How Can These HR and Security Policies Benefit IT Professionals and Beyond?

octavious
Hello, I have noticed many of my colleagues in the IT-HR sector searching for HR policies related to IT. I believe the resources I am providing will be beneficial to them, as well as to professionals in other industries. Additionally, I am attaching a Security Policy, with the hope that it will be universally useful.

Thank you,
Octavious
2 Attachment(s) [Login To View]

navneetk
This seems to be a very big book!

I am attaching our company IT Policy. It's two pages and works well for small organizations.
1 Attachment(s) [Login To View]

Kalyan R
Hi all,

Here is the soft copy of the Information Technology Act, 2000. Hope this will be useful for all HR fraternities in IT & ITES.

Have a great week ahead.

Thanks & Regards,
Kalyan R
1 Attachment(s) [Login To View]

praveenmba2005
Hi friends,

One of my friends is looking for BPO-related HR policies. Can anyone help me?

Regards,
PR
anubanerjee134
Hi,

This is Anu. I have gone through your links which are really helpful. I was wondering if you could please help me out with the topic of my project, i.e., HR MANUAL FOR IT COMPANY. The place where I am doing my internship is a networking company, i.e., they are distributors in computer hardware. I need to submit my project by April 1st. Please help me.

Regards,
Anu
svelu
Hi friends, we are running a background verification company and we need an information security policy. Please find below our findings and share the detailed policy.

Access Control Policy

1. Please share the access control policy and also the group policy setting for passwords on the server.

Encryption Tools

2. Encryption tools should be managed and maintained for Scoped Data.

Incident Management Process

3. It is recommended to have an incident management process to restore normal service in case of an incident.

Accuracy and Currency of Personal Information

4. It is recommended to have a process for ensuring the accuracy and currency of personal information at the direction of the client.

Purpose Limitation

5. There should be a process to ensure that the personal information provided by an individual is limited to the purposes described in the organization's privacy notice.

Enforcement Mechanisms

6. Enforcement mechanisms should be applied to employees, contractors, and agents who violate privacy policies or confidentiality requirements provided by the client.

Thank you.
If you are knowledgeable about any fact, resource or experience related to this topic - please add your views. For articles and copyrighted material please only cite the original source link. Each contribution will make this page a resource useful for everyone. Join To Contribute