Upload presentasi
Presentasi sedang didownload. Silahkan tunggu
Diterbitkan olehSonny Oesman Telah diubah "7 tahun yang lalu
1
IT Policy DLM
2
Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.
3
Menjamin kepuasan pelanggan tetap prima Menjamin kerahsiaan perusahaan terhadap kompetitor Menjamin keteraturan dokumentasi Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT Menjaga image perusahaan Mengurangi resiko dalam keadaan darurat Kelengkapan persyaratan ISO Menjaga disiplin karyawan sesuai prosedure
4
Penggunaan photo sebagai gambar depan PC atau Computer Jaringan sosial internet Pemakaian USB Peng copy an data busines perusahaan Pencegahan virus (zero virus attack) Back-up data Penggunaan password Etika keselamatan dan keamanan pemakaian computer Pelatihan untuk pengguna computer
5
1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan Email dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit
6
HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training IT Support : Menyiapkan dan menentukan materi training Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing
7
Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan Ruang lingkup : Seluruh karyawan
8
Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya. Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan Setelah pelatihan diverifikasi lagi kemampuannya Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut
9
Operator :...................................................... Jobshop Leader:........................................... Jobshop Programmer:.................................. Product Development Eng.:......................... Marketing Eng.............................................. Accounting & Finance Staff :...................... Staff Administration:................................... Manager :.....................................................
10
Optimal Performance (System) Smart & Responsible (Users) Reliable & Secure (Hardware & Infrastructure) S S peed I I nformative R R eliable
11
WhyWhy
12
W hat : Hardware, Software & User W hen : From Inquiry to Disposal W here : DLM W ho : Everyone H ow : Detail Process S afety IT Assets S ecurity Prevent & Protect C onsistency Data
13
Email - Email - Drawing - Administration - Purchasing - Production - Logistic - Marketing
14
: User : Management : IT : Logistic : Purchasing : HR-GA
15
No.Title ManagerStaffIT 1User Guideline vvv 2Procurement vvv 3Installation vvv 4Email & Internet Usage vvv 5Emergency vvv 6Disposal vv 7Budgeting vv 8Server SOP v 9Audit vv 10Maintenance vvv 11Backup v 12External Data Storage Usage vvv 13Virus handling vvv
16
evaluate each user skills Fulfill Standard ? Evaluate every new employee Give training Revaluate N Place at suitable position Y Done by HR. Applied to all employee. Socializing Standard User Guidance
17
MarketingEngineeringLogisticFinanceManage r Plant Operato r Outlook HighMedium Word HighLow Mediu m Excel Medium High Medium Power Point HighLow Mediu m CRM HighLow Mediu m TruTopFab MediumHighMediumLow Platinum ---High- Optipro --MediumHigh-
18
Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Give to Purchasing to be executed Returned to Requester Approve Y N
19
WHY : - Standardized IT Inventory tandardized Maintenance tandardized Services tandardized Operation - Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services
20
Received by Logistic & Informed IT Register & Labeled Setup according Standard Backup Softcopy to Server Ready to use Testin g Y N
21
WHY : - Manageable IT Asset - Optimal performance - Can be outsourced - Smart User WHAT : 1. Hardware 2. Software
22
Work Communicatio n EducativeInformativeLegal
23
Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast email for non work related Send oversized attachment Use personal email for work communication
24
Do Communicate with colleague Communicate with Business Partner Gather information Work related research Don’t Illegal usage Blast email for non work related
25
1. W orking time efficiency 2. N etwork Security 3. N etwork Traffic Resource 4. C ompany image
26
Case : -I-Inconsistency data -P-Power failure -N-Nature disaster
27
User inform to IT Analyze Problem Inform User Log Problem Find Solution Report to management
28
After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP
29
Locate the closets fire extinguisher Go to server room Shut down server Pull off all hard disk & take it to save area
30
WHY : - Controlled - Data Security WHAT : 1. Hardware 2. Software 3. Hard disk
31
Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Execute Asset disposal process Approve d En d Revised Asset List Y N
32
User request to IT IT Analyze request Update IT Asset List Approve d End Uninstall Software YN
33
Backup current Hard disk Do testing Keep Old Hard disk for 2 Years Problem Solve proble m Put on Log Y N Prepare new Hard disk Restore Backup on new hard disk > 2 years Destroy Hard disk Y
34
Review IT Asset List Make Proposal Request GM Approval Approve d Request Managing Director Approval Approve d Include to Next Year Budgeting Revised Proposal N N Y Y
35
- Controlled - P- P- P- Planned - W- W- W- Well Budgeted - M- M- M- Maintained
36
Standard steps in Turning On / Off DLM servers & Network Peripherals. 1.HP Procurve Switch (3) 2.Peplink 3.Domain Controller 4.Gateway 5.Tops1000 6.Planet 7.Backup PC 8.Anti Virus
37
Turning ON Turning Off Anti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP ProcurveAnti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP Procurve
42
Data Files + Application + Database
44
Prevent virus infection
45
Scan at Isolated PC Clean Re-Scan Allowed to be used Format Y N Clean Y N
46
1.P revent Spreading 2.B asic First-Aid for User
47
Scan & Remove with Anti Virus Success Unplug from Network Restart Inform IT Y N
48
Confirm Virus attack Success Replace PC with Substitute Restar t Format Infected PC Y N Try to remove in Save mode Re-Scan Clean Return PC to User Y N
Presentasi serupa
© 2024 SlidePlayer.info Inc.
All rights reserved.