IT Policy & Procedures

IT Policy & Procedures

These guidelines chart the course for secure and responsible use of technology within our organization. By understanding and adhering to these policies and procedures, we become responsible crew members, collaborating to foster a secure and thriving digital ecosystem. 

Last Update 01/17/2024
Completion Time 27 minutes
Members 6
Compulsory
  • 1.0 INTRODUCTION
    • 1.0 INTRODUCTION
  • 2.0 OWNERSHIP
    • 2.1 INFORMATION TECHNOLOGY EQUIPMENT
    • 2.2 DATA OWNERSHIP
  • 3.0 EMAILS
    • 3.0 EMAILS
    • 3.1 OUTGOING EMAILS
    • 3.2 EMAIL BACKUP
    • 3.3 USAGE RESTRICTIONS
  • 4.0 INTERNET
    • 4.0 INTERNET
    • 4.1 PERSONAL USE
    • 4.2 ADDITIONAL STANDARDS
  • 5.0 INTRANET
    • 5.1 AUTHORISED ACCESS
    • 5.2 VENDORS
  • 6.0 AUTHORISED ACCESS
    • 6.1 WORKSTATION
    • 6.2 WIRELESS NETWORKING
    • 6.3 SOFTWARE
  • 7.0 TROUBLESHOOTING
    • 7.1 HARDWARE PROBLEMS
    • 7.2 SOFTWARE PROBLEMS
    • 7.3 TECHNICAL SUPPORT
  • 8.0 TELEPHONE & FAX
    • 8.0 TELEPHONE & FAX
    • 8.1 PROHIBITED USAGE
  • 9.0 INSTANT MESSAGING
    • 9.0 INSTANT MESSAGING
  • 10.0 EXTERNAL USAGE
    • 10.0 EXTERNAL USAGE
  • 11.0 CONFIDENTIALITY
    • 11.0 CONFIDENTIALITY
  • 12.0 INFORMATION TECHNOLOGY EQUIPMENT ACQUISITION
    • 12.0 INFORMATION TECHNOLOGY EQUIPMENT ACQUISITION
    • 12.1 EQUIPMENT DISPOSAL
  • 13.0 VIOLATION OF POLICY
    • 13.0 VIOLATION OF POLICY
  • 14.0 DATA BACK UP PROCESS
    • 14.0 DATA BACK UP PROCESS
  • ACKNOWLEDGMENT
    • Acknowledgment of IT Policy & Procedures