Presentasi sedang didownload. Silahkan tunggu

Presentasi sedang didownload. Silahkan tunggu

IT Policy DLM. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi.

Presentasi serupa


Presentasi berjudul: "IT Policy DLM. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi."— Transcript presentasi:

1 IT Policy DLM

2 Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.

3  Menjamin kepuasan pelanggan tetap prima  Menjamin kerahsiaan perusahaan terhadap kompetitor  Menjamin keteraturan dokumentasi  Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT  Menjaga image perusahaan  Mengurangi resiko dalam keadaan darurat  Kelengkapan persyaratan ISO  Menjaga disiplin karyawan sesuai prosedure

4  Penggunaan photo sebagai gambar depan PC atau Computer  Jaringan sosial internet  Pemakaian USB  Peng copy an data busines perusahaan  Pencegahan virus (zero virus attack)  Back-up data  Penggunaan password  Etika keselamatan dan keamanan pemakaian computer  Pelatihan untuk pengguna computer

5 1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit

6  HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training  IT Support : Menyiapkan dan menentukan materi training  Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing

7  Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan  Ruang lingkup : Seluruh karyawan

8  Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya.  Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan  Setelah pelatihan diverifikasi lagi kemampuannya  Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut

9  Operator :  Jobshop Leader:  Jobshop Programmer:  Product Development Eng.:  Marketing Eng  Accounting & Finance Staff :  Staff Administration:  Manager :

10 Optimal Performance (System) Smart & Responsible (Users) Reliable & Secure (Hardware & Infrastructure) S S peed I I nformative R R eliable

11 WhyWhy

12 W hat : Hardware, Software & User W hen : From Inquiry to Disposal W here : DLM W ho : Everyone H ow : Detail Process S afety  IT Assets S ecurity  Prevent & Protect C onsistency  Data

13 - - Drawing - Administration - Purchasing - Production - Logistic - Marketing

14 : User : Management : IT : Logistic : Purchasing : HR-GA

15 No.Title ManagerStaffIT 1User Guideline vvv 2Procurement vvv 3Installation vvv 4 & Internet Usage vvv 5Emergency vvv 6Disposal vv 7Budgeting vv 8Server SOP v 9Audit vv 10Maintenance vvv 11Backup v 12External Data Storage Usage vvv 13Virus handling vvv

16 evaluate each user skills Fulfill Standard ? Evaluate every new employee Give training Revaluate N Place at suitable position Y Done by HR. Applied to all employee. Socializing Standard User Guidance

17 MarketingEngineeringLogisticFinanceManage r Plant Operato r Outlook HighMedium Word HighLow Mediu m Excel Medium High Medium Power Point HighLow Mediu m CRM HighLow Mediu m TruTopFab MediumHighMediumLow Platinum ---High- Optipro --MediumHigh-

18 Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Give to Purchasing to be executed Returned to Requester Approve Y N

19 WHY : - Standardized IT Inventory tandardized Maintenance tandardized Services tandardized Operation - Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services

20 Received by Logistic & Informed IT Register & Labeled Setup according Standard Backup Softcopy to Server Ready to use Testin g Y N

21 WHY : - Manageable IT Asset - Optimal performance - Can be outsourced - Smart User WHAT : 1. Hardware 2. Software

22 Work Communicatio n EducativeInformativeLegal

23 Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast for non work related Send oversized attachment Use personal for work communication

24 Do Communicate with colleague Communicate with Business Partner Gather information Work related research Don’t Illegal usage Blast for non work related

25 1. W orking time efficiency 2. N etwork Security 3. N etwork Traffic Resource 4. C ompany image

26 Case : -I-Inconsistency data -P-Power failure -N-Nature disaster

27 User inform to IT Analyze Problem Inform User Log Problem Find Solution Report to management

28 After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP

29 Locate the closets fire extinguisher Go to server room Shut down server Pull off all hard disk & take it to save area

30 WHY : - Controlled - Data Security WHAT : 1. Hardware 2. Software 3. Hard disk

31 Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Execute Asset disposal process Approve d En d Revised Asset List Y N

32 User request to IT IT Analyze request Update IT Asset List Approve d End Uninstall Software YN

33 Backup current Hard disk Do testing Keep Old Hard disk for 2 Years Problem Solve proble m Put on Log Y N Prepare new Hard disk Restore Backup on new hard disk > 2 years Destroy Hard disk Y

34 Review IT Asset List Make Proposal Request GM Approval Approve d Request Managing Director Approval Approve d Include to Next Year Budgeting Revised Proposal N N Y Y

35 - Controlled - P- P- P- Planned - W- W- W- Well Budgeted - M- M- M- Maintained

36 Standard steps in Turning On / Off DLM servers & Network Peripherals. 1.HP Procurve Switch (3) 2.Peplink 3.Domain Controller 4.Gateway 5.Tops Planet 7.Backup PC 8.Anti Virus

37 Turning ON Turning Off Anti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP ProcurveAnti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP Procurve

38

39

40

41

42 Data Files + Application + Database

43

44 Prevent virus infection

45 Scan at Isolated PC Clean Re-Scan Allowed to be used Format Y N Clean Y N

46 1.P revent Spreading 2.B asic First-Aid for User

47 Scan & Remove with Anti Virus Success Unplug from Network Restart Inform IT Y N

48 Confirm Virus attack Success Replace PC with Substitute Restar t Format Infected PC Y N Try to remove in Save mode Re-Scan Clean Return PC to User Y N

49


Download ppt "IT Policy DLM. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi."

Presentasi serupa


Iklan oleh Google