IT Policy DLM. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi.

Slides:



Advertisements
Presentasi serupa
Administrasi System Windows XP 2
Advertisements

Profesi di Bidang Teknologi Informasi
Aplikasi Teknologi Informasi Dalam Pendidikan
SISTEM TERDISTRIBUSI Definisi :
VIRTUALISASI.
E-Procurement Komputer & Masyarakat.
Bab VIII Pekerjaan di Bidang Teknologi Informasi
SI527 - ERP (Enterprise Resources Planning)
Managing Software Requirements (manajemen kebutuhan perangkat lunak)
RENCANA PENGEMBANGAN PERANGKAT LUNAK (RPPL)
FIREWALL By.Kundang.K.Juman.
Pengantar SCM ( Supply Chain Management )
1 Pertemuan 1 Introduction Matakuliah: sistem Operasi Tahun: 2010.
Chapter 5: Manajemen Scope Proyek
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and.
SISTEM TERDISTRIBUSI Definisi :
Oleh Agus Prihanto, ST, M.Kom
CUSTOMER RELATIONSHIP MANAGER
PEOPLE AND NETWORK MELWIN SYAFRIZAL DAULAY, S.KOM. M.ENG.
Phase III Rapid Prototyping and Demonstration Prototype
Membangun Sistem Informasi ERP
1 Pertemuan 2 Unit 1 - Careers Matakuliah: G0682 / Bahasa Inggris Ekonomi 1 Tahun: 2005 Versi: versi/revisi.
1 Pertemuan 6 Hubungan WCA dan Sistem Informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
MANAJEMEN LABORATORIUM LAY OUT & GLP
INFRASTRUKTUR E-BISNIS. Introduction  Infrastruktur mempengaruhi kualitas pelayanan  Speed  responsiveness  Infrastruktur e-bisnis  Arsitektur jaringan.
Rifki Arief D. KEPALA BIRO TEKNOLOGI INFORMASI & KOMUNIKASI KEPALA BAGIAN ANALISIS & DESAIN KEPALA BAGIAN INFRASTRUKTUR& JARINGAN KEPALA BAGIAN APLIKASI.
Manajemen Sumber Daya Teknologi Informasi
Management Information Systems, 10/e
INFRASTRUCTURE SECURITY
Enterprise Resource Planning
Management Information Systems (Chapter 2)
PEMILIHAN SISTEM.
Kuesioner Pengelolaan Teknologi Informasi berdasarkan CobIT
Enterprise Resource Planning (ERP)
Managing Technology Resources
Server Application Testing
Managing Technology Resources
04 Membangun Sistem Informasi ERP Tahapan SDLC Hata Maulana, M.T.I.
Lecture 4: ACTIVITY BASED COST SYSTEM
Phase III Rapid Prototyping and Demonstration Prototype
Review Sistem Terdistribusi
Membangun Sistem Informasi ERP
Resource Management IT Governance.
Studi Kasus IT Policy di lingkungan Universitas Yapis Papua
Dasar-Dasar Sistem Informasi
Membangun Sistem Informasi ERP
KEPASTIAN KUALITAS KOMPONEN MAINTENANCE SOFTWARE
04 Membangun Sistem Informasi ERP Tahapan SDLC Hata Maulana, M.T.I.
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
Struktur Tugas dan Fungsi Utama Layanan Teknologi Informasi
SISTEM TERDISTRIBUSI Definisi :
Pertemuan 1 Pengantar Pengembangan Sistem
Mobile Courier User Training Kramat Raya 43, Xprins Meeting Room May 8th, 2014.
Transisi Layanan Teknologi Informasi
Operasi Layanan Teknologi Informasi
SKS: 3 (Tiga) Semester: 4 Oleh : Oman Somantri, S.Kom Selamat Belajar, All is Well….!!
Jaringan Komputer.
Sistem Informasi Berbasis Komputer
Computer Network Defence
V ERIZON SETTINGS FOR I P HONE, A NDROID, O UTLOOK, AND W INDOWS P HONE.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Network Management week 5
Here you'll find the complete solution about how to set up Roadrunner settings for iPhone, Android, Windows Phone and Outlook. Unable to set up Roadrunner.
Fix problems opening Norton  Fix problems opening Norton This problem can happen after you update Norton. To fix the matter, restart the computer. Fix.
Hardware Merupakan komponen-komponen fisik peralatan yang membentuk suatu sistem komputer, serta peralatan- peralatan lain yang mendukung komputer dalam.
Manajemen Sumber Daya Informasi
Managing Technology Resources
SKS: 3 (Tiga) Semester: 4 Oleh : Oman Somantri, S.Kom Selamat Belajar, All is Well….!!
Penanganan Insiden Forensik
SKS: 3 (Tiga) Semester: 4 Oleh : Oman Somantri, S.Kom Selamat Belajar, All is Well….!!
Transcript presentasi:

IT Policy DLM

Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.

 Menjamin kepuasan pelanggan tetap prima  Menjamin kerahsiaan perusahaan terhadap kompetitor  Menjamin keteraturan dokumentasi  Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT  Menjaga image perusahaan  Mengurangi resiko dalam keadaan darurat  Kelengkapan persyaratan ISO  Menjaga disiplin karyawan sesuai prosedure

 Penggunaan photo sebagai gambar depan PC atau Computer  Jaringan sosial internet  Pemakaian USB  Peng copy an data busines perusahaan  Pencegahan virus (zero virus attack)  Back-up data  Penggunaan password  Etika keselamatan dan keamanan pemakaian computer  Pelatihan untuk pengguna computer

1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit

 HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training  IT Support : Menyiapkan dan menentukan materi training  Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing

 Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan  Ruang lingkup : Seluruh karyawan

 Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya.  Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan  Setelah pelatihan diverifikasi lagi kemampuannya  Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut

 Operator :  Jobshop Leader:  Jobshop Programmer:  Product Development Eng.:  Marketing Eng  Accounting & Finance Staff :  Staff Administration:  Manager :

Optimal Performance (System) Smart & Responsible (Users) Reliable & Secure (Hardware & Infrastructure) S S peed I I nformative R R eliable

WhyWhy

W hat : Hardware, Software & User W hen : From Inquiry to Disposal W here : DLM W ho : Everyone H ow : Detail Process S afety  IT Assets S ecurity  Prevent & Protect C onsistency  Data

- - Drawing - Administration - Purchasing - Production - Logistic - Marketing

: User : Management : IT : Logistic : Purchasing : HR-GA

No.Title ManagerStaffIT 1User Guideline vvv 2Procurement vvv 3Installation vvv 4 & Internet Usage vvv 5Emergency vvv 6Disposal vv 7Budgeting vv 8Server SOP v 9Audit vv 10Maintenance vvv 11Backup v 12External Data Storage Usage vvv 13Virus handling vvv

evaluate each user skills Fulfill Standard ? Evaluate every new employee Give training Revaluate N Place at suitable position Y Done by HR. Applied to all employee. Socializing Standard User Guidance

MarketingEngineeringLogisticFinanceManage r Plant Operato r Outlook HighMedium Word HighLow Mediu m Excel Medium High Medium Power Point HighLow Mediu m CRM HighLow Mediu m TruTopFab MediumHighMediumLow Platinum ---High- Optipro --MediumHigh-

Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Give to Purchasing to be executed Returned to Requester Approve Y N

WHY : - Standardized IT Inventory tandardized Maintenance tandardized Services tandardized Operation - Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services

Received by Logistic & Informed IT Register & Labeled Setup according Standard Backup Softcopy to Server Ready to use Testin g Y N

WHY : - Manageable IT Asset - Optimal performance - Can be outsourced - Smart User WHAT : 1. Hardware 2. Software

Work Communicatio n EducativeInformativeLegal

Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast for non work related Send oversized attachment Use personal for work communication

Do Communicate with colleague Communicate with Business Partner Gather information Work related research Don’t Illegal usage Blast for non work related

1. W orking time efficiency 2. N etwork Security 3. N etwork Traffic Resource 4. C ompany image

Case : -I-Inconsistency data -P-Power failure -N-Nature disaster

User inform to IT Analyze Problem Inform User Log Problem Find Solution Report to management

After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP

Locate the closets fire extinguisher Go to server room Shut down server Pull off all hard disk & take it to save area

WHY : - Controlled - Data Security WHAT : 1. Hardware 2. Software 3. Hard disk

Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Execute Asset disposal process Approve d En d Revised Asset List Y N

User request to IT IT Analyze request Update IT Asset List Approve d End Uninstall Software YN

Backup current Hard disk Do testing Keep Old Hard disk for 2 Years Problem Solve proble m Put on Log Y N Prepare new Hard disk Restore Backup on new hard disk > 2 years Destroy Hard disk Y

Review IT Asset List Make Proposal Request GM Approval Approve d Request Managing Director Approval Approve d Include to Next Year Budgeting Revised Proposal N N Y Y

- Controlled - P- P- P- Planned - W- W- W- Well Budgeted - M- M- M- Maintained

Standard steps in Turning On / Off DLM servers & Network Peripherals. 1.HP Procurve Switch (3) 2.Peplink 3.Domain Controller 4.Gateway 5.Tops Planet 7.Backup PC 8.Anti Virus

Turning ON Turning Off Anti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP ProcurveAnti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP Procurve

Data Files + Application + Database

Prevent virus infection

Scan at Isolated PC Clean Re-Scan Allowed to be used Format Y N Clean Y N

1.P revent Spreading 2.B asic First-Aid for User

Scan & Remove with Anti Virus Success Unplug from Network Restart Inform IT Y N

Confirm Virus attack Success Replace PC with Substitute Restar t Format Infected PC Y N Try to remove in Save mode Re-Scan Clean Return PC to User Y N