Info-Tech's bundle of The Top 50 IT Policies are valuable tools designed to help you bank your most precious asset – time. Their ready-to-use format means that you can download and edit these tools whenever you need them to suit your specific IT and business needs. Let us do the time-consuming work for you – take advantage of our ever-expanding collection of downloadable policies.
System/Network Administrators Policy Purpose The Purpose of the system/network administrator policy is to outline responsibilities, guidelines, and standards of conduct for all individuals who function as system/network administrators for [company name]. [This document is meant as a guideline for you to follow, so please add further situation-specific information to it as needed.] Scope [Company name]’s system/network administrator policy applies to all system/network administrators at [company name]. The term system/network administrator applies to any person who is responsible for the maintenance of [company name] computer networks, databases, electronic mail (e-mail), Internet connectivity, telephones (including cellular phones), pagers, voice mail, fax transmissions, modems, multimedia, video, and all other computer-related communications provided by [company name]. Technologies, facilities, and other information resources used for [company name] information processing, transfer, storage, and communications are also included. Responsibilities of System/Network Administrators The operation and creation of the electronic communications systems require personnel to manage, configure, monitor, and administer computer and other electronic communications hardware and software. The responsibilities of the system/network administrators who configure these services and monitor the performance of these systems include, but are not limited to: 1. Not disclosing your passwords to anyone. 2. Storing authentication data (access codes, PIN numbers, password files, encryption keys etc) must be appropriately protected with shadowing, access codes and encryption, etc. 3. Following the guidelines of their administrative unit as well pertinent [company name] policies, applicable laws, and licensing agreements with software manufacturers. 4. Taking precautions against damage or theft of the systems information or components. 5. Applying patches and upgrades to utilities and operating systems as necessary. Proper notification of these changes should be given to users so that program malfunctions can be properly identified and corrected. 6. Solving problems with usernames and passwords. 7. Setting up accounts for individuals to access information and services. 8. Configuring services and systems to fulfill the needs of the organization. 9. Taking corrective action to improve performance. 10. Implementing upgrades and corrections to provide enhancements and features. 11. Monitoring the performance of the services and systems. 12. Resolving and researching problems. 13. Evaluating the effectiveness of the c
Pages to are hidden for
"SysAdmin Code of Conduct"Please download to view full document