The document outlines the IT policy of JS Consultancy Services. It details policies on proper use and care of IT equipment, software, and network security. Key points include only using equipment for official purposes, regularly updating antivirus software, restricting internet usage to non-work hours, requiring passwords be changed every 180 days, and prohibiting personal data storage on network drives. The policy aims to guide employees and protect the company's IT systems, data and infrastructure.
This document provides an overview of human resource management (HRM). It defines HRM as the effective use of human resources to enhance organizational performance. The major activities of HRM include recruiting, selecting, training, motivating, evaluating, and compensating employees. Famous business leaders emphasize that corporate success relies on people. HRM benefits enterprises through employee training and development, individuals through growth opportunities, society through job creation, and the nation through economic growth. The presentation was delivered by Rashmi Hansda.
Report on HR Manual of RCF (Rashtriya Chemical and Fertilizer Company Limited)Sehree Mumtaz
We have uploaded only the Report on HR Manual of the company but you can download its HR Manual by visiting his website or by searching online. Thanks!!!!
This document provides information and examples for evaluating a Chief Financial Officer's (CFO) performance. It includes:
1. A sample performance evaluation form with rating scales to assess factors like administration, communication, decision making, and more.
2. Examples of positive and negative phrases to use in evaluations for attributes like attitude, creativity, interpersonal skills, and problem solving.
3. An overview of the top 12 methods for performance appraisal, such as management by objectives, critical incident, behaviorally anchored rating scales, and 360 degree feedback.
The document is a reference for how to structure a formal CFO performance review with standardized criteria, examples, and different appraisal techniques.
This document provides an overview of a project report on employee training and development. The primary objective is to lay the foundation for training and development, while secondary objectives include improving current training processes and applying learning to human resources. The scope involves exploring the field of human resources and obtaining feedback on training processes. The report will cover topics like identifying training needs, different stages of training programs, and competitiveness of training. Research methodology will include exploratory and descriptive studies using interviews and questionnaires. The limitations are the small sample size and reliance on respondent perceptions.
This certificate certifies that Mr. Mustafa Faramawi Mabrouk worked as a surveyor for Huta-Sete Marine Works Ltd. on the Port Ghalib Marina project in Marsa Alam, Egypt from April 2000 to June 2001. His duties included setting out piles, roads, and other infrastructure using surveying equipment. He completed over 2,000 piles and participated in as-built drawings. The certificate praises his professional and timely work. It is issued at his request to validate his experience for other projects.
The document provides an overview of the ceramics industry in India. It discusses the origins and timeline of key developments in ceramics and glass. The ceramics industry in India began in the late 1950s and has grown significantly since market liberalization in 1991. The size of the industry has expanded as capacity has increased by 40% in 1994-95 and a further 32% in 1995-96. However, growth has slowed due to both internal factors like rising costs and external factors such as a decline in construction activity. The industry is facing challenges of high inventory levels, rising costs, and financial stringency that have led to lower profits.
Safety culture is the number one indicator of successful injury prevention programs, as discussed in a previous blog post.
But what is safety culture and how do you know where yours stacks up?
According to OSHA, “Safety cultures consist of shared beliefs, practices, and attitudes that exist at an establishment. Culture is the atmosphere created by those beliefs, attitudes, etc., which shape our behavior.”
By definition, safety culture is difficult to measure. How do you measure values, attitudes and beliefs?
Following are 25 ways to tell whether or not you have an awesome safety culture. If you can answer yes to most of these, you’re doing great. Keep it up!
If not, you have some work to do. Don’t be discouraged, culture change takes time and perseverance.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH. Abdul Shukor
Knowledge sharing session with Mr. CHRISTOPH MUELLER, CEO of Malaysia Airlines on 11th AUGUST 2015. In efforts to further enhance the performance of the airlines' workforce viz-a-viz Occupational health, safety and ergonomics, steps are proposed and considered. Excellent session throughout. Thanks to the CEO and the management of Malaysia Airlines for this invitation.
This document provides an overview of human resource management (HRM). It defines HRM as the effective use of human resources to enhance organizational performance. The major activities of HRM include recruiting, selecting, training, motivating, evaluating, and compensating employees. Famous business leaders emphasize that corporate success relies on people. HRM benefits enterprises through employee training and development, individuals through growth opportunities, society through job creation, and the nation through economic growth. The presentation was delivered by Rashmi Hansda.
Report on HR Manual of RCF (Rashtriya Chemical and Fertilizer Company Limited)Sehree Mumtaz
We have uploaded only the Report on HR Manual of the company but you can download its HR Manual by visiting his website or by searching online. Thanks!!!!
This document provides information and examples for evaluating a Chief Financial Officer's (CFO) performance. It includes:
1. A sample performance evaluation form with rating scales to assess factors like administration, communication, decision making, and more.
2. Examples of positive and negative phrases to use in evaluations for attributes like attitude, creativity, interpersonal skills, and problem solving.
3. An overview of the top 12 methods for performance appraisal, such as management by objectives, critical incident, behaviorally anchored rating scales, and 360 degree feedback.
The document is a reference for how to structure a formal CFO performance review with standardized criteria, examples, and different appraisal techniques.
This document provides an overview of a project report on employee training and development. The primary objective is to lay the foundation for training and development, while secondary objectives include improving current training processes and applying learning to human resources. The scope involves exploring the field of human resources and obtaining feedback on training processes. The report will cover topics like identifying training needs, different stages of training programs, and competitiveness of training. Research methodology will include exploratory and descriptive studies using interviews and questionnaires. The limitations are the small sample size and reliance on respondent perceptions.
This certificate certifies that Mr. Mustafa Faramawi Mabrouk worked as a surveyor for Huta-Sete Marine Works Ltd. on the Port Ghalib Marina project in Marsa Alam, Egypt from April 2000 to June 2001. His duties included setting out piles, roads, and other infrastructure using surveying equipment. He completed over 2,000 piles and participated in as-built drawings. The certificate praises his professional and timely work. It is issued at his request to validate his experience for other projects.
The document provides an overview of the ceramics industry in India. It discusses the origins and timeline of key developments in ceramics and glass. The ceramics industry in India began in the late 1950s and has grown significantly since market liberalization in 1991. The size of the industry has expanded as capacity has increased by 40% in 1994-95 and a further 32% in 1995-96. However, growth has slowed due to both internal factors like rising costs and external factors such as a decline in construction activity. The industry is facing challenges of high inventory levels, rising costs, and financial stringency that have led to lower profits.
Safety culture is the number one indicator of successful injury prevention programs, as discussed in a previous blog post.
But what is safety culture and how do you know where yours stacks up?
According to OSHA, “Safety cultures consist of shared beliefs, practices, and attitudes that exist at an establishment. Culture is the atmosphere created by those beliefs, attitudes, etc., which shape our behavior.”
By definition, safety culture is difficult to measure. How do you measure values, attitudes and beliefs?
Following are 25 ways to tell whether or not you have an awesome safety culture. If you can answer yes to most of these, you’re doing great. Keep it up!
If not, you have some work to do. Don’t be discouraged, culture change takes time and perseverance.
7 STEPS TO LEADERSHIP EXCELLENCE IN WORK SAFETY & HEALTH. Abdul Shukor
Knowledge sharing session with Mr. CHRISTOPH MUELLER, CEO of Malaysia Airlines on 11th AUGUST 2015. In efforts to further enhance the performance of the airlines' workforce viz-a-viz Occupational health, safety and ergonomics, steps are proposed and considered. Excellent session throughout. Thanks to the CEO and the management of Malaysia Airlines for this invitation.
recruitment and performance appraisal at air india ltdPrateek Gahlot
This document provides an overview of a project report on recruitment and performance appraisal at Air India Ltd. It includes an executive summary, chapters on objectives and methodology, conceptual analysis, questionnaire and data analysis, findings and recommendations. The objectives are to study recruitment procedures, awareness and satisfaction levels of employees, rules regarding spouse appointment after an employee's death, and training needs at Air India. Primary and secondary data was collected through questionnaires and company documents to analyze recruitment, appraisal systems and identify areas for improvement.
Learn what is critical to creating a culture of safety in your organization. These 7 keys based on the science of behavior analysis and positive reinforcement will provide the foundation for a sustainable, effective safety system.
Principles of Human Performance ImprovementDIv CHAS
The document provides an overview of human performance improvement. It discusses that human error is inevitable but can be managed. It describes the significance of incidents and how the majority are caused by human error and latent organizational weaknesses. Finally, it outlines various error prevention tools that can be used at the individual and team level, such as self-checking, questioning attitudes, and peer-checking, to improve performance and safety.
This document outlines elements of a health, safety, and environment (HS&E) and process safety management system. It includes 17 elements that cover topics such as leadership commitment, compliance with legislation, employee competency, hazard identification, documentation, operating procedures, management of change, and project management. Each element lists requirements and expectations for an effective HS&E and process safety system. The document provides a framework for organizations to establish and maintain robust HS&E and process safety protections.
Vice President
General Manager
Deputy General Manager
Manager
Assistant Manager
Supervisor
Executive
Trainee
The management structure of Airtel is very flat and empowering. The employees
are given a lot of freedom and responsibility. The focus is on performance and
results rather than process. There is a culture of openness, transparency and
meritocracy. The top management is highly approachable and encourages
feedback and ideas from all levels.
The key to Airtel's success has been its ability to attract, retain and motivate top
talent. It provides a challenging and learning environment where people are
given opportunities to take on higher responsibilities.
1. KYT is a hazard prediction activity used in Japanese workplaces to raise awareness of potential dangers, point them out, and discuss prevention measures.
2. The process involves 4 rounds: (1) Identifying hazards, (2) Tagging important hazards, (3) Discussing countermeasures, (4) Agreeing on actions and goals. Participants point at hazards while calling out to draw attention and agreement on risks.
3. An example showed an operator pointing out how his clothing could get caught in machinery, and employees discussing protective measures like relocating clothing storage to reduce risks.
1) Syniad Software Ltd is a software development company founded 10 years ago with offices in London, Manchester, New York, and the Netherlands.
2) The company structure includes directors overseeing financial operations, sales/marketing, technical, and overseas operations. Key roles include the Operations Director ensuring project completion and resource availability, and the Technical Director overseeing quality, research, and technical training.
3) The company monitors financial performance against budgets but faces challenges from project fluctuations. It tracks costs, revenue, and sales prospects but struggles with project costing systems.
4) Long-term planning focuses on expansion, company image, product mix, financing, and preparing for a transition away from private ownership.
This document discusses effective leadership skills for team leaders. It emphasizes building trust with employees through clear communication, recognizing accomplishments, setting expectations, and providing constructive coaching. The document outlines different leadership styles and strategies for motivating employees, resolving conflicts, and implementing disciplinary actions in a constructive manner.
This document is a curriculum vitae for Prajin, a HSE officer with over 9 years of experience in civil construction safety and oil and gas. He holds several health and safety certifications and has worked on numerous projects in the UAE and India as a HSE officer and safety officer. Prajin is looking for a new position as a HSE officer where he can focus on continuous improvement and career development.
Safety should be viewed not just as a job responsibility but as a core value that is practiced at work and at home. Viewing safety as a value means it will continue to be followed even outside of work. Leaders must lead by example and live by the values of safety through their own actions to build faith in safety practices. When safety becomes a shared value throughout a community, it can lead to improved self-esteem, productivity and a culture where people support and rely on each other.
This document outlines the steps for conducting an effective incident investigation: establish an incident investigation program; conduct investigations for all incidents, injuries, near misses and property damage; emphasize that safety is a core value; ensure quality investigation forms and procedures; identify root causes rather than blame; and implement corrective actions to prevent future incidents. Key aspects include conducting prompt investigations, documenting findings, determining direct and root causes, and developing corrective action plans. The overall goal is to prevent future injuries by learning from past incidents.
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...IAEME Publication
This paper deals with “A Study On Effectiveness Of Employee’s Training And Development In Rane Brake Lining Limited, Viralimalai, Trichy” Training is the art of increasing the knowledge for doing a particular job. Training is a planned process to modify the attitude, knowledge skill, behavior etc. Through learning to acquire effective performance on activity on range of activities like investment in plant, machinery, and equipment etc. Employee training is important sub-system of Human Resource Development. Employee training is specialized function and is one of the fundamental operative functions for human resource management. Training is the art of increasing the knowledge for doing a particular job. Training is a planned process to modify the attitude, knowledge skill, etc. Through learning to acquire effective performance on activity on range of activities like investment in plant, machinery, and equipment etc., an organization improves its effectiveness to a large extent by investing in its HR for developing their skill, efficiency and motivation.
Mohammed Ashif is applying for the position of Light Vehicle Driver. He has 8 years of experience working as an office boy for Dubai Municipality and 2 years of experience as a driver in India. He holds a UAE valid light vehicle driving license that expires in 2024. He is seeking a suitable position where he can utilize his skills and experience.
This document provides project profiles for several construction projects completed by the company. It includes details on:
- The refurbishment of the Gouritz Rail Bridge in South Africa from 2010-2011.
- The Ambatovy nickel refinery project in Madagascar from 2006-2012, which was successfully completed.
- The expansion of the Tenke Fungurume copper mine in the Democratic Republic of Congo from 2010-2012, also completed successfully.
- The Nacala corridor railway project in Malawi from 2013-2014 to construct a railway, also completed successfully.
- An ongoing project in Durban to reconstruct berths at the Maydon Wharf from 2014-2016,
This document discusses key performance indicators (KPIs) for a health and safety officer position. It provides examples of KPIs, performance appraisal methods, and steps to create KPIs for this role. Potential KPIs include reducing accident rates, ensuring safety compliance, and providing safety trainings. The document recommends linking KPIs to strategies, empowering employees, and noting common mistakes like having too many KPIs when developing performance metrics. Sample KPI materials for health and safety officers can be found on the listed website.
Hazop (incident investigation & root cause analysis )umar farooq
The document discusses incident investigation and root cause analysis. It defines key terms like incident, accident, near miss, unsafe acts, and injuries. It outlines the typical incident investigation process, which includes initial reporting, analysis, a full investigation, an investigation report, identifying trends and corrective actions. The investigation process aims to determine the root causes of incidents by gathering facts about what happened, how and why through interviews and examining the site. The goal is to recommend actions to prevent future recurrence.
This document outlines an IT policy and guidelines for AORA IT. It discusses principles of acceptable use including maintaining systems, standardizing hardware and software for lower costs, and using IT facilities for work purposes only. It provides roles and responsibilities for the IT department in procuring, installing and maintaining equipment. Acceptable use policies are defined for desktops, laptops and printers including proper care, prohibited activities, and guidelines for securing and backing up data.
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
À l’ère où les vols massifs de données personnelles font constamment les manchettes, toutes les entreprises sont à risque, et ce, peu importe leur budget. Une approche combinant des ressources humaines, des processus et des outils doit être privilégiée afin de réduire l’exfiltration et la divulgation de données.
Bien que nous ne sommes pas les propriétaires de l’actif, notre rôle de fiduciaire est de gérer et assurer la confidentialité des ressources informationnelles. Lors de cette allocution, nous allons proposer des façons de faire pragmatiques pour la protection de l’information nominative et stratégique.
This document outlines the information security policies and procedures for Generic Sample Company, LLC. It includes 12 sections covering topics such as firewall and router security, system configuration, data encryption, secure data transmission, anti-virus protection, access control, user authentication, physical security, logging and auditing, security testing, and maintaining security policies. The purpose is to protect client, employee, financial and other corporate information by establishing requirements for securely handling, processing, storing and transmitting sensitive data. All employees are responsible for following the policies relevant to their roles to help ensure PCI compliance.
The Cloud offers great opportunity for disruption in the business world by offering ways to create, test, and deploy applications with greater reach and more simplicity than ever before. Come learn about the Cloud and how Rocket MV is helping you get SaaS-y with capabilities such as Account Based Licensing, RESTful APIs, and micro-services.
Locking down server and workstation operating systemsBen Rothke
The document discusses approaches to securing systems when rapid patching is not possible. It recommends implementing network segmentation, monitoring technologies, and user access controls to shield vulnerable systems that cannot be patched quickly. While patching is important, it is not a panacea, and targeted attacks use other vectors beyond exploiting unpatched vulnerabilities. A proactive application security program integrated into the development lifecycle can help mitigate issues before exploits are found. When patching is truly not possible, additional defenses like host-based IPS, firewalls, and encryption should be used to minimize risk.
recruitment and performance appraisal at air india ltdPrateek Gahlot
This document provides an overview of a project report on recruitment and performance appraisal at Air India Ltd. It includes an executive summary, chapters on objectives and methodology, conceptual analysis, questionnaire and data analysis, findings and recommendations. The objectives are to study recruitment procedures, awareness and satisfaction levels of employees, rules regarding spouse appointment after an employee's death, and training needs at Air India. Primary and secondary data was collected through questionnaires and company documents to analyze recruitment, appraisal systems and identify areas for improvement.
Learn what is critical to creating a culture of safety in your organization. These 7 keys based on the science of behavior analysis and positive reinforcement will provide the foundation for a sustainable, effective safety system.
Principles of Human Performance ImprovementDIv CHAS
The document provides an overview of human performance improvement. It discusses that human error is inevitable but can be managed. It describes the significance of incidents and how the majority are caused by human error and latent organizational weaknesses. Finally, it outlines various error prevention tools that can be used at the individual and team level, such as self-checking, questioning attitudes, and peer-checking, to improve performance and safety.
This document outlines elements of a health, safety, and environment (HS&E) and process safety management system. It includes 17 elements that cover topics such as leadership commitment, compliance with legislation, employee competency, hazard identification, documentation, operating procedures, management of change, and project management. Each element lists requirements and expectations for an effective HS&E and process safety system. The document provides a framework for organizations to establish and maintain robust HS&E and process safety protections.
Vice President
General Manager
Deputy General Manager
Manager
Assistant Manager
Supervisor
Executive
Trainee
The management structure of Airtel is very flat and empowering. The employees
are given a lot of freedom and responsibility. The focus is on performance and
results rather than process. There is a culture of openness, transparency and
meritocracy. The top management is highly approachable and encourages
feedback and ideas from all levels.
The key to Airtel's success has been its ability to attract, retain and motivate top
talent. It provides a challenging and learning environment where people are
given opportunities to take on higher responsibilities.
1. KYT is a hazard prediction activity used in Japanese workplaces to raise awareness of potential dangers, point them out, and discuss prevention measures.
2. The process involves 4 rounds: (1) Identifying hazards, (2) Tagging important hazards, (3) Discussing countermeasures, (4) Agreeing on actions and goals. Participants point at hazards while calling out to draw attention and agreement on risks.
3. An example showed an operator pointing out how his clothing could get caught in machinery, and employees discussing protective measures like relocating clothing storage to reduce risks.
1) Syniad Software Ltd is a software development company founded 10 years ago with offices in London, Manchester, New York, and the Netherlands.
2) The company structure includes directors overseeing financial operations, sales/marketing, technical, and overseas operations. Key roles include the Operations Director ensuring project completion and resource availability, and the Technical Director overseeing quality, research, and technical training.
3) The company monitors financial performance against budgets but faces challenges from project fluctuations. It tracks costs, revenue, and sales prospects but struggles with project costing systems.
4) Long-term planning focuses on expansion, company image, product mix, financing, and preparing for a transition away from private ownership.
This document discusses effective leadership skills for team leaders. It emphasizes building trust with employees through clear communication, recognizing accomplishments, setting expectations, and providing constructive coaching. The document outlines different leadership styles and strategies for motivating employees, resolving conflicts, and implementing disciplinary actions in a constructive manner.
This document is a curriculum vitae for Prajin, a HSE officer with over 9 years of experience in civil construction safety and oil and gas. He holds several health and safety certifications and has worked on numerous projects in the UAE and India as a HSE officer and safety officer. Prajin is looking for a new position as a HSE officer where he can focus on continuous improvement and career development.
Safety should be viewed not just as a job responsibility but as a core value that is practiced at work and at home. Viewing safety as a value means it will continue to be followed even outside of work. Leaders must lead by example and live by the values of safety through their own actions to build faith in safety practices. When safety becomes a shared value throughout a community, it can lead to improved self-esteem, productivity and a culture where people support and rely on each other.
This document outlines the steps for conducting an effective incident investigation: establish an incident investigation program; conduct investigations for all incidents, injuries, near misses and property damage; emphasize that safety is a core value; ensure quality investigation forms and procedures; identify root causes rather than blame; and implement corrective actions to prevent future incidents. Key aspects include conducting prompt investigations, documenting findings, determining direct and root causes, and developing corrective action plans. The overall goal is to prevent future injuries by learning from past incidents.
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...IAEME Publication
This paper deals with “A Study On Effectiveness Of Employee’s Training And Development In Rane Brake Lining Limited, Viralimalai, Trichy” Training is the art of increasing the knowledge for doing a particular job. Training is a planned process to modify the attitude, knowledge skill, behavior etc. Through learning to acquire effective performance on activity on range of activities like investment in plant, machinery, and equipment etc. Employee training is important sub-system of Human Resource Development. Employee training is specialized function and is one of the fundamental operative functions for human resource management. Training is the art of increasing the knowledge for doing a particular job. Training is a planned process to modify the attitude, knowledge skill, etc. Through learning to acquire effective performance on activity on range of activities like investment in plant, machinery, and equipment etc., an organization improves its effectiveness to a large extent by investing in its HR for developing their skill, efficiency and motivation.
Mohammed Ashif is applying for the position of Light Vehicle Driver. He has 8 years of experience working as an office boy for Dubai Municipality and 2 years of experience as a driver in India. He holds a UAE valid light vehicle driving license that expires in 2024. He is seeking a suitable position where he can utilize his skills and experience.
This document provides project profiles for several construction projects completed by the company. It includes details on:
- The refurbishment of the Gouritz Rail Bridge in South Africa from 2010-2011.
- The Ambatovy nickel refinery project in Madagascar from 2006-2012, which was successfully completed.
- The expansion of the Tenke Fungurume copper mine in the Democratic Republic of Congo from 2010-2012, also completed successfully.
- The Nacala corridor railway project in Malawi from 2013-2014 to construct a railway, also completed successfully.
- An ongoing project in Durban to reconstruct berths at the Maydon Wharf from 2014-2016,
This document discusses key performance indicators (KPIs) for a health and safety officer position. It provides examples of KPIs, performance appraisal methods, and steps to create KPIs for this role. Potential KPIs include reducing accident rates, ensuring safety compliance, and providing safety trainings. The document recommends linking KPIs to strategies, empowering employees, and noting common mistakes like having too many KPIs when developing performance metrics. Sample KPI materials for health and safety officers can be found on the listed website.
Hazop (incident investigation & root cause analysis )umar farooq
The document discusses incident investigation and root cause analysis. It defines key terms like incident, accident, near miss, unsafe acts, and injuries. It outlines the typical incident investigation process, which includes initial reporting, analysis, a full investigation, an investigation report, identifying trends and corrective actions. The investigation process aims to determine the root causes of incidents by gathering facts about what happened, how and why through interviews and examining the site. The goal is to recommend actions to prevent future recurrence.
This document outlines an IT policy and guidelines for AORA IT. It discusses principles of acceptable use including maintaining systems, standardizing hardware and software for lower costs, and using IT facilities for work purposes only. It provides roles and responsibilities for the IT department in procuring, installing and maintaining equipment. Acceptable use policies are defined for desktops, laptops and printers including proper care, prohibited activities, and guidelines for securing and backing up data.
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
À l’ère où les vols massifs de données personnelles font constamment les manchettes, toutes les entreprises sont à risque, et ce, peu importe leur budget. Une approche combinant des ressources humaines, des processus et des outils doit être privilégiée afin de réduire l’exfiltration et la divulgation de données.
Bien que nous ne sommes pas les propriétaires de l’actif, notre rôle de fiduciaire est de gérer et assurer la confidentialité des ressources informationnelles. Lors de cette allocution, nous allons proposer des façons de faire pragmatiques pour la protection de l’information nominative et stratégique.
This document outlines the information security policies and procedures for Generic Sample Company, LLC. It includes 12 sections covering topics such as firewall and router security, system configuration, data encryption, secure data transmission, anti-virus protection, access control, user authentication, physical security, logging and auditing, security testing, and maintaining security policies. The purpose is to protect client, employee, financial and other corporate information by establishing requirements for securely handling, processing, storing and transmitting sensitive data. All employees are responsible for following the policies relevant to their roles to help ensure PCI compliance.
The Cloud offers great opportunity for disruption in the business world by offering ways to create, test, and deploy applications with greater reach and more simplicity than ever before. Come learn about the Cloud and how Rocket MV is helping you get SaaS-y with capabilities such as Account Based Licensing, RESTful APIs, and micro-services.
Locking down server and workstation operating systemsBen Rothke
The document discusses approaches to securing systems when rapid patching is not possible. It recommends implementing network segmentation, monitoring technologies, and user access controls to shield vulnerable systems that cannot be patched quickly. While patching is important, it is not a panacea, and targeted attacks use other vectors beyond exploiting unpatched vulnerabilities. A proactive application security program integrated into the development lifecycle can help mitigate issues before exploits are found. When patching is truly not possible, additional defenses like host-based IPS, firewalls, and encryption should be used to minimize risk.
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
This document is a survey that assesses the security practices of third-party vendors who store or transmit a university's confidential information. It contains questions in several categories including company information, policies/standards, architecture, configurations, product design, compliance, and access controls. The survey is to be completed by the third-party vendor and reviewed by the university's information security team prior to finalizing any agreements involving confidential data.
Irdeto is a global leader in digital platform security that protects media, entertainment, games, connected transport and IoT industries. It employs nearly 1,000 security experts across 15 locations covering 6 continents. Irdeto's vision is to build a secure future where people can embrace connectivity without fear. The document discusses Irdeto's service operations center and how it has evolved its monitoring framework over time to incorporate more application logs, metrics, and events into Splunk. It analyzes trends and anomalies to more effectively manage incidents. Future goals include adding more data sources into Splunk, introducing ITSI for event correlation, developing more dashboards and anomaly detection through machine learning.
The University of Malaya ICT Road Map for 2010-2012 outlines five strategies to enhance the use of ICT at the university, including developing a resilient network infrastructure, utilizing ICT to build a knowledge-based community, enhancing ICT products and services to support teaching, learning and research, developing ICT skills among the university community, and ensuring an informed approach to IT service delivery. The road map discusses implementing policies, improving infrastructure through initiatives like high-speed internet and wireless networks, developing new applications and services, and establishing a knowledge management system to support the university's goals.
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
This webinar covers:
- An overview of the General Data Protection Regulation (GPDR) and the Data Security and Protection (DSP) Toolkit and their impact on the healthcare sector.
-Accountability frameworks that support GDPR compliance, and the role of senior management in ensuring compliance and cyber resilience is a strategic focus.
-Embedding data protection by design and by default, and a holistic approach to achieving a cyber resilient posture.
-The practical steps that healthcare organisations need to take when looking at GDPR compliance.
-The role of a robust staff awareness programme in supporting a culture of cyber resilience and compliance.
A recording of the webinar can be found here: https://www.youtube.com/watch?v=xFEkkkwAdl4
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
The digital transformation journey supported by SAP enables our customers to increase business agility, pursue innovation, and demonstrate growth. Cybersecurity is essential to a successful digital transformation and continues to be even more critical as our integrated suite of SAP Ariba solutions drives technologies to promote connected commerce. Join us in this engrossing session as we outline critical steps to securing your organization’s digital transformation.
This document outlines an ICT Failure Contingency Plan for an organization. It details policies for minimizing risk of loss of access to computer systems through daily backups of data and replication to cloud storage. It provides an action plan and responsibilities in the event of an ICT failure to restore services promptly. The backup policy specifies weekly full backups retained for 3 months and daily incremental backups for 1 month. Failure recovery testing is done regularly by restoring past backups to a test server and having users validate the restored data.
1. Benetton Group is a global fashion brand founded in 1965 in Italy that now has over 6,500 stores in 120 countries.
2. Compton Computers Pvt. Ltd. is an ISO 9001 certified Indian IT solutions provider and systems integrator with over 17 years of experience.
3. The presentation discusses network security problems such as privacy, authentication, data storage and loss, and intrusion detection, as well as solutions like encryption, redundancy, and cryptography.
Benetton Group is a global fashion brand founded in 1965 in Italy. Compton Computers Pvt. Ltd. is an ISO 9001 certified Indian IT solutions provider and systems integrator that has been in business for 17 years. Compton has experience designing structured cabling, network, server, storage, and security solutions, and has won several awards for its work integrating end-to-end solutions.
The document provides information about the EU General Data Protection Regulation (GDPR) and preparing for its requirements. It notes that the GDPR concerns all companies and authorities in the EU and introduces new guidelines for technology and organization. Customers will have more rights under the GDPR, and authorities will enforce the rules more strictly with higher fines for noncompliance. Companies have limited time to prepare and must establish data protection and IT security management practices and documentation.
The document provides a curriculum vitae for Ajay Kumar Mohanty, who has over 8 years of experience in IT and system administration roles. He has expertise in managing servers, networks, firewalls, and security for organizations with over 200 users across multiple sites. His experience includes maintaining Windows servers, Active Directory, Exchange, and virtualization software like VMware. He is seeking a role as an IT executive to manage the entire IT infrastructure and implement new technologies for an organization.
13 11-26 snia, storage networking industry association - panorama mundial do ...Carvalho Comunicação
SNIA's mission is to lead the storage industry in developing standards and technologies to empower organizations in managing information. Its vision is to be the trusted authority on storage and a catalyst for adoption of storage standards. SNIA works to advance storage through education, standards development, and its global community of over 4,200 members from 400 organizations. Key activities include operating technology centers, certifying over 4,500 professionals, and developing standards to enhance storage system interoperability. SNIA is led by an executive committee and technical council made up of representatives from member companies.
This document contains Aperture Technologies' Information Assurance Plan and Policy for internal use only and is classified as top secret. It outlines roles and responsibilities for information security, as well as policies around best practices, backup/recovery, and service level agreements. The purpose is to ensure compliance with DOD security standards at the US Air Force Cyber Security Center.
The document is a curriculum vitae for Girma Tadesse that outlines his personal and professional experience. It details his current role as Chief Systems Administrator for the Ministry of Health and Social Services in Namibia since 2015, where he manages IT infrastructure and systems. It also outlines his previous 10 years of experience as a Systems Administrator for the Ministry and 3 years as a Systems Administrator and Acting IT Manager for United Africa Group. His education includes a Post Graduate Diploma in Business Management and Microsoft Certified Systems Engineering certification.
The document outlines Comelec's computer access policy. The policy aims to (1) ensure only authorized users can access computers and information, (2) define rules to achieve protection and secure operation, (3) outline equipment use, and (4) outline use of personal devices. It covers scope, definitions, policy statements, guidelines, responsibilities, and compliance. Policy statements address computer use, passwords, software installation, network connection, file sharing, backups, and more. Guidelines provide details on user roles, anti-virus use, and personnel changes. The policy references related standards and policies.
This presentation by OECD, OECD Secretariat, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
• For a full set of 530+ questions. Go to
https://skillcertpro.com/product/servicenow-cis-itsm-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
1.) Introduction
Our Movement is not new; it is the same as it was for Freedom, Justice, and Equality since we were labeled as slaves. However, this movement at its core must entail economics.
2.) Historical Context
This is the same movement because none of the previous movements, such as boycotts, were ever completed. For some, maybe, but for the most part, it’s just a place to keep your stable until you’re ready to assimilate them into your system. The rest of the crabs are left in the world’s worst parts, begging for scraps.
3.) Economic Empowerment
Our Movement aims to show that it is indeed possible for the less fortunate to establish their economic system. Everyone else – Caucasian, Asian, Mexican, Israeli, Jews, etc. – has their systems, and they all set up and usurp money from the less fortunate. So, the less fortunate buy from every one of them, yet none of them buy from the less fortunate. Moreover, the less fortunate really don’t have anything to sell.
4.) Collaboration with Organizations
Our Movement will demonstrate how organizations such as the National Association for the Advancement of Colored People, National Urban League, Black Lives Matter, and others can assist in creating a much more indestructible Black Wall Street.
5.) Vision for the Future
Our Movement will not settle for less than those who came before us and stopped before the rights were equal. The economy, jobs, healthcare, education, housing, incarceration – everything is unfair, and what isn’t is rigged for the less fortunate to fail, as evidenced in society.
6.) Call to Action
Our movement has started and implemented everything needed for the advancement of the economic system. There are positions for only those who understand the importance of this movement, as failure to address it will continue the degradation of the people deemed less fortunate.
No, this isn’t Noah’s Ark, nor am I a Prophet. I’m just a man who wrote a couple of books, created a magnificent website: http://www.thearkproject.llc, and who truly hopes to try and initiate a truly sustainable economic system for deprived people. We may not all have the same beliefs, but if our methods are tried, tested, and proven, we can come together and help others. My website: http://www.thearkproject.llc is very informative and considerably controversial. Please check it out, and if you are afraid, leave immediately; it’s no place for cowards. The last Prophet said: “Whoever among you sees an evil action, then let him change it with his hand [by taking action]; if he cannot, then with his tongue [by speaking out]; and if he cannot, then, with his heart – and that is the weakest of faith.” [Sahih Muslim] If we all, or even some of us, did this, there would be significant change. We are able to witness it on small and grand scales, for example, from climate control to business partnerships. I encourage, invite, and challenge you all to support me by visiting my website.
This presentation by Nathaniel Lane, Associate Professor in Economics at Oxford University, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
This presentation by Professor Giuseppe Colangelo, Jean Monnet Professor of European Innovation Policy, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
Gamify it until you make it Improving Agile Development and Operations with ...Ben Linders
So many challenges, so little time. While we’re busy developing software and keeping it operational, we also need to sharpen the saw, but how? Gamification can be a way to look at how you’re doing and find out where to improve. It’s a great way to have everyone involved and get the best out of people.
In this presentation, Ben Linders will show how playing games with the DevOps coaching cards can help to explore your current development and deployment (DevOps) practices and decide as a team what to improve or experiment with.
The games that we play are based on an engagement model. Instead of imposing change, the games enable people to pull in ideas for change and apply those in a way that best suits their collective needs.
By playing games, you can learn from each other. Teams can use games, exercises, and coaching cards to discuss values, principles, and practices, and share their experiences and learnings.
Different game formats can be used to share experiences on DevOps principles and practices and explore how they can be applied effectively. This presentation provides an overview of playing formats and will inspire you to come up with your own formats.
This presentation by Tim Capel, Director of the UK Information Commissioner’s Office Legal Service, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfBen Linders
Psychological safety in teams is important; team members must feel safe and able to communicate and collaborate effectively to deliver value. It’s also necessary to build long-lasting teams since things will happen and relationships will be strained.
But, how safe is a team? How can we determine if there are any factors that make the team unsafe or have an impact on the team’s culture?
In this mini-workshop, we’ll play games for psychological safety and team culture utilizing a deck of coaching cards, The Psychological Safety Cards. We will learn how to use gamification to gain a better understanding of what’s going on in teams. Individuals share what they have learned from working in teams, what has impacted the team’s safety and culture, and what has led to positive change.
Different game formats will be played in groups in parallel. Examples are an ice-breaker to get people talking about psychological safety, a constellation where people take positions about aspects of psychological safety in their team or organization, and collaborative card games where people work together to create an environment that fosters psychological safety.
This presentation by Juraj Čorba, Chair of OECD Working Party on Artificial Intelligence Governance (AIGO), was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by OECD, OECD Secretariat, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
The importance of sustainable and efficient computational practices in artificial intelligence (AI) and deep learning has become increasingly critical. This webinar focuses on the intersection of sustainability and AI, highlighting the significance of energy-efficient deep learning, innovative randomization techniques in neural networks, the potential of reservoir computing, and the cutting-edge realm of neuromorphic computing. This webinar aims to connect theoretical knowledge with practical applications and provide insights into how these innovative approaches can lead to more robust, efficient, and environmentally conscious AI systems.
Webinar Speaker: Prof. Claudio Gallicchio, Assistant Professor, University of Pisa
Claudio Gallicchio is an Assistant Professor at the Department of Computer Science of the University of Pisa, Italy. His research involves merging concepts from Deep Learning, Dynamical Systems, and Randomized Neural Systems, and he has co-authored over 100 scientific publications on the subject. He is the founder of the IEEE CIS Task Force on Reservoir Computing, and the co-founder and chair of the IEEE Task Force on Randomization-based Neural Networks and Learning Systems. He is an associate editor of IEEE Transactions on Neural Networks and Learning Systems (TNNLS).
This presentation by OECD, OECD Secretariat, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
2. INTRODUCTION:
IT-POLICY:
1. JS Consultancy Services IT-POLICY as a guide for best
practices within IT as well as providing essential principles
guiding use of equipments, software and IT systems security.
April 15, 2015
Information Technology Policy-JS Consultancy Services
2
4. OUTLINES
IT EQUIPMENTS
1. SYSTEM PROTECTIONS
2. EQUIPMENT PROCUREMENT
3. USE OF LAPTOP AND DESKTOP COMPUTERS
4. USE OF PRINTERS
5. USE OF SCANNERS
6. USE OF LCD PROECTOR
7. USE OF DIGITAL PHOTO & VIDEO CAMERAS
8. USE OF FLASH DISK (MEMORY STICK)
9. USE OF CD-R/RW & DVD-R/RW DISC
10. USE OF EXTERNAL HARD DRIVE (HDDS)
11. Consumables
April 15, 2015
Information Technology Policy-JS Consultancy Services
4
5. IT Equipments
1. System Protection:
2. Keeping IT equipment safe & clean is the responsibility of
every user.
3. For cleaning Spray will be provided.
4. New installation is prohibited in JSCS IT Equipments.
5. By receiving of IT equipment Assets Assignment Form Must be
sign.
6. By damaging of IT equipment 10% cost will be cut off.
7. 75% cost will be cut off by losing equipment.
April 15, 2015
Information Technology Policy-JS Consultancy Services
5
6. RECOMMENDATIONS:
1. Connecting IT Equipment with safe power supply in/out of
the office.
2. All IT Equipment should be covered with plastic.
3. Equipment should be clean with soft wipes and spray.
4. Off devices safely before leaving to home or out of the
office more than 1 hour, unexpectedly or shutting down from
button is prohibited.
5. All loan equipment should be return to JSCS before resign.
April 15, 2015
Information Technology Policy-JS Consultancy Services
6
7. EQUIPMENT PROCUREMENT:
Policies:
1. Purchasing locally or internationally.
2. IT equipments less than US$100 can be purchased using
petty cash. And equipments over
3. US$100 follow the finance procurement policies.
April 15, 2015
Information Technology Policy-JS Consultancy Services
7
8. USE OF LAPTOP AND DESKTOP COMPUTERS
Policies:
1. IT Equipment should be use for official work.
2. Temporary IT Equipment can also be provided according to
need.
USE OF PRINTERS:
1. IT Unit will monitors all staff
2. Staff members are only allowed to print official data not
personal data.
April 15, 2015
Information Technology Policy-JS Consultancy Services
8
9. Recommendations:
1. Color/black and white printers will be used according to
need.
USE OF SCANNERS:
Policies:
1. Every staff member should care about his/her scanning &
Printing.
Recommendations:
1. Always print according to your need.
2. If a Scan size is more than 10MB should be send through
share drive or compressed it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
9
10. April 15, 2015
Information Technology Policy-JS Consultancy Services
10
USE OF LCD PROJECTOR
Policies:
1. Request before 24 hours for an IT Equipments and protect it
after receiving.
2. Projector should be put on standby mode while not use.
USE OF DIGITAL PHOTO AND VIDEO CAMERAS
Policies:
1. Request before 24 hours for Camera.
2. After receiving camera take care.
11. April 15, 2015
Information Technology Policy-JS Consultancy Services
11
USE OF FLASH DISK (MEMORY STICK)
Policies:
1. IF a person feel that he/she require USB than they should
submit request form.
2. USB insertion to other devices is strongly prohibited.
Recommendations:
1. It is recommended that Share Drive should be use instead of
USB to reduce Virus threat.
2. Suspicious USB should be scan before data transformation.
12. USE OF CD-R/RW, DVD-R/RW DISC
Policies:
1. Staff should fill up logbook before getting CDs from IT Unit.
2. Staff are not allowed to use CD/DVDs Drives for personal use.
Recommendations:
1. Reduce the use of CD-RW/DVD-RW.
2. Staff are not allowed to backup official data for their
personal use.
April 15, 2015
Information Technology Policy-JS Consultancy Services
12
13. USE OF EXTERNAL HARD DRIVES (HDDS)
1. JSCS IT-POLICY is to backup data in external (HDD)
CONSUMABLES
Policies:
1. User should submit request form for Cartridge/Toners to IT
Unit.
2. Cartridge/Toners refilling is prohibited.
3. Printers/Photocopiers shall be installed with original
cartridge/toner
April 15, 2015
Information Technology Policy-JS Consultancy Services
13
14. Recommendations:
1. Cartridges/Toners should be purchased per quarter basis
2. Empty (used) cartridges and toners should be disposed
THANKS FOR JOINING!
April 15, 2015
Information Technology Policy-JS Consultancy Services
14
15. MANAGING & USING OF SOFTWARE
April 15, 2015
Information Technology Policy-JS Consultancy Services
15
16.
MANAGING & USING OF SOFTWARE
1. USE OF SOFTWARE
2. FILING SYSTEM
3. ARCHIVING OFFICIAL DATA
4. USE OF E-MAIL & OUTLOOK
5. VIRUS PROTECTION
6. SYSTEM PERFORMANCE
April 15, 2015
Information Technology Policy-JS Consultancy Services
16
OUTLINE
17. MANAGING AND USING OF SOFTWARE
USE OF SOFTWARE:
Policies:
1. Only license software will be installed on JSCS systems. JSCS
license software is not allowed to installed on home systems.
2. software will be use under license.
3. Users are not allowed install, uninstall the preinstall and
modify the install software.
4. Illegal & unlicensed software are not allowed to install on
official systems. User need a software submit request for it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
17
18. 1. All IT related software, Media, CDs and other equipment
should be store with IT Unit.
FILING SYSTEM
Policies:
1. All official and nonofficial data is prohibited to store on
desktop and C: Drive (Windows D:).
Recommendations:
1. File name should be less than 40 characters.
2. Folder structure path shouldn’t exceed 10 folders.
3. Clear and meaning full name.
April 15, 2015
Information Technology Policy-JS Consultancy Services
18
19. ARCHIVING OFFICIAL DATA
Policies:
1. Each member will have maximum space of 10Gigabits space
2. Only official data will be backup.
Recommendations:
1. Exceeding space limit consult IT Unit.
2. Deleting of unnecessary data.
USE OF E-MAIL AND OUTLOOK
Policies:
1. All official E-mails account can be link to outlook.
2. Sending of large email causing problem large email can be
send through share drive or Drop box.
April 15, 2015
Information Technology Policy-JS Consultancy Services
19
20. Recommendations:
1. Delete unnecessary messages from inbox.
2. Official email will be close after 24 hours of an employee
resignation.
E-mail etiquette:
1. Always think for a while when sending message.
VIRUS PROTECTION
1. New viruses are being constantly developed
Policies:
1. Anti-virus programs provide good protection, but only if the
latest updates have been installed.
April 15, 2015
Information Technology Policy-JS Consultancy Services
20
21. 2. JS Consultancy Services uses AVAST Anti-Virus program with
the latest virus definitions
3. Keeping the computer free of the viruses is the responsibility
of computer user.
4. Always contact the IT unit to give you updates and
information on new technology to protect
computers from virus.
5. Multi Anti-virus programs are prohibited, as they conflict
each other.
6. IT Unit can’t protect IT Equipment without users help.
April 15, 2015
Information Technology Policy-JS Consultancy Services
21
22. April 15, 2015
Information Technology Policy-JS Consultancy Services
22
Recommendations:
1. Get the very latest anti-virus update
2. Perform a complete scan of all hard disk drives e.g. C: D:
etc.
SYSTEM PERFORMANCE
Policies:
Installation of many programs/applications:
1. Staff is not allowed to install irrelevant
programs/applications on office computers
Recommendations:
1. Scan computer.
2. Avoid a high resolution screen saver it consume power.
3. Avoid hibernation.
THANKS FOR JOINING!
23. IT & NETWORK SECURITY POLICY
April 15, 2015
Information Technology Policy-JS Consultancy Services
23
24. OUTLINE
IT & NETWORK SECURITY POLICY
1. Network Topology & Infrastructure
2. LOCAL USERS RIGHTS & ASSIGNMENT
3. WORKGROUP SECURITY POLICY
4. PASSWORD POLICY
5. ACCOUNT LOCKOUT POLICY
6. SECURITY OPTIONS (TRUST RELATIONSHIP)
7. USE OF NETWORK DRIVES
8. INTERNET USAGE
9. Technical Review-
April 15, 2015
Information Technology Policy-JS Consultancy Services
24
25. IT AND NETWORK SECURITY POLICY
NETWORK TOPOLOGY AND INFRASTRUCTURE
Policies:
1. Network administrator has the right to modify pwd.
2. Staff must use the network resources under their
specific terms and policies
3. Staff can use network resources by one computer
or equivalent devices at any time
Recommendations:
1. All network users have the responsibility to keep
their office network out of reach of direct
2. heat, sunshine, water, etc.
April 15, 2015
Information Technology Policy-JS Consultancy Services
25
26. LOCAL USERS RIGHTS AND ASSIGNMENTS
Policies:
1. Staff member are not allowed to login to other
person system.
2. Account password secret.
3. Rights and restrictions in network.
4. Shared Drive is restricted and allowed for some
persons.
5. Password must be change after 180 days.
6. Computer user account will be log out after 10
minutes when not in use.
7. All computers are password protected.
April 15, 2015
Information Technology Policy-JS Consultancy Services
26
27. Recommendations:
1. Staff should inform the IT unit if they out of the
office for more than 7 business days for
security reasons.
1. It is recommended that staff members lock their
2. computers while not in use
WORKGROUP SECURITY POLICY
Policies:
1. Only authenticated users allowed to access
shared drive.
Change the system time
April 15, 2015
Information Technology Policy-JS Consultancy Services
27
28. 1. Staff are not allowed to change the security
Settings & timings.
Changing the local user’s name/password
PASSWORD POLICY
Policies:
1. Passwords are good for 180 days.
2. Passwords must be at least eight characters long
and contain numbers and symbols.
3. For security reasons, passwords shall not contain
your user name or any part of your full.
April 15, 2015
Information Technology Policy-JS Consultancy Services
28
29. April 15, 2015
Information Technology Policy-JS Consultancy Services
29
ACCOUNT LOCKOUT POLICY
Policies:
1. Account lockout threshold
2. Account lockout duration
SECURITY OPTIONS (TRUST RELATIONSHIP)
1. If a staff member plans to be out of the office for
at least 30 days, they are advised to change
their password before leaving the office.
2. The HR unit must inform the IT Unit when an
employee is terminated or resigned before
24hours.
30. USE OF NETWORK DRIVES
Policies:
1. Saving personal data to any of the network
backup drives is prohibited.
2. Users are not allowed to save a database file to
the Share Drive or Outlook backup drive.
3. Shared, databases and Outlook backup drives
have a standard structure.
INTERNET USAGE
Policies:
1. Social media during office time is prohibited.
2. Downloading pirated software are prohibited.
April 15, 2015
Information Technology Policy-JS Consultancy Services
30
31. 3. Staff can use internet for unofficial use before 8:00
AM and after 2:30 PM.
4. No one is allowed to download official and
unofficial software without the permission of IT Unit.
5. Uploading is prohibited.
6. Chatting and Instant Messaging software for
unofficial purposes is prohibited.
7. Staff can use Skype as IM.
8. Skype must be sign in during the office hours.
THANKS FOR JOINING
April 15, 2015
Information Technology Policy-JS Consultancy Services
31