IT EQUIPMENT MANAGEMENT PROCEDURE

1.        Purpose

Information technology related equipment should be properly management (e.g. re-used or disposed) once they reach they reach the end of their life-cycle, as otherwise piles of hardware unnecessarily take up office or storage space. The IT equipment management procedure addresses this issue by providing a guideline in the disposal and/or re-use of IT hardware. Read More

IT Role & Responsibility Procedure Document

1.        Purpose

In order to achieve its objectives, the IT department of the company requires to be well organized as well as staffed with disciplined and skilled members. These professionals should be matched to appropriate positions in the organizational structure in order to ensure both organizational efficiency and personal development. The IT’ Roles and Responsibility Procedure provides an overview of the IT organization and its members, as well as their corresponding roles and the teams to which they belong. Read More

Hardware and Software Purchasing Procedure

1.        Purpose

The purchasing of IT related hardware and software must be strictly regulated in order to ensure that company standard-compliant hardware and software are purchased and installed (non-company standard hardware and software require additional approval), and (2) expenditures for hardware and software do not exceed the allocated budget. Company Hardware and Software Purchasing Procedure addresses this issue by providing a guideline to users, IT staff, and Purchasing staff in purchasing IT related hardware and software according to corporate standards. Read More

FILE SERVER PROCEDURE

1.        Purpose

Information systems generate large amounts of data that require storage and protection. In the case of single systems (e.g. a single desktop computer), this data is commonly stored on internal storage devices, often a harddrive. Larger and more complex systems, however, require dedicated storage provided by file servers. By centralizing the point of storage, file servers enhance the management, control, and backup of corporate data. The company’s File Server Procedure provides a guideline to IT staff on managing these file servers. Moreover, it offers employees and departments a clarification of file server policy and procedures. Read More

IT HELPDESK PROCEDURE

1.        Purpose

Company, like many other companies nowadays, depend to a great extent on information technology in conducting its daily operations. Users are expected to interact with increasingly complex information systems and applications, requiring not only more intensive training, but also more efficient and effective support from dedicated staff should problems arise. Company’s IT Helpdesk Procedure provides transparency in the processing of these IT related problems. From a user perspective, IT ensures that users will receive effective and professional support from IT staff. From the IT helpdesk perspective, this procedure provides a solid guideline for a professional approach to solving problems of users. Read More

NETWORK DEVICE CONFIGURATION PROCEDURE

1.        Purpose

The company Network Device Configuration Procedure aims at establishing a standard guideline for network administrators in managing network devices. More specifically, this procedure provides a step-by-step guide to (1) configuring a network device, (2) Installing a new security patch (i.e. firmware upgrade) on a network device, and (3) monitoring (malicious) network activity. Read More

IT Infrastructure Capacity Planning & Performance Reporting

1) Objectives

This document is to describe the process used for the capacity planning and performance reporting of the IT Infrastructure currently under the control and management of the local Site IT. Those equipment owned and/or managed by IT will be excluded from the scope of this document. This document will be updated and maintained by IT department as required. Read More

Guideline for use of IT infrastructure

Security

  • Never give your password to anyone else.
  • Lock desktop or log out of network if leaving your desk for longer periods (e.g. meetings, lunch).
  • Do not leave your notebook unattended, particularly after office hours.
  • Never connect a third party to the network, do not dial in with a PC connected to the Company network.
  • Do not use your company notebook at home for dialing into a local Internet provider.
  • Restrict use of local administrator rights on desktops/notebooks.
  • Confidential or secret information must be sent in messages specifically marked as “confidential” or “secret” Notes feature.

Read More