নিয়মিত ভিজিট করলে চাকুরিই আপনাকে খুঁজে নিবে

Blogger দ্বারা পরিচালিত.

Any Company To Protect All information Computer & Network Equipment

The Company has the right to protect all information


The Company considers as property all records, software and hardware that are part of a program's information system. As Company property it is to be used for business purposes only. A "record" includes any information kept, held, filed, produced and reproduced by, with or for a program in any form or media including, but not limited to, reports, statements, memorandum, folders, files, books, manuals, forms, papers, maps, images, letters, photos, computer tapes and disc.


DISCLOSURE OF INFORMATION:-



Employees are to access and use Company information technology resources for business purposes only. Disclosure of Company information or data to individuals or entities (whether employees or not) without a business need to have/know such information is prohibited. Company information or electronic data may not be transmitted over the Internet or via email except for business purposes to authorized recipients. Confidential client or employee information may not be transmitted to persons or entities that are not authorized to receive such confidential information.



REPORTING SUSPICIOUS EVENTS:-



Any observations of suspicious activity must be reported to the program's manager. Suspicious activity can include: signs of unauthorized equipment usage during evenings and weekends, phone requests from unidentifiable callers for access to secure information, unidentifiable files found on network servers and abnormal activity recorded in log files.


Security Training 


Company programs are required to develop security awareness among all staff members, which

includes descriptions of security breaches intended to circumvent program security management. Individual programs are responsible for the security of all Company information resources they access. Program-specific procedures developed to conform to these policies must be reviewed frequently to reflect changes in staff and technology.


  • Topics of IT Training
  • Change password regularly
  • Keep password record on register book
  • Illegal access to computer system
  • Data backup on server
  • How to use client/server network
  • How to use internet




  • How to use email
  • How to print document
  • How to use UPS
  • How to use anti viru

INFORMATION CLASSIFICATION:-


Information classification provides a means for separating information into categories with different protective requirements. All programs determine the extent to which information is disclosed to specific users. The nature of the information and the duties of Company employees determine the information classification assigned to an employee. The following categories of information serve to provide guidance in identifying appropriate users or recipients. Public Information is available to any person. Restricted Information is not public information, but can be disclosed to or used by program representatives to carry out their duties, so long as there is no legal bar to disclosure. Confidential Information may not be disclosed unless permitted by an Director.




Share :

Facebook Twitter Google+
0 Komentar untuk "Any Company To Protect All information Computer & Network Equipment"

Back To Top