IT Policy
IT Policy
1 IT Policy
1.1 Purchase
3) IT Dept. will assist the Procurement Dept. while evaluating best and most cost-
effective hardware or software to be purchased for a particular dept./project/purpose
based on the requirement. The IT Dept. will also make sure all hardware/software
standards defined in the IT Policy are enforced during such purchases.
1.2 Compliance
1) All employees are expected to comply with the IT Policy rules and guidelines while
purchasing, using and maintaining any equipment or software purchased or provided by
the organization.
2) Any employee who notices misuse or improper use of equipment or software within
the organization must inform his/her Reporting Manager(s) immediately.
1) Basic IT training and guidance is provided to all new employees about using and
maintaining their Personal Computer (PC), peripheral devices and equipment in the
organization, accessing the organization network and using application software.
2) Employees can request and/or the Management Committee can decide to conduct
an IT training on a regular or requirement basis.
1.4 IT Support
3) Any IT Support work informed or assigned via emails sent on employee email IDs,
chats or any other media except the Ticket System or the IT Support Email ID would be
not entertained.
4) For the sake of quick understanding, employees are expected to provide details of
their issue or help required in the Ticket raised or Support Email sent.
6) For any damage to Personal Computers, approval from Reporting Manager would be
required for PC replacements.
7) After raising a ticket in the Ticket System, employees should expect a reply from the
IT Dept. within 1 working day. The IT Dept. may ask the employee to deposit the
problematic equipment to the IT Dept. for checking and will inform the timeline for
repair/maintenance/troubleshooting/installations or the required work.
8) If there is no response in 1 working day, then the IT Dept. Designated Staff should be
asked for an explanation for the delay. If no response is obtained in 3 working days, a
complaint can be raised through an email to the employee’s Reporting Manager and IT
Dept. Designated Staff.
2.1 Objective
The Equipment Usage policy informs employees and managers about equipment
purchase, organizational and project-level inventory management, rules for allocating &
transferring equipment to employees, departments or projects and best practices for all
equipment usage and maintenance.
3) The Procurement Dept. will maintain a small inventory of standard PCs, software and
equipment required frequently to minimize delay in fulfilling critical orders.
a. Item
c. Serial Number
e. Physical Location
f. Date of Purchase
g. Purchase Cost
5) All technological assets of the organization must be physically tagged with codes for
easy identification.
6) Periodic inventory audits will be carried out by the IT Dept. to validate the inventory
and make sure all assets are up-to-date and in proper working condition as required for
maximum efficiency and productivity.
1) Allocation of Assets:
a. New Employees may be allocated a personal computer (desktop or laptop) for office
work on the Day of Joining, as per work requirement.
1) It is the responsibility of all employees to ensure careful, safe and judicious use of the
equipment & other assets allocated to and/or being used by them.
2) Proper guidelines or safety information must be obtained from designated staff in the
IT Dept. before operating any equipment for the first time.
3) Any observed malfunction, error, fault or problem while operating any equipment
owned by the organization or assigned to you must be immediately informed to the
designated staff in IT Dept.
2) The landline phones should be strictly used to conduct official work only. As far as
possible, no personal calls should be made using landline phones owned by the
organization.
3) Long distance calls should be made after careful consideration since they incur
significant costs to the organization.
4) The Admin. Dept. is responsible for maintaining telephone connections in offices. For
any problems related to telephones, they should be contacted.
3.1 Objective
The main aim of this policy is to maintain standard configurations of PC hardware and
software purchased by the organization and provided to employees for official work. The
hardware standards will help maintain optimum work productivity, computer health &
security and provide timely and effective support in troubleshooting PC problems. The
software standards will ensure better system administration, effective tracking of
software licenses and efficient technical support.
3) Only in exceptional cases, when none of the standard configurations satisfy the work
requirements, can an employee request a non-standard PC configuration. Valid reasons
need to be provided for the request and written approval of the Reporting Manager(s) is
required for the same.
1) All PCs being used in the organization are enabled to connect to the organization’s
Local Area Network as well as the Internet.
2) Network security is enabled in all PCs through Firewall, Web Security and Email
Security software.
a. Organization will be installing a file server for backing up data of all employees. All
employees are expected to keep official data on the file system.
c. All employees will login to the file server through ADDC1 user ID and password.
3) Server backup:
b. Replica mode of all running servers will be offline and it should maintain half-hourly
backup.
2) Two configurations – Basic and Advanced are maintained for Antivirus software
installed on organization’s computers. The configurations are installed on PCs as per
work requirement of particular Dept. /Project.
3) Employees are expected to make sure their Antivirus is updated regularly. The IT
Dept. should be informed if the Antivirus expires.
4) Any external storage device like pen drive or hard disk connected to the PC needs to
be completely scanned by the Antivirus software before opening it and copying files
to/from the device.
3.6 PC Support
1) Guidance and tips given by the IT Dept. designated staff for maintaining the PC
should be remembered while using a PC.
2) The IT Dept. should be contacted via the IT Support Ticket System or IT Support
Email for any assistance with your PC hardware or software.
3) Technical support will not be provided for hardware devices or software which are
personally purchased, illegal or not included in the standard hardware/software list
developed by the IT Dept.
4.1 Objective
The Internet Usage Policy provides guidelines for acceptable use of the organization’s
Internet network so as to devote Internet usage to enhance work productivity and
efficiency and ensure safety and security of the Internet network, organizational data
and the employees.
1) Internet is a paid resource and therefore shall be used only for office work.
2) The organization reserves the right to monitor, examine, block or delete any/all
incoming or outgoing internet connections on the organization’s network.
3) The organization has systems in place to monitor and record all Internet usage on the
organization’s network including each website visit, and each email sent or received.
The Management Committee can choose to analyze Internet usage and publicize the
data at any time to assure Internet usage is as per the IT Policy.
4) The organization has installed an Internet Firewall to assure safety and security of
the organizational network. Any employee who attempts to disable, defeat or circumvent
the Firewall will be subject to strict disciplinary action.
1) All employees may be provided with a Username and Password to login to the
Internet network in the office and to monitor their individual usage.
2) An employee can also get a local static IP address for internet and intranet use. All
employees will be responsible for the internet usage through this local static IP.
3) Username and password for a new employee must be requested by the HR Dept.
4) Sharing the Username and Password with another employee, visitor or guest user is
prohibited.
5) A visitor or guest user who wants to use the office Internet will be given a Guest
Username and Password.
6) The IT Dept. will define guidelines for issuing new passwords or allowing employees
to modify their own passwords.
a. Choose a password which does not contain easily identifiable words (e.g. your
username, name, phone number, house location etc.).
c. Use at least one numeric and one special character apart from letters.
b. Make sure no one is observing you while you enter your password.
c. As far as possible, do not write down your password. If you want to write it down, do
no display it in a publicly visible area.
e. Do not reuse old passwords. If that is difficult, do not repeat the last 5 passwords.
b. Lock your monitor screen, log out or turn off your computer when not at desk.
1) Employees are solely responsible for the content accessed and downloaded using
Internet facility in the office. If they accidentally connect to a website containing material
prohibited by the organization, they should disconnect from that site immediately.
2) During office hours, employees are expected to spend limited time to access news,
social media and other websites online, unless explicitly required for office work.
3) Employees are not allowed to use Internet for non-official purposes using the Internet
facility in office.
4) Employees should schedule bandwidth-intensive tasks like large file transfers, video
downloads, mass e-mailing etc. for off-peak times.
4.6 Inappropriate Use
The following activities are prohibited on organization’s Internet network. This list can be
modified/updated anytime by the Management Committee as deemed fit. Any
disciplinary action considered appropriate by the Management Committee (including
legal action or termination) can be taken against an employee involved in the activities
mentioned below:
4) Accessing pirated software, tools or data using the official network or systems
8) Using the Internet for personal financial gain or for conducting personal business
9) Deliberately engaging in an online activity which hampers the safety & security of the
data, equipment and people involved.
10) Carrying out any objectionable, frivolous or illegal activity on the Internet that shall
damage the organization’s reputation
1. Various methods like access control, authentication, monitoring and review will be
used to ensure data security in the organization.
2. Security reviews of servers, firewalls, routers and monitoring systems must be
conducted on a regular basis. These reviews should include monitoring of access logs
and intrusion detection software logs.
3. Appropriate training must be provided to data owners, data users, and network &
system administrators to ensure data security.
a. High Risk: i. It includes information assets which have legal requirements for
disclosure and financial penalties imposed for disclosure. ii. E.g. Payroll, personnel,
financial, biometric data
b. Medium Risk: i. It includes confidential data which would not impose losses on the
organization if disclosed, but is also not publicly available. ii. E.g. Agreement
documents, unpublished reports, etc.
c. Low Risk: i. It includes information that can be freely disseminated. ii. E.g. brochures,
published reports, other printed material etc.
2. Different protection strategies must be developed by the IT department for the above
three data categories. Information about the same must be disseminated appropriately
to all relevant departments and staff.
3. High risk data must be encrypted when transmitted over insecure channels.
4. All data must be backed up on a regular basis as per the rules defined by the IT Dept.
at that time.
1. Access to the network, servers and systems in the organization will be achieved by
individual logins and will require authentication. Authentication includes the use of
passwords, biometrics or other recognized forms of authentication.
2. All users of systems which contain high or medium risk data must have a strong
password as defined in the IT Policy.
4. Where possible and financially feasible, more than one person must have full rights to
any organization-owned server storing or transmitting high risk and medium risk data.
2. Apart from that, all servers and workstations that connect to the network must be
protected with licensed anti-virus software recommended by the vendor. The software
must be kept up-to-date.
2. Operating system and application software logging process must be enabled on all
systems.
6.1 Objective
This policy provides information about acceptable usage, ownership, confidentiality and
security while using electronic messaging systems and chat platforms provided or
approved by the organization. The policy applies to all electronic messages sent or
received via the above mentioned messaging systems and chat platforms by all official
employees of the organization.
2) An employee who, upon joining the organization, is provided with an official email
address should use it for official purposes only.
6) Electronic mails and messages should be sent after careful consideration since they
are inadequate in conveying the mood and context of the situation or sender and might
be interpreted wrongly.
7) All email signatures must have appropriate designations of employees and must be
in the format approved by the Management Committee.
6.3 Ownership
1) The official electronic messaging system used by the organization is the property of
the organization and not the employee. All emails, chats and electronic messages
stored, composed, sent and received by any employee or non-employee in the official
electronic messaging systems are the property of the organization.
2) The organization reserves the right to intercept, monitor, read and disclose any
messages stored, composed, sent or received using the official electronic messaging
systems.
3) The organization reserves the right to alter, modify, re-route or block messages as
deemed appropriate.
4) IT Administrator can change the email system password and monitor email usage of
any employee for security purposes.
2) Caution and proper judgment should be used to decide whether to deliver a message
in person, on phone or via email/electronic messaging systems.
1) Anti-Virus:
a. Anti-virus software pre-approved by the Dept. Head - IT should be installed in the
laptop/desktop provided to a new employee after joining the organization.
b. All employees in the organization are expected to make sure they have anti-virus
software installed in their laptops/desktops (personal or official) used for office work.
c. Organization will bear responsibility for providing, installing, updating and maintaining
records for one anti-virus per employee at a time for the official laptop provided by the
organization. The employee is responsible for installing good quality anti-virus software
in their personal laptop/desktop used for office work.
e. Employees should make sure their anti-virus is regularly updated and not out of date.
2) Safe Email Usage: Following precautions must be taken to maintain email security:
b. In case of doubts about emails/ attachments from known senders, confirm from them
about the legitimacy of the email/attachment.
1) Official Email platforms or electronic messaging systems including but not limited to
chat platforms and instant messaging systems should not be used to send messages
containing pornographic, defamatory, derogatory, sexual, racist, harassing or offensive
material.
2) Official Email platforms or electronic messaging systems should not be used for
personal work, personal gain or the promotion or publication of one’s religious, social or
political views.
3) Spam/ bulk/junk messages should not be forwarded or sent to anyone from the
official email ID unless for an officially approved purpose. 6.4 Confidentiality
7.1 Objective
The Software Usage Policy is defined to provide guidelines for appropriate installation,
usage and maintenance of software products installed in organization-owned
computers.
1) Third-party software (free as well as purchased) required for day-to-day work will be
preinstalled onto all company systems before handing them over to employees. A
designated person in the IT Dept. can be contacted to add to/delete from the list of pre-
installed software on organizational computers.
7.3 Compliance
5) Any employee who notices misuse or improper use of software within the
organization must inform his/her Reporting Manager(s).
3) After installation, all original installation media (CDs, DVDs, etc.) must be safely
stored in a designated location by the IT Dept.
1) The IT Dept. will conduct periodic audit of software installed in all company-owned
systems to make sure all compliances are being met.
2) Prior notice may or may not be provided by the IT Dept. before conducting the
Software Audit.
3) During this audit, the IT Dept. will also make sure the anti-virus is updated, the
system is scanned and cleaned and the computer is free of garbage data, viruses,
worms or other harmful programmatic codes.
Introduction
The Bhilosa IT Policy and Procedure Manual provides the policies and procedures for
selection and use of IT within the institution which must be followed by all staff. It also
provides guidelines Bhilosa will use to administer these policies, with the correct
procedure to follow.
Bhilosa will keep all IT policies current and relevant. Therefore, from time to time it will
be necessary to modify and amend some sections of the policies and procedures, or to
add new procedures.
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Computer hardware refers to the physical parts of a computer and related devices.
Internal hardware devices include motherboards, hard drives, and RAM. External
hardware devices include monitors, keyboards, mice, printers, and scanners.
This policy provides guidelines for the purchase of hardware for the institution to ensure
that all hardware technology for the institution is appropriate, value for money and
where applicable integrates with other technology for the institution. The objective of this
policy is to ensure that there is minimum diversity of hardware within the institution.
Procedures
Purchase of Hardware
The desktop computer systems purchased must run a {insert relevant operating system
here e.g. Windows} and integrate with existing hardware {insert names of existing
technology such as the institution server}.
The desktop computer systems must be purchased as standard desktop system bundle
and must be {insert manufacturer type here, such as HP, Dell, Acer etc.}.
Desktop tower
Keyboard and mouse You may like to consider stating if these are to be wireless
{insert name of operating system, e.g. Windows 7, and software e.g. Office 2013
here}
{insert other items here, such as speakers, microphone, webcam, printers etc.}
{insert other specifications for desktop here, such as DVD drive, microphone port,
etc.}
Any change from the above requirements must be authorized by {insert relevant job title
here}
All purchases for desktops must be in line with the purchasing policy in the Financial
policies and procedures manual.
The purchase of portable computer systems includes {insert names of portable devices
here, such as notebooks, laptops, tablets etc.}
Portable computer systems purchased must run a {insert relevant operating system
here e.g. Windows} and integrate with existing hardware { insert names of existing
technology such as the institution server}.
The portable computer systems purchased must be {insert manufacturer type here,
such as HP, Dell, Acer, etc.}.
{insert other specifications for portable device here, such as DVD drive, microphone
The portable computer system must include the following software provided:
{insert names of software e.g. Office 2013, Adobe, Reader, Internet Explorer here}
{insert names of software e.g. Office 2013, Adobe, Reader, Internet Explorer here}
{insert names of software e.g. Office 2013, Adobe, Reader, Internet Explorer here}
Any change from the above requirements must be authorized by {insert relevant job
title here}
All purchases of all portable computer systems must be supported by {insert guarantee
and/or warranty requirements here} and be compatible with the institution’s server
system.
All purchases for portable computer systems must be in line with the purchasing policy
in the Financial policies and procedures manual.
Server systems can only be purchased by {insert relevant job title here, recommended
IT specialist}.
Server systems purchased must be compatible with all other computer hardware in the
institution.
Any change from the above requirements must be authorized by {insert relevant job title
here}
All purchases for server systems must be in line with the purchasing policy in the
Financial policies and procedures manual.
Computer system peripherals include {insert names of add-on devices such as printers,
scanners, external hard drives etc. here}
Computer peripherals can only be purchased where they are not included in any
hardware purchase or are considered to be an additional requirement to existing
peripherals.
Computer peripherals purchased must be compatible with all other computer hardware
and software in the institution.
The purchase of computer peripherals can only be authorized by {insert relevant job title
here, recommended IT specialist or department manager}.
Any change from the above requirements must be authorized by {insert relevant job title
here}
All purchases for computer peripherals must be in line with the purchasing policy in the
Financial policies and procedures manual.
A mobile phone will only be purchased once the eligibility criteria is met.
The purchase of a mobile phone must be from {insert names authorized suppliers here.}
to ensure the institution takes advantage of volume pricing based discounts provided by
{insert names authorized suppliers here.}. Such discounts should include the purchase
of the phone, the phone call and internet charges etc.
The mobile phone must be compatible with the institution’s current hardware and
software systems.
The mobile phone purchased must be {insert manufacturer type here, such as IPhone,
Blackberry, Samsung, etc.}.
The request for accessories (a hands-free kit etc.) must be included as part of the initial
request for a phone.
The purchase of a mobile phone must be approved by {insert relevant job title here}
prior to purchase.
Any change from the above requirements must be authorized by {insert relevant job title
here}
All purchases of all mobile phones must be supported by {insert guarantee and/or
warranty requirements here}.
All purchases for mobile phones must be in line with the purchasing policy in the
Financial policies and procedures manual.
Purchasing Policy
This policy provides guidelines for the purchase of software for the institution to ensure
that all software used by the institution is appropriate, value for money and where
applicable integrates with other technology for the institution. This policy applies to
software obtained as part of hardware bundle or pre-loaded software.
Procedures
All software, including {insert relevant other types of non-commercial software such as
open source, freeware, etc. here} must be approved by {insert relevant job title here}
prior to the use or download of such software.
Purchase of software
All purchased software must be purchased by {insert relevant job title here}
All purchased software must be purchased from {insert relevant suppliers names or the
words ‘reputable software sellers’ here}
Any changes from the above requirements must be authorized by {insert relevant job
title here}
All purchases for software must be in line with the purchasing policy in the Financial
policies and procedures manual.
Open source or freeware software can be obtained without payment and usually
downloaded directly from the internet.
In the event that open source or freeware software is required, approval from {insert
relevant job title here} must be obtained prior to the download or use of such software.
All open source or freeware must be compatible with the institution’s hardware and
software systems.
Any change from the above requirements must be authorised by {insert relevant job title
here}
Purchasing Policy
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Purpose of the Policy This policy provides guidelines for the use of software for all
employees within the institution to ensure that all software use is appropriate. Under this
policy, the use of all open source and freeware software will be conducted under the
same procedures outlined for commercial software.
Procedures
Software Licensing
All computer software copyrights and terms of all software licences will be followed by
all employees of the institution.
Where licensing states limited usage (i.e. number of computers or users etc.), then it is
the responsibility of {insert relevant job title here} to ensure these terms are followed.
{insert relevant job title here} is responsible for completing a software audit of all
hardware twice a year to ensure that software copyrights and licence agreements are
adhered to.
Software Installation
All software must be appropriately registered with the supplier where this is a
requirement.
Bhilosa is to be the registered owner of all software.
Only software obtained in accordance with the getting software policy is to be installed
on the institution’s computers.
All software installation is to be carried out by {insert relevant job title here}
A software upgrade shall not be installed on a computer that does not already have a
copy of the original version of the software loaded on it.
Software Usage
Only software purchased in accordance with the getting software policy is to be used
within the institution.
Prior to the use of any software, the employee must receive instructions on any
licensing agreements relating to the software, including any restrictions on use of the
software.
All employees must receive training for all new software. This includes new employees
to be trained to use existing software appropriately. This will be the responsibility of
{insert relevant job title here}
Employees are prohibited from bringing software from home and loading it onto the
institution’s computer hardware.
Unless express approval from {insert relevant job title here} is obtained, software cannot
be taken home and loaded on a employees’ home computer
Unauthorized software is prohibited from being used in the institution. This includes the
use of software owned by an employee and used within the institution.
Breach of Policy
Where there is a breach of this policy by an employee, that employee will be referred to
{insert relevant job title here} for {insert consequence here, such as further consultation,
reprimand action etc.}
Where an employee is aware of a breach of the use of software in accordance with this
policy, they are obliged to notify {insert relevant job title here} immediately. In the event
that the breach is not reported and it is determined that an employee failed to report the
breach, then that employee will be referred to {insert relevant job title here} for {insert
consequence here, such as further consultation, reprimand action etc.}
This policy provides guidelines for the use of personally owned notebooks, smart
phones, tablets and {insert other types of mobile devices} for institution purposes. All
staff who use or access {Municipality Name}'s technology equipment and/or services
are bound by the conditions of this Policy.
Procedures
Current mobile devices approved for institution use
The following personally owned mobile devices are approved to be used for institution
purposes:
{insert type of approved mobile devices such as notebooks, smart phones, tablets,
iPhone,removable media etc.}
{insert type of approved mobile devices such as notebooks, smart phones, tablets,
iPhone, removable media etc.}
{insert type of approved mobile devices such as smart phones, tablets, iPhone etc.}
{insert type of approved mobile devices such as notebooks, smart phones, tablets,
iPhone, removable media etc.}.
Guidance: You will need to consider if the institution is to have any control over the
applications that are used for institution purposes and/or used on the personal devices.
Employees when using personal devices for institution use will register the device with
{insert relevant job title or department here}.
{insert relevant job title or department here} will record the device and all applications
used by the device.
Personal mobile devices can only be used for the following institution purposes:
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}
To maintain the device with {insert maintenance requirements of mobile devices such
as current operating software, current security software etc.}
Not to share the device with other individuals to protect the institution data access
through the device
To abide by {Municipality Name}'s internet policy for appropriate use and access of
internet sites etc.
To notify {Municipality Name} immediately in the event of loss or theft of the registered
device
All employees who have a registered personal mobile device for institution use
acknowledge that the institution:
Can access all data held on the device, including personal data
Will delete all data held on the device in the event of loss or theft of the device
Has first right to buy the device where the employee wants to sell the device
Will delete all data held on the device upon termination of the employee. The
terminated employee can request personal data be reinstated from back up data
Has the right to deregister the device for institution use at any time.
The following must be observed when handling mobile computing devices (such as
notebooks and iPads):
Mobile computer devices must never be left unattended in a public place, or in an
unlocked house, or in a motor vehicle, even if it is locked. Wherever possible they
should be kept on the person or securely locked away
Cable locking devices should also be considered for use with laptop computers in
public places, e.g. in a seminar or conference, even when the laptop is attended
Exemptions
This policy is mandatory unless {insert relevant job title or department here} grants an
exemption. Any requests for exemptions from any of these directives, should be
referred to the {insert relevant job title or department here}.
Any breach of this policy will be referred to {insert relevant job title} who will review the
breach and determine adequate consequences, which can include { insert
consequences here such as confiscation of the device and or termination of
employment.}
Indemnity
{Municipality Name} bears no responsibility whatsoever for any legal action threatened
or started due to conduct and activities of staff in accessing or using these resources or
facilities. All staff indemnify {Municipality Name} against any and all damages, costs and
expenses suffered by {Municipality Name} arising out of any unlawful or improper
conduct and activity, and in respect of any action, settlement or compromise, or any
statutory infringement. Legal prosecution following a breach of these conditions may
result independently from any action by {Municipality Name}.
Purchasing Policy
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Purpose of the Policy This policy provides guidelines for the protection and use of
information technology assets and resources within the institution to ensure integrity,
confidentiality and availability of data and assets.
Procedures
Physical Security
For all servers, mainframes and other network assets, the area must be secured with
adequate ventilation and appropriate access through {insert relevant security measure
here, such as keypad, lock etc.}
It will be the responsibility of {insert relevant job title here} to ensure that this
requirement is followed at all times. Any employee becoming aware of a breach to this
security requirement is obliged to notify {insert relevant job title here} immediately.
All security and safety of all portable technology, {insert relevant types here, such as
laptop, notepads, iPad etc.} will be the responsibility of the employee who has been
issued with the {insert relevant types here, such as laptop, notepads, iPads, mobile
phones etc.}. Each employee is required to use {insert relevant types here, such as
locks, passwords, etc.} and to ensure the asset is kept safely at all times to protect the
security of the asset issued to them.
In the event of loss or damage, {insert relevant job title here} will assess the security
measures undertaken to determine if the employee will be required to reimburse the
institution for the loss or damage.
All {insert relevant types here, such as laptop, notepads, iPads etc.} when kept at the
office desk is to be secured by {insert relevant security measure here, such as keypad,
lock etc.} provided by {insert relevant job title here}
Information Security
All {insert relevant data to be backed up here – either general such as sensitive,
valuable, or critical institution data or provide a checklist of all data to be backed up } is
to be backed-up.
It is the responsibility of {insert relevant job title here} to ensure that data back-ups are
conducted {insert frequency of back-ups here} and the backed up data is kept {insert
where back up data is to be kept e.g. cloud, offsite venue, employees home etc. here}
All technology that has internet access must have anti-virus software installed. It is the
responsibility of {insert relevant job title here} to install all anti-virus software and ensure
that this software remains up to date on all technology used by the institution.
All information used within the institution is to adhere to the privacy laws and the
institution’s confidentiality requirements. Any employee breaching this will be {insert
relevant consequence here}
Technology Access
Every employee will be issued with a unique identification code to access the institution
technology and will be required to set a password for access every {insert frequency
here}
Each password is to be {insert rules relating to password creation here, such as number
of alpha and numeric etc.} and is not to be shared with any employee within the
institution.
{insert relevant job title here} is responsible for the issuing of the identification code and
initial password for all employees.
Where an employee forgets the password or is ‘locked out’ after {insert a number here
e.g. three attempts}, then {insert relevant job title here} is authorized to reissue a new
initial password that will be required to be changed when the employee logs in using the
new initial password.
{insert name or type of technology here} {insert authorized persons or job titles here}
{insert name or type of technology here} {insert authorized persons or job titles here}
{insert name or type of technology here} {insert authorized persons or job titles here}
{insert name or type of technology here} {insert authorized persons or job titles here}
Employees are only authorized to use institution computers for personal use {insert
when this is allowable and what they can personally use it for here, such as internet
usage etc.}
It is the responsibility of {insert relevant job title here} to keep all procedures for this
policy up to date.
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
This policy provides guidelines for the administration of information technology assets
and resources within the institution.
Procedures
All software installed and the licence information must be registered on the {insert
where these records are to be kept}. It is the responsibility of {insert relevant job title
here} to ensure that this registered is maintained. The register must record the following
information:
{insert relevant job title here} is responsible for the maintenance and management of all
service agreements for the institution technology. Any service requirements must first
be approved by {insert relevant job title here}.
{insert relevant job title here} is responsible for maintaining adequate technology spare
parts and other requirements including {insert specific technology requirements here,
such as toners, printing paper etc.}
Purchasing Policy
Website Policy
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Purpose of the Policy This policy provides guidelines for the maintenance of all
relevant technology issues related to the institution website.
Procedures
Website Register
{insert any other records to be kept in relation to your institution website here}.
The keeping the register up to date will be the responsibility of {insert relevant job title
here}.
{insert relevant job title here} will be responsible for any renewal of items listed in the
register.
Website Content
All content on the institution website is to be accurate, appropriate and current. This will
be the responsibility of {insert relevant job title here}
All content on the website must follow {insert relevant institution requirements here
where applicable, such as a institution or content plan etc.}
The following persons are authorized to make changes to the institution website:
All data collected from the website is to adhere to the Privacy Act
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
This policy provides guidelines for all electronic transactions undertaken on behalf of the
institution.
The objective of this policy is to ensure that use of electronic funds transfers and
receipts are started, carried out, and approved in a secure manner.
Procedures
All EFT payments and receipts must adhere to all finance policies in the Financial
policies and procedures manual.
All EFT arrangements, including receipts and payments must be submitted to {insert
relevant department of the institution here, e.g. finance department}.
EFT payments must have the appropriate authorization for payment in line with the
financial transactions policy in the Financial policies and procedures manual.
EFT payments must be appropriately recorded in line with finance policy in the Financial
policies and procedures manual.
EFT payments once authorized, will be entered into the {insert title of payment system
here e.g. NAB online system} by {insert relevant job title here}
EFT payments can only be released for payment once pending payments have been
authorized by {insert relevant job title here}
For good control over EFT payments, ensure that the persons authorizing the payments
and making the payment are not the same person.
All EFT receipts must be reconciled to customer records {insert frequency here e.g.
once a week etc.}
It is the responsibility of {insert relevant job title here} to annually review EFT
authorizations for initial entry, alterations, or deletion of EFT records, including supplier
payment records and customer receipt records.
Electronic Purchases
All electronic purchases by any authorized employee must adhere to the purchasing
policy in the Financial policies and procedures manual.
Finance Policies
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Purpose of the Policy This policy provides guidelines for all IT service agreements
entered into on behalf of the institution.
Procedures
The following IT service agreements can be entered into on behalf of the institution:
Guidance: Insert the acceptable IT services for your institution – the following dot points
will assist.
All IT service agreements, obligations and renewals must be recorded {insert where the
agreements are to be recorded here}
Where an IT service agreement renewal is required, in the event that the agreement is
substantially unchanged from the previous agreement, then this agreement renewal can
be authorised by {insert relevant job title here}. Where an IT service agreement renewal
is required, in the event that the agreement has substantially changed from the previous
agreement, {insert who should review, recommended lawyer or solicitor} before the
renewal is entered into. Once the agreement has been reviewed and recommendation
for execution received, then the agreement must be approved by {insert relevant job title
here}
Guidance: This policy should be read and carried out by all staff. Edit this policy so it
suits your needs.
Purpose of the Policy This policy provides guidelines for emergency management of
all information technology within the institution.
Procedures
IT Hardware Failure
Where there is failure of any of the institution’s hardware, this must be referred to {insert
relevant job title here} immediately.
It is the responsibility of {insert relevant job title here} to {insert relevant actions that
should be undertaken here} in the event of IT hardware failure.
It is the responsibility of {insert relevant job title here} to undertake tests on planned
emergency procedures {insert frequency here, recommended quarterly} to ensure that
all planned emergency procedures are appropriate and minimise disruption to institution
operations.
In the event that point of sale (POS) system is disrupted, the following actions must be
immediately undertaken:
Guidance: Insert the actions required for your institution – the following dot points will
assist.
All POS transactions to be taken using the manual machine located below the counter
{insert relevant job title here} is responsible for ensuring that any security breach is dealt
with within {insert relevant timeframe here} to minimise disruption to institution
operations.
Website Disruption
In the event that institution website is disrupted, the following actions must be
immediately undertaken:
Guidance: Insert the actions required for your institution – the following dot points will
assist.