Policy Enforcement


Dexani's expertise in IT management best practices and grass roots involvement with client's computing infrastructure allows us to aid companies with the faciliation, creation and implementation of Information.

Technology Policies such as

  • Backup Policies
  • Data Security Policies
  • Acceptable Internet Use Policies

 

Backup policy / Disaster Recovery Plan

  • A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters.
  • Just as a disaster is an event that makes the continuation of normal functions impossible, a disaster recovery plan consists of the precautions taken so that the effects of a disaster will be minimized, and the organization will be able to either maintain or quickly resume mission-critical functions.
  • Typically, disaster recovery planning involves an analysis of business processes and continuity needs; it may also include a significant focus on disaster prevention.

Information Security Policy

  • In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology assets.
  • A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change.
  • A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

Acceptable Use Policy

  • The purpose of an acceptable internet use policy is to ensure that
    • Precious company resources such as Internet bandwidth is not unnecesarily wasted
    • Legal liabilities are minimised due to the transmission of potentially damaging email and web content
    • High levels of user productivity is maintained

 

These policies are implemented by means of

  • A written policy document signed by employees
  • Content filtering technology that enforce company legal notices onto emails and blocks certain unwanted types of content from entering and leaving the company network.
 

 

 

                   
 
                   
   

 

Copyright Dexani 2010      -      Call us on 0861-339-264
RocketTheme Joomla Templates