UDGI Foundation — Information Technology (IT) Policy
Last updated: 28/06/2025
1. Purpose
This IT Policy defines the rules, responsibilities, and best practices for using UDGI Foundation’s technological assets—such as computers, network, software, and data. It aims to ensure secure, ethical, and efficient use of IT resources, safeguarding data, infrastructure, and people .
2. Scope & Compliance
Applies to all staff, contractors, volunteers, interns, partners, and third-parties using UDGI’s IT resources.
Compliance with this policy is mandatory. Violations may lead to disciplinary action up to termination.
All users must report suspected misuse or security issues immediately to IT or their manager.
3. IT Training
New joiners receive onboarding on UDGI’s hardware, software, network, data security, and acceptable use.
Periodic refresher sessions—e.g., on phishing, password hygiene, data privacy—will be provided.
Training attendance is mandatory and tracked; certificates are issued .
4. IT Support
Issues are to be reported via IT support email/ticketing system.
Acknowledgement within 1 business day; escalation possible after 3 days .
Routine fixes follow FCFS; but urgent/security issues are expedited.
Managers must approve any equipment replacement; final decision by IT Department
5. Equipment Usage & Inventory
UDGI assets are for official use only; must be used responsibly and maintained properly .
Malfunctions must be reported immediately.
Inventory is managed by Procurement & IT; devices are tagged and undergo periodic audits .
Removal of devices outside UDGI premises requires prior approval.
On exit, staff must return all equipment, and inventory logs updated accordingly .
6. Network & Security
All devices must have active firewall, antivirus, and secure configurations.
Access is role-based and requires strong authentication (password + MFA where feasible) .
Regular patching and security updates are mandatory .
7. Data Backup & Classification
Classify data as Critical, Sensitive (PII), or Non‑Critical .
Backup schedule:
Daily: incremental
Weekly: full
Monthly: archival
Backups stored securely on-site, off-site, and/or in the cloud (encrypted) .
Regular restoration tests and backup integrity audits shall be conducted.
8. Anti‑Virus & Malware Protection
Endpoint protection is enforced on all devices.
Real-time scanning, scheduled full system scans, and automatic updates are mandatory .
9. Internet & Acceptable Use
Internet is for official use: research, communications, training, development.
Prohibited activities include:
Illegal content or copyright violations
Unauthorized downloads (games, pirated software)
Excessive personal use
UDGI reserves the right to monitor and log internet usage .
Suspected policy violations must be reported promptly.
10. Information Security & Access Control
Data access is on “least privilege” basis; RBAC in place.
Sensitive data must be encrypted at rest and in transit.
Network security includes firewalls, IDS/IPS, and segmentation .
UDGI has an incident response plan covering containment, investigation, notification, and remediation .
Security awareness sessions (phishing, social engineering) are conducted periodically.
11. Email Policy
Only official accounts should be used for business communication.
Confidential content must be encrypted.
Use strong passwords + MFA.
No chain mails, spam, or unnecessary attachments; use caution with links/attachments .
Emails are archived with retention/deletion rules in place.
12. Software Management
Only approved software may be installed—by IT or authorized personnel .
All software must be properly licensed and recorded.
Personal-use software is prohibited.
Regular software audits will be conducted to verify licenses and usage .
13. Compliance with Laws & Partners
UDGI adheres to India’s IT Act, emerging tech regulations, and partner-specific requirements concerning digital tools and data privacy .
14. Enforcement & Review
Violations will result in disciplinary action—warnings, access suspension, or termination.
IT Policy is reviewed annually or upon significant changes (technology, regulation).
Users are notified of updates via email/training.
Governance:
Oversight is by the IT Department in consultation with Management and/or Governing Council. Records of training, incidents, backups, audits, and policy updates will be maintained.