10.10.2016 Views

NLC - IT Policy 21.5.2015

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Draft <strong>IT</strong> <strong>Policy</strong> - <strong>NLC</strong> Ltd, Neyveli Page 4<br />

Laptop <strong>Policy</strong><br />

Laptop computers provide important functionality, allowing employees to have<br />

their computing resource at hand in meetings/workplace, and those who travel<br />

on business to be maximally functional and productive while away. <strong>NLC</strong><br />

Management Reserves the right to issue lap – tops based on standing<br />

instructions, merits and functional need of its employee.<br />

Information Technology Systems Asset Management:<br />

The Methodology and guidance that <strong>NLC</strong> can adopt in developing and<br />

implementing the <strong>IT</strong> systems asset management component of their<br />

agency information security program viz.,<br />

• <strong>IT</strong> Hardware Asset Control<br />

• <strong>IT</strong> Software Asset Control<br />

• Configuration Management and Change Control<br />

<strong>NLC</strong> Software Usage <strong>Policy</strong>:<br />

The purpose of the <strong>NLC</strong> Software Usage <strong>Policy</strong> is to ensure that <strong>NLC</strong><br />

employees are properly trained on appropriate procedures surrounding safe<br />

and legal use of company-owned software. Furthermore, this policy is<br />

intended to discourage inadvertent (or deliberate) violations of the terms of<br />

our organization’s software license agreements and applicable laws when<br />

installing and/or using software on computers owned by <strong>NLC</strong> or private<br />

computers used to perform work related to <strong>NLC</strong>.<br />

<strong>IT</strong> Security & Audit <strong>Policy</strong>:<br />

Information Security Policies are the cornerstone of information security<br />

effectiveness. The Security <strong>Policy</strong> is intended to define what is expected from<br />

an organization with respect to security of Information Systems. The overall<br />

objective is to control or guide human behaviour in an attempt to reduce the<br />

risk to information assets by accidental or deliberate actions by means of<br />

various measures viz., Data Security,Confidentialit,Integrity,Availability of<br />

Network resources.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!