No Tags Found!


Hello, I have noticed many of my colleagues in the IT-HR sector searching for HR policies related to IT. I believe the resources I am providing will be beneficial to them, as well as to professionals in other industries. Additionally, I am attaching a Security Policy, with the hope that it will be universally useful.

Thank you,
Octavious

From India, Mumbai
Attached Files (Download Requires Membership)
File Type: pdf e_policy_handbook_for_it_168.pdf (952.7 KB, 8635 views)
File Type: zip Security Policy.zip (1.23 MB, 6614 views)

Acknowledge(4)
NM
DI
CA
AT
Amend(0)

This seems to be a very big book! I am attaching our company IT Policy. Its two pages and works well for small organisations.
From India, Calcutta
Attached Files (Download Requires Membership)
File Type: doc it_policycandid_156.doc (27.5 KB, 2910 views)

Acknowledge(2)
NM
AT
Amend(0)

Hi all Here is the Soft copy of the Information Technology Act, 2000. Hope this will be useful for all HR fraternities in IT & ITES. Have a great week ahead. Thanks & Regards Kalyan R
From India, Madras
Attached Files (Download Requires Membership)
File Type: pdf it_act_2000_198.pdf (243.6 KB, 1606 views)

Acknowledge(0)
Amend(0)

Hi friends, One of my friend looking for BPO related HR Policy.can any one help me? rgds PR
From India, Hyderabad
Acknowledge(0)
Amend(0)

Hi,

This is Anu. I have gone through your links which are really helpful. I was wondering if you could please help me out with the topic of my project, i.e., HR MANUAL FOR IT COMPANY. The place where I am doing my internship is a networking company, i.e., they are distributors in computer hardware. I need to submit my project by April 1st. Please help me.

Regards,
Anu

From India, Bangalore
Acknowledge(0)
Amend(0)

Hi friends, we are running a background verification company and we need an information security policy. Please find below our findings and share the detailed policy.

Access Control Policy

1. Please share the access control policy and also the group policy setting for passwords on the server.

Encryption Tools

2. Encryption tools should be managed and maintained for Scoped Data.

Incident Management Process

3. It is recommended to have an incident management process to restore normal service in case of an incident.

Accuracy and Currency of Personal Information

4. It is recommended to have a process for ensuring the accuracy and currency of personal information at the direction of the client.

Purpose Limitation

5. There should be a process to ensure that the personal information provided by an individual is limited to the purposes described in the organization's privacy notice.

Enforcement Mechanisms

6. Enforcement mechanisms should be applied to employees, contractors, and agents who violate privacy policies or confidentiality requirements provided by the client.

Thank you.

From India, Coimbatore
Acknowledge(0)
Amend(0)

CiteHR is an AI-augmented HR knowledge and collaboration platform, enabling HR professionals to solve real-world challenges, validate decisions, and stay ahead through collective intelligence and machine-enhanced guidance. Join Our Platform.







Contact Us Privacy Policy Disclaimer Terms Of Service

All rights reserved @ 2025 CiteHR ®

All Copyright And Trademarks in Posts Held By Respective Owners.