Draft ICT Policy - Koukamma Municipality

Koukamma Municipality ICT
Policy
Prepared by: ICT Manager
KOUKAMMA MUNICIPALITY
ICT POLICY
TABLE OF CONTENT
1. PASSWORD AND USER ID POLICY
1.1 INTRODUCTION
1.2 PURPOSE
1.3 PASSWORD POLICY
1.4 PASSWORD MANAGEMENT
2. INTERNET AND EMAIL USAGE POLICY
2.1 INTRODUCTION
2.2 SCOPE
2.3 POLICY STATEMENT
2.4 APPLICATION OF THIS POLICY
3. POLICY ON THE USE OF COMPUTER EQUIPMENT
3.1 PURPOSE
3.2 SCOPE
3.3 POLICY STATEMENT
3.4 LEGAL SUPPORT FOR THIS POLICY
4. IT SERVER DOCUMENT POLICY
4.1 PURPOSE
4.2 SCOPE
4.3 POLICY
5. VPN: Virtual PRIVATE NETWORK (POLICY)
5.1 PURPOSE
5.2 SCOPE
5.3 POLICY
ICT POLICY
3
3
3
3
4
6
6
6
6
7
8
8
8
8
10
12
11
11
12
15
15
15
15
Page 2
KOUKAMMA MUNICIPALITY
ICT POLICY
1. PASSWORD AND USER ID POLICY
1.1 INTRODUCTION
A computer access password is the primary key to computer security. The importance of password
maintenance and security cannot be over emphasized. All employees and users of the KKM’s
computer facilities are solely responsible for the integrity and secrecy surrounding passwords
allocated for their usage. The password uniquely identifies employees and users, and allows access
to the KKM’s information and computer services. For the user’s protection, and for the protection
of KKM’s resources, the password must be kept secret and not be shared with anyone else.
The IT Department should be contacted if any further password information is required, or if there
is any uncertainty surrounding the usage, applicability, and installation or issuing of passwords.
1.2 PURPOSE
The purpose of this document defines the policy required to securely deploy, manage and control user
accounts and passwords. Accounts and passwords are the primary security credentials used to identify,
authenticate and authorize access to the KKM systems. The policy applies to all KKM computer users
(e.g. staff, contractors, students, consultants) of systems, applications and networks.
1.3 PASSWORD POLICY
All user-chosen passwords for computers and networks shall be difficult to guess. Do not choose:











Words in a dictionary
Proper nouns
Geographical locations
Common acronyms
Slang
Derivatives of user-IDs
Common character sequences such as "123456"
Spouse’s name
Children’s/boyfriend’s/girlfriend’s/pet’s names
Car license plate
Your ID number/ birth date
ICT POLICY
Page 3
KOUKAMMA MUNICIPALITY
ICT POLICY
Do not:
 Construct fixed passwords by combining a set of characters that do not change, with a set of
characters that predictably change.
 Construct passwords which are identical or substantially similar to passwords previously
employed.

Write down or otherwise record a readable password and store it near the access device to
which it pertains.
1.4 PASSWORD MANAGEMENT
1.4.1 Allocation and Block user
User IDs and passwords are required as the principal means of validating a user's authority to access
information services. The allocation and change on request of user IDs and passwords must be strictly
controlled by ICT Manager or IT Administrator.
When a user resigned or dismissed, a written letter from HR must be sent to the IT Department to
disable the user account for 30 days so that all important emails can be save and sent to a relevant
employee, After 30 days the user account will be removed automatically from the server.
1.4.2 The Policy requires:
Mandatory use of a user ID and password, Only ICT Manager or IT Administrator is permitted to allocate
initial passwords to users, who will be required to change it on first use before access to systems will be
granted. When new accounts are created, the IT administrator must assign a unique password that is
not known to anyone else (and especially not a 'standard' password) and conforms to the KKM minimum
standard. A letter from HR indicating a new employee must be forwarded to the IT Department to
create user profile a week before the start date of the employee. Users must log a call for password
request to the IT Department.







Ensure that reset passwords comply with the KKM minimum standard. If the reset request was
anonymous; i.e. the administrator did not see the new password, and the new password was
delivered via secure means (e.g. an SSL web stream), it can be used as the user's new
password. Otherwise, the user must be forced to change this password the next time they log
in.
Be at least 8 characters in length
Contains at least two special characters
Contain no more than three identical consecutive characters in any position from the previous
password
Permit routine password changes to be made only by the user
Ensure passwords reuse is not permitted within 12 months or 12 iterations.
Alter default vendor passwords (and IDs if possible) following installation of software.
ICT POLICY
Page 4
KOUKAMMA MUNICIPALITY
ICT POLICY
1.4.3 Storage and Transmission
Passwords are automatically classified as confidential and must be protected appropriately. If passwords are
stored on systems, they must be encrypted. Under no circumstances is password information to be stored in
clear text on systems, even if it does not relate to the system on which they are stored. Passwords must be
encrypted during transmission. The recommended level of protection is to use a one-way encryption
algorithm. Clear text passwords must never be embedded into application or user files, end user device
emulator or file transfer set-ups, etc, unless on a computer stored or operated in a proven secure area.
Password files must be stored separately from the main application system data.
1.4.3 Monitoring
Monitoring on sharing of username and password will be done on a regular basis. When a user enters an
incorrect password 3 times the system blocks the user until an administrator unblock the user.
ICT POLICY
Page 5
KOUKAMMA MUNICIPALITY
ICT POLICY
2. INTERNET AND EMAIL USAGE POLICY
2.1 INTRODUCTION
The internet and email have emerged as valuable and cost-effective tools for municipal employees.
However, press and court cases from around the world underscore the fact that these technologies may
also pose potential problems for both employers and individual employees.
The Municipality provides selected and authorized employees with internet access and electronic
communication services for the performance and fulfillment of their job responsibilities. This Internet
and Email Usage Policy is designed to encourage the appropriate use of these services subject to
compliance with the requirements stated therein which are necessary to minimize risks associated with
such usage.
Authorized users of the internet and email services provided by the Municipality must appreciate that
the access thereto is for the purpose of increased productivity and not for private activities. Authorized
uses must also appreciate that any connection to the internet offers an opportunity for non-authorized
users to view or access corporate information. Therefore, it is important that all connections be secure,
controlled, and monitored.
Municipal employees are trusted colleagues and are expected to use all business tools appropriately.
However, if instances of abuse of internet access become prevalent, more active monitoring might be
needed. Authorized internet and email users must send and receive emails with attachments that do
not exceed 10 MB in size, and that all attachments are scanned by the Municipality’s chosen anti-virus
and content filtering software.
To comply with international SPAM standards, employees are not permitted to send emails with more
than 20 recipients. A breach of this may result in the municipality being temporarily blacklisted on the
internet.
2.2 SCOPE
This policy applies to all employees who have been granted internet and/or email facilities. Whether this
is from a computer, network enabled device (such as a multi-function printer), and mobile devices
(where applicable).
2.3 POLICY STATEMENT
Authorized employees should contact the ICT Manager if they have any questions about the following
guidelines:
 The display of sexually explicit image or document on any municipal system, including related
“chat-room” conversations, is prohibited and may constitute a violation of the policy on sexual
ICT POLICY
Page 6
KOUKAMMA MUNICIPALITY






ICT POLICY
harassment. In addition, such explicit material may not be archived, stored, distributed, edited
or recorded using the municipal network or computing resources.
If an authorized employee is connected unintentionally to a site that contains sexually explicit or
other offensive material, he/she must disconnect from that site immediately.
To prevent computer viruses or other potentially harmful computer codes from being
transmitted to or through the Municipality’s information technology systems, the downloading
or installation of any software or computer code is strictly prohibited unless explicitly authorized
by the Municipal Manager or his/her nominee. All software downloaded or installed must be
registered to and becomes the property of the Municipality.
No employee may use the KKM’s internet or network to:
Download entertainment software or games, or to play against opponents over the
internet.
Download images, audio or video files unless there is an explicit business related use for
the material.
Obtaining without authorization the access codes and/or passwords of another user.
Browsing websites where people can communicate socially over the internet in chat
rooms or using a client to enable such actions like Facebook, MSN, Tweeter, Yahoo
Gmail, etc.
Software piracy or other infringement of intellectual property rights in digital content.
Use of a PC connected to the Koukamma Municipality network without running virus
detection software
Websites that deals in illegal products or content.
No employee may use the KKM’s internet or email facilities for personal financial gain, political
activities, to express a grievance, to disseminate confidential or false information or to
propagate or encourage hatred or discrimination in any manner whatsoever.
Access to internet is only granted on application where such access is necessary for completion
of tasks for such members of staff and must be approved by Municipal Manager or Dorector of
that section.
Internet access will not be allowed where a job function does not allow such access.
2.4 APPLICATION OF THIS POLICY
The Internet and Email use policy will be applied in several ways:
 Where technology allows, policy will be enforced automatically. For example, Anti-Virus and
Internet Proxies can filter and restrict content.
 Management reports will highlight possible violations. These will be investigated to identify
actual violations. The offender's manager will take disciplinary action in line with Municipal
policy.
 Users may self-police the policy by reporting any violations via the grievance procedure.
ICT POLICY
Page 7
KOUKAMMA MUNICIPALITY
ICT POLICY
2.5 ACCESS TO INTERNET
Unlimited Access to Internet all employees
2.6 ACCESS TO EMAIL
E-mail should be seen as a privilege and not a right. It is therefore imperative that the user should
ensure that his/her e-mail access is kept official and at all times devoid of profanity, obscene, racist,
defamatory, abusive or threatening, discriminatory or otherwise biased remarks or content, lies to
discredit the municipality or any individual that acts as representative of the municipality or government
to discredit any person in a way.




Users should also not distribute or forward any content that is sexual, pornographic, biased,
offensive or violent to disgust or that can be viewed as inappropriate or illegal content.
It is also deemed illegal to send emails that contain usernames and passwords to persons not on
the network or not members of the network, especially if those accounts and passwords grant
access to network with administrator or equal rights and the intended party uses it illegally.
All e-mail messages should be kept to a maximum of 10MB or less. This will aid in necessary
bandwidth being conserved and utilized for important transfers.
Users are also requested to keep private e-mails to absolute minimum and all users are hereby
informed that on all government networks monitoring software may be installed and used to
monitor all electronic communication in accordance with the intelligence acts and to ensure
that the country is properly protected against terrorism of any type.
ICT POLICY
Page 8
KOUKAMMA MUNICIPALITY
ICT POLICY
3. POLICY ON THE USE COMPUTER EQUIPMENT
3.1 PURPOSE
The purpose of this policy is to regulate use of computer equipment so that the Municipality:





Controls costs with a standardized set of software and hardware that can be well supported in
terms of maintenance and user training.
Uses municipal assets efficiently.
minimizes loss of, or damage to, equipment, software and data;
Is protected from legal difficulties
Is productive, by limiting personal use to reasonable levels.
3.2 SCOPE
This policy is applicable to everyone who works at the Koukamma Municipality. This means all
permanent, contract or temporary personnel including anyone supplied by a labour broker or serviceprovider to the Municipality, Referred to as "personnel" or “users” in this document.
This policy must be made an enforceable part of any contract with a labour broker or service provider
whose personnel use the Municipality's computers.
3.3 POLICY STATEMENT
3.3.1 PERSONNEL MAY BE ISSUED WITH A COMPUTER
At the request of your manager you may be issued with computer equipment/ Laptop and access to
computer-based services. These are provided to help you do your job. Qualifying criteria are set by
management.
Qualifying personnel will normally get a standard-issue computer from IT department, along with
standard-issue software. New equipment will be bought only if necessary. Printers are allocated in the
same way, but you may be expected to share a printer with other personnel.
Some personnel may need non-standard equipment or software to do their job effectively. To get this,
your manager must make a recommendation in the form of a submission to management. The
submission must include the details and cost of the software or equipment you need.
3.3.2 THE COMPUTER SYSTEMS BELONG TO THE MUNICIPALITY
The computer, the printers, software licenses, network and data that you use at the Municipality remain
the property of the Municipality.
ICT POLICY
Page 9
KOUKAMMA MUNICIPALITY
ICT POLICY
3.3.3 MANAGEMENT WILL SPECIFY THE STANDARD ISSUE PERSONAL COMPUTER
To make for cost-effective use of equipment and software, the Municipality will standardize on a core
set of software and hardware products. The specifications will be set, and revised from time to time, by
management and the ICT Steering committee. The Committee may set different standards for different
parts of the organization. The standards will cover the following:




Hardware specifications for standard issue desktop computers, notebook computers and
printers. Users will be issued with a computer that meets this standard. When the standard
is raised, computers below the standard will be upgraded or replaced (budget allowing),
without the need for a motivation from the user.
Specifications for new desktop computer, notebook computer or printer hardware. When
the Municipality buys a new computer or printer, its specification will conform to this
standard.
Additional software set. A list of software that may be installed if needed to do the job. To
control maintenance cost, no other software may be used without the written approval of
both the user's Director and the ICT Manager.
Disallowed software and hardware. A list of software, hardware or categories of software or
hardware that is not allowed. In setting the standard, the ICT Committee will consider the
following issues as a minimum: security, licensing, support and risk of harassment (through
offensive material)
3.3.4 USE OF PERSONAL COMPUTERS IS ENCOURAGED FOR OFFICIAL PURPOSES
The use of your personal computer is encouraged for Koukamma Municipality business or activities
sponsored or authorized by the Municipality. An Employee may use his/her computer only under the
following circumstances:



Computer equipment on repairs.
Instructed by his/her Director and approved by Municipal Manager.
Waiting for new Computer equipment to be delivered.
3.3.5 YOU HAVE A DUTY TO USE MUNICIPAL RESOURCES RESPONSIBLY
Take care to use your computer responsibly, ethically and lawfully. Do not waste computer resources or
unfairly monopolize resources to the exclusion of others.
Any file copied from an external source must be scanned for computer viruses. This includes files from a
CD, USB drive, e-mail or Internet.
You may not use the Municipality's computer facilities to:

Play games or run other entertainment software.
ICT POLICY
Page 10
KOUKAMMA MUNICIPALITY




ICT POLICY
Save files containing images, music, sound or video onto Municipal servers, unless they are
for official purposes.
Make or store illegal copies of material protected by copyright. This includes software
programs, music, and publications, in whole or in part.
Back up your entire local hard drive onto Municipal servers.
Print large documents if there is a viable on-screen alternative
3.3.6 YOU MAY HAVE TO PAY FOR LOST, DAMAGED OR STOLEN EQUIPMENT
If an item is lost, damaged or stolen while it was under your control or responsibility, the Municipality
will not normally ask you to pay for it, but you may lose Municipal cover if you fail to follow treasury
regulations or standing instructions. The main elements are summarized here. But, this summary does
not replace the original prescripts, which will be used to deal with any loss. It is not allowed to install
Municipal software of personal computer equipment
You may lose your Municipal cover against loss if you:









Were not on official business when the loss occurred;
Did not obtain permission from the Director/Manager and approval of Municipal Manager;
Were under the influence of alcohol or drugs when the loss occurred;
Had not been issued with a permit to take the item off Municipal premises;
Did not obtain a receipt for equipment you voluntarily surrendered;
Acted recklessly or negligently;
Intentionally caused the damage; or ignored any standing instructions (including Municipal
Circulars);
Water Damage of computer equipment;
Vandalized;
3.3.7 MANAGERS ARE ACCOUNTABLE FOR COMPUTER USE BY THEIR STAFF
Managers should ensure that all their computer-using staff, whether temporary, permanent or contract
is made aware of the contents of this policy. You are required to apply the policy to all those who report
to you. You are accountable for the use your staff makes of personal computer equipment, software and
services.
3.4 LEGAL SUPPORT FOR THIS POLICY






Code of Conduct for the Public Service, which is part of the Public Service Regulations 1999 and
issued in terms of the Public Service Act, 1994.
National Treasury Regulations - Chapter 12: Management of Losses and Claims.
Disciplinary Code and Procedures (Public Service Coordinating Bargaining Council Resolution No:
2 of 1999).
Copyright Amendment Act 125 of 1992
Copyright Act 98 of 1978
Occupational Health and Safety Act, 1993
ICT POLICY
Page 11
KOUKAMMA MUNICIPALITY
ICT POLICY
4. IT SERVER DOCUMENTATION POLICY
4.1 PURPOSE
The purpose of this policy is to establish standards for the base configuration of internal server
equipment that is owned and/or operated by Koukamma Municipality. Effective implementation of this
policy will minimize unauthorized access to Koukamma Municipality proprietary information and
technology.
4.2 SCOPE
This policy applies to server equipment owned and/or operated by Koukamma Municipality, and to
servers registered under any Koukamma Municipality-owned internal network domain.
This policy is specifically for equipment on the internal Koukamma Municipality network. For secure
configuration of equipment external to Koukamma Municipality on the DMZ, refer to the Internet DMZ
Equipment Policy.
4.3 POLICY
OWNERSHIP AND RESPONSIBILITIES
All internal servers deployed at Koukamma Municipality must be owned by an operational group that is
responsible for system administration. Approved server configuration guides must be established and
maintained by each operational group, based on business needs and approved by InfoSec. Operational
groups should monitor configuration compliance and implement an exception policy tailored to their
environment. Each operational group must establish a process for changing the configuration guides,
which includes review and approval by InfoSec.

Servers must be registered within the corporate enterprise management system. At a minimum,
the following information is required to positively identify the point of contact:

Server contact(s) and location, and a backup contact

Hardware and Operating System/Version

Main functions and applications, if applicable

Information in the corporate enterprise management system must be kept up-to-date.

Configuration changes for production servers must follow the appropriate change management
procedures.
GENERAL CONFIGURATION GUIDELINES

Operating System configuration should be in accordance with approved InfoSec guidelines.

Services and applications that will not be used must be disabled where practical.
ICT POLICY
Page 12
KOUKAMMA MUNICIPALITY
ICT POLICY

Access to services should be logged and/or protected through access-control methods such as
TCP Wrappers, if possible.

The most recent security patches must be installed on the system as soon as practical, the only
exception being when immediate application would interfere with business requirements.

Trust relationships between systems are a security risk, and their use should be avoided. Do not
use a trust relationship when some other method of communication will do.

Always use standard security principles of least required access to perform a function.

Do not uses root when a non-privileged account will do.

If a methodology for secure channel connection is available (i.e., technically feasible), privileged
access must be performed over secure channels, (e.g., encrypted network connections using SSH
or IPSec).

Servers should be physically located in an access-controlled environment.

Servers are specifically prohibited from operating from uncontrolled cubicle areas.
MONITORING


All security-related events on critical or sensitive systems must be logged and audit trails saved
as follows:

All security related logs will be kept online for a minimum of 1 week.

Daily backups will be retained for at least 1 month.

Weekly full tape backups of logs will be retained for at least 1 month.

Monthly full backups will be retained for a minimum of 2 years.
Security-related events will be reported to InfoSec, who will review logs and report incidents to
Information Technology management. Corrective measures will be prescribed as needed.
Security-related events include, but are not limited to:

Port-scan attacks

Evidence of unauthorized access to privileged accounts

Anomalous occurrences that are not related to specific applications on the host.
COMPLIANCE

Audits will be performed on a regular basis by authorized organizations within Koukamma
Municipality.

Audits will be managed by the internal audit group or InfoSec, in accordance with the Audit
Policy. InfoSec will filter findings not related to a specific operational group and then present the
ICT POLICY
Page 13
KOUKAMMA MUNICIPALITY
ICT POLICY
findings to the appropriate support staff for remedial action or justification.

Every effort will be made to prevent audits from causing operational failures or disruptions.
ENFORCEMENT
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
DEFINITION
Term
Definition
DMZ:
network.
De-militarised Zone: A network segment external to the corporate production
Server For purposes of this policy, a Server is defined as an internal Koukamma Municipality
Server. Desktop machines and Lab equipment are not relevant to the scope of this policy.
ICT POLICY
Page 14
KOUKAMMA MUNICIPALITY
ICT POLICY
5. VPN: VIRTUAL PRIVATE NETWORK (POLICY)
PURPOSE
The purpose of this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private
Network (VPN) connections to the Koukamma Municipality corporate network.
SCOPE
This policy applies to all Koukamma Municipality employees, contractors, consultants, temporaries, and
other workers including all personnel affiliated with third parties utilizing VPNs to access the Koukamma
Municipality network. This policy applies to implementations of VPN that are directed through an IPSec
Concentrator.
POLICY
Approved Koukamma Municipality employees and authorized third parties (approved consultants.) may
utilize the benefits of VPNs, which are a supplied by the Information Technology Department as a
service. This means that the Information Technology Department through the prescribed Procurement
policies is responsible for selecting an Internet Service Provider (ISP), coordinating installation, installing
any required software, and paying associated fees. Further details may be found in the Remote Access
Policy.
Additionally,

It is the responsibility of employees with VPN privileges to ensure that unauthorized users are
not allowed access to Koukamma Municipality internal networks.

VPN use is to be controlled using either a one-time password authentication such as a token
device or a public/private key system with a strong passphrase.

When actively connected to the corporate network, VPNs will force all traffic to and from the PC
over the VPN tunnel: all other traffic will be dropped.

Dual (split) tunneling is NOT permitted; only one network connection is allowed.

VPN gateways will be set up and managed by Koukamma Municipality network operational
groups.

All computers connected to Koukamma Municipality internal networks via VPN or any other
technology must use the most up-to-date anti-virus software that is the corporate standard
(provide URL to this software); this includes personal computers.

VPN users will be automatically disconnected from Koukamma Municipality's network after
thirty minutes of inactivity. The user must then logon again to reconnect to the network. Pings or
other artificial network processes are not to be used to keep the connection open.

The VPN concentrator is limited to an absolute connection time of 24 hours.

Users of computers that are not Koukamma Municipality-owned equipment must configure the
equipment to comply with Koukamma Municipality's VPN and Network policies.
ICT POLICY
Page 15
KOUKAMMA MUNICIPALITY
ICT POLICY

Only InfoSec-approved VPN clients may be used.

By using VPN technology with personal equipment, users must understand that their machines
are a de facto extension of Koukamma Municipality's network, and as such are subject to the
same rules and regulations that apply to Koukamma Municipality-owned equipment, i.e., their
machines must be configured to comply with InfoSec's Security Policies.
ENFORCEMENT
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
DEFINITIONS
Term
Definition
IPSec Concentrator:
A device in which VPN connections are terminated.
REVISION HISTORY
Date
Revisions
Date of Adoption
………………………………………………
……………………………………………
Municipal Manager
ICT POLICY
Page 16