Professional Documents
Culture Documents
$RGI3W8W
$RGI3W8W
$RGI3W8W
com
WISDOMINFORMATION TECHNOLOGY
Company Name: PT. Arpeni Pratama Ocean Document Date: October 1, 2013
Line Tbk
Scope : All Employees Document Revision Date:
Version : 1.0 Stairs] Effectively Applicable:
The above policy comes into effect for all employees of PT Arpeni Pratama
Ocean Line Tbk since the signing of this policy.
Objective:
Provide guidelines for using Email and Instant Messaging in the workplace for
company purposes/interests
Applies to:
All employees
Ultimate Guide:
The Company implements this policy to regulate the use of electronic messaging
systems, namely E-mail and Instant Messaging.
E-mail and Instant Messaging are important and sensitive means of corporate business.
This policy regulates and provides guidance/standardization of all sending and receiving
electronic messages by utilizing the facilities provided by the company
General requirements:
The company provides electronic messaging facilities to support employee
work effectiveness and of course it will increase company productivity
All electronic messages created and sent must comply with company policies
such as, but not limited to, the rules and examples in this policy
The company prohibits the use of electronic messages for political activities,
illegal/criminal activities, containing pornographic content, illegal
messages/attachments, indecent hats, slanderous or insulting
Company e-messaging tools may not be used for the promotion or publication of
any person, political or religious views, business operations or any activities for
personal gain
The use of Email and Instant Messaging tools will be determined by the IT
Department
Any employee who finds a violation of this policy must immediately notify the
manager or HR Department
Any employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable Law/PP).
Ownership:
Email and Instant Messaging are wholly owned by the company. All Email and
Instant Messaging facilities used, including all messages that are stored, created,
sent or received by employees or non-employees are the property of the
company and NOT the employee's personal property.
The Company reserves the right to block, monitor, review and disclose any/all
messages sent or received. If necessary and according to the approval of the
superior or the authorized party (director, audit manager) an electronic message
audit can be carried out
Confidentiality:
Employees are prohibited from sending unauthorized electronic messages, disclosing
company secrets or confidential company information
It is forbidden to download or copy data files from external systems and the
internet except after obtaining permission from the relevant Manager and IT
Manager
Security:
The company provides antivirus software as a means of checking electronic
messaging (email) facilities. Employees are prohibited from
disabling/deactivating the antivirus software
Even though the company has provided antivirus software, employees are
still required to be careful of the spread of viruses, worms or the like,
especially if they receive messages that are unknown to the sender, unclear
contents of email messages and suspicious attachments. If an employee
receives a suspicious electronic message then take the following steps:
Unauthorized use:
Circulate company data to outside parties without permission
Replying, forwarding chain letters and e-mails categorized as hoaxes are not
permitted
The email username will follow the active directory server account and the
naming will follow the specified policy
Not all e-mails can send e-mails out of APOL. Applications to be able to send
out e-mails must be approved by the supervisor (manager) and HRD
Email access in the office is to use the 'Exchange' service and "webmail' or
'Outlook Anywhere' if outside the office or if using a mobile device. No.
Can use IMAP or POP3 service
Given if it is really needed for work reasons and usemame will follow the
specified policy
Example:
Not available
Question:
Please contact the IT Extension Department 3021
Objective:
Provide guidelines for internet access and utilization through the company network.
Applies to :
All employees who are allowed/entitled to access the company's internet services
Main guide:
Internet services are provided to employees with the approval of the employee's manager to
improve the quality of the employee's work. The internet is a useful tool in supporting the
company's business activities but at the same time it has implications for company security.
For that reason, employees who have been granted internet access rights are obliged to
guarantee that the use of the internet is only for the benefit of the company.
General requirements :
The granting of access rights to the use of the internet within the company
environment to employees must be approved by the manager's direct supervisor
Each employee is responsible for the access rights that have been granted and their
use
The use of the internet is only used for the benefit of the company
Any employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable Law/PP).
Unauthorized use
Access, upload, download, or distribute pornography, sexually charged material,
illegal, propaganda, political, slanderous, sexual harassment, insults, defamation,
gender/racial discrimination, ethnicity, religion, gambling
Some websites or resources that the company believes have the potential to harm the
company, have a negative effect on employee performance, and interfere with
company productivity, which will be blocked by blocking access to the website or
resource. Examples: online games, social networking sites, video streaming.
Example:
Not available
Question :
Please contact the IT Extension Department 3021
Objective:
Provide password management guidelines to maintain the security and integrity of all
company business systems
Applies to :
All employees
Ultimate Guide:
Maintaining the security of the company's business systems which include software,
hardware, e-mail systems, network facilities and business applications is very important to
ensure data integrity and stability of company information systems.
The company provides password data to employees who have the right to access the
company's information system in the form of operating systems, application networks,
email to support the company's business activities.
Every application for making usemame for information systems must obtain approval
from the direct supervisor at least at the manager level. The IT department will
provide a default password that MUST be changed immediately by the employee who
received it the first time using the default password, by following the provisions
described in "PASSWORD GUIDELINES"
Any employee who violates this policy will be subject to disciplinary action including
termination of employment (with reference to the applicable Law/PP).
Password Guidelines:
Passwords must not be easily guessed by employees, each employee must follow the
provisions for giving/changing passwords as follows:
Do not use any part of the account identifier (user name, login ID, date of birth, etc.)
Use a mix of numbers, uppercase, lowercase letters and special characters like "*&
%#@!~
Use two or three short words that have nothing to do with username, name,
address/house number, ID card number, telephone number, birthday.
Do not let others see you when you enter your password.
Do not display or write your password in the work area or other visible place.
Change your password periodically (recommended every 6 months) and do not use
the password you want to change (old password). Change the password with a
completely new one
If you leave your terminal (PC or Laptop), then make sure you log off, or lock screen
or shutdown to make sure your terminal (PC or Laptop) is not open.
Example Passwords:
@rp3nl wl 11yH3rm@w4n
Question :
Please contact the IT Extension Department 3021
Applies to :
All employees
Ultimate Guide:
The company enforces standardization of PC and Laptop configurations according to
company needs
General requirements :
Needs that do not follow the standardization imposed by the IT Department can be
given to employees on condition that they submit changes, additions or exceptions to
standardization that have been approved by the manager and directors concerned.
Employees are not allowed to add or reduce hardware/software that has been provided
by the company unless it has been approved by the IT Manager
The use of hardware/software other than company standards will be the full
responsibility of the employee.
Every employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable Law/PP).
PC Support
The IT department will maintain all of the company's desktop PCs and laptops both in
the office and on board. Every employee is required
maintain and maintain properly every hardware and software that has been entrusted
that has been entrusted by the company to employees to support their work activities
in the company
•?•If they experience problems with their PC/Laptop, users are required to contact the
company's helpdesk team and then the helpdesk team will direct them to the
company's PC support section. Users are not allowed to determine their own
PC/laptop repair/service provider without going through the approval of the IT
Manager
Personal devices used for company purposes will not get support from the IT
Department
Employee training
Training for new employees on the use of PCs, access to the network and other
software/applications will be provided by the IT helpdesk
Backup Procedure
Every employee who has access rights to the working folder server can store data on
the file sharing server. Every certain period the data on the server will be backed up.
Data and applications on the PC/Laptop are not backed up. If you want to backup
data or applications on each PC/laptop that you use, then follow the following
procedure:
o Save the file or data which is company data to the server working folder that
has been provided by the company (IT Department). Periodically the folder
will be backed up by the IT Department
o Not allowed to save files that have nothing to do with the company's business
interests
If the file or data is on your PC/laptop and the file is lost/damaged, contact the IT
Department to restore the file. The IT department does not guarantee that the file can
be returned in its entirety
Anti-Virus Software
The company uses antivirus software that will automatically scan all
PCs/Laptops connected to the company network
Example:
IT request form attachment
Question :
Please contact the IT Extension Department 3021
IT Standard Form
1111-1--1I:-=====
.- [ --ao _
-11 , ,g
., .
ID- -==== ]a .,..0 hlltl!IG
0
,-....... ,J
1111-0,n
7
nou- TTO..._..., Yn>DlqQl(cipt1111111•l
'TTDfT TTDHNOCYR
3) Exit Clearance Form
I Form Name: Form UC (User Clearance)
II Use:
a. Closing network access office included loginapplication
b. Data backup including handover
c. Handover of computer
equipment III Signed:
a. Relevant department manager
b. HR Manager
c. IT Department
r
. .. .
I P l l' IIII
.. _,l,...Mr--.tll
oats•notlad!vt bu1IIflWe,Ib,IT)
rPC
llkb, p daaSullminudto
PCSmti.a
rUH
Sulmldlld lU
TTDU•
nn-.... TTDHRD
M-•
T"II)
Dot+-.i+o.-
nn TTD -dOltT
No: IT 05
Policy Name : Desktop PC Software Standardization /
Laptops
Objective:
Provides guidelines for the process of purchasing, using and installing software on
company PCs
Applies to :
All employees
Ultimate Guide:
The company enforces standardization of PC and laptop software according to company
needs
Application:
1. This policy applies to all company employees who have permission to use the
software installed (installed) on the company's desktop/laptop PC
3. Applications for purchasing software for purposes on board must be notified to the IT
Department before further processing by the Engineering or Nautical Department
Technical Support :
1. Software support is only provided for the type of software that has become company
standard. Examples of support for Windows Operating Systems, Microsoft Office and
Antivirus
2. Support (support) will not be provided for software that is not a company standard,
software purchased personally, software with a trial license and other software that is
not included in the company's standard software list. The use of software outside the
standard is prohibited for all employees.
The Role of the IT Department in the Purchase & Use of Hardware and Software:
6. Ensuring compliance with the company's hardware and software usage policies by all
company hardware/software users.
7. If there is a need for program improvement because the program does not
accommodate the company's business processes, the head of the department
concerned must discuss it with the IT Department and fill out the user form.
request and signed by head Department before
programdeveloped. Steps to be taken by the IT Department:
a. ldentification of problems
1.Through meetings with key users
Notes:
Users are not allowed to install/install hardware/software other than those that have been
set/approved in writing by the company (IT Department). User
It is forbidden to install/store illegal software including audio files (Mp3, wma, etc.), video
(mp4 and others).
1. Make a request on the PR form and specify PC hardware or software that is not on
the standard list. The form must obtain approval from the direct supervisor and
state the purpose of using PC hardware or software that is not included in the
company's standard list(non-standard software)
2. For certain cases and the use of the software is absolutely necessary, granting
permission to use non-standard software can be granted under certain conditions.
Installation pending compatibility test, proposed software purchase and license
type test from IT Department
Example:
Not available
Question :
Please contact the IT Extension Department 3021
Applies to :
All employees who are entitled to use PC/Laptop work facilities
General requirements :
The IT department will enforce the standardization of PC and Laptop hardware
specifications
The IT department is responsible for all hardware installations and employees are
prohibited from modifying, disconnecting, connecting or moving hardware without
the knowledge of the IT department
Any employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable Law/PP).
Hardware Specifications
PC hardware specifications
ntel®H61
4 GB (2GBx2) DDR3 1066 MHz $ORAM (dual-channel support
SstemMellilo.. ontwomMMs,su to8GB
Harddrive 500GBSerial ATA hard disk
Otlcal DriveDVD None
Intel® integrated graphics solution, featuring: • Intel® HD Graphics • Intel® Dynam
Gra hic.s
Embedded high-definition audio with 5.1-channel surround sound
Audio SU• ort:
Seaker
Networiking • Gioab1tEinternet
Modem None
Front: • Four USB 2.0 ports • High-definition headphone and
microphone jacks • Back: • Six USB 2.0 ports • PS/2 keyboard and
mouse ports • Ethernet {RJ-45) port • Three audio ports • VGA port
1/0 Ports • DVI-D port Serial port Parallel port
Low-profile riser slots: PCI Express® 2.0 x16 PCI slot Express®2.0
1/0Expansion x1 slot
Dimensions 101.5 (W) x 396.84 (D) x 266.5 (H) mm (with bezel)
Power Supply 220W
System Compliance 2001 PC
Certification FCC, CE, MET, Nemko (CB&GS)
Special Keys&Controls Acer USB Keyboard and mouse
Warranty 3 (three} years spare parts and labour
Intel® Core™ i3-3110M Processor (3M Cache, 2.40 GHz) Mobile Intel®
Pla.tform HM77:Ex ress Chi et
4GB (4GBx1)of DDR3 system memory, upgradable to 8 GB using two soDIMM
modules for 64-bitO S ,
13.3"HD 1366x768resolutionLED-backlitInte'®
HD Gra hics
500G,B
rtve None
Dimensesiounce& Dimensions 325 (W) x 235 (D) x 18.9/24.8 (H)mm(12.79 x 9.25x0.74/0.97
Wei·:hI inches Wei.ht 1 .72k 3.79 lbs. with 4-cellbayyyye ·a.tsk
ACPI 3.0 CPU power management standard: supports Standby and
Hibernation power-saving modes Power adapter 3-pin 65 WAC adapter: •95
(W)x50 (D) x 25.4 (H) mm (3.74 x 1.96x1inches) •216 g (0.47 lbs.)with180
cm DC cable Battery •43.8 Wh 2960 mAh 4-cell Li-ion battery pack Battery life:
PowerSubsstem 6 hours ENERGY STAR®
Keyboard 88-/89-/93-key Acer FineTouch™ keyboard with international
language support, dedicated US dollar and Euro symbol keys Touchpad Multi
gesture touchpad, supporting two-finger scroll, pinch, rotate, flip Media keys
Media control keys {printed on keyboard): play/pause, stop, previous. next,
volume up, volume down Control keys Acer programmable key Acer Backup
key Acer Bio-Protection fingerprint reader1 Email key Mic mute
In_utDev ces keyCommunication ke·
High-definition audio support Two built-in stereo speakers MS-Sound
compatible Acer PureZone technology with two built-in stereo microphones,
featuring beam forming, echo cancellation, and noise suppression
Audio tectmol ice
WLAN: •Acer lnvilink™ Nplify™ 802.11a/b/g/n Wi-Fi CERTIFIED™
Supporting Acer SignalUp™ wireless technology WPAN: Bluetooth® 4.0+HS
LAN: Gigabit Ethernet Acer Video Conference, featuring: Acer Crystal Eye HD
Commun caitlon webcam
144-pin Acer ProDock connector ExpressCard®/34 slot Multi-in-1 card reader
(SDTM, MMC, MS, MS PRO, xD) Three USB 3.0 ports (one port featuring
power-off USS charging) eSATA / USB 2.0 port15 HDMI ® port with HDCP
support External display (VGA) port Headphone/speaker jack Microphone-in
1/0 ·ack Ethernet RJ-45 ortDC-in ·ack for ACthere is,ter
Interface
Wamr •
Hardware Ownership
All hardware from the company belongs to the company and is only given to
employees who are entitled to receive it according to their positions, responsibilities
and needs to support the work of the employee concerned.
Employees are required to maintain and maintain the hardware provided by the
company and only used for the benefit of the company. Loss or damage caused is the
responsibility of the employee
Laptops are only given to managers and above or employees who do a lot of out of
town official activities. For positions under manager, if you want to give a laptop, you
must get approval from the company (assess that it is necessary to give a laptop) to
the employee concerned. Apart from that using PC hardware
PC/Laptop hardware is only used for employees who are assessed by the company as
requiring hardware as a work tool and in accordance with company policies and in
accordance with company responsibilities and needs. Office Boy example, drivers are
the part that doesn't need to get hardware
PreconditionHardware Purchase
Example:
Not available
Question :
Please contact Exte IT IT Departmentnsion 3021
Applies to:
All employees
General requirements:
The company prepares a Wide Area Network facility so that the head office and
branch offices can be joined in one network to access software or communicate
via voice (telephone).
The company prepares local area network facilities so that computers in one
branch can be connected to each other and facilitate software implementation
All PCs/laptops can access the company network (network) according to the user's
profit which has been regulated by the company's information system access
policy.
Employees are not allowed to bring and connect equipment from outside the office
that is not owned by the company into the company network
Any employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable
Law/PP).
Allowed use:
Every PC/laptop that has been given access to the company network is required
to be responsible that the data will be used effectively to support the work
Unauthorized use:
Transferring company data to other parties that have the potential to harm the
company
Respecting the rules of the IT Department, among others:
o Online game
o Not following the instructions of the IT Department
whenmaintenancenetwork
o Intentionally or unintentionally changing the configurationnetwork
o Accidentally or accidentally disconnected the
Confidentiality:
All information in the network is good atservernorclientbelongs to the company
Example:
Notavailable
Question :
Please contactDepartmentIT Extension 3021
Applies to:
All employees
General requirements:
USB flash is a place to store data temporarily to transfer source data from
company computers. And with consideration of the ease of carrying data for the
company's business needs, USB flash can be used
Any employee who violates this policy will be subject to disciplinary action
including termination of employment (with reference to the applicable
Law/PP).
Example:
Not available
Question :
Please contact the IT Extension Department 3021