IT Policy Contents
Information
Technology
Policy
1.
INTRODUCTION
1.1 What is information
technology policy?
1.2 Purpose of IT Policy
1.3 Policy procedure tends to
2.
ROLES AND RESPONSIBILITIES
2.1 Roles and
responsibilities of IT Manager
2.2 Who need to take
responsibility of IT equipment’s?
3. MESSAGE FROM MANAGEMENT
4. IT ASSETS AND ITS CONCERN
4.1 Concern on acquiring and
handling IT stuff
4.2 Who decide conducting IT
trainings?
4.3 What IT support strategy
has been formulated up to now?
4.4 List of equipment’s
purchased through IT department
4.5 Mechanism for Equipment
usage, maintenance and security
5. COMPUTER
SYSTEM STANDARDS
5.1 Objective for IT
accessories standards
5.2 General guidelines for
standards
5.3 Minimum requirements for
IT accessories
5.4 Who can own network
access for PCs and Laptops?
5.5 What data backup
procedure are followed?
5.6 Antivirus software
installation strategy on PCs or Laptops
5.7 What PCs or Laptop
support techniques acquired through IT department?
6.
INTERNET USAGE POLICY
6.1 Things to be remembered
accessing internet
6.2 Internet login guidelines
6.3 Password utility
6.4 Online content usage
guidelines
6.5 Inappropriate use of
internet and its influence
6.6 Inappropriate internet
sites access and its control mechanism
7. INFORMATION SECURITY
POLICY
7.1 Protocols followed for
Information Security
7.2 Access control procedure
7.3 Virus prevention
techniques
8. EMAIL
ACCESS POLICY
8.1 What is emails and its
importance?
8.2 Who is the owner of
organizational email?
8.3 What confidentiality
should be maintained for emails?
8.4 Why do we require email
security?
8.5 Inappropriate use of
emails and its consequences
9.
SOFTWARE USAGE POLICY
9.1 General
guidelines using software
9.2 What entity
need to be pursued for usage of software?
9.3 Software
license importance and its security
10. COMPUTER USE
POLICIES
10.1 Unauthorized
activities and its impact
11. LOGICAL ACCESS
11.1 Approaches
for protecting passwords
11.2 Provision
adapting external devices control policy
12. SUPPORT POLICIES
12.1 What Protocol
are followed regarding IT support?
12.2 What
methodology are introduced for limiting IT support?
13. SOFTWARE
POLICY
14. INTERNET
EQUIPMENTS PROCEDURE
14.1 Protection
and preservation of hardware components
15. VIRUS PROTECTION POLICIES
15.1 Protocols or Effective
ways followed for resolving virus infected system
16. COPYRIGHT
POLICIES
17. CONTACT
INFORMATION
Comments