Policy on Privilege and User Rights Management

Policy on Privilege and User Rights Management

1. Objective:

Define the rights and privileges of users within the organization.

2. Scope:

Encompasses all users and units benefiting from information technology facilities.

3. Responsibilities:

All employees are responsible for adhering to this policy, and overall management is accountable.

4. Implementation:

Privilege Management

Privileges are restricted to folder access, software installation, connection durations, network settings, general internet usage, guest internet access, and remote work/access. Reviewed at least once every 12 months, and reauthorizations are conducted upon entry, exit, or changes in responsibilities.

User Rights

Software Installation

Configuration and Security Settings

Access to Networks and Network Services

Document Access Rights

In response to a task change notification from the Human Resources department, access settings in the current department folder must be removed, and access settings for the new department folder must be configured.

For new personnel, a written (email) request for the folder and folder permission from the human resources department is required. If there is no written request, no access permission change will be processed.

The IT Service Provider is responsible for checking and authorizing all computer users' document access permissions at least once every 12 months and during job changes.

Folder Access Permissions

Device Usage

RUNITAS INFORMATION TECHNOLOGY INDUSTRY AND TRADE JOINT STOCK COMPANY

Partners

client
client
client
client
client
client
client
client