IT Policy & Procedures
These guidelines chart the course for secure and responsible use of technology within our organization. By understanding and adhering to these policies and procedures, we become responsible crew members, collaborating to foster a secure and thriving digital ecosystem.
Last Update | 01/17/2024 |
---|---|
Completion Time | 27 minutes |
Members | 6 |
Share This Course
Share Link
Share on Social Media
Share by Email
Please login to share this IT Policy & Procedures by email.
Compulsory
-
1.0 INTRODUCTION
-
1.0 INTRODUCTION
-
-
2.0 OWNERSHIP
-
2.1 INFORMATION TECHNOLOGY EQUIPMENT
-
2.2 DATA OWNERSHIP
-
-
3.0 EMAILS
-
3.0 EMAILS
-
3.1 OUTGOING EMAILS
-
3.2 EMAIL BACKUP
-
3.3 USAGE RESTRICTIONS
-
-
4.0 INTERNET
-
4.0 INTERNET
-
4.1 PERSONAL USE
-
4.2 ADDITIONAL STANDARDS
-
-
5.0 INTRANET
-
5.1 AUTHORISED ACCESS
-
5.2 VENDORS
-
-
6.0 AUTHORISED ACCESS
-
6.1 WORKSTATION
-
6.2 WIRELESS NETWORKING
-
6.3 SOFTWARE
-
-
7.0 TROUBLESHOOTING
-
7.1 HARDWARE PROBLEMS
-
7.2 SOFTWARE PROBLEMS
-
7.3 TECHNICAL SUPPORT
-
-
8.0 TELEPHONE & FAX
-
8.0 TELEPHONE & FAX
-
8.1 PROHIBITED USAGE
-
-
9.0 INSTANT MESSAGING
-
9.0 INSTANT MESSAGING
-
-
10.0 EXTERNAL USAGE
-
10.0 EXTERNAL USAGE
-
-
11.0 CONFIDENTIALITY
-
11.0 CONFIDENTIALITY
-
-
12.0 INFORMATION TECHNOLOGY EQUIPMENT ACQUISITION
-
12.0 INFORMATION TECHNOLOGY EQUIPMENT ACQUISITION
-
12.1 EQUIPMENT DISPOSAL
-
-
13.0 VIOLATION OF POLICY
-
13.0 VIOLATION OF POLICY
-
-
14.0 DATA BACK UP PROCESS
-
14.0 DATA BACK UP PROCESS
-
-
ACKNOWLEDGMENT
-
Acknowledgment of IT Policy & Procedures
-