This Policy contains proprietary
information of The Kota Central Co-operative Bank Ltd., Kota. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, whether electronic, mechanical, photocopying,
recording or otherwise, without the prior written permission of The Kota Central
Co-operative Bank Ltd., Kota. The Kota Central Co-operative Bank Ltd., Kota
reserves the right to revise and update this document as and when required.
Purpose
The purpose of this policy is to safeguard Bank’s Information System (IS)
assets, maintain data confidentiality, integrity and availability, to fulfill
organizational goals effectively and utilize resources efficiently.
This document provides the framework to ensure the protection of The Kota
Central Co-operative Bank Ltd., Kota’s assets in accordance with appropriate
standards, laws and regulations
All existing policies related to Personnel, Administration, Protection of
confidential information and other areas apply equally to the computerized
environment.
Scope
This policy applies to employees, contractors, consultants and other workers at
the Bank and their associates, including all personnel affiliated with third
parties. This policy also applies to all applications and equipment that is
owned or leased by the Bank.
Policy Ratification
The entire security policy is approve by the Administrator in its meeting held
on date 21/09/2016 before it is implemented. As technology is dynamic the
security policy needs an ongoing review to keep pace with threats arising out of
the new technology.
Information Technology Area
• IT infrastructure and architecture (e.g. computers and networks) operations
and investment decisions.
• Technology Transfer, by providing enabling technologies that make it easier
for customers and suppliers to do business with the enterprise as well as
increase revenues and profitability.
• Interaction with internal and external clients to ensure continuous customer
satisfaction.
• Manage day-to-day Security Functions.
• Providing training to all IT users to ensure productive use of existing and
new systems.
|