Use of Non-Standard Software Procedure | ITAM106

$ 8.95

Included in these items:MORE SAVINGS

5-Manual CFO Internal Control Procedures Bundle $ 1,497.00
IT Policies and Procedures Template Manual $ 397.00

easily editable in ms wordUse of Non-Standard Software Procedure

The Use of Non-Standard Software Procedure delineates specific guidelines regarding the use of personal software on company computing assets. This procedure helps ensure the efficiency and supportability of company computing resources, strict software configuration control procedures are required. The use of personally owned, unlicensed, or unauthorized software on company computing assets is prohibited. It applies to all company personnel and company computer equipment and systems. (6 pages, 789 words)

In some cases, the need for a software solution outside the scope of the Common Operating Environment (COE) will arise. When a system user identifies such a requirement, that user should submit a formal request for permission to install and use the non-standard software program. This request should be forwarded via the user’s department director to the Information Systems Manager.

Use of Non-Standard Software Responsibilities:

The Information Systems Manager is responsible for reviewing and approving requests to use non-standard software.

Department directors/managers are responsible for enforcing company policy and standards regarding software configuration and use.

Computer system users are responsible for knowing and observing company policy and standards regarding software configuration and use. Users must seek and receive approval before installing or using non-standard software on company computing assets. If unauthorized software is found or suspected, users are responsible for notifying their Department managers.

Company LAN Administrators are responsible for monitoring software installation, configuration, and usage. They are also responsible for reporting violations to the Information Systems Manager and Information Security Manager and, when unauthorized software is detected, coordinating actions required to eradicate the unauthorized software and return the workstation or system to the approved configuration.

The Information Security Manager is responsible for ensuring that software installed on company IT assets –¬†authorized or not –¬†does not pose a security threat and ensuring that users have appropriate access to company software and information.

Use of Non-Standard Software ProcedureUse of Non-Standard Software Procedure Activities

  • Requesting Non-Standard Software
  • Adding Non-Standard Software to the COE
  • Software Not Permitted Under Any Circumstances

Use of Non-Standard Software Procedure Forms



There are no reviews yet.

Be the first to review “Use of Non-Standard Software Procedure | ITAM106”

Your email address will not be published. Required fields are marked *

You may also like…