dc.description.abstract | IT Policy is a systematic approach to policies required to formulate for ensuring
manageability, confidentiality, integrity, availability and security of information and
information systems. This Policy also covers all information that electronically generated,
received, stored, printed, scanned, and typed. The provisions of this Policy are applicable for
Shahjalal Islami Bank Limited. All activities and operations required to ensure data security
including infrastructure, facility design, physical security, surveillance system, network
security, disaster recovery and business continuity planning, use of hardware and software,
data disposal, and protection of copyrights and other intellectual property rights.
Information Technology (IT) is the bedrock for the Bank’s survival and development in a
rapidly changing global environment, and challenges us to devise bold and courageous
initiatives to address a host of vital skilled human resources. In addition, an Information
Technology Policy built on reliable human resources and infrastructure constitutes the
fundamental tool and means of assessing, planning, managing development change and for
achieving sustainable growth.
Every progressive Bank has its own IT Policy and an implementation strategy to respond to the
emerging global reality and thus avert becoming a victim of the digital divide.
Information Technology Security (ITS) achieved by implementing a suitable set of controls,
including policies, procedures and standards. Specific Security Policy is required to establish
for all information/computer users of the Bank. This approved IT Policy has been updated to
reflect the rapidly changing Technologies within the Bank, to assist users of these facilities to
ensure that the facilities are properly protected and those specific IT security objectives are
met. Following the IT Policy, information system services of the Bank in accordance with
Information Technology standards, guidelines and best practices of the Bank can ensuring that
its information technology and business systems may be protected and controlled. | en_US |