0% found this document useful (0 votes)
42 views2 pages

IT Policy

The document outlines an IT policy for a company branch. It details approved software systems including order, billing, accounting, HR, and inventory management software. It also covers email access and security, PC standards, firewalls and security threats, access controls, and backup procedures.

Uploaded by

begautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

IT Policy

The document outlines an IT policy for a company branch. It details approved software systems including order, billing, accounting, HR, and inventory management software. It also covers email access and security, PC standards, firewalls and security threats, access controls, and backup procedures.

Uploaded by

begautam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SHREE BAIDYANATH AYURVED BHAWAN PVT LTD,

BAIDYANATH BHAWAN ROAD, PATNA- 8000o1

ITPOLICY
An IT policy on the nature of IT software systems used at a branch would outline the types of software
systems that are approved for use, as well as guidelines for how they should be used and maintained.
Some specific elements that might be included in such a policy include:
Approved software systems:
1. Order Management Software-Web Based for Retailer for placing order
2. Billing Management Software-Inhouse FoxPro based Application
3. Accounts Management Software TALLY PRIME (ERP)
-

4. HR Management Software- inhouse FoxPro Based


Application
5. Inventory Management Software TALLY PRIME (ERP)
-

6. Purchase Management Software TALLY PRIME (ERP)

Email Access
1. Creation of E-mail Addresses: Based on the request of the respective Department and
approval from the Concerned Authority, the email id is created and shared along with
HR.
2. All use of email must be compliant with the Company's policies on ethical conduct
and the security of business data.
3. Email Security
Choose a strong password
Never hand out your email password, even to colleagues.
Don't write down your password
Users are ultimately responsible for the security of their own passwords. In
case of any misuse, the will be
responsible. This includes choosing strong
user

passwords, keeping them confidential, and not sharing them with others.
4. Avoiding email phishing
D o not click attachments, or links, on unsolicited emails, especially from an
unknown person.
Report suspicious-looking emails to the correct person (usually an IT
manager) immediately.
PC
standards
1. Compatible PC hardware gave according to work requirements for personnel.
2. Software Purchased and Installed by IT Department with a third-party vendor (Comp
IT)
3. Regular maintaining PCs, regular backups, software updates, and hardware upgrades.
Firewall &ThreattoSecurity
1. All PCs within the organization are current, updated antivirus program (Quick Heal)
installed and that regular updates are performed to ensure that the program remains
effective against new threats.
2. Software installation and maintenance: Regular patching and updating software to
ensure that it is secure and up-to-date.
3. Identifying potential security threats, such as the use of intrusion detection systems,
and the protocols that are followed when a potential threat is identified. Steps to be
taken to mitigate the threat, such isolating the affected PC,
as disabling network oy.D
PVT.
LTU
BHAWAN

BAIDYANATRArRVED
E e t G e n e r a lM a n a n e r
SHREE BAIDYANATH AYURVED BHAWAN PVT
BAIDYANATH
LTD, BHAWAN ROAD, PATNA- 800001

access, and contacting the IT department or other designated personnel for


assistance.
Other Controls
1. Access right control to users
>Process for creating and managing user
roles, such as administrator, standard
user, and guest user, as well as the
permissions and access rights associated
with each role. This include
can
guidelines
for granting or denying access to
specific systems, applications, or data based on user role, job
other factors
function, or
controlling access to sensitive data and systems, such as encryption and multi-
factor authentication, and
procedures for monitoring and auditing access to
sensitive data and systems.
2. Backup

Regular Backup weekly and daily depends on the uses


testing backupsto ensure that
they are functioning correctly and that data
can be successfully restored

archiving data and retiring old backups in order to free


up storage space and
reduce the risk of data breaches

BAIDYANATHAYURVED
LTO.
BHAWAM PVI.
E

imaliaulor 9st Genereleaager

Prepared By Approved By
Kumar Gautam
Deo Narayan Jha
IT Manager
AGM
SBAB PATNA
SBAB PATNA

You might also like