Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
LSR Tech Solutions employee access policy for iPhones and iPads
1. LSR Tech Solutions Employee Access to IPhone and IPad<br />LSR Tech Solutions Employee Access IPhone and IPad<br />______________________________________________________<br />Lisa Wessel<br />Prepared by<br />Lisa Wessel<br />______________________________________________________<br />Rick Kramer President<br />PREFACE<br />A centralized LSR Tech Solutions Employee Access for iphone and ipad approval policy will help the IT department run efficiently and cost effectively. Absence of a well defined policy leaves the company open to numerous vulnerabilities, including employees having access to the appropriate systems for their job duties and responsibilities to keep LSR Tech Solutions against competitive competition. This policy will help the employees do their job and have the necessary access to the proper system to do their job accurately and stay competitive. Opening up access to the system will allow employees proper assistance to our customers.<br />TABLE OF CONTENTS<br /> TOC quot;
1-1quot;
quot;
Heading x,2,Heading y,3quot;
PREFACE1 PAGEREF _Toc211069269 3<br />1.0SCOPE & PURPOSE PAGEREF _Toc211069270 5<br />1.1 Scope PAGEREF _Toc211069271 5<br />1.2 Purpose PAGEREF _Toc211069272 5<br />2.0JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS PAGEREF _Toc211069273 5<br /> HYPERLINK quot;
_Toc211069274quot;
2.1 Job Titles Workflow<br />2.2 References PAGEREF _Toc211069274 5<br />2.3 Definitions PAGEREF _Toc211069275 6<br />2.4 Acronyms PAGEREF _Toc211069276 6<br />Process PAGEREF _Toc211069277 7<br />Process Flowchart<br /> SCOPE & PURPOSE<br />1.1 Scope<br />This document applies to all employees that have access to IPhones and IPad and software programs to be able to perform their job duties to the fullest.<br />1.2 Purpose<br />The purpose of this policy is to address issues related to authorization and installation of any software that has yet to be approved by the IT department. The responsible party to authorize any access on LSR Tech Solutions systems will be the Network Administrator.<br /> JOB TITLES, REFERENCES, DEFINITIONS and ACRONYMS<br />2.1 Job Titles<br />2.2 References<br />Policy – “All software to be installed must be approved by the IT department prior to installation and the designated supervisor.”If there is new software installed all templates will have to be updated according to job descriptions. All employees with the job description will have the same access on all of the LSR Tech Solutions software systems.<br />Level 3 Documents – LSR Tech Solutions Employee Access Authorization Request Form. All templates are stored in the G: Information Systems/Reports/Authorization Forms for ipad and iphone. All the templates have been developed and marked for all the systems that the employee will need access to. All of the templates have been approved by management and are reviewed on an annual basis.<br />The management that reviews the templates are as follows: President, Executive Vice President, and Vice President.<br />Management will make the decision on employees who will have the the ability to have access to the iphone and ipad. The iphone will be rotated for the sales, customer service, warehouse and administration departments.<br />2.3 Definitions<br />Software Systems DefinitionIphonePhone with the ability to have internet access and Ipod into one packageIpadA mobile device bigger than smart phone and smaller than a laptop. Also a mobile device to have the ability to access the internet.<br />2.4 Acronyms<br />AcronymDescriptionITInformation Technology<br />Process <br />Employee who would like the opportunity to learn the dynamics of the IPhone or IPad can request the option of trying out the IPhone or IPad. LSR Tech Solutions would like the employees and staff to be able to use the IPhone or IPad for selling and troubleshooting the product.<br />E-mail the help desk with the request of the access for IPhone or IPad. The e-mail address is admin@lsrtech.com.<br />The IT department will e-mail the appropriate employee access form for IPhone or IPhone. The forms are stored in the G: Information System/Reports/Authorization Forms<br />The management will review the appropriate template, sign and return to the department to the Network Administration. <br />The Network Administrator will then issue the appropriate IPhone or IPad and create the phone number, user id and password depending on the IPad or IPhone access. The Network Administrator will give the IPhone or IPad to the employee and demonstrate how to use the IPhone or IPad works. <br />The IPhone and IPad should be used for business purposes only with limited personal usage. The IPhone and IPad usage will be monitored on a monthly basis. If the Network Administrator recognizes any illegal activity on the system the IPhone or IPad usage will be terminated immediately. Illegal activity includes any gambling, viewing any pornographic material or any other inappropriate materials.<br />Once the employee either terminates their position or no longer would like the IPhone or IPad the IPhone or IPad will have to be turned in to the Network Administration and passwords and authority and systems will have to be changed on the devices.<br /> <br />