Document: Information Communication Technology Policy for Emakhazeni Local Municipality

Description

Conclusion

The network and Information Technology as a whole is very important to any organization and abuse of such services may lead to large bills in support and repairs as well as security breaches in some cases. Unfortunately, strict action is important and cannot be ignored and users should be made aware of such actions. There cannot be a scenario where freedom reigns on the network and users have free access to do as they please. It is very important to control and properly implement the policy to act as a tool to ensure such control and to ensure that the relevant performance and security levels are reached on the network and with Information Technology as a whole.

The policy on ensures the protection of the government employee and the interests of the government, locally, provincially and nationally. Without such control measures the transparency policy is not adhered to and a secure network becomes insecure, unstable and very expensive to maintain.

Table of Contents

  • 1. TERMS AND TERMINOLOGIES 3
  • 2. MANAGEMENT OF IT PERSONNEL 4
  • 2.1 PURPOSE OF THE POLICY 4
  • 2.2 HIRING OF PERSONNEL 4
  • 2.3 TRAINING OF STAFF 5
  • 2.4 TERMINATION OF SERVICES 5
  • 3. NETWORK AND PC HARDWARE AND SOFTWARE 5
  • 3.1 PURPOSE OF THE POLICY 5
  • 3.2 SCOPE AND USAGE OF THE NETWORK 6
  • 3.3 NETWORK ACCESS 7
  • 3.4 NETWORK SERVICES 9
  • 3.5 NETWORK AND PC SUPPORT 10
  • 3.6 NETWORK AND PC HARDWARE 11
  • 3.7 NETWORK AND PC SOFTWARE 12
  • 3.8 USERNAMES AND PASSWORDS 13
  • 4. INTERNET POLICY 15
  • 4.1 PURPOSE OF THE POLICY 15
  • 4.2 INTERNET USAGE 15
  • 4.3 INTERNET PUBLISHING 16
  • 5. ELECTRONIC MAIL (E-MAIL) POLICY 17
  • 5.1 PURPOSE OF THE POLICY 17
  • 5.2 E-MAIL USAGE 17
  • 6. ANTI-VIRUS AND FIREWALL POLICY 19
  • 6.1 PURPOSE OF THE POLICY 19
  • 6.2 ANTI-VIRUS AND FIREWALL USAGE AND APPLICATIONS 19
  • 7. SYSTEM DEVELOPMENT LIFE CYCLE 20
  • 7.1 PURPOSE OF THE POLICY 20
  • 7.2 CONSIDERATIONS OF CUSTOM DEVELOPED APPLICATION SOFTWARE 20
  • 8. DATA MANAGEMENT 20
  • 8.1 PURPOSE OF THE POLICY 21
  • 8.2 GENERATED AND INPUT DATA 21
  • 8.3 MANAGEMENT OF GENERATED AND INPUT DATA 21
  • 9. ASSET M ANAGEMENT 22
  • 9.1 PURPOSE OF THE POLICY 22
  • 9.2 USAGE OF INFORMATION TECHNOLOGY ASSETS 22
  • 9.3 MANAGEMENT OF ASSETS AND RECORDKEEPING 23
  • CONCLUSION
Cover: Information Communication Technology Policy for Emakhazeni Local Municipality

Rating

0
Your rating: None
3.333335
Average: 3.3 (3 votes)