IT Policy Contents

Information Technology
Policy

 

1.         INTRODUCTION

 

1.1     What is information technology policy?

1.2     Purpose of IT Policy

1.3     Policy procedure tends to

 

2.             ROLES AND RESPONSIBILITIES

 

2.1     Roles and responsibilities of IT Manager

2.2     Who need to take responsibility of IT equipment’s?

 

3.           MESSAGE FROM MANAGEMENT

 

4.             IT ASSETS AND ITS CONCERN

 

4.1     Concern on acquiring and handling IT stuff

4.2     Who decide conducting IT trainings?

4.3     What IT support strategy has been formulated up to now? 

4.4     List of equipment’s purchased through IT department

4.5     Mechanism for Equipment usage, maintenance and security

 

5.          COMPUTER SYSTEM STANDARDS

 

5.1     Objective for IT accessories standards

5.2     General guidelines for standards

5.3     Minimum requirements for IT accessories

5.4     Who can own network access for PCs and Laptops?

5.5     What data backup procedure are followed?

5.6     Antivirus software installation strategy on PCs or Laptops

5.7     What PCs or Laptop support techniques acquired through IT department?

 

6.          INTERNET USAGE POLICY

 

6.1     Things to be remembered accessing internet

6.2     Internet login guidelines

6.3     Password utility

6.4     Online content usage guidelines

6.5     Inappropriate use of internet and its influence

6.6     Inappropriate internet sites access and its control mechanism

 

 7.      INFORMATION SECURITY POLICY

 

7.1     Protocols followed for Information Security

7.2     Access control procedure

7.3     Virus prevention techniques

            8.        EMAIL ACCESS POLICY

 

8.1     What is emails and its importance?

8.2     Who is the owner of organizational email?

8.3     What confidentiality should be maintained for emails?

8.4     Why do we require email security?

8.5     Inappropriate use of emails and its consequences

 

                    9.        SOFTWARE USAGE POLICY

 

9.1       General guidelines using software

9.2       What entity need to be pursued for usage of software?

9.3       Software license importance and its security

 

             10.     COMPUTER USE POLICIES

 

10.1   Unauthorized activities and its impact

            11.     LOGICAL ACCESS

 

11.1   Approaches for protecting passwords

11.2   Provision adapting external devices control policy

 

            12.     SUPPORT POLICIES

 

12.1   What Protocol are followed regarding IT support?

12.2   What methodology are introduced for limiting IT support? 

             13.      SOFTWARE POLICY 

              14.      INTERNET EQUIPMENTS PROCEDURE

 

14.1   Protection and preservation of hardware components

 

            15.     VIRUS PROTECTION POLICIES

 

15.1  Protocols or Effective ways followed for resolving virus infected  system

 

16.        COPYRIGHT POLICIES

 

17.      CONTACT INFORMATION

Comments

Er.Ajay kattel said…
it will be better if we known the answer of the policy too.

Popular posts from this blog

E - Learning