Statement of IT Policy
(As of 12-31-2015)
1. Business Continuity, Disaster Recovery and Backup Procedures
The Society maintains, tests, and regularly revises plans for continuing business operations in the event of a natural disaster and/or system failures. This includes a tested system and
process to back up and recover media needed for supporting the Society. The IT aspect of overall Society business continuity planning builds upon the physical location for business re-deployment in case of business disruption or overall system failures.
2. Security and Internal Infrastructure (to include servers, routers, data base configurations and software, etc.)
The Society maintains appropriate planning and documentation that describes a stable infrastructure of servers, routers and data bases to support BHS IT operational needs. The
Society maintains appropriate and current licensing for all software purchased and used. The Society allows remote or virtual access to information in order to meet its deliverables to its members and volunteers. The Society monitors access and follows established guidelines in the client and network security policies.
3. Desktop Security and Configuration
The Society keeps client data, business information, and personal identification information private and secure, using appropriate desktop anti-virus and firewall software.
4. Client and Network Passwords and Tokens
The Society maintains access to client data and business information by issuing passwords only to employees and others who have a business need for such access. Users are informed that their access to information is monitored to ensure that members’ and customers’ information remains confidential and protected.
5. Personal Devices/Hardware/Software
The Society encourages creative use of devices and applications that support its programs and users. Use of personal hardware and software is reviewed by the appropriate staff contact to ensure that reasonable costs, security, and proper information management are maintained. All personal use must be appropriate and safeguarded to protect the confidentiality of Society information and/or Intellectual Property and Protected Information. When the Society provides access for such personal devices, or when a personal device is used in part for Society business, then the Society reserves the right to review the overall use of the device.
6. Budgets, Acquisition assessment, and Life-cycle Planning
The budget for technology is supported by clearly defined acquisition processes, with priority given to essential equipment. These processes include plans for upgrading software and hardware based on industry standards in conjunction with their potential use to support Society programs.
7. Operational Review and Requests for systems, hardware, software
The Society maintains an Operational Review process that includes financial oversight and reporting, to determine current and desired future states regarding IT infrastructure in support of Society operational and member needs.
8. Development and Training of Staff
The Society supports the specific technical education and training for all employees and all people working on behalf of the Society, appropriate to their individual roles. The Society supports the continuing education of IT employees and contractors as needed to maximize their effectiveness in performing their current job responsibilities, and to acquire new skills, knowledge and abilities. Where appropriate, the Society provides additional resources to facilitate the learning process.
9. File Management and Sharing
Information technology must be configured, operated and managed in a controlled manner to ensure the confidentiality, integrity and availability of Society information assets. In order to safeguard Society intellectual property, appropriate technology is used to segregate information intended for general public access from information intended for use by internal users.
10. Electronic Communications
Electronic communications are appropriate and safeguarded to protect the confidentiality of Society information and/or intellectual property and other protected information.
11. Third Party Agreements
The Society develops third party agreements that are established between the Society and employees, consultants, vendors, volunteers, etc. that support all aforementioned policies in carrying out Society business operational requirements.
IT Policy Task Force - Don Fuson (CSD-Chair), Casey Parsons (JAD), Dan True (LOL), Steve
Tremper (NSC), Kevin Williams (NED), Steve Zorn (LOL)
IT Policy ● Version Date: December 31, 2015 ● Page 1