NLC - IT Policy 21.5.2015
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Draft <strong>IT</strong> <strong>Policy</strong> - <strong>NLC</strong> Ltd, Neyveli Page 4<br />
Laptop <strong>Policy</strong><br />
Laptop computers provide important functionality, allowing employees to have<br />
their computing resource at hand in meetings/workplace, and those who travel<br />
on business to be maximally functional and productive while away. <strong>NLC</strong><br />
Management Reserves the right to issue lap – tops based on standing<br />
instructions, merits and functional need of its employee.<br />
Information Technology Systems Asset Management:<br />
The Methodology and guidance that <strong>NLC</strong> can adopt in developing and<br />
implementing the <strong>IT</strong> systems asset management component of their<br />
agency information security program viz.,<br />
• <strong>IT</strong> Hardware Asset Control<br />
• <strong>IT</strong> Software Asset Control<br />
• Configuration Management and Change Control<br />
<strong>NLC</strong> Software Usage <strong>Policy</strong>:<br />
The purpose of the <strong>NLC</strong> Software Usage <strong>Policy</strong> is to ensure that <strong>NLC</strong><br />
employees are properly trained on appropriate procedures surrounding safe<br />
and legal use of company-owned software. Furthermore, this policy is<br />
intended to discourage inadvertent (or deliberate) violations of the terms of<br />
our organization’s software license agreements and applicable laws when<br />
installing and/or using software on computers owned by <strong>NLC</strong> or private<br />
computers used to perform work related to <strong>NLC</strong>.<br />
<strong>IT</strong> Security & Audit <strong>Policy</strong>:<br />
Information Security Policies are the cornerstone of information security<br />
effectiveness. The Security <strong>Policy</strong> is intended to define what is expected from<br />
an organization with respect to security of Information Systems. The overall<br />
objective is to control or guide human behaviour in an attempt to reduce the<br />
risk to information assets by accidental or deliberate actions by means of<br />
various measures viz., Data Security,Confidentialit,Integrity,Availability of<br />
Network resources.