SlideShare a Scribd company logo
[COMPANY] - INFORMATION TECHNOLOGY POLICY
Page 1
This Policy is a guide for use of Computers, Operating and Applied Software and other equipment / accessories
provided during the course of employment in the [COMPANY]
[COMPANY] provides employees with a host of Electronic Technologies and Services, including Computers, E-Mail,
Printing and Internet services. These technologies and services are intended to be used for business purposes only
and are meant to assist employees in completing job responsibilities as effectively as possible.
Employees are strictly prohibited from using any technology to view, listen to or communicate offensive,
defamatory or disruptive content. Such content includes, but is not limited to, material of a sexual or sexually
suggestive nature, racial,ethnic or gender-specific slurs,or any other visual / audio / verbal content that offends or
is intended to offend someone because of his or her age, sex, religion, national origin, disability or other lawfully
protected trait.
COMPUTER NETWORK USE LIMITATIONS PROHIBITED ACTIVITIES:
Without prior written permission from [COMPANY], the computer network may not be used to disseminate, view
or store commercial or personal advertisements, solicitations, promotions, destructive code (e.g., viruses, Trojan
horse programs, etc.) or any other unauthorized materials. Occasional limited appropriate personal use of the
computer is permitted if such use does not
a) Interfere with the user’s or any other employee’s job performance;
b) Have an undue effect on the computer or company network’s performance;
c) Violate any other policies, provisions, guidelines or standards of this agreement or any other of the [COMPANY].
Further, at all times users are responsible for the professional, ethical and lawful use of the computer system.
Personal use of the computer is a privilege that may be revoked at any time.
Illegal Copying:
Users may not illegally copy material protected under copyright law or make that material available to others for
copying.You are responsiblefor complying with copyright law and applicable licenses that may apply to software,
files, graphics, documents, messages, and other material you wish to download or copy. You may not agree to a
licenseor download any material for which a registration fee is charged without first obtaining the express written
permission of the Company.
Communication of Trade Secrets:
Unless expressly authorized to do so, user is prohibited from sending, transmitting, or otherwise distributing
proprietary information, data, trade secrets or other confidential information belonging to [COMPANY].
Unauthorized dissemination of such material may resultin severe disciplinary action as well as substantial civil and
criminal penalties.
Users shall notsend on internet, any information other than ASUS General Business,the disclosureof which may in
any case cause harm or loss to either the company’s or its customers’ reputation.
DO NOT WASTE OR DAMAGE COMPUTER RESOURCES
Accessing the Internet:
To ensure security and avoid the spread of viruses, Users accessing the Internet through a computer attached to
[COMPANY]’s network are routed through an approved Internet firewall or other security device. Bypassing
[COMPANY] - INFORMATION TECHNOLOGY POLICY
Page 2
[COMPANY]’s computer network security by accessing the Internet directly by modem or other means is strictly
prohibited.
Frivolous Use:
Computer resources are not unlimited. Network bandwidth and storage capacity have finite limits, and all Users
connected to the network have a responsibility to conserve these resources. As such, the User must not
deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of
others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive
amounts of time on the Internet, playing games, participating in online chat groups, uploading or downloading
largefiles,accessingstreamingaudio and/or video files, or otherwise creatingunnecessary loads on network traffic
associated with non-business-related uses of the Internet.
Users shall not carry out any objectionable, frivolous or illegal activity on the internet that shall damage the
company's business or its image.
Users shall not post to public discussion groups, chat rooms or other public forums representing the company on
the Internet unless preauthorized by company.
Virus detection:
Files obtained from sources outside the Company, including disks brought from home, files downloaded from the
Internet, newsgroups, bulletin boards, or other online services; files attached to e-mail, and files provided by
customers or vendors, may contain dangerous computer viruses that may damage the Company's computer
network. Users should never download files from the Internet, accept e-mail attachments from outsiders, or use
disks from non-Company sources, without first scanning the material with [COMPANY]-approved virus checking
software. If you suspect that a virus has been introduced into the [COMPANY]'s network, notify the System
Administrator immediately.
Desk Top / Laptop Use
Any malfunctioning of the computer system due to power, booting and / or operating system failure, username /
password failure, hard disk problem, keyboard, monitor, LCD display and mouse not functioning should be
reported to System Administrator before taking any service from outside parties for repairs. Laptops should be
handled with utmost care for not getting damage for the LCD screen and other internal peripherals. Any allocation
of Desktop / Laptop should be routed through Head of Department to Department of HR to Department of IT.
USAGE OF PASSWORD FOR PROTECTION OF DATA AND SHARE THE PASSWORD
Do not share your system password with others for security and maintain confidentiality of data.
Change your password when necessary and follow email send by HQ
Data storage
Not to store data in the desk top which is official in nature and all info has to be in the other hard drive partition
and on server / uploaded into the server. Company also not responsible for loss of data on the desk top
Software
Being property of company cannot be copied or pirated for personal use / given to others
CD Drive / Pen Drive and Others
[COMPANY] - INFORMATION TECHNOLOGY POLICY
Page 3
Responsibility of safety of accessories provided with he computers like data card, pen drive etc. While using such
things, if any malware, Trojan and virus infected in system will liable by you.
WEB FILTER POLICY
Rule
No.
Rule
Name
(Ref)
Type Applicability Description When Special Permission
1 INT Disallow
To all by
default
Adult/ Sexually Explicit, Advertisements &
Popups,Alcohol & Tobacco,Criminal Activity,
Gambling,Online Games, Hacking,IllegalDrugs,Intimate
Apparel & Swimwear,Intolerance & Hate,Peer-to-
Peer,Personals & Dating, Phishing & Fraud,Proxies &
Translators,Ringtones/ MobilePhoneDownloads, Spam
URLs, Spyware,Streaming Media, Sports, Violence,
Weapons, Tasteless and Offensive, Chat, Social
Networking sites ( Orkut,myspace, facebook, linkedIn
etc)Youtube, VoIP, Internet Telephony e.g. skype, Blogs,
WiKis,Data sharing portals, web backup, remote PC
access, web conferencing
Any
time
None
2 INTA Allow
All by default
default
ASUS related social media channel only
Any
time
(For Marketing,see
MKTrule)
3 NEWS Disallow All by default News
Any
time
On need basis
4 MSG Disallow
To all by
default
Messenger
Any
time
None
5 WEBS Disallow
To all by
default
Free web mails
Any
time
On need basis
6 JOBC Disallow
To all by
default
Job search & career development
Any
time
HR PersonnelOnly
7 TRADE Disallow
To all by
default
Finance / Investment / Trading
Any
time
Allow authorized
personnel
8 FILE Disallow
To all by
default
File Download (executable, video) except [COMPANY]
FTP and MS Outlook
Any
time
authorized by admin
9 MKTG Disallow
To all by
default
For Marketing activity
Any
time
Allow authorized
personnel

More Related Content

What's hot

Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
The Pathway Group
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
Altacit Global
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
Komal Gadia
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
dhawal mehta
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Singgih Prasetya
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
Krishnakant Mishra
 
Everything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail RenderingEverything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail Rendering
Litmus
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
Mumbai University
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.
 
Software piracy
Software piracySoftware piracy
Software piracy
Akhil Tiwari
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
Amir Ali Mokhberi
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
Syed Muhammad Shah
 
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutuksetDigiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
Harto Pönkä
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security Policy
Redspin, Inc.
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 

What's hot (20)

Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Everything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail RenderingEverything You Need to Know About Gmail Rendering
Everything You Need to Know About Gmail Rendering
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Software piracy
Software piracySoftware piracy
Software piracy
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
 
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutuksetDigiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
Digiturva: Uhkat ja suojautuminen - oma toiminta ja sen vaikutukset
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security Policy
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 

Similar to It policy (ver 1.0)

POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
Luis Antonio Bustillos López
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
shakti755479
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
Wissam Abdel Baki
 
It school policy
It school policyIt school policy
It school policy
Rach Stiell
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
Kunal Sharma
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
Alan Simpers MBA M.ED
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
Ankit Juneja
 
AUR briefing 2011-12
AUR briefing 2011-12AUR briefing 2011-12
AUR briefing 2011-12
cmstechsvcs
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
Demand Metric
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 
bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
jayine group
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
Computer crime
Computer crimeComputer crime
Computer crime
Surya Prasad
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
IT Policy
IT Policy IT Policy
IT Policy
Julian Hutabarat
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
abamufleh
 
Security Plan
Security PlanSecurity Plan
Security Plan
Jerrell Collymore
 

Similar to It policy (ver 1.0) (20)

POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
AUP.ppt
AUP.pptAUP.ppt
AUP.ppt
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
It school policy
It school policyIt school policy
It school policy
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
AUR briefing 2011-12
AUR briefing 2011-12AUR briefing 2011-12
AUR briefing 2011-12
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
IT Policy
IT Policy IT Policy
IT Policy
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Security Plan
Security PlanSecurity Plan
Security Plan
 

More from sentmery5

HareAndTortoiseStory.ppt
HareAndTortoiseStory.pptHareAndTortoiseStory.ppt
HareAndTortoiseStory.ppt
sentmery5
 
FishPhilosophy.ppt
FishPhilosophy.pptFishPhilosophy.ppt
FishPhilosophy.ppt
sentmery5
 
सम्पूर्ण चिकित्सा.pdf
सम्पूर्ण चिकित्सा.pdfसम्पूर्ण चिकित्सा.pdf
सम्पूर्ण चिकित्सा.pdf
sentmery5
 
Requirement specification document
Requirement specification documentRequirement specification document
Requirement specification document
sentmery5
 
Requirement specification document
Requirement specification documentRequirement specification document
Requirement specification document
sentmery5
 
Merge multiple excel files into a single spreadsheet
Merge multiple excel files into a single spreadsheetMerge multiple excel files into a single spreadsheet
Merge multiple excel files into a single spreadsheet
sentmery5
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
sentmery5
 

More from sentmery5 (7)

HareAndTortoiseStory.ppt
HareAndTortoiseStory.pptHareAndTortoiseStory.ppt
HareAndTortoiseStory.ppt
 
FishPhilosophy.ppt
FishPhilosophy.pptFishPhilosophy.ppt
FishPhilosophy.ppt
 
सम्पूर्ण चिकित्सा.pdf
सम्पूर्ण चिकित्सा.pdfसम्पूर्ण चिकित्सा.pdf
सम्पूर्ण चिकित्सा.pdf
 
Requirement specification document
Requirement specification documentRequirement specification document
Requirement specification document
 
Requirement specification document
Requirement specification documentRequirement specification document
Requirement specification document
 
Merge multiple excel files into a single spreadsheet
Merge multiple excel files into a single spreadsheetMerge multiple excel files into a single spreadsheet
Merge multiple excel files into a single spreadsheet
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 

It policy (ver 1.0)

  • 1. [COMPANY] - INFORMATION TECHNOLOGY POLICY Page 1 This Policy is a guide for use of Computers, Operating and Applied Software and other equipment / accessories provided during the course of employment in the [COMPANY] [COMPANY] provides employees with a host of Electronic Technologies and Services, including Computers, E-Mail, Printing and Internet services. These technologies and services are intended to be used for business purposes only and are meant to assist employees in completing job responsibilities as effectively as possible. Employees are strictly prohibited from using any technology to view, listen to or communicate offensive, defamatory or disruptive content. Such content includes, but is not limited to, material of a sexual or sexually suggestive nature, racial,ethnic or gender-specific slurs,or any other visual / audio / verbal content that offends or is intended to offend someone because of his or her age, sex, religion, national origin, disability or other lawfully protected trait. COMPUTER NETWORK USE LIMITATIONS PROHIBITED ACTIVITIES: Without prior written permission from [COMPANY], the computer network may not be used to disseminate, view or store commercial or personal advertisements, solicitations, promotions, destructive code (e.g., viruses, Trojan horse programs, etc.) or any other unauthorized materials. Occasional limited appropriate personal use of the computer is permitted if such use does not a) Interfere with the user’s or any other employee’s job performance; b) Have an undue effect on the computer or company network’s performance; c) Violate any other policies, provisions, guidelines or standards of this agreement or any other of the [COMPANY]. Further, at all times users are responsible for the professional, ethical and lawful use of the computer system. Personal use of the computer is a privilege that may be revoked at any time. Illegal Copying: Users may not illegally copy material protected under copyright law or make that material available to others for copying.You are responsiblefor complying with copyright law and applicable licenses that may apply to software, files, graphics, documents, messages, and other material you wish to download or copy. You may not agree to a licenseor download any material for which a registration fee is charged without first obtaining the express written permission of the Company. Communication of Trade Secrets: Unless expressly authorized to do so, user is prohibited from sending, transmitting, or otherwise distributing proprietary information, data, trade secrets or other confidential information belonging to [COMPANY]. Unauthorized dissemination of such material may resultin severe disciplinary action as well as substantial civil and criminal penalties. Users shall notsend on internet, any information other than ASUS General Business,the disclosureof which may in any case cause harm or loss to either the company’s or its customers’ reputation. DO NOT WASTE OR DAMAGE COMPUTER RESOURCES Accessing the Internet: To ensure security and avoid the spread of viruses, Users accessing the Internet through a computer attached to [COMPANY]’s network are routed through an approved Internet firewall or other security device. Bypassing
  • 2. [COMPANY] - INFORMATION TECHNOLOGY POLICY Page 2 [COMPANY]’s computer network security by accessing the Internet directly by modem or other means is strictly prohibited. Frivolous Use: Computer resources are not unlimited. Network bandwidth and storage capacity have finite limits, and all Users connected to the network have a responsibility to conserve these resources. As such, the User must not deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time on the Internet, playing games, participating in online chat groups, uploading or downloading largefiles,accessingstreamingaudio and/or video files, or otherwise creatingunnecessary loads on network traffic associated with non-business-related uses of the Internet. Users shall not carry out any objectionable, frivolous or illegal activity on the internet that shall damage the company's business or its image. Users shall not post to public discussion groups, chat rooms or other public forums representing the company on the Internet unless preauthorized by company. Virus detection: Files obtained from sources outside the Company, including disks brought from home, files downloaded from the Internet, newsgroups, bulletin boards, or other online services; files attached to e-mail, and files provided by customers or vendors, may contain dangerous computer viruses that may damage the Company's computer network. Users should never download files from the Internet, accept e-mail attachments from outsiders, or use disks from non-Company sources, without first scanning the material with [COMPANY]-approved virus checking software. If you suspect that a virus has been introduced into the [COMPANY]'s network, notify the System Administrator immediately. Desk Top / Laptop Use Any malfunctioning of the computer system due to power, booting and / or operating system failure, username / password failure, hard disk problem, keyboard, monitor, LCD display and mouse not functioning should be reported to System Administrator before taking any service from outside parties for repairs. Laptops should be handled with utmost care for not getting damage for the LCD screen and other internal peripherals. Any allocation of Desktop / Laptop should be routed through Head of Department to Department of HR to Department of IT. USAGE OF PASSWORD FOR PROTECTION OF DATA AND SHARE THE PASSWORD Do not share your system password with others for security and maintain confidentiality of data. Change your password when necessary and follow email send by HQ Data storage Not to store data in the desk top which is official in nature and all info has to be in the other hard drive partition and on server / uploaded into the server. Company also not responsible for loss of data on the desk top Software Being property of company cannot be copied or pirated for personal use / given to others CD Drive / Pen Drive and Others
  • 3. [COMPANY] - INFORMATION TECHNOLOGY POLICY Page 3 Responsibility of safety of accessories provided with he computers like data card, pen drive etc. While using such things, if any malware, Trojan and virus infected in system will liable by you. WEB FILTER POLICY Rule No. Rule Name (Ref) Type Applicability Description When Special Permission 1 INT Disallow To all by default Adult/ Sexually Explicit, Advertisements & Popups,Alcohol & Tobacco,Criminal Activity, Gambling,Online Games, Hacking,IllegalDrugs,Intimate Apparel & Swimwear,Intolerance & Hate,Peer-to- Peer,Personals & Dating, Phishing & Fraud,Proxies & Translators,Ringtones/ MobilePhoneDownloads, Spam URLs, Spyware,Streaming Media, Sports, Violence, Weapons, Tasteless and Offensive, Chat, Social Networking sites ( Orkut,myspace, facebook, linkedIn etc)Youtube, VoIP, Internet Telephony e.g. skype, Blogs, WiKis,Data sharing portals, web backup, remote PC access, web conferencing Any time None 2 INTA Allow All by default default ASUS related social media channel only Any time (For Marketing,see MKTrule) 3 NEWS Disallow All by default News Any time On need basis 4 MSG Disallow To all by default Messenger Any time None 5 WEBS Disallow To all by default Free web mails Any time On need basis 6 JOBC Disallow To all by default Job search & career development Any time HR PersonnelOnly 7 TRADE Disallow To all by default Finance / Investment / Trading Any time Allow authorized personnel 8 FILE Disallow To all by default File Download (executable, video) except [COMPANY] FTP and MS Outlook Any time authorized by admin 9 MKTG Disallow To all by default For Marketing activity Any time Allow authorized personnel