Information Technology

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] Introduction to IT Induction. Information Technology.

Scene 2 (5s)

[Audio] Organogram Infrastructure Setup IT Policy Overview Escalation Contacts.

Scene 3 (13s)

[Audio] Certainly! Here is the explanation of the IT organization structure as depicted in the organogram: **Top Management:** **Managing Director (B M K Nagesh):** The highest authority in the company, overseeing all operations including I T. **Chief Executive Officer (Sandeep Raut):** Handles the company's vision and strategy, overseeing daily operations, managing finances, building relationships with stakeholders, and ensuring legal compliance. **IT Leadership:** **Global Head – IT (Ravi Prakash D):** Leads the global IT strategy and operations, ensuring alignment with business goals. **Head – IT (Srinivasa Rao K):** Assists the Global Head in managing IT operations and strategies, providing support in decision-making and execution. **IT Management:** **Manager - IT (Nagesswaran B):** Manages the day-to-day IT operations and teams, ensuring smooth functioning and addressing any issues that arise. **Specialized Roles:** **Support Executive - ERP (Naveen Kumar):** Manages Enterprise Resource Planning (ERP) systems, ensuring they meet business requirements and operate efficiently. **System Administration Team:** ** We have a dedicated system administration team across all the factories to ensure the smooth operation and security of all our technological infrastructure. **Senior System Administrator (Karthik K):** Manages and maintains IT systems, ensuring their optimal performance. **System Administrator (Vacant):** Similar role focusing on maintaining IT infrastructure. This structure outlines the hierarchy and roles within the IT department, ensuring clear responsibilities and efficient management of IT resources and operations..

Scene 4 (2m 28s)

[Audio] ERP Industry Specific Software Tally - Finance Dashboards Web based.

Scene 5 (2m 35s)

[Audio] Infra Setup Active Directory Network Connectivity O365 Security.

Scene 6 (2m 43s)

[Audio] Generic Approved copy of the IT Policy document is available at People Strong HRIS SOFTWARE COPYRIGHT COMPLIANCE Intellectual Property laws, such as Copyright and Patent laws in countries make unauthorized copying, altering, misuse, tampering, sharing, distribution or other exploitation of a piece of software illegal. If caught using illegal copies of software, or if held to have indulged in any of the aforesaid activities, the organization may face not only a civil suit, but also AIPL directors, management and individual users may be charged with monetary and criminal liabilities as well, including imprisonment. In the event of such prosecution, the harm to the good name and credentials of the company and the said individuals is immeasurable and irreparable..

Scene 7 (3m 39s)

[Audio] Software Management All ownership and control of software shall vest in the company and no user shall claim or exercise any rights in connection with the same. The user is merely permitted to use the software as permitted by the company for the purposes of the company. Users are not authorized to make any copies of software, or to alter, tamper, share, distribute or otherwise exploit the software under any circumstances. User shall not install any software on TKL equipment, without the prior written approval, that requires anyone time, monthly or deferred payment. Should the User install such software, any and all costs relating to the payment of the same shall be paid for solely by the User. No user will hand over any company's information or data (confidential and restricted) and software to any outsiders, including clients and customers until authorized in writing by Head - IT / Finance Controller / Managing Director..

Scene 8 (4m 42s)

[Audio] Access Control Management It is a criminal offence under the IT Act 2000 to deliberately attempt to access a system to which you do not have the authority. Logins to and use of the IT resources will be logged and monitored. Software checks will be done yearly in remote PC's, which also may include physical verification. All system-level and user-level passwords must be minimum of of 8 characters with combination of alpha numeric and a special character changed at least for every 40 days. System would also be configured to force the user level password change every 40 days. System will be configured to lock the user login account after 3 unsuccessful login attempts System will be configured to lock the computer after 15 minutes of in-activity. If you suspect that an account has been compromised, report the incident to IT helpdesk and do change all the passwords if the account is assigned to you alone..

Scene 9 (5m 44s)

[Audio] User Account Management Every new user account creation must be authorized by HR department / HOF and the authorization form must at least contain the following information and sent to IT helpdesk through a mail to respective IT Team. In case of common UID, the entire group/Department shall be held jointly and collectively responsible, if there is any violation or breach of the IT Policy. UID shall be suspended if the user is not accessing his / her systems for more than 60 days or upon retirement of the user. The same shall be deleted after 3 months with prior approval of Head - IT UIDs relating to terminated employees shall be disabled immediately upon receiving the communication from HR department and with authorization from Head - IT after successful backup. MD will have every right to go-through the user's data at any point of time. Back up of data from Laptops/desktops will not be taken. Please store all important official data onto the central file server & One Drive..

Scene 10 (6m 58s)

[Audio] Email IT shall configure an email address after receiving the details from HR for new joiners and from respective HOD/HOF for present employees for official communication. Normal process of email address allocation will be as [email protected] subject to the availability User should avoid sending greetings towards festivals and New Year. If any such email is received, user should not reply and should delete the email without opening the mail or attachment. This needs to be followed strictly to avoid chocking of internal bandwidth as well as external threats. Usage of TKL's email system in any way that may be interpreted as insulting, disruptive or offensive by any other person, or company, or which may be harmful to TKL morale should be avoided. Forwarding of chain letters internally and sending messages to, multiple destinations will be considered as 'spamming', which is an illegal activity in India and many countries. Owner of the email address will be considered as the author for all the messages originating from his / her email address. So users must ensure confidentiality of login credentials..

Scene 11 (8m 14s)

[Audio] Internet Use of the internet makes communication more efficient. However, internet service remains TKL property, and therefore must be used primarily for official purposes. Any unauthorized or improper use of e mail or the Internet is not acceptable and will not be permitted. Restricted access to the internet will be provided to all users to assist them in the performance of their jobs. Wherever access is provided, usage should be limited to official business purposes only. It is assumed that users will not browse immoral sites or objectionable sites or sites giving malicious content or any other sites forbidden by the Government of India. If any instance of violation of this is found, the individuals involved will be liable for the consequences. IT will monitor all the activities of users on Internet and may be reported..

Scene 12 (9m 11s)

[Audio] Laptop/ Data Card/Accessories Make, Model and specifications would be decided by IT team after analyzing the user's requirements. User is responsible for the upkeep of the asset. In case of damage or loss arising out of negligent usage, the user is liable to pay the value of repairs of the asset. The laptops would need to be submitted for periodic physical verification as may be required from time to time. In an unfortunate event of loss / theft of the laptop, the user is responsible to lodge FIR with concerned Police Station and also report the incident immediately to Finance department under intimation to the IT Department and User's reporting authority. The user is also responsible to follow all the other norms as stipulated by IT/Finance department in regard to such (theft) incidents. In the event a claim on the lost / stolen item is not entertained by the insurance company for any reason in whole or in part, the employee will be liable to pay the differential value to the company. The IT /Finance department on a case-to-case basis will determine the value after considering the insurance claim amount received, if any..

Scene 13 (10m 30s)

[Audio] Asset Management All purchases related to IT ( Software, Hardware, Licenses etc) will have to be routed through IT . The User shall be responsible for ensuring that all TKL equipment is returned to back to TKL, either at the request of TKL, or upon the User's association with TKL, for which the equipment was issued, being concluded. If the User is found" Absconding" or "intentionally fails to turn up after the acceptance of the employment", in such case the HR shall immediately send a notification to the IT Department of such Users along with the details of the equipment allotted to them. Based on the report received from the IT Department thereupon, the HR shall immediately file an FIR with the jurisdictional Police Station. Inventory of hardware and software assets (including licenses) is physically audited periodically at least once in a year by IT. Deviations of the inventory, if any are to be regulated by IT..

Scene 14 (11m 38s)

[Audio] Escalation Contacts Email: [email protected] Karthi – 9600901842 ( System Support) Naveen Kumar – 9943584370 ( ERP Support) 1st Level Escalation Contacts Nagesswaran – 9842204201 2nd Level Escalation Contacts Srinivasa Rao – 77609 72676.

Scene 15 (12m 24s)

[Audio] We appreciate your time and attention during this IT induction session. Your understanding of our infrastructure setup and its components is crucial for the seamless operation and success of our organization. If you have any questions or need further assistance, please do not hesitate to reach out to the IT team..