{"id":4783,"date":"2024-04-15T12:39:59","date_gmt":"2024-04-15T12:39:59","guid":{"rendered":"https:\/\/hera.vistagroup.ge\/%e1%83%a9%e1%83%95%e1%83%94%e1%83%9c-%e1%83%a8%e1%83%94%e1%83%a1%e1%83%90%e1%83%ae%e1%83%94%e1%83%91\/policy\/it-policy\/"},"modified":"2024-04-18T11:41:08","modified_gmt":"2024-04-18T11:41:08","slug":"it-policy","status":"publish","type":"page","link":"https:\/\/hera-youth.ge\/en\/about-us\/policy\/it-policy\/","title":{"rendered":"IT Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4783\" class=\"elementor elementor-4783 elementor-3614\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ac96a2 e-flex e-con-boxed e-con e-parent\" data-id=\"9ac96a2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26b5d92 elementor-widget elementor-widget-text-editor\" data-id=\"26b5d92\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Introduction<br \/>1. The Association \u201cHERA-XXI\u201d IT Policy and Procedure Manual provides guidelines for the<br \/>selection, use, and protection of IT within the organization. These policies and procedures<br \/>must be followed by all staff members. The manual also outlines the procedures to be<br \/>followed for administering these policies effectively.<br \/>2. Association \u201cHERA-XXI\u201d is committed to keeping all IT policies current and relevant. Therefore,<br \/>periodic modifications, amendments, or additions to the policies and procedures may be<br \/>necessary.<br \/>3. We value the input of our employees and welcome any suggestions, recommendations, or<br \/>feedback on the policies and procedures specified in this manual.<br \/>4. This policy and its associated procedures are applicable to all individuals associated with the<br \/>organization, including employees, members, contractors, volunteers, and any other<br \/>affiliated parties.<br \/>Information Technology Security<br \/>5. This section provides guidelines for the protection, use, and accessibility of information<br \/>technology assets and resources within the Association. Its purpose is to ensure the<br \/>integrity, confidentiality, and availability of data and assets.<br \/>Physical Security<br \/>5.1 The Association \u201cHERA-XXI\u201d insures renewal\/upgrade of all electronic equipments in 5<br \/>years<br \/>5.2 The Association \u201cHERA-XXI\u201d insures surge protection for network equipment and<br \/>computers<br \/>5.3 Each person in the organization is responsible for the security and safety of portable<br \/>technology, such as laptops, notepads, iPads, etc., that are issued to them. The person<br \/>must ensure that these assets are kept safely at all times to protect their security.<br \/>5.4 In case of loss or damage, an assessment of the security measures will be conducted by<br \/>the designated authority to determine any necessary actions, which may include the<br \/>person\u2019s responsibility to reimburse the organization for the incurred loss or damage.<\/p>\n<p>Data Sharing and Accessibility<br \/>5.5 The Association will determine the information that can be shared with the public and<br \/>collaborating partners, including e-Health data management. Access controls and data<br \/>sharing agreements will be implemented to protect privacy, ensure compliance, and define<br \/>the responsibilities of all involved parties. Regular reviews will be conducted to align with<br \/>legal requirements and organizational needs.<\/p>\n<p>Technology Access<br \/>5.6 Each individual within the organization (as required) will be assigned a unique identification<br \/>code for accessing the organization\u2019s email and computers.<br \/>5.7 Email passwords are unique and must not be shared with any other individual within the<br \/>organization.<br \/>5.8 The Executive Director of the Association \u201cHERA-XXI\u201d is responsible for issuing the<br \/>identification codes and initial passwords to all individuals within the organization.<br \/>Email use:<br \/>5.9 The Association \u201cHERA-XXI\u201d provides email services to all individuals when relevant and<br \/>useful for their jobs.<br \/>5.10 Email is a standard and widely used communication method within the<br \/>organization. It is encouraged for appropriate communication among staff members,<br \/>volunteers, donors, partners, and others.<br \/>5.11 Examples of appropriate email use include: Communication with colleagues,<br \/>members, volunteers, donors, and partners. Distributing information to colleagues.<br \/>Sharing information about organization events and activities.<br \/>5.12 Users should exercise caution when making commitments or agreeing to purchases<br \/>via email.<br \/>Backup<br \/>6. This section is designed to protect data within the organization, ensuring it is not lost and<br \/>can be recovered in the event of equipment failure, intentional data destruction, or<br \/>disasters. This section applies to all equipment and data owned and operated by the<br \/>organization.<br \/>Definitions:<br \/>6.1 Backup: The process of saving files onto magnetic tape or other offline mass storage media to prevent data loss in case of equipment failure or destruction.<br \/>Timing:<br \/>6.2 Full backups will be performed after working hours from Monday to Friday. If backups<br \/>cannot be performed on Friday due to maintenance reasons, they shall be done on<br \/>Saturday or Sunday.<br \/>6.3 The IT personnel will perform regular backups and develop a procedure for testing<br \/>backups. They will also test the ability to restore data from backups on a monthly basis.<br \/>Data to be backed up<br \/>6.4 Data to be backed up includes user data stored on the hard drive. Systems to be backed<br \/>up include, but are not limited to: Work files on computers, File server and Mail data files.<br \/>Archive<br \/>6.5 Archives will be created at the end of every year in December. User account data<br \/>associated with file and mail servers will be archived one month after the employees<br \/>have left the organization.<br \/>File restoration<br \/>6.6 Users requiring file restoration must submit a request to the help desk, providing<br \/>information about the file\u2019s creation date, name, last modification date, and the date and<br \/>time it was deleted or destroyed.<br \/>Disaster recovery<br \/>6.7 All efforts will be made to prevent or limit the impact of a disaster on the organization\u2019s<br \/>information systems. The IT Disaster Recovery Plan may be implemented when<br \/>necessary. Key employees will be assigned responsibilities, including immediate response<br \/>to potential disasters, assessment of the extent and impact of the disaster, notification of<br \/>employees, and allocation of required responsibilities and activities.<br \/>INTERNET USE<br \/>7. The Association \u201cHERA-XXI\u201d provides internet access to its employees. However, it is crucial<br \/>to exercise responsible internet usage to prevent security problems that could<br \/>compromise the organization\u2019s data and reputation.<br \/>8. Users are strictly prohibited from knowingly introducing any form of computer virus,<br \/>Trojan, spyware, or other malware into the organization\u2019s network. In the event of a<br \/>software virus breach, it is imperative to report it immediately to the IT personnel.<br \/>9. The IT personnel are responsible for promptly addressing and mitigating any security breaches to minimize disruptions to the organization\u2019s business operations. Any instances<br \/>of software virus breaches should be reported immediately to the IT personnel. The IT<br \/>personnel will take appropriate actions to resolve the security breach and minimize any<br \/>potential disruptions to the organization\u2019s business operations.<br \/>Reviewed &amp;approved Date: 2021<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introduction1. The Association \u201cHERA-XXI\u201d IT Policy and Procedure Manual provides guidelines for theselection, use, and protection of IT within the organization. These policies and proceduresmust be followed by all staff members. The manual also outlines the procedures to befollowed for administering these policies effectively.2. Association \u201cHERA-XXI\u201d is committed to keeping all IT policies current and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4260,"parent":4738,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4783","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/pages\/4783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/comments?post=4783"}],"version-history":[{"count":1,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/pages\/4783\/revisions"}],"predecessor-version":[{"id":4784,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/pages\/4783\/revisions\/4784"}],"up":[{"embeddable":true,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/pages\/4738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/media\/4260"}],"wp:attachment":[{"href":"https:\/\/hera-youth.ge\/en\/wp-json\/wp\/v2\/media?parent=4783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}