IT Policy
Introduction
IGCSM Skill Development Pvt. Ltd. is committed to ensuring the security, integrity, and efficient use of
its IT resources.
This IT Policy outlines the guidelines for the appropriate and responsible use of IT systems.
Acceptable Use Policy
- IT resources must be used for authorized business purposes only.
- Users must not engage in activities that violate laws, policies, or ethical standards.
- Personal use of IT assets should be minimal and not interfere with work duties.
Data Security
- All sensitive data must be stored securely and accessed only by authorized personnel.
- Users must not share passwords or grant unauthorized access to systems.
- Regular backups of critical data must be maintained.
Internet and Email Usage
- Internet usage should be for work-related activities.
- Downloading or sharing pirated software, media, or any illegal content is strictly prohibited.
- Users should be cautious when opening email attachments from unknown sources.
Software and Hardware Policy
- Only licensed software approved by the company should be installed on company devices.
- Users must not tamper with or modify company hardware without prior approval.
- All IT assets must be returned upon termination of employment or contract.
Cybersecurity and Incident Reporting
- Users must report any suspected cybersecurity threats or breaches immediately.
- All devices must be protected with up-to-date antivirus software.
- Multi-factor authentication should be enabled where applicable.
Policy Compliance
Failure to comply with this IT Policy may result in disciplinary action, including termination of
employment or legal action.
Regular audits will be conducted to ensure compliance.