Professional Documents
Culture Documents
TABLE OF CONTENTS
Introduction 1
1. Email Use 1
2. Internet Use 3
4. IT Software 6
5. Trouble Shooting 7
6. Taking Backup 7
9. Databases 8
Introduction
The IT Policy puts forth the guidelines for the employees of ORG on using the
organization’s IT facilities, including computer hardware, printers, fax machines, software, e-
mail, and internet. These IT facilities at ORG are provided to employees for the purpose of
performing official work.
ORG discourages personal use of these facilities. These facilities must be used responsibly
by all staff members. Misuse by even a few individuals has the potential to negatively impact
productivity, compromise corporate security and network integrity, interfere with the work or
rights of the other colleagues and ultimately reduce IT resources availability for critical
operations. Therefore, all employees are expected to exercise responsible and ethical
behaviour when using the organization’s Information Technology facilities.
Any action that may expose the organization to risks of unauthorized access to data,
disclosure of information, legal liability, or potential system failure is prohibited and may
result in disciplinary action up to and including termination of employment.
The content of this Manual may be revised anytime due to changing legal requirements,
internal needs or recommendations for increasing efficiency of IT. All changes need to be
discussed with the Management Team and approved by the Chief Executive. Notice of
changes will be distributed to employees from IT Department through an official
memorandum.
The following policies and guidelines will ensure effective Information Technology
Management.
1. Email Use
ORG Email Use policy provides the guidelines by which the electronic mail is to be used.
The purpose of this policy is to increase efficiency, reduce costs, and protect the
organization during litigation, government investigation or audit.
Organizations main email accounts system will be controlled by a designated person (IT or
Admin in-charge) and no other staff member will be allowed access to these accounts.
To ensure safe and secure communication the following measures should be taken in
addition to measures described in section 2.1.
As soon as possible all staff should start using official ORG email for work related
correspondence.
Only secure and reliable software for communication should be used such as:
1
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
• Secure and reliable email server: such as Yahoo, Gmail, Hotmail etc
• Secure and reliable email client: such as Outlook Express
• Reliable browser such as Internet Explorer, FireFox or Chrome
• Signatures: User signature in emails to identify and authenticate emails
• ORG ’s e-mail system is not to be used to create, send or copy any offensive,
harassing or disruptive messages. Messages will be considered offensive if they
contain information or language that would violate the ORG ’s Harassment
Prevention Policies including Sexual Harassment Prevention.
• Both the sender and the recipient have to determine whether a particular email
message is a necessary part of that documentation.
2
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
2. Internet Use
The purpose of ORG internet use policy is to ensure that the use of internet among
employees of ORG is consistent with the ORG policies, all applicable laws, and the
individual user's job responsibilities.
2.1 Security
Employees should keep personal log-on and passwords confidential and change
passwords on a regular basis. Failure to adhere to this policy jeopardizes network
security and puts users at risk of potential misuse of the system by other individuals.
Network users may be held responsible for all actions taken using their personal
network access permissions.
Important: All staff members using IT resources should check with the IT Officer
before installing software or reconfiguring computer. Moreover the following steps
must be taken to ensure security. IT Officer may be asked to provide assistance.
• Install Antivirus software
• Use a firewall
• Use spy-ware protection
• Keep operating system patched & install updates/as advised by IT Officer
• Use strong passwords
• Disable file sharing when outside office
• Backup data
• Keep versions up-to-date
• Prevent unauthorized use and reduce laptop theft
• Scan computer regularly for viruses
• Do not configure network without permission of IT Officer (because it creates
wrong IP conflicts within the network and creates network sharing problems)
3
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
3. I. T. Equipment/Hardware
4
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
All staff members are expected to use these services in a responsible fashion. The following
are considered unacceptable uses of I.T. equipments /Computer Systems/ hardware, and
are not allowed.
5
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
4. IT Software
4.1 Authorized/Licensed Software
The software programmes on the computers used for ORG should comply with local
and international laws of software piracy. All software acquired for or on behalf of the
ORG or developed by its employees is and shall be deemed as ORG property. All
such software must be used in compliance with applicable licenses, notices,
contracts, and agreements.
ORG is commonly using Microsoft products. All the computers are loaded with these
software applications.
6
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
5. Troubleshooting
One of the objectives of the IT department is to provide timely and efficient technological
support to all the project staff. Users contact IT department directly via phone, cell number
or through email. IT Resource person himself visits users to identify and resolve the issues.
These are small issues related to installation, configuration of devices and software tools.
Such types of issues can also be resolved remotely providing telephonic help or remote login
to client’s computers locally and in provincial offices. Since ORG has only one IT resource
person in Head Office and one in regional office, therefore, it is important to cooperate and
develop a mutual understanding, which is helpful for IT and other staff members. Staff may
be required to fill out IT services and feedback forms.
6. Taking Backup
Data is one of ORG 's most important assets. In order to protect this asset from loss or
destruction, it is imperative that it be safely and securely captured, copied, and stored by the
IT department. Backups must be conducted on monthly basis by the IT department with prior
approval from the Admin and stored in office and off-site.
7
Reviewed by Director Operations Approved by Founding Chief Executive
Information Technology Manual August 2013
• Personal data will be removed from the computer and returned to the employee.
Employee will need to arrange his/her own CDs/flash drive/hard drive/ for receiving the
data.
• All ORG employees are advised to run the antivirus scan of computers at least once a
week in order to remove the virus from computers.
• It is better to use USB disk security software and scan USB before use.
• Employee should turn off LCDs, printers before leaving office in order to avoid damage
from electricity fluctuation which can cause circuit burn to equipment.
• Laptops are most sensitive IT Equipment. Employee should avoid the Laptops from jerks
and shocks. Liquid such as water, juices, tea should be strictly avoided during laptop
use.
9. Databases
IT department will assist Administration in implementation of Cell Phone Use Policy. Cell
phone limits are available with Admin. Cellular telephones and personal digital assistants
(PDAs) - such as blackberry, smart phone and other devices - enable fast communications,
remote wireless network connectivity and more productive mobile employees. However,
such devices add significant operating expenses and create additional security concerns for
the organization. This policy intends to control costs, secure organization data and protect
mobile devices, and the data.
8
Reviewed by Director Operations Approved by Founding Chief Executive