IT Policy
IT Policy
ITPOLICY
An IT policy on the nature of IT software systems used at a branch would outline the types of software
systems that are approved for use, as well as guidelines for how they should be used and maintained.
Some specific elements that might be included in such a policy include:
Approved software systems:
1. Order Management Software-Web Based for Retailer for placing order
2. Billing Management Software-Inhouse FoxPro based Application
3. Accounts Management Software TALLY PRIME (ERP)
-
Email Access
1. Creation of E-mail Addresses: Based on the request of the respective Department and
approval from the Concerned Authority, the email id is created and shared along with
HR.
2. All use of email must be compliant with the Company's policies on ethical conduct
and the security of business data.
3. Email Security
Choose a strong password
Never hand out your email password, even to colleagues.
Don't write down your password
Users are ultimately responsible for the security of their own passwords. In
case of any misuse, the will be
responsible. This includes choosing strong
user
passwords, keeping them confidential, and not sharing them with others.
4. Avoiding email phishing
D o not click attachments, or links, on unsolicited emails, especially from an
unknown person.
Report suspicious-looking emails to the correct person (usually an IT
manager) immediately.
PC
standards
1. Compatible PC hardware gave according to work requirements for personnel.
2. Software Purchased and Installed by IT Department with a third-party vendor (Comp
IT)
3. Regular maintaining PCs, regular backups, software updates, and hardware upgrades.
Firewall &ThreattoSecurity
1. All PCs within the organization are current, updated antivirus program (Quick Heal)
installed and that regular updates are performed to ensure that the program remains
effective against new threats.
2. Software installation and maintenance: Regular patching and updating software to
ensure that it is secure and up-to-date.
3. Identifying potential security threats, such as the use of intrusion detection systems,
and the protocols that are followed when a potential threat is identified. Steps to be
taken to mitigate the threat, such isolating the affected PC,
as disabling network oy.D
PVT.
LTU
BHAWAN
BAIDYANATRArRVED
E e t G e n e r a lM a n a n e r
SHREE BAIDYANATH AYURVED BHAWAN PVT
BAIDYANATH
LTD, BHAWAN ROAD, PATNA- 800001
BAIDYANATHAYURVED
LTO.
BHAWAM PVI.
E
Prepared By Approved By
Kumar Gautam
Deo Narayan Jha
IT Manager
AGM
SBAB PATNA
SBAB PATNA