KEBIJAKAN PERUSAHAAN MENGENAI IT IT Policy DLM TUJUAN
KEBIJAKAN PERUSAHAAN MENGENAI IT IT Policy DLM
TUJUAN Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.
Semua Perusahaan yang mempunyai visi menjadi kelas dunia mempunyai IT Policy � � � � Menjamin kepuasan pelanggan tetap prima Menjamin kerahsiaan perusahaan terhadap kompetitor Menjamin keteraturan dokumentasi Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT Menjaga image perusahaan Mengurangi resiko dalam keadaan darurat Kelengkapan persyaratan ISO Menjaga disiplin karyawan sesuai prosedure
Contoh-contoh pengaturan dalam hal : � � � � � Penggunaan photo sebagai gambar depan PC atau Computer Jaringan sosial internet Pemakaian USB Peng copy an data busines perusahaan Pencegahan virus (zero virus attack) Back-up data Penggunaan password Etika keselamatan dan keamanan pemakaian computer Pelatihan untuk pengguna computer
PENGATURAN KEBIJAKSANAAN INI MELIPUTI : • 1. Pedoman dasar untuk pengguna perangkat IT • 2. Pembelian barang fasilitas IT * • 3. Instalasi barang fasilitas IT * • 4. Penggunaan Email dan Internet • 5. Penanganan Virus • 6. Penanganan resiko dalam keadaan darurat • 7. Perbaikan barang fasilitas IT * • 8. Proses back-up data dan aplikasi • 9. Penggunaan external data storage • 10. Pembuangan barang fasilitas IT * • 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * • 12. Standar pengoperasian server * • 13. Audit
Tanggung jawab untuk mensosialisasikan : HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training � IT Support : Menyiapkan dan menentukan materi training � Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing �
1. Pedoman penggunaan perangkat IT � Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan � Ruang lingkup : Seluruh karyawan
Procedur Umum � � Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya. Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan Setelah pelatihan diverifikasi lagi kemampuannya Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut
Standar/kwalifikasi pengetahuan IT menurut posisi � � � � Operator : . . . Jobshop Leader: . . . Jobshop Programmer: . . . . Product Development Eng. : . . . Marketing Eng. . . Accounting & Finance Staff : . . Staff Administration: . . Manager : . . .
DLM IT POLICY s & U t ( r a Sm al ce tim an Op rm m) rfo ste Pe (Sy e l b i s n o p es rs) R e (Hardware & Infrastructure) Speed Informative Reliable & Secure 2010
What is it Why
WHAT What User When Where Who How : Hardware, Software & : From Inquiry to Disposal : DLM : Everyone afety : Detail Process S Security IT Assets Prevent & Protect Consistency Data
Wh y 90% Operational Using IT - Email - Drawing - Administration - Purchasing - Production - Logistic - Marketing
: User : Management : IT : Logistic : Purchasin : HR-GA g ICONS
No. Title Manager Staff IT 1 User Guideline v v v 2 Procurement v v v 3 Installation v v v 4 Email & Internet Usage v v v 5 Emergency v v v 6 Disposal v v 7 Budgeting v v 8 Server SOP 9 Audit v 10 Maintenance v 11 Backup 12 External Data Storage Usage v v v 13 Virus handling v v v v
Place at suitable position Y evaluate each user skills Socializing Standard User Guidance Fulfill Standard ? Evaluate every new employee N Give training Revaluate Done by HR. employee. Applied to all
Marketing Engineering Logistic Finance Manage r Outlook High Medium Word High Low Medium Excel Medium High Medium Power Point High Low Medium CRM High Low Medium Tru. Top. Fab Medium High Medium Low Platinum - - - High - Optipro - - Medium High - Plant Operato r Low
2. PROCUREMENT Fill in Purchase Request Supervisor Signature Request GM Approval Give to Purchasing to be executed Request IT Approval Y Approve N Returned to Requester
PROCUREMENT WHY : - Standardized IT Inventory - Standardized Maintenance - Standardized Services WHAT : - Standardized Operation 1. Hardware - Controlled Procurement 2. Software 3. Services
3. INSTALLATION Received by Logistic & Informed IT Register & Labeled Backup Softcopy to Server Setup according Standard N Testing Y Ready to use
INSTALLATION WHY : - Manageable IT Asset - Optimal performance - Can be outsourced - Smart User WHAT : 1. Hardware 2. Software
4. INTERNET & EMAIL Work Communicatio n Educative Informative Legal
EMAIL DO & DON’T Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast email for non work related Send oversized attachment Use personal email for work communication
INTERNET DO & DON’T Do Communicate with colleague Don’t Illegal usage Communicate with Business Partner Blast email for non work related Gather information Work related research
WHY ALL THOSE DO & DON’T 1. Working time efficiency 2. Network Security 3. Network Traffic Resource 4. Company image
5. EMERGENCY Case : -Inconsistency data -Power failure -Nature disaster
CASE 1 : INCONSISTENCY DATA User inform to IT Analyze Problem Find Solution Inform User Log Problem Report to management
CASE 2 : POWER FAILURE After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP
CASE 3 : NATURE DISASTER Locate the closets fire extinguisher Go to server room Shut down server Pull off all hard disk & take it to save area
6. DISPOSAL WHAT : 1. Hardware 2. Software 3. Hard disk WHY : - Controlled - Data Security
HARDWARE DISPOSAL Review IT Asset Age & Performance Make Asset disposal request Y Revised Asset List Execute Asset disposal process Request GM Approval Approved N End
SOFTWARE DISPOSAL User request to IT Y Uninstall Software Update IT Asset List IT Analyze request Approved N End
HARD DISK DISPOSAL Prepare new Hard disk Backup current Hard disk Keep Old Hard disk for 2 Years Restore Backup on new hard disk Put on Log Do testing N Problem Y Y >2 years Destroy Hard disk Solve problem
7. STANDARDIZATION & BUDGETING Review IT Asset List Make Proposal Revised Proposal N Request GM Approval Approved N Y Request Managing Director Approval Approved Y Include to Next Year Budgeting
Why ? - Controlled - Planned - Well Budgeted - Maintained
8. SERVER SOP Standard steps in Turning On / Off DLM servers & Network Peripher 1. HP Procurve Switch (3) 2. Peplink 3. Domain Controller 4. Gateway 5. Tops 1000 6. Planet 7. Backup PC 8. Anti Virus
Turning ON Turning Off HP Procurve Anti Virus Peplink Backup Data Domain Controller Planet Gateway Tops 1000 Gateway Planet Domain Controller Backup Data Peplink Anti Virus HP Procurve
9. AUDIT Collect Info Revise IT Policy Improvement Plan Analyze Log Findings
PURPOSE IMPROVEMENT
10. MAINTENANCE Physical Cleaning Virus Scanning Defrag Update Anti Virus
PURPOSE HEALTHY & HYGIENIST WORKING ENVIRONMENT
11. BACKUP Data Files + Application + Database
PURPOSE DATA AND SYSTEM RELIABILITY
11. EXTERNAL DATA STORAGE WHY Prevent virus infection
WHAT TO DO Scan at Isolated PC Clean Y Allowed to be used N Re-Scan Clean Y N Format
12. VIRUS HANDLING 1. Prevent Spreading 2. Basic First-Aid for User
BASIC USER KNOW-HOW Scan & Remove with Anti Virus N Success Y Restart Unplug from Network Inform IT
IT NEXT ACTION Confirm Virus attack Try to remove in Save mode N Success Replace PC with Substitute Format Infected PC Y Restar t Re-Scan N Clean Y Return PC to User
THANK YOU
- Slides: 49