IT Strategies and Roadmaps Document

1.        Introduction

Strategies and roadmaps direct involved people towards their longer-term goals and business objectives. The purpose of this IT Strategy and Roadmap document is to achieve just this; to ensure that members of the IT organization head towards clearly defined business goals, through shared vision and approach. A necessary common vision (or rather the lack of it) has been highlighted in several feedback sessions and team meetings. The importance of this document for the IT organization should therefore not underestimated. Chapter two and three specify the scope and owner of this document, respectively. Chapter four elaborates the strategic direction currently applicable to our organization, in which compliance with PD directives is emphasized. Chapter five explains the current application portfolio and highlights changes and trends. Chapter six and seven elaborate automation, information, and project plans. Chapter eight provides an overview of our IT organization. Chapter nine shows our current resource situation with special emphasis on the resource constraints. Chapter ten highlights the plan of training and “upgrading” current employees in order to achieve our business objectives. Chapter eleven, lastly, provides an overview of operational policies and guidelines for our IT organization.  Read More

IT Infrastructure Capacity Planning & Performance Reporting

1) Objectives

This document is to describe the process used for the capacity planning and performance reporting of the IT Infrastructure currently under the control and management of the local Site IT. Those equipment owned and/or managed by IT will be excluded from the scope of this document. This document will be updated and maintained by IT department as required. Read More

Guideline for use of IT infrastructure

Security

  • Never give your password to anyone else.
  • Lock desktop or log out of network if leaving your desk for longer periods (e.g. meetings, lunch).
  • Do not leave your notebook unattended, particularly after office hours.
  • Never connect a third party to the network, do not dial in with a PC connected to the Company network.
  • Do not use your company notebook at home for dialing into a local Internet provider.
  • Restrict use of local administrator rights on desktops/notebooks.
  • Confidential or secret information must be sent in messages specifically marked as “confidential” or “secret” Notes feature.

Read More