It Policy Presentation
It Policy Presentation
It Policy Presentation
Guideline
1.Part One : Introduction
1. Introduction
1.1 Background
.IT Policy and strategy has become essential for any organizations, no matter
the size and business of the organization varies way.
.One of the importance of policy is to establish standards and guidelines for
Ethiopost, Information Technology (IT) environment to ensure the
confidentiality, integrity, and availability of company computing resources.
.This document outlines the technology options supported by Ethiopost and
guidelines for appropriate use, acquisition, and implementation.
.Ethiopost as an organization works with in a community, government and
with stakeholders of internal, external partners.
.In addition, IT technology is one of the main ways of communicating with
those outside the organization and even within the organization LAN system.
Unless the IT policy and strategy implemented and exercised, technology is
open to misuse which can do substantial business damage to an organization.
. IT Policy and strategy should also aim to have the protection of Ethiopost
resources and the staff as its fundamental objectives.
.The IT Policy clearly defining that the responsibility of the organization and
what staffs can do and cannot do with the organization equipment's.
background continued.....
. To ensuring that the use of computers, laptops, Printer, POS Printer, UPS, fax
machines, photocopy machines and other IT resources in line with an organization's
overall polices, missions, values, objectives and to help the staff can feel secure and
comfortable in the knowledge they are operating within safe guidelines.
.The protection of confidential, sensitive, and proprietary information is critically
important to the organization. Therefore, it is essential that employees and
administrators take steps to appropriately safeguard such information. The
organization prohibits use of organizational information and information technology
resources for hate, bigotry violence or intimidation directed at any individual or
group or harassment of any kind.
1.2 Purpose of the Policy
. The purpose of this document is to ensure that appropriate measures are put in
place to protect corporate infonnation Technology Services systems, IT equipment of
Ethiopost network associated infrastructure.
. It is intended to protect the tangible and intangible IT assets from accidental or
intentional attacks. Provide a baseline from which to acquire, configure and audit
computer systems and networks for compliance with the policy.
.It also aims to inform different Users about protecting network resources and
information assets of the Ethiopost.
.The IT investment of the organization is considerable, and the dependency on
computer technology in the delivery of Ethiopost missions, values and objectives is
high, therefore, the IT Policy will assist in maintaining systems at operational level.
1.3 Scope of the Policy
.This policy applies to all Ethiopost staff and management, or any other persons
otherwise affiliated but not employed by the Ethiopost, who may use Ethiopost
IT infrastructure and/or access Ethiopost applications with respect to the
security and privacy of information.
1.4 Authority
2.1.3.8. HR and User Department Provide Role for users that could enable them to
get access to ICT infrastructure in general and to relevant applications, in
particular
2.1.3.9. Users shall Perform their operations through proper ICT equipment
2.1.3.10. Users Not use ICT equipment's for their personal business
2.1.3.11. Users Not install any application software on their PC without consulting
Information Technology Department
2.1.3.12. Users Not affect the identification codes of their machine by any means
2.1.3.13. Users Use their identity to get access to Ethiopost resources
2.1.3.14. Users Store their identity properly; change their passwords regularly
2.1.3.15. Users Not pass their identity to second party including colleague
2.1.3.16. Users shall place their equipment in an appropriate position
2.1.3.17. Users shall keep their equipment clean.
2. I. 3.18. Users Never put and/or use food or beverages near pcs
2.1.3.19. Users Keep all accessories, including drivers and recovery CDs in a safe
place
2.1.3.20. Users transferring/return of equipment shall include all accessories
2.2.Internet Usage Policy
2.2.1. Definition: Use of the internet by employees of Ethiopost is permitted and
encouraged where such use supports the goals and objectives of the Ethiopost.
2.2. Objective: Ethiopost is committed to preventing the occurrence ofinappropriate,
unethical, or unlawful internet usage for to create conducive working environment.
2.2.3. Policy Statement:
2.2.3.1. ITD shall ensure that the internet access facilities at Ethiopost are used in
accordance with the Ethiopost IT policy.
2.2.3.2. Access to the Internet to all Users or partially modality is provided to support
business activities and only to perform their jobs and professional roles.
2.2.3.3. ITD shall provide social network media access service as per its code of conduct.
And the Users should be governed accordingly.
2.3.1. Definition: An email communication and use policy elaborates the responsibilities
and conduct of the Ethiopost employees, when using email in their day-to-day working
activities.
2.3.2. Objective: Ensure that the facility of Electronic Mail hence forth and widely known
as E-mail is used in an efficient manner to accomplish the Ethiopost day to day business
activities.
2.3.3. Policy Statement:
2.3.3.1. ITD shall in consultation with all departments formulate an appropriate email use
and archiving policy.
2.3.3.2. ITD shall implement the necessary hardware and software infrastructure to
ensure that the Email facility is used by Ethiopost employees to achieve business
objectives.
2.3.3.3. All employees of Ethiopost and consultants working for Ethiopost are eligible to
use the Ethiopost email system.
2.3.3.4. All Users of Ethiopost mail are not allowed to conduct personal business.
2.3.3.5. Individuals must not send, forward or receive confidential or sensitive Ethiopost
information through non- Ethiopost email accounts.
2.3.3.6. Ethiopost retains the right to access and view all Emails sent and received by the
Email system. This right is exercised solely through the IT Staff on the
instructions of CEO.
2.3.3. Policy Statement continued..........
2.3.3.7. All Users are responsible for all emails sent from their email account.
2.3.3.8. It is forbidden to send pornography, or it is forbidden to send pornographic jokes
or stories by email.
2.3.3.9. Email service should not be used for junk or unsolicited bulk mail.
2.3.3.10. Every employee should be able to scan for viruses before accessing web or e-
mail information.
2.3.3.11. Any employee who wishes to download or download information related to
his / her work from a website that is related to his / her work and download it from a
trusted source must first copy and edit it into my document.
2.3.3.12. The user should discontinue the use of e-mail and notify the EPITD or remove
the existing ones when a warning message is received about the authorization of the
authorized database.
2.3.3.13. When the user receives a warning message about filling out the authorized
database, E-mail use should be discontinued and notified to the IT department or existing
ones removed.
2.3.3.14. All Users are not allowed to attempt to hack into another user's email address
or to hack or use emails is prohibited.
2.3.3.15. All Users are not allowed to register or compete in any of the online contests
that are not recognized by the Company.
2.3.3.16. All Users are not allowed to register or unregister on suspicious websites and
services using the corporate email address.
2.3.3.17. All Users are not allowed to send or receive abusive, defamatory, illegal
documents and discriminatory messages using the company's corporate e-mail.
2.3.3.18. All Users are not allowed to open anonymous e-mails or send e-mails to
unknown addresses at the corporate e-mail address used by any employee of the
2.4. End-user Support
Policy
2.4.1Definition: This policy focused on the daily IT operations and maintenance
of IT infrastructure through handling problems reported by the Ethiopost end
Users on timely basis.
2.4.2. Objective: To Ensure that all end-Users of the Ethiopost business IT
resources are supported to conduct their officially assigned duties.
2.4.3. Policy Statement:
2.4.3.1. ITD shall ensure that all end user support cases are properly logged into
a central base and reviewed on a regular basis for improvement in service
support.
2.4.3.2. ITD shall create appropriate Users account with privilege for persons
who submit user account request form formally.
2.4.3.3. Users of the computer system may not use the system for illegal or
unlawful purposes.
2.4.3.4. . Users are responsible loss of their user account and password.
2.4.3.5. Users are responsible to keep all computer and accessories, including
desktop computers, laptops, shared printers, network cables, drivers, and
recovery CDs in a safe place
2.4.3.6. Repairing computes, installing and/or deleting software is prohibited for
end Users.
2.4.3. Policy Statement continued............
2.4.3.7. ITD shall ensure that all end user support cases are properly
logged into a central base and reviewed on a regular basis for
improvement in service support.
2.4.3.8. ITD shall ensure that a centralized technical knowledge base
used for problem solving is established and training on the utilization of
this data base is provided to all end-user support staff.
2.4.3.9. On resignation or termination of employment, Users should
handover all the equipment (including CDs) and credentials to the
relevant bodies. This should be considered as part of the clearance
procedure.
2.4.3.10. ITD shall disable or delete user accounts belonging to
terminated/resigned, Users and data stored on equipment belonging to
terminated Users shall be removed in an appropriate manner.
2.4.3.11. ITD retains the right to delete any personal media files stored
in shared locations. The local storage of data on a personal device (e.g.,
laptops, desktops, mobile phones and tablets) will not be backed up,
and the loss of any information (in the event of a device failure) will be
the responsibility of the user.
2.4.3.12. End Users must lock the screen or log off when the device is
unattended, and End Users must regularly manage documents in shared
locations and delete files and folders that are no longer required.
This Policy applies to:
All IT infrastructure Users of the Ethiopost.
2.5. End users and IT staff's training policy
2.5.1. Definition: IT training policy reveals the capacity of all staffin
Ethiopost to operate IT systems and to take over their responsibility
accordingly.
2.5.2. Objective: To ensure that the appropriate staffs are engaged and
take over their tasks and responsibilities properly.
2.5.3. Policy Statement:
2.5.3.1. ITD shall ensure that all staff assigned with responsibilities for
various business critical IT System operations of the Ethiopost are
professionally trained.
2.5.3.2. ITD shall ensure that the skill sets, and competency levels of the
Employees are periodically reviewed and evaluated.
2.5.3.3. All Users shall ensure that capable of using basic computer
operations to conduct their tasks and responsibilities.
2.5.3.4. ITD shall ensure that the ICT training provided focuses on capacity
building and skills building.
2.5.3.5. ITD shall ensure that organizing IT related capacity building
trainings periodically based on the premises of business requirement
This Policy applies to:
All Departments within the Ethiopost.
3.Part Three: Hardware's and
Software's Policy
3.1. IT Hardware resource
Procurement Policy.
3.1.1. Definition: The IT resource procurement policy states the framework and
guidelines to be followed when procuring resources whether they are hardware and
software resources as per the operational and projected needs of the Ethiopost
3.1.2. Objective: This policy essential for a smooth functioning and consistent
3.1.3. Policy Statement:
3.1.3.1.Procurement department shall ensure that the hardware and software
vendors are meet minimum requirements of specification needs.
3.1.3.2.ITD shall develop procedures for evaluation testing and ranking of hardware
and software development.
3.1.3.3.All Departments and offices are responsible to get confirmation letter from ITD
before requests are submitted to Purchasing and property administration directorate.
3.1.3.4.All IT resource procurement shall be confirmed by ITD. Any IT resource
Purchased without the technical confirmation ITD is invalid.
3.1.3.5.ITD shall ensure that clearance confirmation for purchased hardware and
software based on specification and standards.
3.1.3.6.ITD and Procurement Shall implement norm of Laptop, desktop, printers, and
related resources that appropriate hardware must be delivered to prospective users
3.1.3.7.ITD shall identify and propose for upgrade of hardware that do not satisfy the
minimum requirement
3.1.3. Policy Statement continued..........
4.8.3.9. Users of networked computer and should store their data on their
local hard drives and on the server. Data stored on their local hard drive may
be lost if a problem develops with the PC, and the IT Staff may not be able to
assist in its recovery. Therefore, data should be stored on both the server and
local drive within the file directory (folder).