Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1.0 OBJECTIVE:
1.1 To lay down the procedure to configure the basic policies for user accounts, general security for
data and maintenance for desktops.
2.0 SCOPE:
2.1 This procedure is applicable to all the computers in CRONUS PHARMA SPECIALITES INDIA
PVT LTD, Hyderabad.
3.0 RESPONSIBILITY:
3.1 IT is responsible for the configuration of such policies.
3.2 All the users in the Cronus Pharma have to follow this procedure.
3.3 IT & team are responsible to supervise and comply with this procedure.
3.4 Head QA/Designee is responsible for compliance of this procedure.
4.0 PROCEDURE:
4.1 Basic security and group policies.
1.1.1. User login account policies for the operating system.
1.1.2. User name and password combination is unique for that particular user and it is the electronic
identification of that user.
1.1.3. Creation and deletion of user account is under the responsibility of IT.
1.1.4. Maintenance of user password is under responsibility of respective user with the help of IT.
1.1.5. For reactivation and missing password users have to consult IT.
1.1.6. IT is responsible for deactivate\disable the User account on his\her last working day.
1.1.7. Previous login user name shall not be visible at new login.
1.2. User privilege for operating system of computers
1.2.1. Each user shall have a unique combination of user identification and password.
1.2.2. The password shall be confidential.
1.2.3. There are two types of common user groups
a. Administrator level
b. User level
1.3. General policies and privileges for the Administrator level users
1.3.1. The administrator level users shall have rights to access / modify / control all features of the
computer system.
1.3.2. IT personnel will have the rights to access administrator level.
1.4. General policies and privileges for the user level users
1.4.1. All the computer users of Cronus Pharma come under user level.
1.4.2. Users are restricted to Copy, Paste, Delete any kind of electronic raw data files from raw data
storage folder of the application software generated by systems.
1.4.3. Computer lockout mechanism shall be configured to prevent unauthorized access to operating
system when system is ideal.
1.4.4. They cannot use CD writer / Floppy drive/ USB flash drives.
1.4.5. All the users by default will be the members of restricted users group.
Details Prepared by Reviewed by Approved by
Sign & Date
Name Krishnamurthy M K Veerendar Ch. Ramachandra Rao B. Suman Rao
1.4.6. They cannot change Date, Time and Time zone of the system.
1.5. Security policies
1.5.1. Password Policy
1.5.2. All passwords shall have a minimum number of six characters. Passwords must be complexity
(combination of alphabets and numbers).
1.5.3. Password shall not be copied by anyway.
1.5.4. Password will expire in 90 days.
1.5.5. Passwords shall not be repeated for at least 3 changes.
1.5.6. During first login, system will ask to change the password given by the IT personnel.
1.5.7. Folder level security policy
Each user will have network drive to store their data, which is not accessible by other users.
Network Drives will back up into Magnetic tapes.
Data exported by the software (Empower, Lab X, etc.) will be stored in the network drive and
available to only respective users.
The folders, which are used by multi user, shall have access by network drive and configuration
to the respective user in a predefined manner approved by head of the department.
1.6. Network connections settings
1.6.1. Network settings are configured for Network Connections for Security Purpose.
1.6.2. Disabled to rename LAN connections or remote access connections available to all users.
1.33. All passwords shall have a minimum number of six characters. Passwords must be complexity
(combination of alphabets and numbers).
1.34. Password shall not be copied by anyway.
1.35. Password will expire in 90 days.
1.36. Passwords shall not be repeated for at least 3 changes.
1.37. During first login, system will ask to change the password given by the IT personnel.
1.38. Folder level security policy
1.39. Each user will have network drive to store their data, which is not accessible by other users.
Network Drives will back up into Magnetic tapes.
1.40. Data exported by the software (Empower, Lab X, etc.) will be stored in the network drive and
available to only respective users.
1.41. The folders, which are used by multi user, shall have access by network drive and configuration
to the respective user in a predefined manner approved by head of the department.
1.42. Network connections settings
1.43. Network settings are configured for Network Connections for Security Purpose.
1.44. Disabled to rename LAN connections or remote access connections available to all users.
1.45. Prohibited access to properties of components of LAN connections.
1.46. Prohibited the TCP/IP advanced configurations.
1.47. Prohibited the enabling/disabling components of LAN connection.
1.94. The definition of the antivirus shall be updated automatically by using the Antivirus server on
regular basis
1.95. Basic security and group policies.
1.95.1. User login account policies for the operating system.
1.95.2. User name and password combination is unique for that particular user and it is the electronic
identification of that user.
1.95.3. Creation and deletion of user account is under the responsibility of IT.
1.95.4. Maintenance of user password is under responsibility of respective user with the help of IT.
1.95.5. For reactivation and missing password users have to consult IT.
1.95.6. IT is responsible for deactivate\disable the User account on his\her last working day.
1.95.7. Previous login user name shall not be visible at new login.
1.96. User privilege for operating system of computers
1.96.1. Each user shall have a unique combination of user identification and password.
1.96.2. The password shall be confidential.
1.96.3. There are two types of common user groups
c. Administrator level
d. User level
1.97. General policies and privileges for the Administrator level users
1.97.1. The administrator level users shall have rights to access / modify / control all features of the
computer system.
Details Prepared by Reviewed by Approved by
Sign & Date
Name Krishnamurthy M K Veerendar Ch. Ramachandra Rao B. Suman Rao
Each user will have network drive to store their data, which is not accessible by other users.
Network Drives will back up into Magnetic tapes.
Data exported by the software (Empower, Lab X, etc.) will be stored in the network drive and
available to only respective users.
The folders, which are used by multi user, shall have access by network drive and configuration
to the respective user in a predefined manner approved by head of the department.
1.100. Network connections settings
1.100.1. Network settings are configured for Network Connections for Security Purpose.
1.100.2. Disabled to rename LAN connections or remote access connections available to all users.
1.100.3. Prohibited access to properties of components of LAN connections.
1.100.4. Prohibited the TCP/IP advanced configurations.
1.100.5. Prohibited the enabling/disabling components of LAN connection.
1.101. Antivirus policy
1.101.1. For security of the data from the various viruses, ISD installed Antivirus software on Server
and all its client computers in entire network.
1.101.2. The definition of the antivirus shall be updated automatically by using the Antivirus server on
regular basis
1.102. Basic security and group policies.
1.102.1. User login account policies for the operating system.
1.102.2. User name and password combination is unique for that particular user and it is the electronic
identification of that user.
1.102.3. Creation and deletion of user account is under the responsibility of IT.
1.102.4. Maintenance of user password is under responsibility of respective user with the help of IT.
1.102.5. For reactivation and missing password users have to consult IT.
1.102.6. IT is responsible for deactivate\disable the User account on his\her last working day.
1.102.7. Previous login user name shall not be visible at new login.
1.103. User privilege for operating system of computers
1.103.1. Each user shall have a unique combination of user identification and password.
1.103.2. The password shall be confidential.
1.103.3. There are two types of common user groups
e. Administrator level
f. User level
1.104. General policies and privileges for the Administrator level users
1.104.1. The administrator level users shall have rights to access / modify / control all features of the
computer system.
1.104.2. IT personnel will have the rights to access administrator level.
1.105. General policies and privileges for the user level users
1.105.1. All the computer users of Cronus Pharma come under user level.
1.105.2. Users are restricted to Copy, Paste, Delete any kind of electronic raw data files from raw data
storage folder of the application software generated by systems.
1.105.3. Computer lockout mechanism shall be configured to prevent unauthorized access to operating
system when system is ideal.
1.105.4. They cannot use CD writer / Floppy drive/ USB flash drives.
1.105.5. All the users by default will be the members of restricted users group.
1.105.6. They cannot change Date, Time and Time zone of the system.
1.106. Security policies
1.106.1. Password Policy
1.106.2. All passwords shall have a minimum number of six characters. Passwords must be complexity
(combination of alphabets and numbers).
1.106.3. Password shall not be copied by anyway.
1.106.4. Password will expire in 90 days.
1.106.5. Passwords shall not be repeated for at least 3 changes.
1.106.6. During first login, system will ask to change the password given by the IT personnel.
1.106.7. Folder level security policy
Each user will have network drive to store their data, which is not accessible by other users.
Network Drives will back up into Magnetic tapes.
Data exported by the software (Empower, Lab X, etc.) will be stored in the network drive and
available to only respective users.
The folders, which are used by multi user, shall have access by network drive and configuration
to the respective user in a predefined manner approved by head of the department.
1.107. Network connections settings
1.107.1. Network settings are configured for Network Connections for Security Purpose.
1.107.2. Disabled to rename LAN connections or remote access connections available to all users.
1.107.3. Prohibited access to properties of components of LAN connections.
1.107.4. Prohibited the TCP/IP advanced configurations.
1.107.5. Prohibited the enabling/disabling components of LAN connection.
1.108. Antivirus policy
1.108.1. For security of the data from the various viruses, ISD installed Antivirus software on Server
and all its client computers in entire network.
1.108.2. The definition of the antivirus shall be updated automatically by using the Antivirus server on
regular basis
4.1 SAFETY, HEALTH AND ENVIRONMENT:
4.2 Not Applicable.
5.0 ABBREVIATIONS: