Hi all,
I need some help. I am working as an HR professional in an IT company. We need to draft a code security policy to ensure that when an employee leaves the company, they do not copy any code or documents to avoid any IT violations. Could anyone working in an IT company help me resolve this issue?
Thanks
From India, Pune
I need some help. I am working as an HR professional in an IT company. We need to draft a code security policy to ensure that when an employee leaves the company, they do not copy any code or documents to avoid any IT violations. Could anyone working in an IT company help me resolve this issue?
Thanks
From India, Pune
Although I have not worked in an IT company, I have handled vendor security desk as an assignment manager at an IT company and served as an Ops Manager in security agencies.
IT SECURITY SOP GUIDE
Technically speaking, the security procedures involve the IT department in managing information security. Few points that the Physical Security department must know and handle are as follows:
1. All electronic devices in the company's inventory, including laptops, are identified with specific code numbers for security to determine ownership.
2. These inventory items require special approval from the IT department for any movement within or outside the company premises.
3. All items and device ports and USBs are disabled by the IT Department when used on company servers or logins to prevent personal use or connection of external devices.
4. Security control and checks are exercised on all electronic devices entering or leaving premises, following approval protocols from the IT department.
5. Unauthorized electronic devices, including mobile phones, are seized and submitted to the IT department for further checks for any misappropriation or information leaks.
6. Offices are equipped with electronic RFID locks accessible only with RFID cards issued to authorized personnel.
7. RFID turnstiles are used at access gates or doors to prevent tailgating.
8. A robust visitor management system linked to access control via the intranet is essential for granting access to approved individuals.
9. Restricted areas are physically manned with special permission required on an approval form.
10. Display of ID cards/visitor cards/vendor cards/guest cards at all times is mandatory.
11. Surprise checks for electronic media security can be conducted by the IT department in coordination with the facility team.
12. Periodic audits of electronic or IT devices should be conducted under the management team's control or any appointed team of trusted members.
13. CCTVs and RFID access should be installed in all vulnerable areas.
14. Regular training on electronic media security and procedures should be provided to employees, especially during induction.
15. An SAP-based HR software can help control goods movement and employee clearance upon leaving the premises.
16. Employees resigning and leaving the organization must undergo a manual clearance procedure through each department, subject to approval from department heads.
17. An exit interview is necessary for employees, ensuring the presence of at least one family member for a safe transition after due clearance. This is crucial to prevent any untoward incidents or stress-related issues.
Thank you.
From India, Vadodara
IT SECURITY SOP GUIDE
Technically speaking, the security procedures involve the IT department in managing information security. Few points that the Physical Security department must know and handle are as follows:
1. All electronic devices in the company's inventory, including laptops, are identified with specific code numbers for security to determine ownership.
2. These inventory items require special approval from the IT department for any movement within or outside the company premises.
3. All items and device ports and USBs are disabled by the IT Department when used on company servers or logins to prevent personal use or connection of external devices.
4. Security control and checks are exercised on all electronic devices entering or leaving premises, following approval protocols from the IT department.
5. Unauthorized electronic devices, including mobile phones, are seized and submitted to the IT department for further checks for any misappropriation or information leaks.
6. Offices are equipped with electronic RFID locks accessible only with RFID cards issued to authorized personnel.
7. RFID turnstiles are used at access gates or doors to prevent tailgating.
8. A robust visitor management system linked to access control via the intranet is essential for granting access to approved individuals.
9. Restricted areas are physically manned with special permission required on an approval form.
10. Display of ID cards/visitor cards/vendor cards/guest cards at all times is mandatory.
11. Surprise checks for electronic media security can be conducted by the IT department in coordination with the facility team.
12. Periodic audits of electronic or IT devices should be conducted under the management team's control or any appointed team of trusted members.
13. CCTVs and RFID access should be installed in all vulnerable areas.
14. Regular training on electronic media security and procedures should be provided to employees, especially during induction.
15. An SAP-based HR software can help control goods movement and employee clearance upon leaving the premises.
16. Employees resigning and leaving the organization must undergo a manual clearance procedure through each department, subject to approval from department heads.
17. An exit interview is necessary for employees, ensuring the presence of at least one family member for a safe transition after due clearance. This is crucial to prevent any untoward incidents or stress-related issues.
Thank you.
From India, Vadodara
Looking for something specific? - Join & Be Part Of Our Community and get connected with the right people who can help. Our AI-powered platform provides real-time fact-checking, peer-reviewed insights, and a vast historical knowledge base to support your search.