Professional Documents
Culture Documents
A. PURPOSE
The purpose of making this Standard Operational Procedure is to provide guidelines for access
within the internal network (LAN) as well as access from outside the Internal Network into the
internal network for corporate purposes.
B. SCOPE
The scope or scope of this SOP includes access services within the internal network / Local area
Network as well as access from outside the company / external access to the internal network for
both Employees, Management and from Third Parties in this case the Vendors who cooperate with
PT. CCH Indonesia .
C. REFERENCE
• LAN : LAN (Local Area Network) a computer network that only covers the local area. This means
that this network can only be used by users in the LAN area. LAN connects the device to the
internet network through a simple network device.
• WiFi : (Wireless Fidelity) technology that utilizes electronic equipment to exchange data
wirelessly (using radio waves) over a computer network, including high-speed Internet connections
• Employee: a person who serves as a worker in a company or institution to carry out the
operations of his workplace with remuneration in the form of money.
• Leader: person who is authorized by the company to run the company on behalf of the
entrepreneur.
• Third Party: A party outside the company that cooperates with the company to carry out its
business activities.
• IT Department: Department within a company that handles Network and Telecommunications
for smooth communication of both data and voice.
• Phishing: an attempt to obtain information on someone's data by using phishing techniques. The
data targeted by phishing are personal data (name, age, address), account data (username and
password), and financial data (credit card information, accounts).
Created By Validated
Standar Operational Procedure
NETWORK ACCESS
• VPN: (Virtual Private Network) is a connection service that gives you access to websites securely
(secure) and privately (private) by changing the connection path through the server and hiding the
data exchange that occurs.
• Hacking : The act of finding an entry point (Entrance) that may exist in a computer system or
computer network and until it successfully takes over.
• RJ45: an ethernet cable connector that functions as a connector on a LAN (Local Area Network)
computer network topology and other network topologies
D. GENERAL PROVISIONS
1. PT.CCH Indonesia employees who have been determined (Office, Manager, Staff) and
PT.CCH Indonesia guests can use the network/Internet available in the company.
2. Guest access can only be done through a Wifi connection, which must request
authorization/permission from the party who has the authority or the IT Department to
access it.
3. Employees can use local network access without a password except for access that
requires authorization or authentication through a portal with a single account in certain
applications.
4. Employees who have obtained permission to use computers are required to change the
standard password provided every 90 days and report it to the IT Department.
5. Employees are not allowed to make configuration changes to the computer without the
permission of the IT Department.
6. Employees who have been determined to access certain applications (ECC, ERP, etc.) are
prohibited from changing passwords without the permission of the IT department.
7. Employees are not allowed to bring their own IT devices (Laptop, Flashdisk, External Hard
Drive, etc.) using the local network or the Internet.
8. Employees are not allowed to do Phishing activities, or Hacking activities.
9. Employees are not allowed to access blocked or sensitive material belonging to the
company.
Created By Validated
Standar Operational Procedure
NETWORK ACCESS
E. DESCRIPTION OF PROCEDURE
Internal Network Access Procedure (LAN)
o The Head of Division/Production/Office will inform or submit a request for
computers or access to the Local Network or the internet to the IT
Department.
o The IT Department will carry out checks and checks and validate the
submission data to the Management.
o If the management does not agree/Reject then the application or access
request is cancelled.
o If the request is approved, the Department will carry out a number of
preparations such as, computer equipment, account creation by considering
the user level, user data and user needs based on information from
management.
o Employees who have been appointed receive a set of computers equipped
with standard passwords and must change them every 90 days.
o Naming computers in accordance with the order of computers given to
employees.
o Every computer gets access to local Network and Internet.
o Employees are given access to CCHFS (File Server) according to their position
and department.
O Employees who are given access to company applications such as ECC, ERP,
TPB3 etc. are not allowed to change passwords or share passwords without
the permission of the IT Department or the authorized department.
Created By Validated
Standar Operational Procedure
NETWORK ACCESS
START
Submission of Computer/Network
Access from Head of Section.
NO
submission
validation
YES
Computer Setup
Account Creation
Comp+User
Configuration
FINISH
Created By Validated
Standar Operational Procedure
NETWORK ACCESS
START
Employee/Third Party
Applying for Network
Access
Network Access
Request
Validation
NO
Access Done
Yes
Device Check
Change Password
FINISH
Created By Validated
Standar Operational Procedure
NETWORK ACCESS
7. After the login data is input in the new connection a VPN CCH will appear
8. Click on Network (Location on Taskbar Bottom right of Monitor Screen) to bring up
VPN CCH Virtual Adapter
10. Make sure the network computer has appeared a virtual adapter, namely VPN CCH
11. Check on the server in the VPN > PPTP Server section that the client is connected
12. Finish