You are on page 1of 1

IT Security Policy

To ensure data security and backup system. Only authorized person to handle his/her computer. IT
department responsible to maintain all computer troubleshooting and data management system. To
be easy access all computers are under LAN system. To be strong the IT system, the below IT
procedure are established.

1. Authorized user: Only authorized person is allow using the computer and after completion
of daily works, this person is responsible to proper shut down the computer.
2. Password: Individual accounts and password shall be created for users to access the system. IT
department responsible to change the PASSWORD in each three months. All passwords shall be
preserved by IT for further modification or ay forgetting case.
3. Monitoring: Access to computer system shall be monitored and revised periodically i.e., each
month by IT department.
4. Anti-Virus: Firewalls/anti-virus/tempering prevention software shall be used to allow the
system to both log and detect viruses, security violations and tampering. It department auto run the
antivirus software daily at each computer.
5. Hardware Security: Hardware security shall be controlled and monitored (e.g. controlling
work station, security server, password protected screen servers) by IT department.
6. Data Recovery: IT department shall keep weekly/daily back up in secured place to protect its
IT systems, which include a full IT disaster recovery plan to prepare for any unforeseen incidents.
7. Computer Terminal Lock: To ensure the commuter security computer terminal lock after
03 (Three) minutes of inactivity.
8. Security of Information: Every account holder shall be honorable to company internal data
system. Nobody is allowed to share the internal data to other company computer until top
management authorization. If IT anybody can detect such user, management shall take serious
action against the account holder.
9. Personal Work: Nobody is allowed to perform personal activity/ web browsing/ web email
checking during working period by using company property. Company will take serious action if any
one does such activity.
10. Violation of IT Security: If any unauthorized person uses the computer without proper
authorization from IT manager. IT department responsible to regular audit of IT system regarding
unauthorized access or attempt to access and will take necessary action accordingly.
11. Management Meeting: The Company shall regularly hold meeting that shall be attended
by senior management to address information technology issues, including system security.

Computer No. : WS# PR-055


User Name :
Employee ID :
Department :

…………………………………………….
Authorized Signature

You might also like