IT Policy DLM
Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.
Menjamin kepuasan pelanggan tetap prima Menjamin kerahsiaan perusahaan terhadap kompetitor Menjamin keteraturan dokumentasi Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT Menjaga image perusahaan Mengurangi resiko dalam keadaan darurat Kelengkapan persyaratan ISO Menjaga disiplin karyawan sesuai prosedure
Penggunaan photo sebagai gambar depan PC atau Computer Jaringan sosial internet Pemakaian USB Peng copy an data busines perusahaan Pencegahan virus (zero virus attack) Back-up data Penggunaan password Etika keselamatan dan keamanan pemakaian computer Pelatihan untuk pengguna computer
1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit
HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training IT Support : Menyiapkan dan menentukan materi training Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing
Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan Ruang lingkup : Seluruh karyawan
Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya. Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan Setelah pelatihan diverifikasi lagi kemampuannya Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut
Operator : Jobshop Leader: Jobshop Programmer: Product Development Eng.: Marketing Eng Accounting & Finance Staff : Staff Administration: Manager :
Optimal Performance (System) Smart & Responsible (Users) Reliable & Secure (Hardware & Infrastructure) S S peed I I nformative R R eliable
WhyWhy
W hat : Hardware, Software & User W hen : From Inquiry to Disposal W here : DLM W ho : Everyone H ow : Detail Process S afety IT Assets S ecurity Prevent & Protect C onsistency Data
- - Drawing - Administration - Purchasing - Production - Logistic - Marketing
: User : Management : IT : Logistic : Purchasing : HR-GA
No.Title ManagerStaffIT 1User Guideline vvv 2Procurement vvv 3Installation vvv 4 & Internet Usage vvv 5Emergency vvv 6Disposal vv 7Budgeting vv 8Server SOP v 9Audit vv 10Maintenance vvv 11Backup v 12External Data Storage Usage vvv 13Virus handling vvv
evaluate each user skills Fulfill Standard ? Evaluate every new employee Give training Revaluate N Place at suitable position Y Done by HR. Applied to all employee. Socializing Standard User Guidance
MarketingEngineeringLogisticFinanceManage r Plant Operato r Outlook HighMedium Word HighLow Mediu m Excel Medium High Medium Power Point HighLow Mediu m CRM HighLow Mediu m TruTopFab MediumHighMediumLow Platinum ---High- Optipro --MediumHigh-
Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Give to Purchasing to be executed Returned to Requester Approve Y N
WHY : - Standardized IT Inventory tandardized Maintenance tandardized Services tandardized Operation - Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services
Received by Logistic & Informed IT Register & Labeled Setup according Standard Backup Softcopy to Server Ready to use Testin g Y N
WHY : - Manageable IT Asset - Optimal performance - Can be outsourced - Smart User WHAT : 1. Hardware 2. Software
Work Communicatio n EducativeInformativeLegal
Do Communicate with colleague Communicate with Business Partner Don’t Unauthorized password sharing Illegal usage Blast for non work related Send oversized attachment Use personal for work communication
Do Communicate with colleague Communicate with Business Partner Gather information Work related research Don’t Illegal usage Blast for non work related
1. W orking time efficiency 2. N etwork Security 3. N etwork Traffic Resource 4. C ompany image
Case : -I-Inconsistency data -P-Power failure -N-Nature disaster
User inform to IT Analyze Problem Inform User Log Problem Find Solution Report to management
After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP
Locate the closets fire extinguisher Go to server room Shut down server Pull off all hard disk & take it to save area
WHY : - Controlled - Data Security WHAT : 1. Hardware 2. Software 3. Hard disk
Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Execute Asset disposal process Approve d En d Revised Asset List Y N
User request to IT IT Analyze request Update IT Asset List Approve d End Uninstall Software YN
Backup current Hard disk Do testing Keep Old Hard disk for 2 Years Problem Solve proble m Put on Log Y N Prepare new Hard disk Restore Backup on new hard disk > 2 years Destroy Hard disk Y
Review IT Asset List Make Proposal Request GM Approval Approve d Request Managing Director Approval Approve d Include to Next Year Budgeting Revised Proposal N N Y Y
- Controlled - P- P- P- Planned - W- W- W- Well Budgeted - M- M- M- Maintained
Standard steps in Turning On / Off DLM servers & Network Peripherals. 1.HP Procurve Switch (3) 2.Peplink 3.Domain Controller 4.Gateway 5.Tops Planet 7.Backup PC 8.Anti Virus
Turning ON Turning Off Anti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP ProcurveAnti Virus Backup Data Planet Tops1000 Gateway Domain Controller Peplink HP Procurve
Data Files + Application + Database
Prevent virus infection
Scan at Isolated PC Clean Re-Scan Allowed to be used Format Y N Clean Y N
1.P revent Spreading 2.B asic First-Aid for User
Scan & Remove with Anti Virus Success Unplug from Network Restart Inform IT Y N
Confirm Virus attack Success Replace PC with Substitute Restar t Format Infected PC Y N Try to remove in Save mode Re-Scan Clean Return PC to User Y N