8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 1/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONSSAMPLE POLICY FROM THE BUSINESS POLICIES AND PROCEDURES SAMPLERINCLUDES A LIST OF
Computer & IT Policies and Procedures Manual
The Computer and Network Policy, Procedures and Forms Manual
discusses strategic IT management, control of computer and network
assets, and includes a section on creating your own information systems
manual along with a computer and IT security guide. The Computer &Network Manual helps you comply with Sarbanes Oxley, COBIT or ISO
17799 security and control reuirements! This Computer and Network
Manual allows IT Managers, IT departments and IT eecuti!es to de!elop
their own uni"ue IT policy and procedures
US$ 595.00
How to Order:
Online:
www.bi!"n#"l.$%!B P'%ne:()*+-(+/01
//+*--+11(
Email:[email protected]
Includes seven !" modules:). In23%4#$2i%n "n4 T"ble %5 C%n2en26
7. 8#i4e 2% 93e9"3in " well w3i22en!"n#"l
(. A S"!9le M"n#"l $%;e3in $%!!%n3e<#i3e!en26 "n4 93"$2i$e6
*. # P%li$ie6 "n4 !5 $%33e69%n4in
5%3!6. S%52w"3e De;el%9!en2 S#99le!en2
-. IT Se$#3i2 8#i4e0. %% J%b De6$3i92i%n6 $%;e3in e;e3
9%6i2i%n 3e5e3en$e4 in 2'e M"n#"l. C%!9le2e In4e=
&'oose (our deliver(
o)tion:
• H"34 C%;e3 B%%> 9l#6
CD $%n2"inin "ll
4%$#!en26 in e4i2"bleMi$3%6%52 ?%34 5%3!"2"n4 in62"n2 4%wnl%"4
or
In62"n2 4%wnl%"4 %nl
@n% 6'i99in"
Sam)le *olic( +rom &om)uter , I- *olicies and *rocedures anual
I- /sset anaement Section: I- /sset /ssessment
D%$#!en2 IDI-/0#
Ti2leI- /SSE- /SSESSE1-
P3in2 D"2emm2dd2((((
Re;i6i%n0.0 P3e9"3e4 B*re)arer3s 1ame2-itle D"2e P3e9"3e4mm2dd2((((
Ee$2i;e D"2emm2dd2((((
Re;iewe4 B4eviewer3s 1ame2-itle
D"2e Re;iewe4mm2dd2((((
A993%;e4 Binal /))rover3s 1ame2-itle
D"2e A993%;e4mm2dd2((((
*olic(: T'e C%!9"n 6'"ll "66e66 @e;"l#"2e i26 In5%3!"2i%n Te$'n%l% "66e26
5%3 $%n5%3!"n$e 2% C%!9"n 3e<#i3e!en26.
*ur)ose: T% i4en2i5 '"34w"3e "n4 6%52w"3e @In5%3!"2i%n Te$'n%l% "66e26 %n2'e C%!9"n In5%3!"2i%n Te$'n%l% ne2w%3>, 4e2e3!ine i5 2'%6e
"66e26 "3e "993%93i"2e 5%3 2'e C%!9"n6 nee46, 4e2e3!ine i5 2'e6e"66e26 "3e 93%9e3l li$en6e4 "n4 ;e36i%ne4, "n4 i5 2'e $%n5%3! 2%
C%!9"n 62"n4"346.
Sco)e: All In5%3!"2i%n Te$'n%l% "66e26 2'"2 !">e #9 2'e C%!9"n6
In5%3!"2i%n Te$'n%l% 662e!ne2w%3> "3e 6#be$2 2% 2'i6 93%$e4#3e.
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 2/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONSSAMPLE POLICY FROM THE BUSINESS POLICIES AND PROCEDURES SAMPLERINCLUDES A LIST OF
4es)onsibilities:
T'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 i6 3e69%n6ible 5%3
6#9e3;i6in 2'e In5%3!"2i%n Te$'n%l% "66e2 "66e66!en2 93%3"!.
T'e Te$' S#99%32 M"n"e3 i6 3e69%n6ible 5%3 $%n4#$2in $%!9le2e,4e2"ile4, "n4 %be$2i;e In5%3!"2i%n Te$'n%l% "66e2 "66e66!en26,
w3i2in n%n$%n5%3!"n$e 3e9%326, "n4 3e9%32in n4in6 %5 In5%3!"2i%n
Te$'n%l% "66e2 "66e66!en26.
6e7nitions:Ne2w%3> 6$"n @%3 6$"n G S$"nnin "n In5%3!"2i%n Te$'n%l% ne2w%3>@wi2' 69e$i"lie4 6%52w"3e 2% $%n3! 2'e 93e6en$e %3 "b6en$e %5
$%!9#2e3 '"34w"3e %3 6%52w"3e, $'e$> "66e2 $%n#3"2i%n6, ;e3i5
6%52w"3e ;e36i%n6, !"n"e 6%52w"3e li$en6e6, 23"$> le"6e "n4 w"33"n2in5%3!"2i%n, 4e2e$2 ne2w%3> ;#lne3"bili2ie6, e2$. C%!!e3$i"l "n4 %9en
6%#3$e 6%52w"3e 5%3 $%n4#$2in In5%3!"2i%n Te$'n%l% "66e2 6$"n6 i6
3e"4il ";"il"ble 6ee A44i2i%n"l Re6%#3$e A 5%3 #i4"n$e.
In5%3!"2i%n Te$'n%l% A66e2 G An $%!9#2e3 '"34w"3e, 6%52w"3e,In5%3!"2i%n Te$'n%l%+b"6e4 C%!9"n in5%3!"2i%n, 3el"2e4
4%$#!en2"2i%n, li$en6e6, $%n23"$26 %3 %2'e3 "3ee!en26, e2$. In 2'i6
$%n2e=2, In5%3!"2i%n Te$'n%l% "66e26 !" be 3e5e33e4 2% "6 #62
"66e26.
N%n$%n5%3!"n$e G A 6ini$"n2, !"2e3i"l 5"il#3e 2% $%n5%3! 2% %ne %3
!%3e 3e<#i3e!en26 "l6% 3e5e33e4 2% "6 " n%n$%n5%3!i2. M%;in " PC
53%! %ne 4e6>#6e3 2% "n%2'e3 wi2'%#2 2'e >n%wle4e %3 9e3!i66i%n %5
2'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 i6 %ne e="!9le %5 "n%n$%n5%3!"n$e.
*rocedure:
.0 I- asset assessment *8/1).) In5%3!"2i%n Te$'n%l% "66e2 "66e66!en26 6'"ll be $%n4#$2e4 "2 3e#l"3
in2e3;"l6. A66e66!en26 6'%#l4 be $%n4#$2e4 "nn#"ll, "2 " !ini!#!. @See
Re5e3en$e A.
• In5%3!"2i%n Te$'n%l% "66e2 "66e66!en26 6'%#l4 "l6% be $%n4#$2e4w'ene;e3 " l"3e 2#3n%;e3 %5 "66e26 @5%3 e="!9le, " l"3e n#!be3 %5 PCle"6e6 e=9i3e6 in " 6'%32 2i!e 53"!e %$$#36.
).7 P3i%3 2% "n "66e66!en2, 2'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 6'"ll
3e;iew ITAM)/*+) IT ASSET ASSESSMENT CHECKLIST 5%3 9%66ible!%4i$"2i%n6. T'i6 $'e$>li62 6'"ll be #6e4 b 2'e Te$' S#99%32 M"n"e3 "6 "#i4e 2% $%n4#$2in In5%3!"2i%n Te$'n%l% "66e2 "66e66!en26.
.0 I- /sset S&/17.) T'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 6'"ll en6#3e 2'"2 2'e Te$' S#99%32
M"n"e3 '"6 2'e $#33en2 ;e36i%n %5 2'e 5%ll%win %n '"n4 93i%3 2% $%n4#$2in" ne2w%3> 6$"n:
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 3/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONSSAMPLE POLICY FROM THE BUSINESS POLICIES AND PROCEDURES SAMPLERINCLUDES A LIST OF
• ITAM)/7+ IT ASSET INENTORY DATABASE
• ITAM)/7+- IT NET?ORK MAP "n4
• ITAM)/*+) IT ASSET ASSESSMENT CHECKLIST.
7.72'e Te$' S#99%32 M"n"e3 6'"ll 3#n " 6$"n %n 2'e C%!9"n6 In5%3!"2i%n Te$'n%l% ne2w%3> 2% 4e2e3!ine 2'e 62"2#6 %5 "ll In5%3!"2i%n Te$'n%l%
"66e26 %n 2'e ne2w%3> "n4 $%!9"3e 2'e 3e6#l26 wi2' 2'e 4%$#!en26 li62e4 in7.), l%%>in 5%3 in5%3!"2i%n 6#$' "6:
• ?'"2 In5%3!"2i%n Te$'n%l% '"34w"3e i6 %n 2'e ne2w%3> "n4 w'% "3e 2'e3ei62e3e4 %wne36
• ?'e2'e3 '"34w"3e i6 in #6e %3 n%2
• ?'"2 6%52w"3e i6 in62"lle4 %n e"$' $%!9#2e3, w'e2'e3 i2 i6 2'e $%33e$2;e36i%n, "n4 w'e2'e3 i2 i6 " li$en6e4 $%9 "n4%3
• ?'e2'e3 #n"993%;e4#n"#2'%3ie4 6%52w"3e '"6 been in62"lle4 %n "n PC.
7.( I5 " n%n$%n5%3!"n$e i6 5%#n4, 2'e Te$' S#99%32 M"n"e3 6'"ll 3e9%32 i2 in
"$$%34"n$e wi2' 93%$e4#3e ITSD)/1 IT INCIDENT HANDLIN8.
%.0 6O&UE1-/-IO1 /16 6IS-4IU-IO1(.) T'e Te$' S#99%32 M"n"e3 6'"ll $%n6%li4"2e "n4 6#!!"3ie "66e2 6$"n
3e6#l26 %n ITAM)/*+7 IT ASSET SCAN SUMMARY.
(.7 T'e Te$' S#99%32 M"n"e3 6'"ll 93e9"3e "n4 6#b!i2 2'ei3 n4in6 G in$l#4in
5%3!6 ITAM)/*+) "n4 ITAM)/*+7 G 2% 2'e In5%3!"2i%n Te$'n%l% A66e2
M"n"e3.
#.0 1O1&O1O4/1&E H/168I1;*.) I5 " n%n$%n5%3!"n$e i6 4i6$%;e3e4 in 2'e $%#36e %5 "n "66e2 "66e66!en2, 2'e
In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 6'"ll w3i2e " C%33e$2i;e A$2i%n Re<#e62@CAR, in "$$%34"n$e wi2' 93%$e4#3e ITSD)/1 IT INCIDENT HANDLIN8.
*.7 T'e CAR 6'"ll be 6#b!i22e4 2% 2'e M"n"e3 %5 2'e 4e9"32!en2 w'e3e 2'en%n$%n5%3!"n$e %$$#33e4.
*.( T'e De9"32!en2 M"n"e3 3e$ei;in 2'e CAR 6'"ll 6#b!i2 " 3e9l in
"$$%34"n$e wi2' 93%$e4#3e ITSD)/1 IT INCIDENT HANDLIN8.
*.* I5 " $%33e$2i;e "$2i%n w"6 2">en, 2'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3
6'%#l4 3e;iew 2'e 6i2#"2i%n wi2'in 2'3ee !%n2'6 2% ;e3i5 2'"2 2'e $%33e$2i;e"$2i%n w"6 ee$2i;e.
5.0 I- /SSE- 4ecords u)dateA52e3 2'e In5%3!"2i%n Te$'n%l% "66e2 "66e66!en2 "n4 6#b6e<#en2
$%33e$2i;e "$2i%n6, T'e In5%3!"2i%n Te$'n%l% A66e2 M"n"e3 6'"ll en6#3e2i!el "n4 "$$#3"2e #94"2e6 2% ITAM)/7+ IT ASSET INENTORY DATABASE
"n4 ITAM)/7+- IT NET?ORK MAP. @See Re5e3en$e B.
orms:
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 4/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONSSAMPLE POLICY FROM THE BUSINESS POLICIES AND PROCEDURES SAMPLERINCLUDES A LIST OF
• ITAM)/*+) IT ASSET ASSESSMENT CHECKLIST
• ITAM)/*+7 IT ASSET SCAN SUMMARY
4e+erences:
/. ISO S-/16/46 !00:0% < &O6E O *4/&-I&E O4 I1O4/-IO1SE&U4I-= /1/;EE1-> &8/USE ? /SSE- /1/;EE1-
Cl"#6e %5 2'e S2"n4"34 i6 2'e A66e2 M"n"e!en2 62"n4"34, w'i$' 4e"l6 wi2'
"66e2 "$$%#n2"bili2 "n4 in5%3!"2i%n $l"66i$"2i%n.
ISO S2"n4"34 70//7:7/)) "n4 i26 $%!9"ni%n 62"n4"346, ISO70//):7/)) "n4 ISO 70//:7//, 93%;i4e " $%!93e'en6i;e 6e2 %5
$%n23%l6 $%!93i6in be62 93"$2i$e6 in 2'e el4 %5 in5%3!"2i%n 6e$#3i2.
ISO 70//7 w"6 5%3!e3l >n%wn 2% ISO "6 )0011 "n4 !" $%n2in#e 2%be >n%wn 2'"2 w" in 2'e b#6ine66 "n4 In5%3!"2i%n Te$'n%l% w%3l4
5%3 6%!e 2i!e. See'229:www.i6%.%3i6%'%!e62%3e$"2"l%#ei$6$"2"l%#e4e2"ili$6.'2!
. S/4/1ESOA8E= /&- O 00
S"3b"ne6+O=le, 9"66e4 b 2'e U.S. C%n3e66 in 7//7, i6 4e6ine4 2% 93e;en2
!"ni9#l"2i%n, l%66, %3 4e623#$2i%n %5 3e$%346 wi2'in 9#bli$l+'el4 $%!9"nie64%in b#6ine66 in 2'e U.S. Be$"#6e ;i32#"ll "ll $%!9"nie6 >ee9 3e$%346
ele$23%ni$"ll, Se$2i%n */* %5 2'e A$2 i!9lie6 2'"2 "n "4e<#"2e in2e3n"l
$%n23%l 623#$2#3e i6 In5%3!"2i%n Te$'n%l%+b"6e4.
T'e3e5%3e, 3e#l"3 6$"nnin %5 2'e C%!9"n6 In5%3!"2i%n Te$'n%l%ne2w%3>, e;i4en$e %5 3e#l"3 6$"nnin, "n4 >ee9in "n #9+2%+4"2e
In5%3!"2i%n Te$'n%l% "66e2 in;en2%3 "3e "ll e;i4en$e %5 "4e<#"2e in2e3n"l
$%n23%l6.
/dditional 4esources:
A. T'e3e "3e !"n 29e6 %5 6$"n6 2'"2 !" be $%n4#$2e4 %n " $%!9#2e3ne2w%3> G '"34w"3e 6$"n6, 6%52w"3e 6$"n6, wi3ele66 "n4 wi3e4 ne2w%3> 6$"n6,6e$#3i2 6$"n6, e2$. S62e! Cen2e3 7/)7 R7 C%n#3"2i%n M"n"e3@'229:www.!i$3%6%52.$%!en+#66e3;e3+$l%#493%4#$26662e!+$en2e37/)7+37+$%n#3"2i%n+!"n"e34e5"#l2."69=5bi4X4-2$!?6T i6 %ne 5%3! %5"66e2 !"n"e!en2 6%52w"3e. A44i2i%n"l "66e2 !"n"e!en2 6%52w"3e93%;i4e36 "n4 2'ei3 93%4#$26 !" be 5%#n4 b 6e"3$'in 2'e In2e3ne2.
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 5/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONSSAMPLE POLICY FROM THE BUSINESS POLICIES AND PROCEDURES SAMPLERINCLUDES A LIST OF
4evision Histor(:
4evisi
on6ate 6escri)tion o+ &'anes
4eBuested
(
/!!44
Ini2i"l Rele"6e
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 6/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
"orm# IT$M1%'1 IT $SS(T $SS(SSM()T C*(C+IST
A66e66!en2 : D"2e:
A3e" E;"l#"2e4:
De92. M3.:
Le"4 A66e66%3:
A66e66%3:
I- /sset /ccountabilit( 4es)onse and &omments
) I6 e;e3 IT "66e2 G '"34w"3e, 6%52w"3e, "n43el"2e4 4%$#!en2"2i%n G "$$%#n2e4 5%3Q
7 I6 "n IT "66e2 in;en2%3 !"in2"ine4Q
( I6 "n IT "66e2 $l"66i$"2i%n 6$'e!e in 9l"$eQ
* D%e6 2'e in;en2%3 i4en2i5 2'e %wne3 "n4
l%$"2i%n %5 e"$' "66e2Q D%e6 2'e $%!9"n '";e " $le"3 6e2 %5
62"n4"346 5%3 IT "66e26Q A3e 2'e 62"n4"346#9 2% 4"2eQ H%w %52en "3e 2'e 3e;iewe4QD% 2'e $%n5%3! 2% in4#623 62"n4"346"n4%3 le"l 3e<#i3e!en26Q
- I6 2'e IT "66e2 in;en2%3 3e;iewe4 3e#l"3l2% 6ee 2'e $%!9"n 4%e6 n%2 3i6> '";in%b6%le2e IT "66e26 in in;en2%3Q
0 D%e6 e;e3 '"34w"3e "66e2 $%n5%3! 2%$%!9"n 62"n4"346Q A3e 2'e $le"3l "n4
93%9e3l i4en2ie4Q
D% "ll 6%52w"3e "66e26 $%n5%3! 2% $%!9"n62"n4"346Q A3e 2'e $le"3l "n4 93%9e3li4en2ie4Q
1 D%e6 2'e IT "66e2 in;en2%3 2'%3%#'l "n4"$$#3"2el "$$%#n2 5%3 6%52w"3e ;e36i%n6 "n4li$en6e6Q
)/ I6 2'e3e "n IT ne2w%3> 4i"3"!Q I6 i2"$$#3"2eQ I6 i2 3e"4il 93%4#$e4Q ?'en w"6i2 l"62 3e;iewe4Q H%w 53e<#en2l i6 i2
3e;iewe4Q
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 7/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
-ec' Su))ort /rea 4es)onse and &omments
) A3e w%3>e36 %3"nie4 "n4 6$'e4#le4Q
7 A3e "4e<#"2e w%3>in "3e"6 93%;i4e4 5%3 2"6>6Q
( A3e 43"win6 "n4 6$'e!"2i$6 %3"nie4,
in;en2%3ie4 "n4 3e"4il "$$e66ibleQ
* A3e w%3> in623#$2i%n6 6#$ien2Q
A3e "ll i2e!6 @new '"34w"3e6%52w"3e, i2e!6bein 3e9"i3e4, e2$. in;en2%3ie4Q
- I6 2'e3e "n %b;i%#6 4i6%3"ni"2i%nQ
T%%l6 3"n4%!l 6$"22e3e4 "b%#2Q
P"326 %n ben$'e6 4i6%3"nie4Q
C%!9%nen26 %3 9"326 5%3 %2'e3 "66e!blie693e6en2Q
0 A3e w%3> "3e"6 @ben$'e6 $le"nQ
A3e 9"326 %3"nie4 "n4 62%3e4 e$ien2lQ A3e62%3e6 $le"3l !"3>e4Q
1 A3e 62"in "3e"6 %3"nie4Q
-ec' Su))ort EBui)ment 4es)onse and
&omments
A3e 2%%l6 93%9e3l in;en2%3ie4Q A3e 3e$%346"$$#3"2e "n4 #9+2%+4"2eQ
A3e 2%%l6 93%9e3l 62%3e4 w'en n%2 in #6eQ
A3e 2%%l6 in %%4 w%3>in %34e3Q
A3e 2%%l6 3e<#i3in $"lib3"2i%n bein 3e$"lib3"2e4%n " 3e#l"3 b"6i6Q A3e $"lib3"2i%n3e$%346 $#33en2Q
-ec' Su))ort 4ecords 4es)onse and &omments
A3e 93%4#$2i%n 3e$%346 @in62"ll"2i%n6, 3e9"i36,e2$. !"in2"ine4Q A3e 2'e
$%!9le2e "n4 #9+2%+4"2eQ A3e2'e 3e"4il "$$e66ibleQ
A3e w%3> 9en4in "n4 w%3> in 93%$e663e$%346 in$l#4e4 wi2' 2'e "b%;eQA3e 2'e li>ewi6e $%!9le2e "n4#9+2%+4"2eQ A3e 2'e "l6% 3e"4il"$$e66ibleQ
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 8/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
User &om)laints 4es)onse and &omments
) I6 2'e3e " l% %5 #6e3 $%!9l"in26 "n4 $%n$e3n6QI6 i2 $%!9le2e, #92% 4"2e, %3"nie4,"n4 3e"4il
"$$e66ibleQ
7 ?'"2 i6 2'e le;el %5 4e2"il in 2'e l% leQ A3e$%!9l"in26$%n$e3n6 $l"66ie4$le"3l "n4l%i$"llQ
( I6 2'i6 $%!9l"in2 le 9e3i%4i$"ll 3e;iewe4 5%323en46Q
/ut'orization
C%!!en26:
Te$' S#99%32: D"2e:
IT A66e2 M"n"e3: D"2e:
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 9/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
IT$M1%'- IT $SS(T SC$) S.MM$/0
#$ttach results from scanning software to this sheet.%
Hardware scan results:
So+tware scan results:
1oncon+ormities discre)ancies" +ound:
Ot'er comments:
Te$' S#99%32: D"2e:
IT A66e2 M3.: D"2e:
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 10/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
Computer and IT Policies and Procedures Manual#
41 Prewritten Policies and Procedures
IT Administration
. Information Technology Management
'. IT (ecords Management
). IT *ocument Management
+. IT *e!ice Naming Con!entions
. TCP-IP Implementation tandards
/. Network Infrastructure tandards
0. Computer and Internet 1sage Policy
2. 34Mail Policy
5. IT 6utsourcing
7. IT *epartment atisfaction
IT Asset Management
. IT $sset tandards
'. PIT $sset Management
). IT 8endor election
+. IT $sset $ssessment
. IT $sset Installation atisfaction
IT Training and Support
/. IT ystem $dministration
0. IT upport Center
2. IT er!er - Network upport
5. IT Trou9leshooting
'7. IT 1ser4taff Training Plan
IT Security and Disaster Recovery
'. IT Threat $nd (isk $ssessment
''. IT ecurity Plan
'). IT Media torage
'+. IT *isaster (eco!ery
'. Computer Malware
'/. IT $ccess Control
'0. IT ecurity $udits
'2. IT Incident :andling
'5. ;<6* Policy
Software Development
)7. IT Pro=ect *efinition
). IT Pro=ect Management
)'. ystems $nalysis
)). oftware *esign
)+. oftware Programming). oftware *ocumentation
)/. oftware Testing
)0. *esign Changes *uring *e!elopment
)2. oftware (eleases and 1pdates
)5. oftware upport
+7. oftware Consulting er!ices
+. oftware Training
8/19/2019 Bizmanualz Computer IT Policies and Procedures Sample
http://slidepdf.com/reader/full/bizmanualz-computer-it-policies-and-procedures-sample 11/12
SAMPLE FROM THE COMPUTER & IT POLICIES AND PROCEDURES MANUALINCLUDES AN EXAMPLE PROCEDURE, A LIST OF TOPICS, FORMS AND JOB
DESCRIPTIONS
75 Corresponding Forms and Records
IT Administration
. Information Technology Plan
'. IT Plan (e!iew Checklist
). (ecords Classification and (etention >uide
+. (ecords Management *ata9ase
. *ocument Control ?ist/. *ocument Change (e"uest Form
0. *ocument Change Control Form
2. Network Infrastructure tandards ?ist
5. Company Computer and Internet 1sage Policy
7. Company 34Mail Policy $cknowledgement
. IT 6utsourcer *ue *iligence Checklist
'. IT 6utsourcer (ecord
). IT Post4er!ice atisfaction (eport
+. 1ser atisfaction ur!ey
. ;<6* Policy & $cknowledgement
IT Asset Management
/. IT $sset tandards ?ist
0. IT $sset Configuration @orksheet
2. IT $sset tandards 3ception (e"uest
5. IT $sset (e"uisition-*isposal Form
'7. IT $sset $c"uisition ?ist
'. Tech upport (ecei!ing ?og
''. Nonconforming IT $sset Form
'). IT $sset In!entory *ata9ase
'+. IT Network Map
'. IT 8endor Notification Form
'/. IT 8endor ur!ey
'0. $ppro!ed IT 8endor *ata heet
'2. IT 8endor ?ist
'5. IT 8endor *is"ualification Form
)7. IT $sset $ssessment Checklist
). IT $sset can ummary
)'. IT $sset Installation Follow41p (eport
IT Training and Support )). ystem $dministration Task ?ist
)+. Tech upport ?og
). ystem Trou9le and $cknowledgement Form
)/. er!er-Network Planning Checklist
)0. IT er!er-Network upport Plan
)2. IT Trou9leshooting Plan
)5. 1ser Trou9leshooting >uide
+7. IT Training (e"uirements ?ist
+. IT Training ?og
IT Security and Disaster Recovery +'. It Threat-(isk $ssessment (eport
+). IT ecurity $ssessment Checklist
++. IT ecurity Plan
+. IT ecurity Plan Implementation chedule
+/. Information torage Plan
+0. IT *isaster (eco!ery Plan
+2. $ccess Control Plan
+5. 1ser $ccess Control *ata9ase
7. $ccess Control ?og
. 1ser $ccount Con!entions
'. IT ecurity $udit (eport
). IT Nonconformity (eport
+. IT ecurity $udit Plan
. IT Incident (eport
/. ;<6* Policy & $cknowledgements
Software Development
0. IT Pro=ect Plan
2. IT Pro=ect *e!elopment *ata9ase
5. IT Pro=ect tatus (eport
/7. IT Pro=ect Team (e!iew Checklist
/. IT Pro=ect Progress (e!iew Checklist
/'. *esign (e!iew Checklist
/). @ork Product (e!iew Checklist
/+. (e"uest For *ocument Change #(*C%
/. oftware Pro=ect Test cript
//. oftware Pro=ect Test Checklist
/0. oftware Pro=ect Test Pro9lem (eport
/2. *esign Change (e"uest Form
/5. oftware ?icense $greement
07. oftware ?imited @arranty0. oftware Copyright Notice
0'. oftware Consulting $greement
0). tatement 6f @ork
0+. oftware Consulting Customer upport ?og
0. oftware Training 3!aluation Form
ob 2escriptions# $ complete =o9 description is included for each of the )) positions referenced in the
Computer & IT Policies and Procedures Manual. 3ach position includes a summary description of the position,
essential duties and responsi9ilities, organiAational relationships, a list of the procedures where the position is
referenced, specific "ualifications, physical demands of the position, and work en!ironment.
;eta Test Coordinator
;oard Mem9er
Chief 3ecuti!e 6fficer #C36*irector of Buality
*ocument Manager
Financial Manager
:elp *esk Technician
:uman (esources Manager
Internal $udit Team ?eader
IT $sset Manager
IT *isaster (eco!ery Coordinator
Information Technology Manager
IT Pro=ect Manager
IT ecurity Manager IT torage ?i9rarian
IT upport Center Manager
?$N $dministrator
Network & Computer ystems
$dministrator
President
Product Manager
Pro=ect Manager
Purchasing Manager
Buality Manager
hipping- (ecei!ing Clerk
oftware *esigner oftware upport $nalyst
oftware Trainer
ystems $nalyst
Technical upport Manager
Technical upport pecialist
Technical @riter
Telecommunications Manager
Training Manager