SlideShare a Scribd company logo
IT POLICY
 Liable for the acts of Employees and Agents etc.
◦ Strict Liability
◦ Vicarious Liability
 Data
◦ Protection and
◦ Secrecy
 Are the norm of the day.
WHY “IT POLICY”!
“A policy is a statement that reflects the moral,
ethical and legal position of an organization with
regards to particular issue or activity”.
Policies depend on:
Size of the company,
Sensitivity of the information
Type of information that business handles.
Security of data and information throughout the
service life cycle is crucial to every organization to
survive.
 Email and Internet Usage
 Laptop/Desktop Usage
 Hardware Usage
 Security of Computer Network
◦ System Access
◦ Virus Protection
◦ Installation Rights
 System back up and Maintenance
 Third Party and Remote Access
Company valuable IP Assets include.
◦ Patents
◦ Designs
◦ Copyrights
◦ Trade Secrets (Unpatented)
◦ Customer Data
◦ Business Data
◦ Third Party Data
◦ Formulas
◦ Source Code
◦ Employee Information
WHY “IT POLICY”! .. Continued..
A company UNDER LAW obliged to protect sensitive personal data of its
customers and employees.
◦ Reference:
 Information Technology Act, 2000
 Holds the Company liable
 Civil action- compensation under Section 43A
 Criminal action- Punishment under Section 72A
if they fail to protect any sensitive personal data that they own.
LEGAL & CONTRACTUAL
OBLIGATION OF A COMPANY!
A Company may be held liable
 To pay Compensation
or
 Criminal Prosecution
For
 Negligence in handling of data, or any information
leading to DEFAMATION
 Use of unauthorized or pirated software
 Criminal prosecution-(IT Act, 2000) dealing with
cybercrime and electronic commerce is based on the UN include:
◦ Tampering in source documents-
◦ Sending off offensive messages through
Computer & Communication devices
◦ Punishment for identity theft-
◦ Cheating by impersonation-
◦ Violation of privacy by use of electronic
means of a company-
◦ Publication or transmission of obscene
material in electronic form-
Information technology means & includes:
computers,
computer-based networks,
computer peripherals,
operating systems,
e-mail,
Intranet,
Any Software available by a Company
for the purpose of supporting its goals or providing quality
services to customers, or increase shareholder value and foster
employment satisfaction.
IT Resources of the Company may Include
Implementing IT policies within your organization help in:
Time Management
Employer & Employee Relationship
Customer Relationship
Reduces the risk of pirated and unauthorized usage.
Bandwidth Protection
◦ Authorized use of Company network and resources.
ADVANTAGES OF IT POLICY
ADVANTAGES OF IT POLICY- cont’d
Minimize potential risks to your business
Create a framework for your employees to
operate within.
Ensure organization in a state of compliance
Elimination of fraud and waste. 
IT policies must align with business policies.
Information Technology policy intends to:-
Establish a culture of security and trust for all employees;
Establish guidelines governing proper use of IT and Internet by
all employees;
◦ Improvement of efficiency and performance
◦ Control Internet usage;
Contd…..
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY
 To supplement, not replace, all existing laws, regulations,
agreements, and contracts;
 Preserve the integrity of the information technology systems;
 Protect IT systems against the accidents, failures
or improper use;
 Reserves the right to access confidential data;
Contd/--
OBJECTIVE & PURPOSE OF
INFORMATION TECHNOLOGY POLICY….
Reserves and limit to copy, remove or alter any data,
file or system resources;
Maintain a high level of professionalism in keeping
with Code of Ethics;
Maintain Company’s reputation among trade and
public.
 Most of our communications are now electronic.
 Recipients of electronic documents like
◦ agents,
◦ distributors,
◦ customers etc.
needs the source and authenticity
of the documents or messages.
 Satisfy audit requirements
Contd….
 Assist in compliance with applicable
◦ laws
◦ Regulations
◦ Guidelines and recommendations
 Mitigate risk from a security incident
 Educate users on sound security
practices
 Reduce legal risk
INTRUSIONS
ARE
NOT
ALW
AYS AS
OBVIOUS
AS THIS
EXAM
PLE
Espionage
Employees falling to a trap and
passing sensitive and secure data of
the company.
Harassment
Viewing inappropriate content, such as
hate or violence, can create an
environment that is hostile and offensive
for co-workers, and can damage co.
reputation
Productivity
Frequent online browsing,
shopping, and chatting can get
in the way of getting the work
done, and often leads to
resentment from the coworkers
Viruses
some websites can lead to
viruses, spyware, or other
malicious software getting into
the network.
Service Interruptions
Large downloads and
streaming audio and video can
suck up network resources
that other employees need to
do work and service customers
 All
◦ Directors
◦ Employees,
◦ Part-time employees,
◦ Industrial Trainees,
◦ Contractors,
◦ Agents,
◦ Anyone in organization directly or indirectly
associated with conducting business within
organization.
 1. Communication Skills: if you want to
succeed.
 2. Benchmarking: Comparing your
performance with the best.
4. Safety in Teams: Every business wants a
safe environment for its staff.
5. Tolerance in the Workplace: The challenge
of 21st-century workplace. Learn how to help
others be more tolerant, and find out when you
need to "draw the line.”  
 6- Innovation: The desire and ability of the company to
venture into new, breakthrough areas of opportunity and
produce record setting results in various fields.
 7-Quality of Services:  in terms of presentation,
functionality, value, speed, timeliness, reliability, courtesy,
friendliness..etc.
 8- IT security roles, policies and
procedures: management and security actions must be in
line with business requirements.
 9- Confidentiality: Information can be accessed only by
authorized users, Ensure business transactions and
information exchanges can be trusted.
1. COBIT
2. Risk Management
3. Security
4. Internet Security, Acceptable use & email
usage policies
5. Benchmarking
 “Control Objectives for Information and Related
Technology (COBIT) which help:
 optimize IT investments,
 ensure service delivery
 and provide a measure to check when things do
go wrong.
 Since COBIT being IT best practices and the
framework for IT governance,
 it helps organizations understand and
 manage the risks and benefits associated with IT.
COBIT subdivides IT into four domains:
Plan and Organize, PO
Acquire and Implement, AI
Deliver and Support, DS
Monitor and Evaluate, ME

More Related Content

What's hot

Ethics in it
Ethics in itEthics in it
Ethics in it
Akash Mathapati
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
almario1988
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
PECB
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
Julia Urbina-Pineda
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
Thoughtworks
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed
 
Information security
Information securityInformation security
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Information security
Information securityInformation security
Network security
Network securityNetwork security
Network security
Estiak Khan
 

What's hot (20)

Ethics in it
Ethics in itEthics in it
Ethics in it
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Information security
Information securityInformation security
Information security
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
information security technology
information security technologyinformation security technology
information security technology
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Information security
Information securityInformation security
Information security
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information security
Information securityInformation security
Information security
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

February - March 2017 Newletter
February - March 2017 NewletterFebruary - March 2017 Newletter
February - March 2017 Newletter
Gilbert A. Herrera
 
Retaining Students 10-2015-rev
Retaining Students 10-2015-revRetaining Students 10-2015-rev
Retaining Students 10-2015-rev
Brad Burch, Ph.D.
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
Sherri Booher
 
Classifying animal presentation final
Classifying animal presentation finalClassifying animal presentation final
Classifying animal presentation final
chriscatafay
 
IT Strategy Tools
IT Strategy ToolsIT Strategy Tools
IT Strategy Tools
Sherri Booher
 
KitYunes Portfolio Full
KitYunes Portfolio FullKitYunes Portfolio Full
KitYunes Portfolio Full
Kit Yunes
 
V&I dag 4 juni 2015 (LinkedIn)
V&I dag 4 juni 2015 (LinkedIn)V&I dag 4 juni 2015 (LinkedIn)
V&I dag 4 juni 2015 (LinkedIn)André Grob
 
Ong Yi Hui resume
Ong Yi Hui resumeOng Yi Hui resume
Ong Yi Hui resume
Yi Hui Ong
 
KitYunesPortfolioLinkedIn
KitYunesPortfolioLinkedInKitYunesPortfolioLinkedIn
KitYunesPortfolioLinkedIn
Kit Yunes
 
GENERAL REPORT CYLINDER BOOM HMC
GENERAL REPORT CYLINDER BOOM HMCGENERAL REPORT CYLINDER BOOM HMC
GENERAL REPORT CYLINDER BOOM HMC
Aryo Ardono R
 
Shreeti- Updated Resume- Professional
Shreeti- Updated Resume- ProfessionalShreeti- Updated Resume- Professional
Shreeti- Updated Resume- Professional
Shreeti Kaushik
 
DanSinger-CV_reference_combined
DanSinger-CV_reference_combinedDanSinger-CV_reference_combined
DanSinger-CV_reference_combined
Dan Singer
 
Report_Valeria Pannunzio_4455203
Report_Valeria Pannunzio_4455203Report_Valeria Pannunzio_4455203
Report_Valeria Pannunzio_4455203
Valeria Pannunzio
 
MY CV
MY CVMY CV
Kit Yunes V&M Portfolio
Kit Yunes V&M PortfolioKit Yunes V&M Portfolio
Kit Yunes V&M Portfolio
Kit Yunes
 
Ficha de trabalho Módulo Organização geral da Cozinha
Ficha de trabalho Módulo Organização geral da CozinhaFicha de trabalho Módulo Organização geral da Cozinha
Ficha de trabalho Módulo Organização geral da Cozinha
Luís Chumbeiro
 
Resume-Cassie
Resume-CassieResume-Cassie
Resume-Cassie
Cassandra Zopfi
 

Viewers also liked (17)

February - March 2017 Newletter
February - March 2017 NewletterFebruary - March 2017 Newletter
February - March 2017 Newletter
 
Retaining Students 10-2015-rev
Retaining Students 10-2015-revRetaining Students 10-2015-rev
Retaining Students 10-2015-rev
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
Classifying animal presentation final
Classifying animal presentation finalClassifying animal presentation final
Classifying animal presentation final
 
IT Strategy Tools
IT Strategy ToolsIT Strategy Tools
IT Strategy Tools
 
KitYunes Portfolio Full
KitYunes Portfolio FullKitYunes Portfolio Full
KitYunes Portfolio Full
 
V&I dag 4 juni 2015 (LinkedIn)
V&I dag 4 juni 2015 (LinkedIn)V&I dag 4 juni 2015 (LinkedIn)
V&I dag 4 juni 2015 (LinkedIn)
 
Ong Yi Hui resume
Ong Yi Hui resumeOng Yi Hui resume
Ong Yi Hui resume
 
KitYunesPortfolioLinkedIn
KitYunesPortfolioLinkedInKitYunesPortfolioLinkedIn
KitYunesPortfolioLinkedIn
 
GENERAL REPORT CYLINDER BOOM HMC
GENERAL REPORT CYLINDER BOOM HMCGENERAL REPORT CYLINDER BOOM HMC
GENERAL REPORT CYLINDER BOOM HMC
 
Shreeti- Updated Resume- Professional
Shreeti- Updated Resume- ProfessionalShreeti- Updated Resume- Professional
Shreeti- Updated Resume- Professional
 
DanSinger-CV_reference_combined
DanSinger-CV_reference_combinedDanSinger-CV_reference_combined
DanSinger-CV_reference_combined
 
Report_Valeria Pannunzio_4455203
Report_Valeria Pannunzio_4455203Report_Valeria Pannunzio_4455203
Report_Valeria Pannunzio_4455203
 
MY CV
MY CVMY CV
MY CV
 
Kit Yunes V&M Portfolio
Kit Yunes V&M PortfolioKit Yunes V&M Portfolio
Kit Yunes V&M Portfolio
 
Ficha de trabalho Módulo Organização geral da Cozinha
Ficha de trabalho Módulo Organização geral da CozinhaFicha de trabalho Módulo Organização geral da Cozinha
Ficha de trabalho Módulo Organização geral da Cozinha
 
Resume-Cassie
Resume-CassieResume-Cassie
Resume-Cassie
 

Similar to IT Policy

IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
Vijay Dalmia
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
James Wier
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
JustinFinch11
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
skumartarget
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptx
Securityium
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
E Radar
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Software
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
DeepakBsws
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
Jason Chapman
 

Similar to IT Policy (20)

IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
An insight into information security.pptx
An insight into information security.pptxAn insight into information security.pptx
An insight into information security.pptx
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Importance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdfImportance of ICT in business, mostly photography Presentation.pdf
Importance of ICT in business, mostly photography Presentation.pdf
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

IT Policy

  • 2.  Liable for the acts of Employees and Agents etc. ◦ Strict Liability ◦ Vicarious Liability  Data ◦ Protection and ◦ Secrecy  Are the norm of the day. WHY “IT POLICY”!
  • 3. “A policy is a statement that reflects the moral, ethical and legal position of an organization with regards to particular issue or activity”. Policies depend on: Size of the company, Sensitivity of the information Type of information that business handles. Security of data and information throughout the service life cycle is crucial to every organization to survive.
  • 4.  Email and Internet Usage  Laptop/Desktop Usage  Hardware Usage  Security of Computer Network ◦ System Access ◦ Virus Protection ◦ Installation Rights  System back up and Maintenance  Third Party and Remote Access
  • 5. Company valuable IP Assets include. ◦ Patents ◦ Designs ◦ Copyrights ◦ Trade Secrets (Unpatented) ◦ Customer Data ◦ Business Data ◦ Third Party Data ◦ Formulas ◦ Source Code ◦ Employee Information WHY “IT POLICY”! .. Continued..
  • 6. A company UNDER LAW obliged to protect sensitive personal data of its customers and employees. ◦ Reference:  Information Technology Act, 2000  Holds the Company liable  Civil action- compensation under Section 43A  Criminal action- Punishment under Section 72A if they fail to protect any sensitive personal data that they own. LEGAL & CONTRACTUAL OBLIGATION OF A COMPANY!
  • 7. A Company may be held liable  To pay Compensation or  Criminal Prosecution For  Negligence in handling of data, or any information leading to DEFAMATION  Use of unauthorized or pirated software
  • 8.  Criminal prosecution-(IT Act, 2000) dealing with cybercrime and electronic commerce is based on the UN include: ◦ Tampering in source documents- ◦ Sending off offensive messages through Computer & Communication devices
  • 9. ◦ Punishment for identity theft- ◦ Cheating by impersonation- ◦ Violation of privacy by use of electronic means of a company- ◦ Publication or transmission of obscene material in electronic form-
  • 10. Information technology means & includes: computers, computer-based networks, computer peripherals, operating systems, e-mail, Intranet, Any Software available by a Company for the purpose of supporting its goals or providing quality services to customers, or increase shareholder value and foster employment satisfaction. IT Resources of the Company may Include
  • 11. Implementing IT policies within your organization help in: Time Management Employer & Employee Relationship Customer Relationship Reduces the risk of pirated and unauthorized usage. Bandwidth Protection ◦ Authorized use of Company network and resources. ADVANTAGES OF IT POLICY
  • 12. ADVANTAGES OF IT POLICY- cont’d Minimize potential risks to your business Create a framework for your employees to operate within. Ensure organization in a state of compliance Elimination of fraud and waste.  IT policies must align with business policies.
  • 13. Information Technology policy intends to:- Establish a culture of security and trust for all employees; Establish guidelines governing proper use of IT and Internet by all employees; ◦ Improvement of efficiency and performance ◦ Control Internet usage; Contd….. OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY
  • 14.  To supplement, not replace, all existing laws, regulations, agreements, and contracts;  Preserve the integrity of the information technology systems;  Protect IT systems against the accidents, failures or improper use;  Reserves the right to access confidential data; Contd/-- OBJECTIVE & PURPOSE OF INFORMATION TECHNOLOGY POLICY….
  • 15. Reserves and limit to copy, remove or alter any data, file or system resources; Maintain a high level of professionalism in keeping with Code of Ethics; Maintain Company’s reputation among trade and public.
  • 16.  Most of our communications are now electronic.  Recipients of electronic documents like ◦ agents, ◦ distributors, ◦ customers etc. needs the source and authenticity of the documents or messages.  Satisfy audit requirements Contd….
  • 17.  Assist in compliance with applicable ◦ laws ◦ Regulations ◦ Guidelines and recommendations  Mitigate risk from a security incident  Educate users on sound security practices  Reduce legal risk INTRUSIONS ARE NOT ALW AYS AS OBVIOUS AS THIS EXAM PLE
  • 18. Espionage Employees falling to a trap and passing sensitive and secure data of the company.
  • 19. Harassment Viewing inappropriate content, such as hate or violence, can create an environment that is hostile and offensive for co-workers, and can damage co. reputation Productivity Frequent online browsing, shopping, and chatting can get in the way of getting the work done, and often leads to resentment from the coworkers Viruses some websites can lead to viruses, spyware, or other malicious software getting into the network. Service Interruptions Large downloads and streaming audio and video can suck up network resources that other employees need to do work and service customers
  • 20.  All ◦ Directors ◦ Employees, ◦ Part-time employees, ◦ Industrial Trainees, ◦ Contractors, ◦ Agents, ◦ Anyone in organization directly or indirectly associated with conducting business within organization.
  • 21.
  • 22.  1. Communication Skills: if you want to succeed.  2. Benchmarking: Comparing your performance with the best.
  • 23. 4. Safety in Teams: Every business wants a safe environment for its staff. 5. Tolerance in the Workplace: The challenge of 21st-century workplace. Learn how to help others be more tolerant, and find out when you need to "draw the line.”  
  • 24.  6- Innovation: The desire and ability of the company to venture into new, breakthrough areas of opportunity and produce record setting results in various fields.  7-Quality of Services:  in terms of presentation, functionality, value, speed, timeliness, reliability, courtesy, friendliness..etc.  8- IT security roles, policies and procedures: management and security actions must be in line with business requirements.  9- Confidentiality: Information can be accessed only by authorized users, Ensure business transactions and information exchanges can be trusted.
  • 25. 1. COBIT 2. Risk Management 3. Security 4. Internet Security, Acceptable use & email usage policies 5. Benchmarking
  • 26.  “Control Objectives for Information and Related Technology (COBIT) which help:  optimize IT investments,  ensure service delivery  and provide a measure to check when things do go wrong.  Since COBIT being IT best practices and the framework for IT governance,  it helps organizations understand and  manage the risks and benefits associated with IT.
  • 27. COBIT subdivides IT into four domains: Plan and Organize, PO Acquire and Implement, AI Deliver and Support, DS Monitor and Evaluate, ME