SHREE BAIDYANATH AYURVED BHAWAN PVT LTD,
BAIDYANATH BHAWAN ROAD, PATNA- 8000o1
                                                ITPOLICY
An IT policy on the nature of IT software systems used at a branch would outline the types of software
systems that are approved for use, as well as guidelines for how they should be used and maintained.
Some   specific elements that might      be included in such           a   policy include:
        Approved software systems:
            1.    Order   Management Software-Web Based for Retailer for placing order
            2.    Billing Management Software-Inhouse FoxPro based Application
            3.    Accounts  Management Software TALLY PRIME (ERP)
                                                          -
            4.    HR Management Software- inhouse FoxPro Based
                                                               Application
            5.    Inventory Management Software TALLY PRIME (ERP)
                                                              -
            6.    Purchase Management Software TALLY PRIME (ERP)
       Email Access
            1.    Creation of E-mail Addresses: Based on the request of the respective Department and
                  approval from the Concerned Authority, the email id is created and shared along with
                  HR.
            2.    All use of email must be compliant with the Company's policies on ethical conduct
                  and the security of business data.
            3.    Email Security
                        Choose a strong password
                            Never hand out your email password,                 even   to   colleagues.
                            Don't write down your password
                            Users are ultimately responsible for the security of their own passwords. In
                            case   of any misuse, the             will be
                                                          responsible. This includes choosing strong
                                                        user
                         passwords, keeping them confidential, and not sharing them with others.
           4.    Avoiding email phishing
                    D o not click attachments, or links, on unsolicited emails, especially from an
                            unknown person.
                            Report suspicious-looking emails to the correct person (usually an IT
                            manager) immediately.
 PC
  standards
           1.    Compatible PC hardware gave according to work requirements for personnel.
           2.    Software Purchased and Installed by IT Department with                       a   third-party vendor (Comp
                  IT)
           3.    Regular maintaining PCs, regular backups, software updates,                       and hardware    upgrades.
  Firewall &ThreattoSecurity
           1.    All PCs within the  organization are current, updated antivirus program (Quick Heal)
                 installed and that regular updates are performed to ensure that the program remains
                 effective against new threats.
           2.    Software installation and maintenance: Regular patching and updating software to
                 ensure that it is secure and up-to-date.
           3.    Identifying potential security threats, such as the use of intrusion detection systems,
                 and the protocols that are followed when a potential threat is identified. Steps to be
                 taken to   mitigate    the   threat, such             isolating   the affected PC,
                                                                  as                                       disabling network oy.D
                                                                                                                             PVT.
                                                                                                                                  LTU
                                                                                                                       BHAWAN
                                                                                                      BAIDYANATRArRVED
                                                                                                  E                    e t   G e n e r a lM a n a n e r
    SHREE BAIDYANATH AYURVED BHAWAN PVT
           BAIDYANATH
                                        LTD, BHAWAN ROAD, PATNA- 800001
                    access, and   contacting   the IT     department     or       other   designated personnel       for
                    assistance.
   Other           Controls
              1.   Access right control to users
                        >Process for creating and managing user
                                                                   roles, such as administrator, standard
                           user, and guest user, as well as the
                                                                permissions and access rights associated
                            with each role. This         include
                                                   can
                                                                   guidelines
                                                                            for granting or denying access to
                            specific systems, applications,    or   data based on user role, job
                            other factors
                                                                                                  function, or
                            controlling access to sensitive data and systems, such as encryption and multi-
                            factor authentication, and
                                                         procedures for monitoring and auditing access to
                            sensitive data and systems.
              2.   Backup
                            Regular Backup weekly and daily depends on the uses
                            testing backupsto ensure that
                                                           they are functioning correctly and                that data
                            can be successfully restored
                            archiving data and retiring old backups in order to free
                                                                                     up storage space and
                            reduce the risk of data breaches
                                                                                   BAIDYANATHAYURVED
                                                                                                                 LTO.
                                                                                                       BHAWAM PVI.
                                                                              E
imaliaulor                                                                                        9st Genereleaager
Prepared By                                                                                     Approved By
Kumar Gautam
                                                                                               Deo Narayan Jha
 IT Manager
                                                                                                    AGM
SBAB PATNA
                                                                                                 SBAB PATNA