013
IT infrastructure workshop technology 2013IT infrastructure workshop technology 2013
IT infrastructure workshop technology 2013
 
Presentation user privilege
Presentation user privilege Presentation user privilege
Presentation user privilege
 
Executive Competitive Selling Process - ECSP
Executive Competitive Selling Process - ECSPExecutive Competitive Selling Process - ECSP
Executive Competitive Selling Process - ECSP
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

IT Policy

  • 1. AORA IT POLICY The Practical Approach V.1.4 TECHNOLOGY DIVISION By: Julian Hutabarat - June 2013
  • 3. Principles Acceptable Use Policy Principles The purpose of the IT Policy is to ensure the effective protection and proper usage of the computer systems within The Company. The IT investment of the organization is considerable, and the dependency on computer technology in the delivery of the company services is high. The IT Policy will assist in maintaining systems at operational level. Contraventions of the IT Policy could seriously disrupt the operation of the company and any breaches will be treated seriously. To ensure all IT equipment and software at AORA TV is procured in the most cost effective way and meets minimum Company operating standards. A standardized network system, standard software and administrative computing systems are essential for this, as is the standardization of the hardware that will run these systems. This will result in lower IT costs for the Company. The Company encourages the use of IT facilities to make work processes more efficient and effective. The company IT assets, infrastructure and equipment remain the property of the companies at all times. The Company provides these facilities in order to improve the productivity of employees in the course of executing their job functions. The company IT assets, infrastructure and equipment remain the property of the Companies at all times. The Companies provides these facilities in order to improve the productivity of employees in the course of executing their job functions. The company IT facilities are intended to be for business purposes only and not for private/personal work. The access to and use of Companies IT facilities is a privilege and not a right. The standardization of PC and Notebook Computer Equipment assists in the optimization of company investments and the supportability of our IT desktop standard environment including efficient operation and provision of this system. Technology Division/IT Department is responsible for establishing standard configurations of PC, Notebook Computer and Printer Equipment for the Company employees.
  • 4. Guideline Acceptable Use Policy Role of The Information Technology (IT) 1. The purchase, installation, configuration and maintenance of computer equipment are the responsibility of the IT Department. 2. No new computers, printers, and/or any computer equipment shall be bought without approval and authorization from the Technology Division/IT Department. 3. No software package is to be purchased and loaded without the approval and authorization from the Technology Division/IT Department. 4. IT Department MUST ALWAYS be advised of : a) All computer faults before anyone or any service provider from outside is called to fix the problem. b) Any computer equipment which is being moved from one location to another. 5. IT Department does not carry an inventory of extra hardware nor is it cost effective to have hardware maintenance personnel on staff (Maintenance). 6. IT Department maintains an inventory of equipment and software. An annual inspection will determine the equipment location, type, software applications, and operating systems (Inventory). 7. IT Department will coordinate maintenance services, be the primary contact for making service calls, monitor service levels, and recommend for the costs of maintenance. 8. IT Department will install standard equipment and software in the requesting department, verify that it functions properly, and instruct the clients in its basic operation. Additional training is the responsibility of the department (Installation & Testing).
  • 5. Acceptable Use Policy for Desktop, Laptop & Printer This policy defines end-user acceptable use of company IT equipment. The policy applies to desktops, laptops, printers, and other equipment provided by the Companies. Acceptable use applies to proper care, handling and maintenance of equipment use. User Responsibilities. 1. Users shall use company- provided IT equipment responsibly and for company business purposes only. Appropriate use policies are; 2. Company information displayed on screens or on reports shall be treated as confidential and private. Users must guard company information from unauthorized access or use. Any employee-signed confidentiality agreement shall fully apply to information accessed with company IT equipment. 3. Managers are responsible to ensure that their employees are adequately trained on appropriate use of IT equipment and that they adhere to this policy. 4. Users may not grant access to non-employees, including vendors or contractors, without approval of their manager or approval by the IT Department. 5. Users shall keep their equipment clean and free from dust. Users shall maintain “breathing space” around equipment in accordance with equipment installation instructions. 6. Users shall not eat or drink at their workstation. 7. Desktop acceptable use policies apply equally to portable devices, including laptops and notebooks.
  • 6. Acceptable Use Policy for Desktop & Laptop User Responsibilities. 8. All acceptable use polices apply equally to non-company provided equipment if the equipment accesses company information or company networks. 9. Users who access company information and computer systems from remote locations must adhere to this policy.. 10. Users should not store company information or files locally only. The use of shared or network drives for all company information is required. 11. Users are responsible for backing up files stored on their desktop or laptop. The Companies does not provide backups at the desktop level. 12. Costs incurred from damages or total loss of a desktop/notebook computer may be the responsibility of the employee if the circumstances are caused by intentional damage, improper care or neglect. 13. Users must be held accountable for unauthorized or illegal use of the company owned personal computers. 14. Managers are responsible to ensure that their employees are adequately trained on appropriate use of IT equipment and that they adhere to this policy.
  • 7. Acceptable Use Policy for Desktop & Laptop Prohibited Practices Any activity, action, or lack of action on the part of a user that damages the companies or compromises security or confidentiality is prohibited. Examples of prohibited practices include:- 1. Installing new desktops or equipment without prior approval by the IT Department. 2. Upgrading equipment or adding peripheral equipment without prior approval of the IT Department. 3. Downloading and/or installing programs that are not specifically approved by the IT Department. 4. Using unlicensed software. Users may not copy and share software that is installed on their desktops or laptops with other users. 5. Using programs or Internet web sites that compromise the privacy of customers or employees. 6. Removing or compromising desktop virus protection programs. 7. Opening email attachments that are inappropriate or from someone you do not know. 8. Using company-provided IT equipment for non-business reasons or for personal gain. 9. Unauthorized attempts to break into any workstation. 10. Unauthorized access to company files, programs, databases, or confidential information. 11. Sending or posting confidential files to unauthorized persons. 12. Allowing co-workers or other users to use your desktop without approval of your manager or by the IT Department. 13. Sharing password information or displaying it in plain view on or around your desktop. Users must secure their passwords and not reveal them to others.
  • 8. Guideline: 1. Shutdown your computer unit properly before leaving your working area. 2. Logout of finish session and lock computer when left unattended or should need to be in locked offices when not in use. 3. Place Desktop on a flat and stable surfaces. 4. Always keep your computer clean and dry, avoid using it with wet hands. 5. Always disconnect the Desktop from the power outlet and disconnect peripherals before attempting to clean your Desktop of its component. 6. Implement Anti-Virus software. 7. Protect confidential and sensitive information. 8. Regularly check for and apply vendor security updates for your operating system and applications. 9. User is responsible for backing up any files from the desktop computer. 10. Data must be backed up on a regular basis, and the backups held in a secure location. Proper handling of PC
  • 9. Guideline: 1. Physically secure your machine or never leave an unsecured laptop computer unattended. 2. Implement anti-virus software. 3. Protect confidential and sensitive information. 4. Scan email attachments before opening them 5. Use both hands when lifting and moving your laptop. 6. Close the screen and unplug the power supply when moving the laptop. 7. Keep food away from your laptop. 8. Always keep your hands clean while using your laptop. 9. Regularly check for and apply vendor security updates for your operating system and applications. 10. Users is responsible for backing up and files from the notebook computer. 11. Data must be backed up on a regular basis, and the backups held in a secure location. Proper handling of Notebook
  • 10. Acceptable Use Policy for Desktop, Laptop & Printer Not each department will have a dedicated printer or networked printer. Full support is provided for these printers. Departmental staff should be familiar with basic printer operation (i.e. how to power the printer down/up, how to clear paper jams, etc.). The Help Desk provides the first level of support for problems with these printers. Before calling for help, the individual should check to see if others are able to print successfully to the printer so it can be determined whether the problem lies with the printer or an individual's computer. Guidelines 1. Laser Printers are cost effective for printing office documents and letters. The toner cartridges can also be refilled at a lower cost than purchasing a new toner. 2. Dot Matrix printers are required for printing salary bills, Receipt payment and other documents which require large sheets and carbonize of paper. 3. Inkjet Printers can be used wherever the volume of printouts required are low and also when there is a need to take high resolution colored printouts. 4. To optimize the use of printers, a single heavy duty printer can be shared over a network and used as a shared network printer by 2 or more officers thus reducing the cost for maintenance and resulting in the optimum use of the printer.
  • 11. 1. SMT & Manager (3rd Gen i5-3320M, Memory 4 Gb, 12.5 Inch, 320 GB HDD). 2. Engineer's (3rd Gen i5-3320M, Memory 8 Gb, 14 Inch, 500 GB HDD). 3. Staff & Supervisor (Intel® i3, Memory 4 GB, 14 Inch, 250 GB HDD). Hardware Notebook Policy
  • 12. Memory 1. Minimum Memory 4 GB for Standard Users 2. Minimum Memory 8 GB for Engineer Users Operating System Windows 1. Windows 7 Home Basic for Regular Users 2. Windows 7 Pro, upon request Computer Equipment Repair (Warranty): 1. Notebook for SMT and Manager Level are 3 years 2. Notebook for Staff or Supervisor are 1 years. Hardware Notebook Policy
  • 13. 1. Group Printer (HQ & Branches) a) Xerox DocuPrint P255 dw b) HP Laser Jet HP LaserJet (M1132 MFP) c) HP Laser Jet HP LaserJet Pro (M1536DNF) d) Epson Stylus Home Small-in-One Printers e) Epson TM U220 ( Printer Payment ) f) Multifunction Copiers Hardware Printer Policy Document proposed by IT Infrastructure
  • 14. Prepared by Julian Hutabarat