Information Technology (IT) is one of the most important requisites of any organization. Information technology provides support and new directions to the institute’s operations. Nowadays, Internet is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks.
IACS Computing Facilities constitute all facilities related to numerical and symbolic computations and communications and network access and not limited to, e-mail and Internet access. The Centre for Computer Research, Education and Services (CCRES) provides support in networking and information resources for its computing community. The Computer Centre undertakes security and monitoring measures to preserve the integrity and performance of its networking and computing resources.
Use of any IACS technology resource can be made by authorized persons as long as this usage is in compliance with Institute policies and all local, state and central Government laws governing telecommunication. Failure to comply may result in the closure of an account, with further discretionary action taken by the Director of the Institute, if necessary.
In order to protect the integrity of the IACS computer and communications network and its systems, any proof of unauthorized or illegal use of any IACS network device and/or computer and/or its accounts can warrant an investigation. Users may voluntarily cooperate with the Computer Centre staff in such investigations. If necessary, User's files, accounts and/or systems will be investigated only by a person, persons or a committee designated for each case separately as directed by the competent authority.
The following IT security policy lays out the rules regarding how IACS IT resources can be used. The policy will define acceptable and unacceptable behaviors, guidelines, access controls, and potential consequences for breaking rules.
The following items describe general policies for usage and administration of IACS's computing facilities.
Users : Users of IACS computing facilities are to be limited primarily to IACS's academic and other staff, students and visitors for purposes that conform to the requirements of the item above.
1. Policy and Guidelines on the Use of IT Resources ( as per MeitY-F. No. 2(22)/2013-EG-IIandamendments/modificationthereofffromtimetotime)-This policy governs the usage of IT Resources from an end user’s perspective.
2. E-mail Policy (as per MeitY-F.No.2(22)/2013-EG-II and amendments/ modification thereofffromtimetotime)-https://www.meity.gov.in/content/email-policy –This governs the usage of email services provided to IACS users. When a new user creates a new E-mail ID of IACS, then they are advised via the Email creation form to “please change your password periodically and never reveal your login details to anyone.”
3. PasswordPolicy-https://www.meity.gov.in/writereaddata/files/Password_Policy_1.pdf –The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change of passwords.
4. Policy on Adoption of Open Source Software (as per MeitY- F. No. 1(3)/2014 – EG II and amendments/modificationthereofffromtimetotime)
This will encourage the formal adoption and use of Open Source Software (OSS) in IACS.
5. Backup Policy for Servers – Periodic Backups are taken for network equipment’s like Core Switches, Firewalls, Routers, Email Gateway Servers, Wireless Controller, Active Directory Server (automatic daily update), Mail Server (automatic daily update), Web Server (automatic daily update), EDUROAM Server, DNS Server, Proxy Servers and all the network switches installed in different locations throughout the IACS Campus.
6. DC (Data Center) Requirements-IACS Computer Centre has its own dedicated Data Center and all network equipment’s are hosted as on-premises infrastructure.
7. Document Digitization
At IACS, we digitize all the official documents like-Accounts, Medical, Personal Files, Office Memorandum, Annual Reports, and Fixed Assets along with all old documents up to last 15 years. All the digitized files are accessed through the Document management system IACS.
8. Biometric attendance is recorded using two ways-Fingerprint recognition and Face recognition and recording of biometric attendance is mandatory for all IACS users. The biometric devices are installed in Main Raman Gate, Entrance of Main building, Entrance of Centenary Building, Entrance of CRAFT building.
9. Centralized Inventory for IT Assets: Centralized inventory of IT assets is maintained.
10. Online Tracking of all kinds of documents is done using Dispatch Docketing System.
11. CCTV Surveillance- CCTV camera is installed in different locations throughout the campus like in Main Raman Gate which is used for both Entry and Exit of employees, Canteen, Corridors, Data Centers and all other open places of IACS. CCTV Footage is stored in the CCTV Storage Server for 90 days. Footage may be accessed with prior approval of the Competent Authority only.
12. Access to Internet and Intranet- IACS network can be accessed only through Proxy authentication. Users should not undertake any activity through any website or applications to bypass filtering / Policy / Firewall of the network or perform any other unlawful acts which may affect the network’s performance or security. Users are not allowed to change the NIC configuration, IP address or any other parameters set for accessing organization LAN without permission of implementing authority.
It is the responsibility of the user to ensure that the client system is free from any Virus/Malware/Potential threat software’s/pirated copy of software’s before connecting to organization’s network.
13. Access to Wireless Networks- It is MANDATORY for departments deploying wireless network in IACS to implement secured access using one of the methods. Access to network/internet via wireless routers must be using one of the methods. Wi-Fi Protected Access (WPA) OR Wired Equivalent Protection (WEP) AND Media Access Control (MAC) Filtering enabled access.
All IACS users can access Wireless Network through MAC binding of their network devices. However, for any Guest user, Wi-Fi connectivity is provided without MAC binding. Wireless client systems and wireless devices is not allowed to connect to IACS wireless access points without authentication. To ensure information security, it is recommended that users should not connect their devices to unsecured wireless networks. It is the responsibility of the user to ensure that the device is free from any Virus/Malware/Potential threat softwares/pirated copy of softwares before connecting to company’s Wi-Fi network.
General guidelines to be followed are as below:
14. Filtering and Blocking of sites- IACS CCRES blocks content over the Internet which may pose a security threat to the network and productivity of the users/Institute.
16. E-mail Account Management- Email Accounts are being kept for 6 months duration after resignation in case of students and in case of staff the email account is deleted on the next day of superannuation. In case of any Faculty members, Email ID is kept lifetime for research purposes. Sending Broadcast mail to all users of IACS is blocked for any individual IACS users.
17. Use of Secure Passwords- All users accessing the e-mail services must use strong passwords for security of their e-mail accounts. They should set the password of at least 8 characters in length and it should contain uppercase, lowercase, special character and a number.
Misuse
Any usage which contravenes local, state and central government laws or violates norms of IACS usage will be treated as misuse. Two specific categories of misuse are listed below. All listed actions and others which effectively amount to the same are considered as misuse of IACS computing, communications and network facility.
Misuse involving or amounting to attack on any devices, systems and/or networks
Other categories of misuse
Infractions
The following actions will be taken in case of infractions of the IACS policies: