Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
I. IT Security
Of ………. employees, only …….. employees have access to the IT system and
even then, only to restricted areas specific to their job function
o The Korean headquarters receives orders for the facility, and although
we are copied on the request, we only interact with our HQ. All
invoices to/from the end customer, i.e.: Ascena, are through HQ and
not from the factory.
IT Department 1
PT. Bintang Baru Sukses C-TPAT Validation Maret 2020 – © 2020
PT Bintang Baru Sukses – IT SECURITY
We use three systems to manage our company data and further limit access
based on job function and then the Microsoft windows operating system
supports our email program.
External firm, PT. Hanasta Dakara IT security updates and reviews of our
systems on an annual basis for auditing and periodically to manage IT
questions
Wifi
o The system passcode for guests is changed daily, and is not provided
to employees; therefore, employees are not using our wifi system for
their personal phones, which is considered a higher security standard.
There are ……. desktop computers for those authorized to have access to
various systems, and they remain within the facility and are never taken
offsite. The computers are secured within the person’s work station.
Backup of system
o Back up of system is done weekly; and with a copy held on site and
duplicate copy at PT. Hanasta Dakara; the number of transaction
managed for each order is minimal and a weekly backup is sufficient
for our operations;
IT Department 2
PT. Bintang Baru Sukses C-TPAT Validation Maret 2020 – © 2020
PT Bintang Baru Sukses – IT SECURITY
Systems
Passcode is 10-14 digits (letter, 1 number, 1 symbol)
Passcodes changed every 6 months
Employ both internal or external IT workers
Antivirus? Commoto, Macafee, Symantec
VPN for laptops
Back-up system is separate from the server
EVIDENCE OF IMPLEMENTATION
BEST PRACTICE
IT Department 3
PT. Bintang Baru Sukses C-TPAT Validation Maret 2020 – © 2020
PT Bintang Baru Sukses – IT SECURITY
Restricted use of guest wifi system with no access to employees
Restricted access to all systems and company information
o Of the 4%, only 7 people (or .5%) have access to the ERP system,
where the majority of company information is kept.
IT Department 4
PT. Bintang Baru Sukses C-TPAT Validation Maret 2020 – © 2020