IT Policy
Last updated: April 8, 2025
This IT Policy outlines the acceptable use, security, and management of information technology resources
at Jai Shree Shyam Foundation (JSS). All employees, volunteers, and associated personnel are expected to
comply with this policy to ensure the integrity, confidentiality, and availability of data and systems.
1. Acceptable Use
- IT resources shall be used for official foundation purposes only.
- Users must not engage in activities that are illegal, unethical, or disruptive to JSS operations.
- Personal use of foundation devices should be minimal and appropriate.
2. Data Security
- Confidential data must be stored securely and accessed only by authorized personnel.
- Strong passwords should be used and changed regularly.
- Data should be backed up periodically to prevent loss.
3. Internet and Email Usage
- Internet access should support foundation goals and not be misused for entertainment, gambling, or
unauthorized downloads.
- Emails should be used professionally. Sending spam, phishing, or offensive content is strictly
prohibited.
4. Software and Hardware
- Only authorized software may be installed on foundation devices.
- Users must not attempt to modify or tamper with IT hardware or systems.
- Report any malfunction or suspicious activity to the IT team immediately.
5. Personal Devices
- Use of personal devices for work must be approved by management.
- Devices accessing foundation data must follow the same security standards.
6. Policy Violation
Violating this policy may result in disciplinary action, including revocation of IT privileges,
termination of association, or legal consequences.
7. Review and Updates
This policy is subject to periodic review and may be updated as required. Users will be informed of any
major changes.