490 likes | 501 Views
Kebijakan Perusahaan Mengenai IT. IT Policy DLM. Tujuan. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan.
E N D
Kebijakan Perusahaan Mengenai IT IT Policy DLM
Tujuan Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.
Semua Perusahaan yang mempunyai visi menjadi kelas dunia mempunyai IT Policy • Menjamin kepuasan pelanggan tetap prima • Menjamin kerahsiaan perusahaan terhadap kompetitor • Menjamin keteraturan dokumentasi • Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT • Menjaga image perusahaan • Mengurangi resiko dalam keadaan darurat • Kelengkapan persyaratan ISO • Menjaga disiplin karyawan sesuai prosedure
Contoh-contoh pengaturan dalam hal : • Penggunaan photo sebagai gambar depan PC atau Computer • Jaringan sosial internet • Pemakaian USB • Peng copy an data busines perusahaan • Pencegahan virus (zero virus attack) • Back-up data • Penggunaan password • Etika keselamatan dan keamanan pemakaian computer • Pelatihan untuk pengguna computer
Pengaturan Kebijaksanaan ini meliputi : 1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan Email dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit
Tanggung jawab untuk mensosialisasikan : • HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training • IT Support : Menyiapkan dan menentukan materi training • Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing
1. Pedoman penggunaan perangkat IT • Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan • Ruang lingkup : Seluruh karyawan
Procedur Umum • Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya. • Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan • Setelah pelatihan diverifikasi lagi kemampuannya • Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut
Standar/kwalifikasi pengetahuan IT menurut posisi • Operator :...................................................... • Jobshop Leader:........................................... • Jobshop Programmer:.................................. • Product Development Eng.:......................... • Marketing Eng.............................................. • Accounting & Finance Staff :...................... • Staff Administration:................................... • Manager :.....................................................
DLM IT POLICY 2010 Speed Informative Reliable Optimal Performance (System) Reliable & Secure (Hardware & Infrastructure) Smart & Responsible (Users)
What is it Why
What What : Hardware, Software & User When :From Inquiry to Disposal Where : DLM Who : Everyone How : Detail Process Safety IT Assets Security Prevent & Protect Consistency Data
Why • Email • Drawing • Administration • Purchasing • Production • Logistic • Marketing 90% Operational Using IT
Icons : User : Management : IT : Logistic : Purchasing : HR-GA
1. User Guidance Place at suitable position Y evaluate each user skills Give training Socializing Standard User Guidance Fulfill Standard ? N Evaluate every new employee Revaluate Done by HR. Applied to all employee.
2. Procurement Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Approve Y N Returned to Requester Give to Purchasing to be executed
Procurement • WHY : • Standardized IT Inventory • Standardized Maintenance • Standardized Services • Standardized Operation • Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services
3. Installation Received by Logistic & Informed IT Register & Labeled Backup Softcopy to Server Setup according Standard N Testing Y Ready to use
Installation • WHY : • Manageable IT Asset • Optimal performance • Can be outsourced • Smart User WHAT : 1. Hardware 2. Software
4. Internet & Email Work Communication Educative Informative Legal
Why all those Do & Don’t Working time efficiency Network Security Network Traffic Resource Company image
5. Emergency • Case : • Inconsistency data • Power failure • Nature disaster
Case 1 : Inconsistency data User inform to IT Analyze Problem Find Solution Inform User Log Problem Report to management
Case 2 : Power Failure After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP
Case 3 : Nature Disaster Locate the closets fire extinguisher Pull off all hard disk & take it to save area Go to server room Shut down server
6. Disposal WHAT : 1. Hardware 2. Software 3. Hard disk • WHY : • Controlled • Data Security
Hardware Disposal Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Approved Y N End Revised Asset List Execute Asset disposal process
Software Disposal User request to IT IT Analyze request Approved Y N End Uninstall Software Update IT Asset List
Hard Disk Disposal Prepare new Hard disk Backup current Hard disk Restore Backup on new hard disk Do testing Keep Old Hard disk for 2 Years N Problem Put on Log Y Destroy Hard disk > 2 years Y Solve problem
7. Standardization & Budgeting Review IT Asset List Revised Proposal N Make Proposal Request GM Approval Approved N Y Request Managing Director Approval Approved Y Include to Next Year Budgeting
Why ? • - Controlled • Planned • Well Budgeted • Maintained
8. Server SOP Standard steps in Turning On / Off DLM servers & Network Peripherals. HP Procurve Switch (3) Peplink Domain Controller Gateway Tops1000 Planet Backup PC Anti Virus
HP Procurve Anti Virus Peplink Backup Data Domain Controller Planet Gateway Tops1000 Tops1000 Gateway Planet Domain Controller Backup Data Peplink Anti Virus HP Procurve
Purpose Improvement
Purpose Healthy & Hygienist working environment
11. Backup Data Files + Application + Database
Purpose Data and system Reliability
11. External Data Storage why Prevent virus infection
What to do Scan at Isolated PC Re-Scan Format Clean Clean N N Y Y Allowed to be used
12. Virus Handling Prevent Spreading Basic First-Aid for User
Basic User Know-How Scan & Remove with Anti Virus Unplug from Network Inform IT Success N Y Restart
IT next action Confirm Virus attack Try to remove in Save mode Replace PC with Substitute Format Infected PC Success N Y Restart N Return PC to User Clean Re-Scan Y