0% found this document useful (0 votes)
55 views

IT Policy June 2005

The document outlines an ICT policy for the Export Processing Zones Authority. It details policies for hardware and software procurement, management and security. It also covers topics like networking, backups, internet usage and email.

Uploaded by

Elijah Nyangwara
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

IT Policy June 2005

The document outlines an ICT policy for the Export Processing Zones Authority. It details policies for hardware and software procurement, management and security. It also covers topics like networking, backups, internet usage and email.

Uploaded by

Elijah Nyangwara
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 15

Export Processing Zones Authority

Information and Communication Technology


Policy
Version I
Export Processing Zones Authority
P.O. Box 50563 00200
Nairobi
Te! 25" 020 2#$2%0$&6
'ax! 25" 020 2#$3#0"
( 2005 copyright EPZA
)une 2005
1
2
Introduction
*n+or,ation an- .o,,unication Technoogies /*.T0 is a -ri1ing +orce o+ a acti1ities. *t pays a
crucia roe o+ i,pro1ing co,,unication2 in+or,ation processing an- in+or,ation ,anage,ent.
The Authority protects its Assets /3ar-4are2 5o+t4are an- Net4or6s0 an- other reate- acti1ities
through 1arious poicies an- proce-ures2 4hich ha1e to be +oo4e- by each an e1ery sta++ ,e,ber
in the organi7ation.
ICT Mission Statement
The *.T section 4i -e1eop an- i,pe,ent e++ecti1e an- e++icient *.T poicy an- pro1i-e
sustainabe technoogica in+rastructure an- support +or the reai7ation o+ Export Processing Zones
Authority ,ission
3
1! Computer "ard#are$ Peripherals and other e%uipment
.o,puter har-4are2 peripheras an- other e8uip,ent 4i incu-e a the co,puter reate-
har-4are 4hich is o4ne- by EPZA. These 4i incu-e an- not i,ite- to Persona .o,puters an-
its accessories2 9aptops2 :P5s2 Printers2 existing cabing in+rastructure etc.
$.$ Purchasing an- *nstaing o+ har-4are
A the *.T e8uip,ent sha be purchase- a+ter reco,,en-ation by the *.T section. :ser
re8uiring *.T e8uip,ent sha contact their respecti1e ,anagers 4ho 4i in turn +or4ar- to
the *.T section 4ho 4i consi-er the re8uest -epen-ing on +easibiity2 suitabiity an-
bu-get.
$.$.$ .o,puters an- aptops
Purchases o+ co,puter har-4are an- aptops sha be restricte- to incu-e ony
bran-e- co,puters incu-ing an- not i,ite- to .o,pa82 3P2 *B;2 an- <e
$.$.2 .abing
.abing re+ers to the 4iring 4hich has been set up to support 9oca Area Net4or6
/9AN0 an- the teephone syste, at a the EPZA pre,ises. 5tructure- cabing sha
be a-opte- an- a the o++ices sha ha1e net4or6 points to pro1i-e +or the access
to the 9AN an- +or use in the teephone ser1ices.
$.$.3 :ninterruptibe Po4er 5uppy /:P50 units
These are the po4er surge protectors an- reguators. A the co,puters an-
ree1ant e8uip,ent ,ust be protecte- +ro, po4er reate- probe,s by use o+ a
:P5.
$.$." Printers
A the co,puters sha be accessibe to a printer 4hich is either connecte- -irecty
or through the net4or6.
$.$.5 ;o-e,s
Ony co,puters +or -iaup access sha be +itte- 4ith ,o-e, as sha be
reco,,en-e- by the *.T section hea-.
4
$.2 E8uip,ent *n1entory
EPZA *.T section sha ,aintain the in1entory o+ a the *.T e8uip,ent an- a-1ice the
,anage,ent on ac8uisition an- -isposa o+ the sa,e
$.3 :se o+ e8uip,ent
A the *.T e8uip,ent sha be use- 4ithin the EPZA o++ices.
Non EPZA ,e,bers o+ sta++ are prohibite- +ro, using an- accessing the *.T e8uip,ent.
$." .onsu,abes
*.T consu,abes sha be procure- by the procure,ent o++icer in iaison 4ith the *.T
section
$.5 =or6ing o++ pre,ises an- using outsource->Externa e8uip,ent
Any e8uip,ent re8uire- +or use outsi-e the o++ice sha be sub?ect to reease by the *.T
section
Outsource- >Externa e8uip,ent such as aptop2 .<s2 <is6ettes2 9.< pro?ectors +or use
4ithin EPZA pre,ises sha be sub?ect to appro1a by *.T section.
$.6 5er1icing an- ,aintenance
5er1icing an- ,inor repairs o+ *.T e8uip,ent sha be -one internay. ;a?or repairs sha
be outsource- to outsi-e co,pany as sha be -eter,ine-.
$.# @etiring o+ obsoete e8uip,ent
The *.T section sha +ro, ti,e to ti,e a-1ice the Authority on e8uip,ent 4hich are
obsoete an- re8uire -isposa.
5
&! 'ocal Area (et#or)
2.$ ;anage,ent
2.2 .ontro an- Access
2.3 Net4or6 Printer
6
*! Soft#are Systems
3.$ Procure,ent o+ so+t4are
Procure,ent o+ any so+t4are sha be coor-inate- by the user -epart,ent an- the *.T
section 4ho sha pro1i-e the technica a-1ice. 5o+t4are can be bought either o++&the&she+
or -e1eope-.
3.$.$ O++ the she+ 5o+t4are
The Authority sha buy ,ost o+ the generic syste,s +ro, the ,ar6et +or on4ar-
custo,i7ation to ta6e a-1antage o+ their resiience an- the +act that they ha1e
been taste- in the ,ar6et
3.$.2 <e1eope- so+t4are /*n&house an- taior&,a-e0
5o+t4are -e1eop,ent co,pany 4i be contracte- to -e1eop taior&,a-e so+t4are
+or the Authority incase the sai- so+t4are is not a1aiabe o++&the&she+. This 4i be
coor-inate- by the user -epart,ent an- the *.T section.
5yste,s -e1eope- internay /*n&house0 by the ,e,bers o+ sta++ sha be +or s,a
scae use by the -e1eopers>users to ease processing o+ -ata or per+or,ing o+
certain +unctions.
3.2 5o+t4are ,aintenance an- upgra-e
The Authority sha enter into agree,ent 4ith the 1en-ors>suppiers o+ the so+t4are in use
4ithin the Authority +or ,aintenance an- upgra-e to +aciitate ,aintenance o+ up to -ate
so+t4are>syste,s.
3.3 Access an- use o+ so+t4are
Any so+t4are instae- in the Authority har-4are syste,s sha ony be use- by authori7e-
o++icers. This authori7ation sha be pro1i-e- by the hea- o+ *.T or the hea- o+ the user
-epart,ent.
3." 5o+t4are usage poicies an- proce-ures
3.".$ 9icense Agree,ents
3.".2 @epro-ucing 5o+t4are
3.".3 :nauthori7e- 5o+t4are
7
+! Information Processing$ Management and Security
+1 Introduction
The goa o+ bac6ups is to pre1ent the oss o+ -ata in the case o+ syste, +aiure or the acci-enta
-eetion o+ -ata. Bac6ups are not ,eant to archi1e -ata +or +uture re+erence.
The *.T -i1ision 4i 6eep proper bac6up on -aiy basis an- retaine- +or a perio- o+ up to one
4ee6.
<ue to the +re8uent change in technoogy2 the bac6upAs ,e-ia sha be re1ise- consistenty to
ensure that a the bac6ups are accessibe an- can be re-epoye- 4hen nee-e-.
Entry to 5er1er @oo, sha re,ain restricte- to *n+or,ation an- .o,,unication Technoogy
/*.T0 sta++.
A -ata pertaining to the Authority sha be store- on Bac6up ;e-ia.
The bac6ups o+ co,puter syste,s sha be ocate- in sa+e externa areas to ei,inate any
chances o+ -a,age in the e1ent o+ -isaster.
+& ,hat to -ac)up
<ata store- ocay on -es6top co,puters an- on syste,s that are ,anage- by the *.T
-epart,ent incu-ing net4or6 e8uip,ent sha be bac6e- up in accor-ance 4ith this poicy.
+* .re%uency of -ac)up and Storage Period
<ata bac6up sha be -one on -aiy basis as +oo4sB
a0 *ncre,enta bac6up sha be -one -aiy +ro, ;on-ay to 'ri-ay.
b0 'ri-ay bac6up sha be 6ept as the 4ee6y bac6up an- the other bac6up tapes recyce- or
o1er4ritten.
c0 The bac6up o+ the ast 'ri-ay o+ the ,onth sha be treate- as the ,onthy bac6up. The
other 'ri-ayAs bac6up o+ the pre1ious ,onth sha be recyce-.
-0 ;onthy bac6ups sha be 6ept +or a perio- o+ one year an- therea+ter the tapes can be
recyce-.
:ser -ata shou- not be archi1e- +or ong perio-s o+ ti,e as it is ony being bac6e- up to reco1er
+ro, har-4are +aiure an- acci-enta -eetion. Bac6ups o+ user -ata ,ay be store- +or a ,axi,u,
8
o+ six ,onths an- are to be -estroye- or o1er4ritten a+ter that ti,e. .ertain in+or,ation2 such as
syste, ogs an- seecte- usage ogs2 shou- be store- +or a year so as to pro1i-e su++icient -ata
+or usage anaysis an- to hep in1estigate security inci-ents.

4.4 Storage Media
There are ,any a1aiabe bac6up soutions incu-ing Tape bac6ups2 Net4or6 attache- storage2
5torage Area Net4or6s2 <irect Attache- 5torage2 i5.5*2 <is6 .oning2 @e,o1abe an- Externa
<is6 <ri1es2 Bac6up 5o+t4are2 @A*< 5torage2 'ireproo+ ;e-ia 5a+es an- .abinets.
+/ Storage 'ocation
=ee6y bac6ups an- ,onthy bac6ups sha be 6ept o++&site. Proper en1iron,ent contro2
te,perature2 hu,i-ity an- +ire protection2 sha be ,aintaine- at the storage ocation.
".6 Storage Security and Access
".6.$ A bac6up ,e-ia 4i be store- in a secure area an- ony accessibe to *.T or
authori7e- sta++. To a-- an extra ayer o+ security -ocu,ents shou- be sa1e- 4ith
pass4or-s.
".6.2 The bac6up -e1ice2 5er1ers an- storage ,e-ia shou- be in a secure2 oc6e-
roo, 4ith i,ite- access. The bac6up ,e-ia shou- be store- in +ireproo+ sa+e 4hen it is
not in use.
".6.3 Perio-ic tests o+ the bac6ups 4i be per+or,e- to -eter,ine i+ +ies can be
restore-. This shou- be -one ,onthy to ensure that both the tapes an- the bac6up
proce-ures 4or6 propery.
".# 0estoring -ac)up
<ata re8uire- +or restoring sha be -one upon re8uest to the *.T section
9
/! Internet and Email
The Authority has net4or6 connecti1ity that enabes sta++ to chec6 ,ai an- bro4se the internet +or
in+or,ation an- other ser1ices. The +oo4ing is to be obser1e- by a users 4hen accessing the
*nternet!&
$. =hie sta++ is encourage- to use the *nternet as an in+or,ation resource2 they are not
ao4e- to -o4noa- an- insta -ata +ro, the *nternet 4ithout appro1a +ro, *.T.
2. The sta++ is -iscourage- +ro, 1isiting unauthori7e- sites.
3. <eete e,ais that they -o not 6no4 the source 4ithout opening to a1oi- in+ecting the
e8uip,ent 4ith 1iruses.
". 5a1e any e,ais to separate +o-er i+ they 4ish to re+er to the, ater.
5. <eete e,ais 4ith attach,ents to sa1e -is6s space.
6. Any e,ais that are three months o- or ,ore 4i auto,aticay be -eete- +ro, a ,ai
boxes by *.T section to re-ee, -is6 space.
#. 5ta++ is encourage- to sa1e copies o+ their i,portant -ocu,ents on -is6ettes2 .<s or
tapes in iaison 4ith *.T section
10
1! EPZA ,e2site
6.$ :se
Authority 4ebsite sha be use- as source o+ in+or,ation to the externa 4or- an- sha
aso pro1i-e a +ee-bac6 on en8uiries about the EPZ progra,,e in Cenya.
6.2 :p-ating
:p-ating o+ the Authority 4ebsite sha be -one a+ter reco,,en-ation +ro, the =ebsite
,anage,ent tea, 4hich sha be constitute- by the .EO an- co,prises o+ Ne4
*n1est,ents2 P@O an- the *.T.
6.3 @e-esigning
@e-esigning o+ the 4ebsite sha be -one a+ter e1ery three years an- sha be coor-inate-
by the =ebsite ,anage,ent tea,.
11
3! Training and Staff A#areness
*n+or,ation an- .o,,unication Technoogy is -yna,ic there+ore training o+ sta++ on upco,ing
technoogy is e,phasi7e- to ensure that the Authority is not e+t behin-. To ensure that users ha1e
su++icient 6no4e-ge o+ operating co,puter syste,s! &
$. A a++ecte- users sha be a-e8uatey traine- on any ne4 upco,ing so+t4are or co,puter
har-4are
2. The *.T sta++ sha be traine- consistenty to act as the +irst e1e *.T support in the
organi7ation.
3. The Authority sha pro1i-e ree1ant earning ,aterias on *.T in the section an- ,ain
ibrary.
12
4! Prohi2ited Acti5ities67ses
The iste- actions are prohibite- in the AuthorityAs *.T syste,s
$. <o4noa-ing 5o+t4are 4ithout *.T section hea- authority
2. Printing or -istributing copyrighte- ,aterias
3. :se o+ unicense- 5o+t4are
". :sing Authority syste,s to soicit +or persona gain
5. Operating a Business +ro, the o++ice using Authority *.T +aciity
6. :se o+ O++ensi1e or 3arassing state,ents
#. 'or4ar-ing inappropriate ,essages
%. :se o+ 5urs an- )o6es
D. 5exuay oriente- ,essages or ?o6es
$0. Accessing =ebsites .ontaining
a. Pornographic
b. Terroris,
c. Espionage
-. The+t
e. <rugs
$$. Ea,bing
$2. :nethica Acti1ities
$3. Acti1ities -a,aging to the co,pany
$". Eranting access to externa persons
$5. *,personating another person
$6. *ntro-ucing a 1irus
13
8! 0esponse to ICT incidentals
D.$ <es6top .o,puters an- Access
D.2 Net4or6
D.3 5yste, A-,inistration
D." E,ai
D.5 *nternet
D.6 ;o1e,ent o+ E8uip,ent
14
Fioation o+ the poicy 4i resut in re1ocation>suspension o+ the pri1ieges accor-e- to the *.T
users
This poicy 4i be re1ie4e- on reguar basis an- users 4i be noti+ie- by e,ai on the changes an-
current 1ersion o+ the *.T poicy.
15

You might also like