IIPS, Mumbai strives to use modern Information and Communication Technology (ICT) for high efficiency, secure, inclusive, ethical and cost-effectiveness of its activities. The ICT Policy defines the resources, usage, execution, and maintenance policies adhering to the above motives.
1. Salient features of the lT Policy:
- Governance of computing and networking resources across the campus.
- Expert committee approved lT specification, purchases, and installations as the standards and government guidelines.
- Adherence to the policy during purchase and procurement.
- Accessibility control of lT resources.
- Acquire and disseminate advancement of technology needed for high-quality teaching and research in the field of population, health, and developmental
2. Process of implementation and adherence to the policy:
The implementation and enforcement of compliance of the below mentioned lT policies are entrusted with ICT Unit.
- Access control policy: Administrators, teaching faculty, Administrative staff, and Technical Staff are categorized, and privileges of access is provided based on approvals of the competent authority. Authentication to some of the services is through Active Directory and NIC LDAP services(PARICHAY).
- Data log and retention policy: In general, all data pertaining to firewall and access logs are stored and retained for 15 days.
- Confidential data access policy: Payroll, Marks and Employee details maintained at IIPS are access controlled to approved personnel only.
- User accounts creation and maintenance policy: Categories like Faculty, Staff, and Students is maintained, and their accounts are terminated upon leaving the institute.
- Video surveillance policy: Server room and critical lCT infrastructure are under continuous surveillance. The recordings are preserved for a period of 30 days
- Accessibility to Internet: Internet access through the firewall is provided through LAN and Wi-Fi network. MAC address of the user’s device is registered on Wireless LAN Controller (WLCs), user is granted access to the Wi-Fi if the authentication is successful.
- Adherence: The policy is enforced through server, firewall, Wireless LAN Controller (WLCs), and subnet restriction. Institute’s website is GIGW Compliance and perform Security Audits at least once in two years.
- Inclusive Environment: Installing essential software/hardware for special abiled persons/Divyangjan.
3. Upgradation and disposal of obsolete or unusable ICT infrastructure and associated resources:
Computers (Desktop and Laptop) are replaced in every five years, a duration that corresponds to industry benchmarks for the useful and efficient life of a computer system/end of productive life/beyond economical repair. This replacement cycle provides users with competitive technology, stronger security standards, and reduced.
4. Renewal of Annual Maintenance Contract (AMC) : Institute renew the AMC on time to ensure the continued performance of the equipment or systems and to avoid any unexpected breakdowns or failures.
5. Green Computing Practices:
Due to growing concern about environmental responsibility, computing resources should be used efficiently. The following green computing practices adopted by the institute.
- Obsolete equipment disposal by following “Upgradation and disposal of obsolete or unusable IT infrastructure” policy.
- Use of certified energy efficient and environment friendly equipment.
- Sharing printers, computing resources and storage over network.
- Keeping monitors in sleep mode or turn off mode when not in use.
- Using of email or eOffice dashboard for circulation of office documents and memos.
- Minimizes usages of papers by implementation of eGovernance software.
6. Risk Management of ICT infrastructure:
- The Institute following the risk management policies for critical ICT infrastructures as given below
- The operation of the ICT system is protected against inappropriate levels of power, temperature, humidity, and also against fire and dirt.
- Periodic and Scheduled backup of data in separated location.
- Keeping IT infrastructure under surveillance.
- Use of fire alarm, smoke alarm and fire extinguisher.
- Physical security for theft control.
- Use of Anti-virus tools for protecting servers, desktops and network devices from malwares.
- Regular updating of software with security patches.
- Regular updating of firewall.
- Periodic assessment of risks due to obsolescence of critical ICT infrastructure.
- Random checks on LAN wire conditions and up keeping them to protect from damage or fire