Hello, I have noticed many of my colleagues in the IT-HR sector searching for HR policies related to IT. I believe the resources I am providing will be beneficial to them, as well as to professionals in other industries. Additionally, I am attaching a Security Policy, with the hope that it will be universally useful.
Thank you,
Octavious
From India, Mumbai
Thank you,
Octavious
From India, Mumbai
This seems to be a very big book! I am attaching our company IT Policy. Its two pages and works well for small organisations.
From India, Calcutta
From India, Calcutta
Hi all Here is the Soft copy of the Information Technology Act, 2000. Hope this will be useful for all HR fraternities in IT & ITES. Have a great week ahead. Thanks & Regards Kalyan R
From India, Madras
From India, Madras
Hi friends, One of my friend looking for BPO related HR Policy.can any one help me? rgds PR
From India, Hyderabad
From India, Hyderabad
Hi,
This is Anu. I have gone through your links which are really helpful. I was wondering if you could please help me out with the topic of my project, i.e., HR MANUAL FOR IT COMPANY. The place where I am doing my internship is a networking company, i.e., they are distributors in computer hardware. I need to submit my project by April 1st. Please help me.
Regards,
Anu
From India, Bangalore
This is Anu. I have gone through your links which are really helpful. I was wondering if you could please help me out with the topic of my project, i.e., HR MANUAL FOR IT COMPANY. The place where I am doing my internship is a networking company, i.e., they are distributors in computer hardware. I need to submit my project by April 1st. Please help me.
Regards,
Anu
From India, Bangalore
Hi friends, we are running a background verification company and we need an information security policy. Please find below our findings and share the detailed policy.
Access Control Policy
1. Please share the access control policy and also the group policy setting for passwords on the server.
Encryption Tools
2. Encryption tools should be managed and maintained for Scoped Data.
Incident Management Process
3. It is recommended to have an incident management process to restore normal service in case of an incident.
Accuracy and Currency of Personal Information
4. It is recommended to have a process for ensuring the accuracy and currency of personal information at the direction of the client.
Purpose Limitation
5. There should be a process to ensure that the personal information provided by an individual is limited to the purposes described in the organization's privacy notice.
Enforcement Mechanisms
6. Enforcement mechanisms should be applied to employees, contractors, and agents who violate privacy policies or confidentiality requirements provided by the client.
Thank you.
From India, Coimbatore
Access Control Policy
1. Please share the access control policy and also the group policy setting for passwords on the server.
Encryption Tools
2. Encryption tools should be managed and maintained for Scoped Data.
Incident Management Process
3. It is recommended to have an incident management process to restore normal service in case of an incident.
Accuracy and Currency of Personal Information
4. It is recommended to have a process for ensuring the accuracy and currency of personal information at the direction of the client.
Purpose Limitation
5. There should be a process to ensure that the personal information provided by an individual is limited to the purposes described in the organization's privacy notice.
Enforcement Mechanisms
6. Enforcement mechanisms should be applied to employees, contractors, and agents who violate privacy policies or confidentiality requirements provided by the client.
Thank you.
From India, Coimbatore
CiteHR is an AI-augmented HR knowledge and collaboration platform, enabling HR professionals to solve real-world challenges, validate decisions, and stay ahead through collective intelligence and machine-enhanced guidance. Join Our Platform.