1 / 49

Kebijakan Perusahaan Mengenai IT

Kebijakan Perusahaan Mengenai IT. IT Policy DLM. Tujuan. Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan.

lyoungs
Download Presentation

Kebijakan Perusahaan Mengenai IT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kebijakan Perusahaan Mengenai IT IT Policy DLM

  2. Tujuan Mengatur dan memberikan pedoman kepada seluruh Karyawan agar penggunaan perangkat IT dapat dipakai secara optimal untuk kepentingan operasi Perusahaan. Hal ini diperlukan karena tipikal operasi DLM sangat tergantung kepada perangkat IT, baik untuk permesinan maupun untuk data penunjang lainnya.

  3. Semua Perusahaan yang mempunyai visi menjadi kelas dunia mempunyai IT Policy • Menjamin kepuasan pelanggan tetap prima • Menjamin kerahsiaan perusahaan terhadap kompetitor • Menjamin keteraturan dokumentasi • Meminimalisasi kemungkinan-kemungkinan kegagalan operasi fasilitas IT • Menjaga image perusahaan • Mengurangi resiko dalam keadaan darurat • Kelengkapan persyaratan ISO • Menjaga disiplin karyawan sesuai prosedure

  4. Contoh-contoh pengaturan dalam hal : • Penggunaan photo sebagai gambar depan PC atau Computer • Jaringan sosial internet • Pemakaian USB • Peng copy an data busines perusahaan • Pencegahan virus (zero virus attack) • Back-up data • Penggunaan password • Etika keselamatan dan keamanan pemakaian computer • Pelatihan untuk pengguna computer

  5. Pengaturan Kebijaksanaan ini meliputi : 1. Pedoman dasar untuk pengguna perangkat IT 2. Pembelian barang fasilitas IT * 3. Instalasi barang fasilitas IT * 4. Penggunaan Email dan Internet 5. Penanganan Virus 6. Penanganan resiko dalam keadaan darurat 7. Perbaikan barang fasilitas IT * 8. Proses back-up data dan aplikasi 9. Penggunaan external data storage 10. Pembuangan barang fasilitas IT * 11. Standarnisasi dan pengajuan anggaran barang/fasilitas IT * 12. Standar pengoperasian server * 13. Audit

  6. Tanggung jawab untuk mensosialisasikan : • HRD : Mensosialisasikan IT Policy dan Mengkordinasikan training • IT Support : Menyiapkan dan menentukan materi training • Manager : Bertanggung jawab terhadap pelaksanaan IT Policy di department masing-masing

  7. 1. Pedoman penggunaan perangkat IT • Tujuan : Memberdayakan semua pemakai dalam menggunakan perangkat IT secara optimal dan aman melalui sosialisasi pedoman IT dan pelatihan-pelatihan • Ruang lingkup : Seluruh karyawan

  8. Procedur Umum • Setiap karyawan / user baru akan di review kemampuan IT nya, sesuai dengan keperluan posisi kerjanya. • Jika kemampuannya dibawah standar akan dijadwalkan untuk diberikan pelatihan • Setelah pelatihan diverifikasi lagi kemampuannya • Jika sampai dua kali pelatihan tidak juga memenuhi standar, karyawan tersebut tidak dapat menempati posisi pekerjaan tersebut

  9. Standar/kwalifikasi pengetahuan IT menurut posisi • Operator :...................................................... • Jobshop Leader:........................................... • Jobshop Programmer:.................................. • Product Development Eng.:......................... • Marketing Eng.............................................. • Accounting & Finance Staff :...................... • Staff Administration:................................... • Manager :.....................................................

  10. DLM IT POLICY 2010 Speed Informative Reliable Optimal Performance (System) Reliable & Secure (Hardware & Infrastructure) Smart & Responsible (Users)

  11. What is it Why

  12. What What : Hardware, Software & User When :From Inquiry to Disposal Where : DLM Who : Everyone How : Detail Process Safety  IT Assets Security  Prevent & Protect Consistency  Data

  13. Why • Email • Drawing • Administration • Purchasing • Production • Logistic • Marketing 90% Operational Using IT

  14. Icons : User : Management : IT : Logistic : Purchasing : HR-GA

  15. 1. User Guidance Place at suitable position Y evaluate each user skills Give training Socializing Standard User Guidance Fulfill Standard ? N Evaluate every new employee Revaluate Done by HR. Applied to all employee.

  16. Skill vs. Work area

  17. 2. Procurement Fill in Purchase Request Request Supervisor Signature Request IT Approval Request GM Approval Approve Y N Returned to Requester Give to Purchasing to be executed

  18. Procurement • WHY : • Standardized IT Inventory • Standardized Maintenance • Standardized Services • Standardized Operation • Controlled Procurement WHAT : 1. Hardware 2. Software 3. Services

  19. 3. Installation Received by Logistic & Informed IT Register & Labeled Backup Softcopy to Server Setup according Standard N Testing Y Ready to use

  20. Installation • WHY : • Manageable IT Asset • Optimal performance • Can be outsourced • Smart User WHAT : 1. Hardware 2. Software

  21. 4. Internet & Email Work Communication Educative Informative Legal

  22. Email Do & Don’t

  23. Internet Do & Don’t

  24. Why all those Do & Don’t Working time efficiency Network Security Network Traffic Resource Company image

  25. 5. Emergency • Case : • Inconsistency data • Power failure • Nature disaster

  26. Case 1 : Inconsistency data User inform to IT Analyze Problem Find Solution Inform User Log Problem Report to management

  27. Case 2 : Power Failure After power back on Start on Save Mode Restart Wait for Confirmation from IT to start using ERP

  28. Case 3 : Nature Disaster Locate the closets fire extinguisher Pull off all hard disk & take it to save area Go to server room Shut down server

  29. 6. Disposal WHAT : 1. Hardware 2. Software 3. Hard disk • WHY : • Controlled • Data Security

  30. Hardware Disposal Review IT Asset Age & Performance Make Asset disposal request Request GM Approval Approved Y N End Revised Asset List Execute Asset disposal process

  31. Software Disposal User request to IT IT Analyze request Approved Y N End Uninstall Software Update IT Asset List

  32. Hard Disk Disposal Prepare new Hard disk Backup current Hard disk Restore Backup on new hard disk Do testing Keep Old Hard disk for 2 Years N Problem Put on Log Y Destroy Hard disk > 2 years Y Solve problem

  33. 7. Standardization & Budgeting Review IT Asset List Revised Proposal N Make Proposal Request GM Approval Approved N Y Request Managing Director Approval Approved Y Include to Next Year Budgeting

  34. Why ? • - Controlled • Planned • Well Budgeted • Maintained

  35. 8. Server SOP Standard steps in Turning On / Off DLM servers & Network Peripherals. HP Procurve Switch (3) Peplink Domain Controller Gateway Tops1000 Planet Backup PC Anti Virus

  36. HP Procurve Anti Virus Peplink Backup Data Domain Controller Planet Gateway Tops1000 Tops1000 Gateway Planet Domain Controller Backup Data Peplink Anti Virus HP Procurve

  37. 9. Audit

  38. Purpose Improvement

  39. 10. Maintenance

  40. Purpose Healthy & Hygienist working environment

  41. 11. Backup Data Files + Application + Database

  42. Purpose Data and system Reliability

  43. 11. External Data Storage why Prevent virus infection

  44. What to do Scan at Isolated PC Re-Scan Format Clean Clean N N Y Y Allowed to be used

  45. 12. Virus Handling Prevent Spreading Basic First-Aid for User

  46. Basic User Know-How Scan & Remove with Anti Virus Unplug from Network Inform IT Success N Y Restart

  47. IT next action Confirm Virus attack Try to remove in Save mode Replace PC with Substitute Format Infected PC Success N Y Restart N Return PC to User Clean Re-Scan Y

  48. Thank you

More Related