Manual - 61906 - 3. Information Technology Policy
Manual - 61906 - 3. Information Technology Policy
Policy Manual
Version 2.0
www.defindia.org
Disclaimer: All rights reserved. No part of this publication may be utilized, reproduced, stored in
a retrieval system, or transmitted in any form by any means, electronic, mechanical, recording or
otherwise, without the prior written consent of the publisher.
URL: www.defindia.org
Table of Contents
1 About the Information Technology Policy .................................................................................... 3
2.1 Objective................................................................................................................................. 5
6.1 Objective............................................................................................................................... 15
7.1 Objective............................................................................................................................... 17
7.2 General Guidelines ............................................................................................................... 17
7.3 Compliance ........................................................................................................................... 17
1.1 Purchase
1) The Procurement Dept. procedures & guidelines need to be followed to purchase new
technological equipment, services or software for official purposes.
2) All approved equipment, services or software will be purchased through the Procurement
Dept., unless informed/permitted otherwise.
3) IT Dept. will assist the Procurement Dept. while evaluating best and most cost-effective
hardware or software to be purchased for a particular dept./project/purpose based on the
requirement. The IT Dept. will also make sure all hardware/software standards defined in
the IT Policy are enforced during such purchases.
4) Complete details related to purchase of technological equipment, services or software can
be found in the Procurement Policy Manual.
1.2 Compliance
1) All employees are expected to comply with the IT Policy rules and guidelines while
purchasing, using and maintaining any equipment or software purchased or provided by the
organization.
2) Any employee who notices misuse or improper use of equipment or software within the
organization must inform his/her Reporting Manager(s) immediately.
3) Inappropriate use of equipment and software by an employee will be subject to disciplinary
action as deemed fit by the Management Committee of the organization.
1.3 Employee Training
1) Basic IT training and guidance is provided to all new employees about using and
maintaining their Personal Computer (PC), peripheral devices and equipment in the
organization, accessing the organization network and using application software.
2) Employees can request and/or the Management Committee can decide to conduct an IT
training on a regular or requirement basis.
1.4 IT Support
1) DEF uses an online Ticket System to provide IT Support to its employees and clients. The
URL for the same is http://support.defindia.org/
2) Employees may need hardware/software installations or may face technological issues
which cannot be resolved on their own. Employees are expected to get help from the IT
Dept. for such issues via the Ticket System or the IT Support Email ID only.
3) Any IT Support work informed or assigned via emails sent on employee email IDs, chats or
any other media except the Ticket System or the IT Support Email ID would be not
entertained.
4) For the sake of quick understanding, employees are expected to provide details of their
issue or help required in the Ticket raised or Support Email sent.
5) For major issues like PC replacement, non-working equipment, installation of application
software and more, it is mandatory for all employees to inform the IT Dept.
6) For any damage to Personal Computers, approval from Reporting Manager would be
required for PC replacements.
7) After raising a ticket in the Ticket System, employees should expect a reply from the IT
Dept. within 1 working day. The IT Dept. may ask the employee to deposit the problematic
equipment to the IT Dept. for checking and will inform the timeline for
repair/maintenance/troubleshooting/installations or the required work.
8) If there is no response in 1 working day, then the IT Dept. Designated Staff should be asked
for an explanation for the delay. If no response is obtained in 3 working days, a complaint
can be raised through an email to the employee’s Reporting Manager and IT Dept.
Designated Staff.
9) Tickets will be resolved on a First-Come-First-Served basis. However, the priority can be
changed on request at the sole discretion of the designated team in IT Dept.
2 Equipment Usage Policy
2.1 Objective
The Equipment Usage policy informs employees and managers about equipment purchase,
organizational and project-level inventory management, rules for allocating & transfering
equipment to employees, departments or projects and best practices for all equipment usage and
maintenance.
1) Allocation of Assets:
a. New Employees may be allocated a personal computer (desktop or laptop) for
office work on the Day of Joining, as per work requirement.
b. If required, employees can request their Reporting Manager(s) for additional
equipment or supplies like external keyboard, mouse etc.
c. Allocation of additional assets to an employee is at the sole discretion of the
Reporting Manager(s).
d. No employee is allowed to carry official electronic devices out of office without
permission from Reporting Manager.
2) De-allocation of Assets:
a. It is the Reporting Manager’s responsibility to collect all allocated organizational
equipment & other assets from an employee who is leaving the organization.
b. Updating the Inventory Sheet is mandatory after receiving back all allocated
equipment.
c. The received assets must be returned back to the Admin. Dept.
1) It is the responsibility of all employees to ensure careful, safe and judicious use of the
equipment & other assets allocated to and/or being used by them.
2) Proper guidelines or safety information must be obtained from designated staff in the IT
Dept. before operating any equipment for the first time.
3) Any observed malfunction, error, fault or problem while operating any equipment owned by
the organization or assigned to you must be immediately informed to the designated staff
in IT Dept.
4) Any repeated occurrences of improper or careless use, wastage of supplies or any such
offense compromising the safety or health of the equipment and people using them will be
subject to disciplinary action.
5) If your assigned computing device is malfunctioning or underperforming and needs to be
replaced or repaired, then written approval from your Reporting Manager is required for the
same. The malfunctioning device needs to be submitted to the IT Dept. for checking,
maintenance or repair. The IT Dept. staff person will give a time estimate for
repair/maintenance.
6) The Reporting Manager can be informed about excessive delay or dissatisfaction about the
repair or maintenance performed by the IT Dept. The issue will then be resolved by the
Reporting Manager in consultation with the IT Dept. Head. The Management Committee
can be consulted in terms of serious disputes or unresolved issues.
1) Landline phone systems are installed in the organization’s offices to communicate internally
with other employees and make external calls.
2) The landline phones should be strictly used to conduct official work only. As far as possible,
no personal calls should be made using landline phones owned by the organization.
3) Long distance calls should be made after careful consideration since they incur significant
costs to the organization.
4) The Admin. Dept. is responsible for maintaining telephone connections in offices. For any
problems related to telephones, they should be contacted.
5) Employees should remember to follow telephone etiquette and be courteous while
representing themselves and the organization using the organization’s phone services.
3 Personal Computer (PC) Standards
3.1 Objective
The main aim of this policy is to maintain standard configurations of PC hardware and software
purchased by the organization and provided to employees for official work. The hardware standards
will help maintain optimum work productivity, computer health & security and provide timely and
effective support in troubleshooting PC problems. The software standards will ensure better system
administration, effective tracking of software licenses and efficient technical support.
1) All PCs being used in the organization are enabled to connect to the organization’s Local
Area Network as well as the Internet.
2) Network security is enabled in all PCs through Firewall, Web Security and Email Security
software.
3) Employees are expected to undertake appropriate security measures as enlisted in the IT
Policy.
1) Approved licensed antivirus software is installed on all PCs owned by the organization.
2) Two configurations – Basic and Advanced are maintained for Antivirus software installed on
organization’s computers. The configurations are installed on PCs as per work requirement
of particular Dept./Project.
3) Employees are expected to make sure their Antivirus is updated regularly. The IT Dept.
should be informed if the Antivirus expires.
4) Any external storage device like pen drive or hard disk connected to the PC needs to be
completely scanned by the Antivirus software before opening it and copying files to/from
the device.
3.6 PC Support
1) Guidance and tips given by the IT Dept. designated staff for maintaining the PC should be
remembered while using a PC.
2) The IT Dept. should be contacted via the IT Support Ticket System or IT Support Email for
any assistance with your PC hardware or software.
3) Technical support will not be provided for hardware devices or software which are
personally purchased, illegal or not included in the standard hardware/software list
developed by the IT Dept.
4) Software applications evaluated by the IT Dept. to cause problems with the organization’s
PCs will be removed.
The Internet Usage Policy provides guidelines for acceptable use of the organization’s Internet
network so as to devote Internet usage to enhance work productivity and efficiency and ensure
safety and security of the Internet network, organizational data and the employees.
1) Internet is a paid resource and therefore shall be used only for office work.
2) The organization reserves the right to monitor, examine, block or delete any/all incoming or
outgoing internet connections on the organization’s network.
3) The organization has systems in place to monitor and record all Internet usage on the
organization’s network including each website visit, and each email sent or received. The
Management Committee can choose to analyze Internet usage and publicize the data at
any time to assure Internet usage is as per the IT Policy.
4) The organization has installed an Internet Firewall to assure safety and security of the
organizational network. Any employee who attempts to disable, defeat or circumvent the
Firewall will be subject to strict disciplinary action.
1) All employees may be provided with a Username and Password to login to the Internet
network in the office and to monitor their individual usage.
2) An employee can also get a local static IP address for internet and intranet use. All
employees will be responsible for the internet usage through this local static IP.
3) Username and password for a new employee must be requested by the HR Dept.
4) Sharing the Username and Password with another employee, visitor or guest user is
prohibited.
5) A visitor or guest user who wants to use the office Internet will be given a Guest
Username and Password.
6) The IT Dept. will define guidelines for issuing new passwords or allowing employees to
modify their own passwords.
7) Any password security breach must be notified to the IT Dept. immediately.
8) Username and password allotted to an employee will be deleted upon
resignation/termination/retirement from the organization.
The following password guidelines can be followed to ensure maximum password safety.
1) Select a Good Password:
a. Choose a password which does not contain easily identifiable words (e.g. your
username, name, phone number, house location etc.).
b. Use 8 or more characters.
c. Use at least one numeric and one special character apart from letters.
d. Combine multiple unrelated words to make a password.
2) Keep your Password Safe:
a. Do not share your password with anyone.
b. Make sure no one is observing you while you enter your password.
c. As far as possible, do not write down your password. If you want to write it down,
do no display it in a publicly visible area.
d. Change your password periodically (every 3 months is recommended).
e. Do not reuse old passwords. If that is difficult, do not repeat the last 5 passwords.
3) Other Security Measures:
a. Ensure your computer is reasonably secure in your absence.
b. Lock your monitor screen, log out or turn off your computer when not at desk.
1) Employees are solely responsible for the content accessed and downloaded using
Internet facility in the office. If they accidentally connect to a website containing
material prohibited by the organization, they should disconnect from that site
immediately.
2) During office hours, employees are expected to spend limited time to access news,
social media and other websites online, unless explicitly required for office work.
3) Employees are not allowed to use Internet for non-official purposes using the Internet
facility in office.
4) Employees should schedule bandwidth-intensive tasks like large file transfers, video
downloads, mass e-mailing etc. for off-peak times.
The following activities are prohibited on organization’s Internet network. This list can be
modified/updated anytime by the Management Committee as deemed fit.
Any disciplinary action considered appropriate by the Management Committee (including legal
action or termination) can be taken against an employee involved in the activities mentioned below:
Information security means protection of the organization’s data, applications, networks and
computer systems from unauthorized access, alteration and destruction. The Information Security
Policy provides guidelines to protect data integrity based on data classification and secure the
organization’s information systems.
1. Various methods like access control, authentication, monitoring and review will be used to
ensure data security in the organization.
2. Security reviews of servers, firewalls, routers and monitoring systems must be conducted
on a regular basis. These reviews should include monitoring of access logs and intrusion
detection software logs.
3. Appropriate training must be provided to data owners, data users, and network & system
administrators to ensure data security.
1. Access to the network, servers and systems in the organization will be achieved by
individual logins and will require authentication. Authentication includes the use of
passwords, biometrics or other recognized forms of authentication.
2. All users of systems which contain high or medium risk data must have a strong password
as defined in the IT Policy.
3. Default passwords on all systems must be changed after installation.
4. Where possible and financially feasible, more than one person must have full rights to any
organization-owned server storing or transmitting high risk and medium risk data.
1. Virus prevention for personal computers and email usage has been described previously.
2. Apart from that, all servers and workstations that connect to the network must be
protected with licensed anti-virus software recommended by the vendor. The software
must be kept up-to-date.
3. Whenever feasible, system/network administrators must inform users when a virus/ other
vulnerability has been detected in the network or systems.
1. Intrusion detection must be implemented on all servers and workstations containing high
and medium risk data.
2. Operating system and application software logging process must be enabled on all systems.
3. Server, firewall and critical system logs must be reviewed frequently.
6 Email & Chat Policy
6.1 Objective
This policy provides information about acceptable usage, ownership, confidentiality and security
while using electronic messaging systems and chat platforms provided or approved by the
organization. The policy applies to all electronic messages sent or received via the above mentioned
messaging systems and chat platforms by all official employees of the organization.
1) The organization reserves the right to approve or disapprove which electronic messaging
systems and chat platforms would be used for official purposes. It is strictly advised to use
the pre-approved messaging systems and platforms for office use only.
2) An employee who, upon joining the organization, is provided with an official email address
should use it for official purposes only.
3) Any email security breach must be notified to the IT Dept. immediately.
4) Upon termination, resignation or retirement from the organization, the organization will
deny all access to electronic messaging platforms owned/provided by the organization.
5) All messages composed and/or sent using the pre-approved messaging systems and
platforms need to comply with the company policies of acceptable communication.
6) Electronic mails and messages should be sent after careful consideration since they are
inadequate in conveying the mood and context of the situation or sender and might be
interpreted wrongly.
7) All email signatures must have appropriate designations of employees and must be in the
format approved by the Management Committee.
6.3 Ownership
1) The official electronic messaging system used by the organization is the property of the
organization and not the employee. All emails, chats and electronic messages stored,
composed, sent and received by any employee or non-employee in the official electronic
messaging systems are the property of the organization.
2) The organization reserves the right to intercept, monitor, read and disclose any messages
stored, composed, sent or received using the official electronic messaging systems.
3) The organization reserves the right to alter, modify, re-route or block messages as deemed
appropriate.
4) IT Administrator can change the email system password and monitor email usage of any
employee for security purposes.
6.4 Confidentiality
1) Proprietary, confidential and sensitive information about the organization or its employees
should not be exchanged via electronic messaging systems unless pre-approved by the
Reporting Manager(s) and/or the Management Committee.
2) Caution and proper judgment should be used to decide whether to deliver a message in
person, on phone or via email/electronic messaging systems.
3) Before composing or sending any message, it should be noted that electronic messages can
be used as evidence in a court of law.
4) Unauthorized copying and distributing of copyrighted content of the organization is
prohibited.
1) Anti-Virus:
a. Anti-virus software pre-approved by the Dept. Head - IT should be installed in the
laptop/desktop provided to a new employee after joining the organization.
b. All employees in the organization are expected to make sure they have anti-virus
software installed in their laptops/desktops (personal or official) used for office
work.
c. Organization will bear responsibility for providing, installing, updating and
maintaining records for one anti-virus per employee at a time for the official laptop
provided by the organization. The employee is responsible for installing good
quality anti-virus software in their personal laptop/desktop used for office work.
d. Employees are prohibited from disabling the anti-virus software on organization-
provided laptops/desktops.
e. Employees should make sure their anti-virus is regularly updated and not out of
date.
2) Safe Email Usage: Following precautions must be taken to maintain email security:
a. Do not to open emails and/or attachments from unknown or suspicious sources
unless anticipated by you.
b. In case of doubts about emails/ attachments from known senders, confirm from
them about the legitimacy of the email/attachment.
c. Use Email spam filters to filter out spam emails.
1) Official Email platforms or electronic messaging systems including but not limited to chat
platforms and instant messaging systems should not be used to send messages containing
pornographic, defamatory, derogatory, sexual, racist, harassing or offensive material.
2) Official Email platforms or electronic messaging systems should not be used for personal
work, personal gain or the promotion or publication of one’s religious, social or political
views.
3) Spam/ bulk/junk messages should not be forwarded or sent to anyone from the official
email ID unless for an officially approved purpose.
7 Software Usage Policy
7.1 Objective
The Software Usage Policy is defined to provide guidelines for appropriate installation, usage and
maintenance of software products installed in organization-owned computers.
1) Third-party software (free as well as purchased) required for day-to-day work will be pre-
installed onto all company systems before handing them over to employees. A designated
person in the IT Dept. can be contacted to add to/delete from the list of pre-installed
software on organizational computers.
2) No other third-party software – free or licensed can be installed onto a computer system
owned or provided to an employee by the organization, without prior approval of the IT
Dept.
3) To request installation of software onto a personal computing device, an employee needs to
send a written request via the IT Ticket System or IT Support Email.
4) Any software developed & copyrighted by the organization belongs to the organization.
Any unauthorized use, storage, duplication or distribution of such software is illegal and
subject to strict disciplinary action.
7.3 Compliance
1) Software licensed or purchased by the organization must be registered in the name of the
organization with the Job Role or Department in which it will be used and not in the name of
an individual.
2) After proper registration, the software may be installed as per the Software Usage Policy of
the organization. A copy of all license agreements must be maintained by the IT Dept.
3) After installation, all original installation media (CDs, DVDs, etc.) must be safely stored in a
designated location by the IT Dept.
1) The IT Dept. will conduct periodic audit of software installed in all company-owned systems
to make sure all compliances are being met.
2) Prior notice may or may not be provided by the IT Dept. before conducting the Software
Audit.
3) During this audit, the IT Dept. will also make sure the anti-virus is updated, the system is
scanned and cleaned and the computer is free of garbage data, viruses, worms or other
harmful programmatic codes.
4) The full cooperation of all employees is required during such audits.
Approved by:
Management Committee / Working Committee
Sr. Manager – Research & Advocacy, Dy. Manager – Comm. & Media,
Digital Empowerment Foundation Digital Empowerment Foundation
About
DEF believes access to the Internet together with digital literacy can empower people to use information and
knowledge to improve their lives on their own in various ways using different digital tools. DEF has adopted a multi-
stakeholder approach and a seven-fold path to enable communities, governments, schools, civil society
organisations and micro-enterprises avail the benefits of the Information Age. It promotes more extensive use of ICTs
for development and has created platforms for discovering and honouring ICTD innovators and practitioners so as to
create a knowledge hub and database and an ecosystem that can enable digital innovators to share knowledge, forge
partnerships and scale up. It is also engaged in advocacy and research on all digital areas and such issues as Internet
rights and right to information.