IT Policy is being documented for fair and transparent use of various IT resources in the
Campus for Students, Research Scholars, faculty, Staff, Management and visiting
Guests. Information technology policies articulate the institution’s vision, strategy, and
principles as they relate to the use of IT resources. The IT policies interpret applicable
laws and regulations and ensure that the policies are consistent with legal and contractual
requirements. In addition, IT policies specify requirements and standards for the
consistent use of IT resources within the Institution.
A senior faculty is appointed as IT Coordinator and two IT staffs are appointed to assist
him. Since inappropriate use of Institutional systems exposes the Institution to risk, it is
important to specify exactly what is permitted and what is prohibited. The purpose of this
policy is to detail the acceptable use of corporate information technology resources for
the protection of all parties involved. The scope of this policy includes any and all use of
institutional IT resources, including but not limited to, computer systems, email, the
network, and the Internet connection. For example, policy outlines things like email use,
confidentiality, social media and web browsing. Network usage inside the campus is
protected by password and an affidavit is to be signed by the students to get the
password.
Software
Wireless Network
Wireless access shall be done securely through certain steps to mitigate known risks. Access to wireless network is protected by password for staff and students. Social media is blocked for students during working hours. Guest access to the institutional network is often necessary for students, customers, consultants, or vendors who are visiting the Institution. Guests can access the network with permission.
Network Security
Duties of IT Coordinator