SlideShare a Scribd company logo
JSCS IT-Policy
Aman ullah
IT Coordinator
April 15, 2015
Information Technology Policy-JS Consultancy Services
INTRODUCTION:
 IT-POLICY:
1. JS Consultancy Services IT-POLICY as a guide for best
practices within IT as well as providing essential principles
guiding use of equipments, software and IT systems security.
April 15, 2015
Information Technology Policy-JS Consultancy Services
2
IT EQUIPMENTS
April 15, 2015
Information Technology Policy-JS Consultancy Services
3
OUTLINES
 IT EQUIPMENTS
1. SYSTEM PROTECTIONS
2. EQUIPMENT PROCUREMENT
3. USE OF LAPTOP AND DESKTOP COMPUTERS
4. USE OF PRINTERS
5. USE OF SCANNERS
6. USE OF LCD PROECTOR
7. USE OF DIGITAL PHOTO & VIDEO CAMERAS
8. USE OF FLASH DISK (MEMORY STICK)
9. USE OF CD-R/RW & DVD-R/RW DISC
10. USE OF EXTERNAL HARD DRIVE (HDDS)
11. Consumables
April 15, 2015
Information Technology Policy-JS Consultancy Services
4
IT Equipments
1. System Protection:
2. Keeping IT equipment safe & clean is the responsibility of
every user.
3. For cleaning Spray will be provided.
4. New installation is prohibited in JSCS IT Equipments.
5. By receiving of IT equipment Assets Assignment Form Must be
sign.
6. By damaging of IT equipment 10% cost will be cut off.
7. 75% cost will be cut off by losing equipment.
April 15, 2015
Information Technology Policy-JS Consultancy Services
5
RECOMMENDATIONS:
1. Connecting IT Equipment with safe power supply in/out of
the office.
2. All IT Equipment should be covered with plastic.
3. Equipment should be clean with soft wipes and spray.
4. Off devices safely before leaving to home or out of the
office more than 1 hour, unexpectedly or shutting down from
button is prohibited.
5. All loan equipment should be return to JSCS before resign.
April 15, 2015
Information Technology Policy-JS Consultancy Services
6
EQUIPMENT PROCUREMENT:
 Policies:
1. Purchasing locally or internationally.
2. IT equipments less than US$100 can be purchased using
petty cash. And equipments over
3. US$100 follow the finance procurement policies.
April 15, 2015
Information Technology Policy-JS Consultancy Services
7
 USE OF LAPTOP AND DESKTOP COMPUTERS
 Policies:
1. IT Equipment should be use for official work.
2. Temporary IT Equipment can also be provided according to
need.
 USE OF PRINTERS:
1. IT Unit will monitors all staff
2. Staff members are only allowed to print official data not
personal data.
April 15, 2015
Information Technology Policy-JS Consultancy Services
8
 Recommendations:
1. Color/black and white printers will be used according to
need.
 USE OF SCANNERS:
 Policies:
1. Every staff member should care about his/her scanning &
Printing.
 Recommendations:
1. Always print according to your need.
2. If a Scan size is more than 10MB should be send through
share drive or compressed it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
9
April 15, 2015
Information Technology Policy-JS Consultancy Services
10
 USE OF LCD PROJECTOR
 Policies:
1. Request before 24 hours for an IT Equipments and protect it
after receiving.
2. Projector should be put on standby mode while not use.
 USE OF DIGITAL PHOTO AND VIDEO CAMERAS
 Policies:
1. Request before 24 hours for Camera.
2. After receiving camera take care.
April 15, 2015
Information Technology Policy-JS Consultancy Services
11
 USE OF FLASH DISK (MEMORY STICK)
 Policies:
1. IF a person feel that he/she require USB than they should
submit request form.
2. USB insertion to other devices is strongly prohibited.
 Recommendations:
1. It is recommended that Share Drive should be use instead of
USB to reduce Virus threat.
2. Suspicious USB should be scan before data transformation.
 USE OF CD-R/RW, DVD-R/RW DISC
 Policies:
1. Staff should fill up logbook before getting CDs from IT Unit.
2. Staff are not allowed to use CD/DVDs Drives for personal use.
 Recommendations:
1. Reduce the use of CD-RW/DVD-RW.
2. Staff are not allowed to backup official data for their
personal use.
April 15, 2015
Information Technology Policy-JS Consultancy Services
12
 USE OF EXTERNAL HARD DRIVES (HDDS)
1. JSCS IT-POLICY is to backup data in external (HDD)
 CONSUMABLES
 Policies:
1. User should submit request form for Cartridge/Toners to IT
Unit.
2. Cartridge/Toners refilling is prohibited.
3. Printers/Photocopiers shall be installed with original
cartridge/toner
April 15, 2015
Information Technology Policy-JS Consultancy Services
13
 Recommendations:
1. Cartridges/Toners should be purchased per quarter basis
2. Empty (used) cartridges and toners should be disposed
THANKS FOR JOINING!
April 15, 2015
Information Technology Policy-JS Consultancy Services
14
MANAGING & USING OF SOFTWARE
April 15, 2015
Information Technology Policy-JS Consultancy Services
15

 MANAGING & USING OF SOFTWARE
1. USE OF SOFTWARE
2. FILING SYSTEM
3. ARCHIVING OFFICIAL DATA
4. USE OF E-MAIL & OUTLOOK
5. VIRUS PROTECTION
6. SYSTEM PERFORMANCE
April 15, 2015
Information Technology Policy-JS Consultancy Services
16
OUTLINE
 MANAGING AND USING OF SOFTWARE
 USE OF SOFTWARE:
 Policies:
1. Only license software will be installed on JSCS systems. JSCS
license software is not allowed to installed on home systems.
2. software will be use under license.
3. Users are not allowed install, uninstall the preinstall and
modify the install software.
4. Illegal & unlicensed software are not allowed to install on
official systems. User need a software submit request for it.
April 15, 2015
Information Technology Policy-JS Consultancy Services
17
1. All IT related software, Media, CDs and other equipment
should be store with IT Unit.
 FILING SYSTEM
 Policies:
1. All official and nonofficial data is prohibited to store on
desktop and C: Drive (Windows D:).
 Recommendations:
1. File name should be less than 40 characters.
2. Folder structure path shouldn’t exceed 10 folders.
3. Clear and meaning full name.
April 15, 2015
Information Technology Policy-JS Consultancy Services
18
 ARCHIVING OFFICIAL DATA
 Policies:
1. Each member will have maximum space of 10Gigabits space
2. Only official data will be backup.
 Recommendations:
1. Exceeding space limit consult IT Unit.
2. Deleting of unnecessary data.
 USE OF E-MAIL AND OUTLOOK
 Policies:
1. All official E-mails account can be link to outlook.
2. Sending of large email causing problem large email can be
send through share drive or Drop box.
April 15, 2015
Information Technology Policy-JS Consultancy Services
19
 Recommendations:
1. Delete unnecessary messages from inbox.
2. Official email will be close after 24 hours of an employee
resignation.
 E-mail etiquette:
1. Always think for a while when sending message.
 VIRUS PROTECTION
1. New viruses are being constantly developed
 Policies:
1. Anti-virus programs provide good protection, but only if the
latest updates have been installed.
April 15, 2015
Information Technology Policy-JS Consultancy Services
20
2. JS Consultancy Services uses AVAST Anti-Virus program with
the latest virus definitions
3. Keeping the computer free of the viruses is the responsibility
of computer user.
4. Always contact the IT unit to give you updates and
information on new technology to protect
computers from virus.
5. Multi Anti-virus programs are prohibited, as they conflict
each other.
6. IT Unit can’t protect IT Equipment without users help.
April 15, 2015
Information Technology Policy-JS Consultancy Services
21
April 15, 2015
Information Technology Policy-JS Consultancy Services
22
 Recommendations:
1. Get the very latest anti-virus update
2. Perform a complete scan of all hard disk drives e.g. C: D:
etc.
 SYSTEM PERFORMANCE
 Policies:
 Installation of many programs/applications:
1. Staff is not allowed to install irrelevant
programs/applications on office computers
 Recommendations:
1. Scan computer.
2. Avoid a high resolution screen saver it consume power.
3. Avoid hibernation.
THANKS FOR JOINING!
IT & NETWORK SECURITY POLICY
April 15, 2015
Information Technology Policy-JS Consultancy Services
23
 OUTLINE
 IT & NETWORK SECURITY POLICY
1. Network Topology & Infrastructure
2. LOCAL USERS RIGHTS & ASSIGNMENT
3. WORKGROUP SECURITY POLICY
4. PASSWORD POLICY
5. ACCOUNT LOCKOUT POLICY
6. SECURITY OPTIONS (TRUST RELATIONSHIP)
7. USE OF NETWORK DRIVES
8. INTERNET USAGE
9. Technical Review-
April 15, 2015
Information Technology Policy-JS Consultancy Services
24
 IT AND NETWORK SECURITY POLICY
 NETWORK TOPOLOGY AND INFRASTRUCTURE
 Policies:
1. Network administrator has the right to modify pwd.
2. Staff must use the network resources under their
specific terms and policies
3. Staff can use network resources by one computer
or equivalent devices at any time
 Recommendations:
1. All network users have the responsibility to keep
their office network out of reach of direct
2. heat, sunshine, water, etc.
April 15, 2015
Information Technology Policy-JS Consultancy Services
25
 LOCAL USERS RIGHTS AND ASSIGNMENTS
 Policies:
1. Staff member are not allowed to login to other
person system.
2. Account password secret.
3. Rights and restrictions in network.
4. Shared Drive is restricted and allowed for some
persons.
5. Password must be change after 180 days.
6. Computer user account will be log out after 10
minutes when not in use.
7. All computers are password protected.
April 15, 2015
Information Technology Policy-JS Consultancy Services
26
 Recommendations:
1. Staff should inform the IT unit if they out of the
office for more than 7 business days for
security reasons.
1. It is recommended that staff members lock their
2. computers while not in use
 WORKGROUP SECURITY POLICY
 Policies:
1. Only authenticated users allowed to access
shared drive.
 Change the system time
April 15, 2015
Information Technology Policy-JS Consultancy Services
27
1. Staff are not allowed to change the security
Settings & timings.
 Changing the local user’s name/password
 PASSWORD POLICY
 Policies:
1. Passwords are good for 180 days.
2. Passwords must be at least eight characters long
and contain numbers and symbols.
3. For security reasons, passwords shall not contain
your user name or any part of your full.
April 15, 2015
Information Technology Policy-JS Consultancy Services
28
April 15, 2015
Information Technology Policy-JS Consultancy Services
29
 ACCOUNT LOCKOUT POLICY
 Policies:
1. Account lockout threshold
2. Account lockout duration
 SECURITY OPTIONS (TRUST RELATIONSHIP)
1. If a staff member plans to be out of the office for
at least 30 days, they are advised to change
their password before leaving the office.
2. The HR unit must inform the IT Unit when an
employee is terminated or resigned before
24hours.
 USE OF NETWORK DRIVES
 Policies:
1. Saving personal data to any of the network
backup drives is prohibited.
2. Users are not allowed to save a database file to
the Share Drive or Outlook backup drive.
3. Shared, databases and Outlook backup drives
have a standard structure.
 INTERNET USAGE
 Policies:
1. Social media during office time is prohibited.
2. Downloading pirated software are prohibited.
April 15, 2015
Information Technology Policy-JS Consultancy Services
30
3. Staff can use internet for unofficial use before 8:00
AM and after 2:30 PM.
4. No one is allowed to download official and
unofficial software without the permission of IT Unit.
5. Uploading is prohibited.
6. Chatting and Instant Messaging software for
unofficial purposes is prohibited.
7. Staff can use Skype as IM.
8. Skype must be sign in during the office hours.
THANKS FOR JOINING
April 15, 2015
Information Technology Policy-JS Consultancy Services
31

More Related Content

What's hot

recruitment and performance appraisal at air india ltd
 recruitment and performance appraisal at air india ltd recruitment and performance appraisal at air india ltd
recruitment and performance appraisal at air india ltd
Prateek Gahlot
 
7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture
Aubrey Daniels International
 
Principles of Human Performance Improvement
Principles of Human Performance ImprovementPrinciples of Human Performance Improvement
Principles of Human Performance Improvement
DIv CHAS
 
PSM RM - Process Safety Management implementation guidance 1
PSM RM - Process Safety Management implementation guidance 1PSM RM - Process Safety Management implementation guidance 1
PSM RM - Process Safety Management implementation guidance 1
Process Safety Culture
 
45087468 airtel-final-project-report
45087468 airtel-final-project-report45087468 airtel-final-project-report
45087468 airtel-final-project-report
Soumya Sahoo
 
Kyt method
Kyt method Kyt method
Kyt method
sopheak086
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
Hamza Cheema
 
Safety Leadership
Safety LeadershipSafety Leadership
Safety Leadership
txheaven
 
Prajin CV HSE Officer
Prajin CV HSE OfficerPrajin CV HSE Officer
Prajin CV HSE Officer
Prajin Chandran
 
Safety as a value
Safety as a valueSafety as a value
Safety as a value
guestbbec14
 
Incident Investigation Training by Zenith
Incident Investigation Training by ZenithIncident Investigation Training by Zenith
Incident Investigation Training by Zenith
Atlantic Training, LLC.
 
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
 A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK... A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
IAEME Publication
 
office boy
office boyoffice boy
office boy
mohammed Ashif
 
Annexure A1
Annexure A1Annexure A1
Annexure A1
Juan van Zyl
 
Health and safety officer kpi
Health and safety officer kpiHealth and safety officer kpi
Health and safety officer kpi
jomlendigas
 
Hazop (incident investigation & root cause analysis )
Hazop  (incident investigation & root cause analysis )Hazop  (incident investigation & root cause analysis )
Hazop (incident investigation & root cause analysis )
umar farooq
 

What's hot (16)

recruitment and performance appraisal at air india ltd
 recruitment and performance appraisal at air india ltd recruitment and performance appraisal at air india ltd
recruitment and performance appraisal at air india ltd
 
7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture7 Keys for Creating A Safety Culture
7 Keys for Creating A Safety Culture
 
Principles of Human Performance Improvement
Principles of Human Performance ImprovementPrinciples of Human Performance Improvement
Principles of Human Performance Improvement
 
PSM RM - Process Safety Management implementation guidance 1
PSM RM - Process Safety Management implementation guidance 1PSM RM - Process Safety Management implementation guidance 1
PSM RM - Process Safety Management implementation guidance 1
 
45087468 airtel-final-project-report
45087468 airtel-final-project-report45087468 airtel-final-project-report
45087468 airtel-final-project-report
 
Kyt method
Kyt method Kyt method
Kyt method
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
Safety Leadership
Safety LeadershipSafety Leadership
Safety Leadership
 
Prajin CV HSE Officer
Prajin CV HSE OfficerPrajin CV HSE Officer
Prajin CV HSE Officer
 
Safety as a value
Safety as a valueSafety as a value
Safety as a value
 
Incident Investigation Training by Zenith
Incident Investigation Training by ZenithIncident Investigation Training by Zenith
Incident Investigation Training by Zenith
 
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
 A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK... A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
A STUDY ON EFFECTIVENESS OF EMPLOYEE’S TRAINING AND DEVELOPMENT IN RANE BRAK...
 
office boy
office boyoffice boy
office boy
 
Annexure A1
Annexure A1Annexure A1
Annexure A1
 
Health and safety officer kpi
Health and safety officer kpiHealth and safety officer kpi
Health and safety officer kpi
 
Hazop (incident investigation & root cause analysis )
Hazop  (incident investigation & root cause analysis )Hazop  (incident investigation & root cause analysis )
Hazop (incident investigation & root cause analysis )
 

Similar to Jscs it policy presentations

IT Policy
IT Policy IT Policy
IT Policy
Julian Hutabarat
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
Benoît H. Dicaire
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
Rocket Software
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
Suthaesh Ramash
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
Priyanka Aash
 
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
Splunk
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
David Asirvatham
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdf
josemaza20
 
Anshika
AnshikaAnshika
Network security
Network securityNetwork security
Network security
Anshika MIshra
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
Peter Haase
 
Resume update executive it
Resume  update executive itResume  update executive it
Resume update executive it
Ajaya Mohanty
 
13 11-26 snia, storage networking industry association - panorama mundial do ...
13 11-26 snia, storage networking industry association - panorama mundial do ...13 11-26 snia, storage networking industry association - panorama mundial do ...
13 11-26 snia, storage networking industry association - panorama mundial do ...
Carvalho Comunicação
 
Robert-DOD Project
Robert-DOD ProjectRobert-DOD Project
Robert-DOD Project
Robert D. Williams
 
Girma Tadesse CV
Girma Tadesse CV Girma Tadesse CV
Girma Tadesse CV
GirmaTadesse8
 
POLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptxPOLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptx
JebsKwan
 

Similar to Jscs it policy presentations (20)

IT Policy
IT Policy IT Policy
IT Policy
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Group 10 - PDPA II.pptx
Group 10 - PDPA II.pptxGroup 10 - PDPA II.pptx
Group 10 - PDPA II.pptx
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
PLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdfPLAN DE CONTINGENCIA.pdf
PLAN DE CONTINGENCIA.pdf
 
Anshika
AnshikaAnshika
Anshika
 
Network security
Network securityNetwork security
Network security
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Resume update executive it
Resume  update executive itResume  update executive it
Resume update executive it
 
13 11-26 snia, storage networking industry association - panorama mundial do ...
13 11-26 snia, storage networking industry association - panorama mundial do ...13 11-26 snia, storage networking industry association - panorama mundial do ...
13 11-26 snia, storage networking industry association - panorama mundial do ...
 
Robert-DOD Project
Robert-DOD ProjectRobert-DOD Project
Robert-DOD Project
 
Girma Tadesse CV
Girma Tadesse CV Girma Tadesse CV
Girma Tadesse CV
 
POLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptxPOLICY REVIEW - COMELEC.pptx
POLICY REVIEW - COMELEC.pptx
 

Recently uploaded

Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
SkillCertProExams
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
Raheem Muhammad
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
Legislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptxLegislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptx
Charmi13
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
Ben Linders
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPEACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
Charmi13
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
Claudio Gallicchio
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
kekzed
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Genesis chapter 3 Isaiah Scudder.pptx
Genesis    chapter 3 Isaiah Scudder.pptxGenesis    chapter 3 Isaiah Scudder.pptx
Genesis chapter 3 Isaiah Scudder.pptx
FamilyWorshipCenterD
 

Recently uploaded (20)

Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
Legislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptxLegislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptx
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPEACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
Genesis chapter 3 Isaiah Scudder.pptx
Genesis    chapter 3 Isaiah Scudder.pptxGenesis    chapter 3 Isaiah Scudder.pptx
Genesis chapter 3 Isaiah Scudder.pptx
 

Jscs it policy presentations

  • 1. JSCS IT-Policy Aman ullah IT Coordinator April 15, 2015 Information Technology Policy-JS Consultancy Services
  • 2. INTRODUCTION:  IT-POLICY: 1. JS Consultancy Services IT-POLICY as a guide for best practices within IT as well as providing essential principles guiding use of equipments, software and IT systems security. April 15, 2015 Information Technology Policy-JS Consultancy Services 2
  • 3. IT EQUIPMENTS April 15, 2015 Information Technology Policy-JS Consultancy Services 3
  • 4. OUTLINES  IT EQUIPMENTS 1. SYSTEM PROTECTIONS 2. EQUIPMENT PROCUREMENT 3. USE OF LAPTOP AND DESKTOP COMPUTERS 4. USE OF PRINTERS 5. USE OF SCANNERS 6. USE OF LCD PROECTOR 7. USE OF DIGITAL PHOTO & VIDEO CAMERAS 8. USE OF FLASH DISK (MEMORY STICK) 9. USE OF CD-R/RW & DVD-R/RW DISC 10. USE OF EXTERNAL HARD DRIVE (HDDS) 11. Consumables April 15, 2015 Information Technology Policy-JS Consultancy Services 4
  • 5. IT Equipments 1. System Protection: 2. Keeping IT equipment safe & clean is the responsibility of every user. 3. For cleaning Spray will be provided. 4. New installation is prohibited in JSCS IT Equipments. 5. By receiving of IT equipment Assets Assignment Form Must be sign. 6. By damaging of IT equipment 10% cost will be cut off. 7. 75% cost will be cut off by losing equipment. April 15, 2015 Information Technology Policy-JS Consultancy Services 5
  • 6. RECOMMENDATIONS: 1. Connecting IT Equipment with safe power supply in/out of the office. 2. All IT Equipment should be covered with plastic. 3. Equipment should be clean with soft wipes and spray. 4. Off devices safely before leaving to home or out of the office more than 1 hour, unexpectedly or shutting down from button is prohibited. 5. All loan equipment should be return to JSCS before resign. April 15, 2015 Information Technology Policy-JS Consultancy Services 6
  • 7. EQUIPMENT PROCUREMENT:  Policies: 1. Purchasing locally or internationally. 2. IT equipments less than US$100 can be purchased using petty cash. And equipments over 3. US$100 follow the finance procurement policies. April 15, 2015 Information Technology Policy-JS Consultancy Services 7
  • 8.  USE OF LAPTOP AND DESKTOP COMPUTERS  Policies: 1. IT Equipment should be use for official work. 2. Temporary IT Equipment can also be provided according to need.  USE OF PRINTERS: 1. IT Unit will monitors all staff 2. Staff members are only allowed to print official data not personal data. April 15, 2015 Information Technology Policy-JS Consultancy Services 8
  • 9.  Recommendations: 1. Color/black and white printers will be used according to need.  USE OF SCANNERS:  Policies: 1. Every staff member should care about his/her scanning & Printing.  Recommendations: 1. Always print according to your need. 2. If a Scan size is more than 10MB should be send through share drive or compressed it. April 15, 2015 Information Technology Policy-JS Consultancy Services 9
  • 10. April 15, 2015 Information Technology Policy-JS Consultancy Services 10  USE OF LCD PROJECTOR  Policies: 1. Request before 24 hours for an IT Equipments and protect it after receiving. 2. Projector should be put on standby mode while not use.  USE OF DIGITAL PHOTO AND VIDEO CAMERAS  Policies: 1. Request before 24 hours for Camera. 2. After receiving camera take care.
  • 11. April 15, 2015 Information Technology Policy-JS Consultancy Services 11  USE OF FLASH DISK (MEMORY STICK)  Policies: 1. IF a person feel that he/she require USB than they should submit request form. 2. USB insertion to other devices is strongly prohibited.  Recommendations: 1. It is recommended that Share Drive should be use instead of USB to reduce Virus threat. 2. Suspicious USB should be scan before data transformation.
  • 12.  USE OF CD-R/RW, DVD-R/RW DISC  Policies: 1. Staff should fill up logbook before getting CDs from IT Unit. 2. Staff are not allowed to use CD/DVDs Drives for personal use.  Recommendations: 1. Reduce the use of CD-RW/DVD-RW. 2. Staff are not allowed to backup official data for their personal use. April 15, 2015 Information Technology Policy-JS Consultancy Services 12
  • 13.  USE OF EXTERNAL HARD DRIVES (HDDS) 1. JSCS IT-POLICY is to backup data in external (HDD)  CONSUMABLES  Policies: 1. User should submit request form for Cartridge/Toners to IT Unit. 2. Cartridge/Toners refilling is prohibited. 3. Printers/Photocopiers shall be installed with original cartridge/toner April 15, 2015 Information Technology Policy-JS Consultancy Services 13
  • 14.  Recommendations: 1. Cartridges/Toners should be purchased per quarter basis 2. Empty (used) cartridges and toners should be disposed THANKS FOR JOINING! April 15, 2015 Information Technology Policy-JS Consultancy Services 14
  • 15. MANAGING & USING OF SOFTWARE April 15, 2015 Information Technology Policy-JS Consultancy Services 15
  • 16.   MANAGING & USING OF SOFTWARE 1. USE OF SOFTWARE 2. FILING SYSTEM 3. ARCHIVING OFFICIAL DATA 4. USE OF E-MAIL & OUTLOOK 5. VIRUS PROTECTION 6. SYSTEM PERFORMANCE April 15, 2015 Information Technology Policy-JS Consultancy Services 16 OUTLINE
  • 17.  MANAGING AND USING OF SOFTWARE  USE OF SOFTWARE:  Policies: 1. Only license software will be installed on JSCS systems. JSCS license software is not allowed to installed on home systems. 2. software will be use under license. 3. Users are not allowed install, uninstall the preinstall and modify the install software. 4. Illegal & unlicensed software are not allowed to install on official systems. User need a software submit request for it. April 15, 2015 Information Technology Policy-JS Consultancy Services 17
  • 18. 1. All IT related software, Media, CDs and other equipment should be store with IT Unit.  FILING SYSTEM  Policies: 1. All official and nonofficial data is prohibited to store on desktop and C: Drive (Windows D:).  Recommendations: 1. File name should be less than 40 characters. 2. Folder structure path shouldn’t exceed 10 folders. 3. Clear and meaning full name. April 15, 2015 Information Technology Policy-JS Consultancy Services 18
  • 19.  ARCHIVING OFFICIAL DATA  Policies: 1. Each member will have maximum space of 10Gigabits space 2. Only official data will be backup.  Recommendations: 1. Exceeding space limit consult IT Unit. 2. Deleting of unnecessary data.  USE OF E-MAIL AND OUTLOOK  Policies: 1. All official E-mails account can be link to outlook. 2. Sending of large email causing problem large email can be send through share drive or Drop box. April 15, 2015 Information Technology Policy-JS Consultancy Services 19
  • 20.  Recommendations: 1. Delete unnecessary messages from inbox. 2. Official email will be close after 24 hours of an employee resignation.  E-mail etiquette: 1. Always think for a while when sending message.  VIRUS PROTECTION 1. New viruses are being constantly developed  Policies: 1. Anti-virus programs provide good protection, but only if the latest updates have been installed. April 15, 2015 Information Technology Policy-JS Consultancy Services 20
  • 21. 2. JS Consultancy Services uses AVAST Anti-Virus program with the latest virus definitions 3. Keeping the computer free of the viruses is the responsibility of computer user. 4. Always contact the IT unit to give you updates and information on new technology to protect computers from virus. 5. Multi Anti-virus programs are prohibited, as they conflict each other. 6. IT Unit can’t protect IT Equipment without users help. April 15, 2015 Information Technology Policy-JS Consultancy Services 21
  • 22. April 15, 2015 Information Technology Policy-JS Consultancy Services 22  Recommendations: 1. Get the very latest anti-virus update 2. Perform a complete scan of all hard disk drives e.g. C: D: etc.  SYSTEM PERFORMANCE  Policies:  Installation of many programs/applications: 1. Staff is not allowed to install irrelevant programs/applications on office computers  Recommendations: 1. Scan computer. 2. Avoid a high resolution screen saver it consume power. 3. Avoid hibernation. THANKS FOR JOINING!
  • 23. IT & NETWORK SECURITY POLICY April 15, 2015 Information Technology Policy-JS Consultancy Services 23
  • 24.  OUTLINE  IT & NETWORK SECURITY POLICY 1. Network Topology & Infrastructure 2. LOCAL USERS RIGHTS & ASSIGNMENT 3. WORKGROUP SECURITY POLICY 4. PASSWORD POLICY 5. ACCOUNT LOCKOUT POLICY 6. SECURITY OPTIONS (TRUST RELATIONSHIP) 7. USE OF NETWORK DRIVES 8. INTERNET USAGE 9. Technical Review- April 15, 2015 Information Technology Policy-JS Consultancy Services 24
  • 25.  IT AND NETWORK SECURITY POLICY  NETWORK TOPOLOGY AND INFRASTRUCTURE  Policies: 1. Network administrator has the right to modify pwd. 2. Staff must use the network resources under their specific terms and policies 3. Staff can use network resources by one computer or equivalent devices at any time  Recommendations: 1. All network users have the responsibility to keep their office network out of reach of direct 2. heat, sunshine, water, etc. April 15, 2015 Information Technology Policy-JS Consultancy Services 25
  • 26.  LOCAL USERS RIGHTS AND ASSIGNMENTS  Policies: 1. Staff member are not allowed to login to other person system. 2. Account password secret. 3. Rights and restrictions in network. 4. Shared Drive is restricted and allowed for some persons. 5. Password must be change after 180 days. 6. Computer user account will be log out after 10 minutes when not in use. 7. All computers are password protected. April 15, 2015 Information Technology Policy-JS Consultancy Services 26
  • 27.  Recommendations: 1. Staff should inform the IT unit if they out of the office for more than 7 business days for security reasons. 1. It is recommended that staff members lock their 2. computers while not in use  WORKGROUP SECURITY POLICY  Policies: 1. Only authenticated users allowed to access shared drive.  Change the system time April 15, 2015 Information Technology Policy-JS Consultancy Services 27
  • 28. 1. Staff are not allowed to change the security Settings & timings.  Changing the local user’s name/password  PASSWORD POLICY  Policies: 1. Passwords are good for 180 days. 2. Passwords must be at least eight characters long and contain numbers and symbols. 3. For security reasons, passwords shall not contain your user name or any part of your full. April 15, 2015 Information Technology Policy-JS Consultancy Services 28
  • 29. April 15, 2015 Information Technology Policy-JS Consultancy Services 29  ACCOUNT LOCKOUT POLICY  Policies: 1. Account lockout threshold 2. Account lockout duration  SECURITY OPTIONS (TRUST RELATIONSHIP) 1. If a staff member plans to be out of the office for at least 30 days, they are advised to change their password before leaving the office. 2. The HR unit must inform the IT Unit when an employee is terminated or resigned before 24hours.
  • 30.  USE OF NETWORK DRIVES  Policies: 1. Saving personal data to any of the network backup drives is prohibited. 2. Users are not allowed to save a database file to the Share Drive or Outlook backup drive. 3. Shared, databases and Outlook backup drives have a standard structure.  INTERNET USAGE  Policies: 1. Social media during office time is prohibited. 2. Downloading pirated software are prohibited. April 15, 2015 Information Technology Policy-JS Consultancy Services 30
  • 31. 3. Staff can use internet for unofficial use before 8:00 AM and after 2:30 PM. 4. No one is allowed to download official and unofficial software without the permission of IT Unit. 5. Uploading is prohibited. 6. Chatting and Instant Messaging software for unofficial purposes is prohibited. 7. Staff can use Skype as IM. 8. Skype must be sign in during the office hours. THANKS FOR JOINING April 15, 2015 Information Technology Policy-JS Consultancy Services 31