Anda di halaman 1dari 49

KEBIJAKAN PERUSAHAAN

MENGENAI IT

IT Policy DLM
TUJUAN
Mengatur dan memberikan pedoman
kepada seluruh Karyawan agar
penggunaan perangkat IT dapat dipakai
secara optimal untuk kepentingan operasi
Perusahaan.

Hal ini diperlukan karena tipikal operasi


DLM sangat tergantung kepada
perangkat IT, baik untuk permesinan
maupun untuk data penunjang lainnya.
Semua Perusahaan yang mempunyai visi menjadi kelas
dunia mempunyai IT Policy

 Menjamin kepuasan pelanggan tetap prima


 Menjamin kerahsiaan perusahaan terhadap
kompetitor
 Menjamin keteraturan dokumentasi
 Meminimalisasi kemungkinan-kemungkinan
kegagalan operasi fasilitas IT
 Menjaga image perusahaan
 Mengurangi resiko dalam keadaan darurat
 Kelengkapan persyaratan ISO
 Menjaga disiplin karyawan sesuai prosedure
Contoh-contoh pengaturan dalam hal :

 Penggunaan photo sebagai gambar depan PC


atau Computer
 Jaringan sosial internet
 Pemakaian USB
 Peng copy an data busines perusahaan
 Pencegahan virus (zero virus attack)
 Back-up data
 Penggunaan password
 Etika keselamatan dan keamanan pemakaian
computer
 Pelatihan untuk pengguna computer
PENGATURAN KEBIJAKSANAAN INI
MELIPUTI :

•1. Pedoman dasar untuk pengguna perangkat IT


•2. Pembelian barang fasilitas IT *

•3. Instalasi barang fasilitas IT *

•4. Penggunaan Email dan Internet

•5. Penanganan Virus

•6. Penanganan resiko dalam keadaan darurat

•7. Perbaikan barang fasilitas IT *

•8. Proses back-up data dan aplikasi

•9. Penggunaan external data storage

•10. Pembuangan barang fasilitas IT *

•11. Standarnisasi dan pengajuan anggaran

barang/fasilitas IT *
•12. Standar pengoperasian server *
Tanggung jawab untuk mensosialisasikan :

 HRD :
Mensosialisasikan IT Policy dan
Mengkordinasikan training
 IT Support :
Menyiapkan dan menentukan materi training
 Manager :
Bertanggung jawab terhadap pelaksanaan IT
Policy di department masing-masing
1. Pedoman penggunaan perangkat IT

 Tujuan :
Memberdayakan semua pemakai dalam
menggunakan perangkat IT secara optimal dan
aman melalui sosialisasi pedoman IT dan
pelatihan-pelatihan

 Ruang lingkup :
Seluruh karyawan
Procedur Umum

 Setiap karyawan / user baru akan di review


kemampuan IT nya, sesuai dengan keperluan
posisi kerjanya.
 Jika kemampuannya dibawah standar akan
dijadwalkan untuk diberikan pelatihan
 Setelah pelatihan diverifikasi lagi
kemampuannya
 Jika sampai dua kali pelatihan tidak juga
memenuhi standar, karyawan tersebut tidak
dapat menempati posisi pekerjaan tersebut
Standar/kwalifikasi pengetahuan IT menurut posisi

 Operator :......................................................
 Jobshop Leader:...........................................
 Jobshop Programmer:..................................
 Product Development Eng.:.........................
 Marketing Eng..............................................
 Accounting & Finance Staff :......................
 Staff Administration:...................................
 Manager :.....................................................
DLM IT
POLICY
Speed
2010
Informative
Reliable

Reliable & Secure


le
b
si
Infrastructure)
n (Hardware &

O rm m)
Pe (Sy
o

pt
p

rfo ste
es rs)

im anc
R
se

al e
&
t (U
a r
Sm
What is it
Why
WHAT
What : Hardware, Software &
User
When : From Inquiry to Disposal
Where : DLM
Who : Everyone
How : Detail Process S afety  IT Assets
Security  Prevent &
Protect
Consistency  Data
Wh
y
- Email
- Drawing

90% - Administration
- Purchasing
- Production
- Logistic
Operational Using - Marketing

IT
ICONS
: User
: Management
: IT
: Logistic
:
Purchasing
: HR-GA
No. Title Manager Staff IT
1 User Guideline v v v
2 Procurement v v v
3 Installation v v v
4 Email & Internet Usage v v v
5 Emergency v v v
6 Disposal v v
7 Budgeting v v
8 Server SOP v
9 Audit v v
10 Maintenance v v v
11 Backup v
12 External Data Storage Usage v v v
13 Virus handling v v v
1. USER GUIDANCE
Y Place at
suitable
evaluate
position
each user
skills

Socializing N
Fulfill Give
Standard User
Standard ? training
Guidance

Evaluate
every new
employee Revaluate

Done by HR. Applied to all


employee.
SKILL VS. WORK AREA
Marketing Engineering Logistic Finance Manager Plant
Operato
r
Outlook High Medium Medium Mediu Medium
m
Word High Low Low Mediu Medium
m
Excel Medium Medium High High Medium
Power High Low Low Mediu Medium
Point m
CRM High Low Low Mediu Medium
m
TruTopFab Medium High Medium Low Low Low
Platinum - - - High -
2. PROCUREMENT
Fill in Request Request
Purchase Supervisor IT
Request Signature Approval

Request
GM Y Approve
Approval
N

Returned
Give to to
Purchasing Requester
to be
executed
PROCUREMENT

WHY :
- Standardized IT Inventory
- Standardized Maintenance
- Standardized Services WHAT :
- Standardized Operation
1. Hardware
- Controlled Procurement
2. Software
3. Services
3. INSTALLATION
Received by
Logistic Register &
& Informed Labeled
IT

Backup Setup
Softcopy according
to Server Standard
N

Testin
g

Ready to
use
INSTALLATION
WHY :
- Manageable IT Asset
- Optimal performance
- Can be outsourced WHAT :
- Smart User 1. Hardware
2. Software
4. INTERNET & EMAIL

Work
Communicatio
n
Educative
Informative
Legal
EMAIL DO & DON’T
Do Don’t
Communicate with Unauthorized password
colleague sharing
Communicate with Illegal usage
Business Partner Blast email for non work
related
Send oversized attachment
Use personal email for work
communication
INTERNET DO & DON’T
Do Don’t
Communicate with Illegal usage
colleague
Communicate with Blast email for non work
Business Partner related
Gather information
Work related research
WHY ALL THOSE DO & DON’T

1. Working time efficiency


2. Network Security
3. Network Traffic Resource
4. Company image
5. EMERGENCY

Case :
-Inconsistency data
-Power failure
-Nature disaster
CASE 1 :
INCONSISTENCY DATA
User
Analyze Find
inform to
Problem Solution
IT

Inform Log
User Problem

Report to
management
CASE 2 : POWER FAILURE
After
power
back on

Start on
Save Restart
Mode

Wait for
Confirmation
from IT to start
using ERP
CASE 3 : NATURE
DISASTER
Locate the
closets fire
extinguisher

Go to Shut Pull off all hard


server down disk & take it to
room server save area
6. DISPOSAL
WHAT :
1. Hardware
2. Software
3. Hard disk
WHY :
- Controlled
- Data Security
HARDWARE DISPOSAL
Review IT Make Asset Request
Asset Age & disposal GM
Performance request Approval

Y Approve N En
d d

Revised
Asset List

Execute Asset
disposal
process
SOFTWARE DISPOSAL

User request IT Analyze


to IT request

Y Approve N
End
d

Uninstall
Software

Update IT
Asset List
HARD DISK DISPOSAL
Restore
Prepare Backup
Backup on
new Hard current Do testing
new hard
disk Hard disk
disk

Keep Old N
Put on
Hard disk Problem
Log
for 2 Years

Y Solve
>2 Destroy
proble
years Hard disk
m
7. STANDARDIZATION &
BUDGETING
Review
Revised
IT Asset
Proposal
List

N
Request
Make Approve
GM
Proposal d N
Approval
Y

Request
Managing Approve
Director d
Approval
Y
Include to
Next Year
Budgeting
Why ?
- Controlled
- Planned
- Well Budgeted
- Maintained
8. SERVER SOP
Standard steps in
Turning On / Off DLM servers & Network Peripherals.

1. HP Procurve Switch (3)


2. Peplink
3. Domain Controller
4. Gateway
5. Tops1000
6. Planet
7. Backup PC
8. Anti Virus
Turning ON Turning Off
HP Procurve Anti Virus

Peplink Backup Data

Domain Controller Planet

Gateway Tops1000

Tops1000 Gateway

Planet Domain Controller

Backup Data Peplink

Anti Virus HP Procurve


9. AUDIT
Collect
Info
Revise
Analyze
IT Policy

Improvem Log
ent Plan Findings
PURPOSE

IMPROVEMENT
10. MAINTENANCE
Physical
Cleaning

Virus
Scanning Defrag

Update
Anti Virus
PURPOSE

HEALTHY & HYGIENIST


WORKING ENVIRONMENT
11. BACKUP
Data Files

Application

Database
PURPOSE

DATA AND SYSTEM


RELIABILITY
11. EXTERNAL DATA STORAGE

WHY
Prevent virus
infection
WHAT TO DO
Scan at
Isolated
PC

N N
Clean Re-Scan Clean Format

Y Y
Allowed
to be
used
12. VIRUS HANDLING

1. Prevent Spreading
2. Basic First-Aid for
User
BASIC USER KNOW-HOW

Scan &
Remove with
Anti Virus

N Unplug
Success from Inform IT
Network
Y

Restart
IT NEXT ACTION
Confirm Try to
Virus remove in
attack Save mode

N Replace Format
Success PC with Infected
Substitute PC
Y

Restar
t N

Y Return PC
Re-Scan Clean
to User
THANK YOU

Anda mungkin juga menyukai