Preview

Ict Policy and Server Room Proposal for a Small Firm

Powerful Essays
Open Document
Open Document
51183 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ict Policy and Server Room Proposal for a Small Firm
INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT

INTRODUCTION

Information and Communications Technology Policy addresses security issues and how to effectively apply and maintain information systems, thereby facilitating protection of critical, valuable and confidential information together with its associated systems. Most people are likely to recognise the impact and severity of the loss or theft of confidential designs for a new product. However they do not always recognise the potential risk, and consequential result, of seemingly 'innocent' activities, such as copying software or copying the corporate database onto their laptop computer or not documenting changes made to their systems. The purchase and installation of hardware and software requires those involved to consider carefully the Information Security issues involved in this process. Careful consideration of the company's business needs is paramount, as it is usually expensive to make subsequent changes. Analysis of user requirements versus the various benchmarks test results will establish the best choice of server/software to be purchased. Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the IT & T Policy issues are adequately covered. The issue of IT consumables is looked into. These are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. Valuable items should always be kept in a secure environment to avoid damage or loss.

OBJECTIVES
To develop an Information Communication Technology policy for KPLC Retirement Benefits Scheme that introduces efficient and effective use of IT systems and in turn facilitate the smooth running of the secretariat.

MISSION STATEMENT
To strive to provide nothing but the best means of data and telecommunications services to the secretariat as a whole.

DEFINITION OF ICT POLICY

You May Also Find These Documents Helpful

  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Privileged Access Agreement (PAA) - Page 220 – Contractors and temporary workers sign this type of document.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this assignment I will be explaining the issues and constraints in relation to the use of business information in Asda. I will be outlining the operational issues within the company.…

    • 1048 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Why: Management should define the policies for the reason to use the Internet, how to use the Internet, responsibilities of the person online, and consequences for in appropriate use. This will allow the IS department to take measures to ensure security over the Web, while still allowing for successful business to be conducted.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Information Security Policy creates a framework to protect the Council’s information, whether electronic or paper based from any form of threat, including both internal, and external, deliberate or accidental. It ensures that any data or information held is protected from unauthorised access and that its integrity and confidentiality is maintained.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    We live and conduct business in an active asymmetric threat environment. An individual, business or organization must adapt and protect its vital information assets and critical digital infrastructure. Failure to do so is reckless and may be considered as an obvious lack of due diligence for people who have fiduciary and custodial responsibilities.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sensitive Items

    • 798 Words
    • 4 Pages

    It is very important to secure all your sensitive equipment and items, and maintain accountability. The reason simply is to keep very important high cost…

    • 798 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Nowadays it is rather hard for companies to choose upon the IT applications to implement in their supply chains because of the broad variety of choices on one hand and their complexity in actual implementation and relevancy to the business venture on the other. No matter that software may seem universal for all businesses in fact it has different effect on the particular firm – some thrive, another do not change, third even fail. Therefore, before purchasing and installing a specific IT package companies need to be aware of the benefits it brings and also the pitfalls it carries along.…

    • 1644 Words
    • 7 Pages
    Best Essays
  • Good Essays

    Week 3 Assignment Bsa 375

    • 361 Words
    • 2 Pages

    Architecture design is used to define how options can be used to improve the hardware and software specifications. This paper will describe the application architecture and process design. A detailed observation is necessary to determine what kind of hardware can accommodate the software and it is a critical part of the system development life cycle. A high-level explanation of the security controls suggestions will be included.…

    • 361 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The advancements that have taken place in the information technology empire over the years have greatly impacted the integrity, reliability, and trust that people place in the technology world. With developments such as the wireless world innovation and the tremendous advancements within the digital storage field, the notion of a…

    • 2759 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The report is about the resource proposal which is aimed at improving the current poor situation in the company and increasing the efficiency of the staff. Our capital expenditure budget for the cost is about 316500 yuan. With the money, we need to upgrade the ergonomic equipment to make the staff more comfortable and work efficiently. Besides that, we need to upgrade the hardware, software and build network systems. These resources can not only help the staff to work more efficiently and securely but also provide a competitive advantage for the department and the organisation. In order to find suitable, affordable, secure topology , software and other equipment which have good value at a low price, I collected the information from the Internet,newspapers, reports , advertisments,and interviewed some suppliers to choose the best products. The resources that are applied for in the proposal are listed in the budget table and the proposed costs of my proposal is 275307.00yuan. Today, the competition between companies is fierce so we cannot stand still. It is time we updated the equipment and other facilities. All levels of the staff should cooperate their efforts to improve the condition of the company and promote the position in the marketplace.…

    • 1991 Words
    • 8 Pages
    Good Essays