Volume 4: Information Technology

Volume 4:
Information Technology
For Community and Voluntary Groups
�
2
Contents
Introduction “Breaking down the Jargon”.......................................... 5
1Desktop/Server.................................................................... 6
1.1PC/Mac.................................................................... 6
1.2
The components and what they do:............................ 6
1.3Servers..................................................................... 8
2Software............................................................................ 10
2.1
Guide to buying software for your organisation........... 10
2.2
ENCLUDEit Donation Programme............................... 10
2.3
What software do you need?..................................... 11
2.4
What is a software licence?...................................... 11
2.5
Can my computers use the software I buy?................ 12
2.6
Open source, freeware and shareware....................... 13
2.7
Software Upgrades................................................... 13
3Network............................................................................. 14
3.1
What is a Local Area Network (LAN)?......................... 14
3.2
Choosing the right type of network for your business.. 14
3.3
Help installing a Local Area Network.......................... 14
3.4
TCP/IP address....................................................... 15
3.5
Small business domain names –
What types are there?.............................................. 15
3.6
Domain Name Types................................................ 15
3.7
Registering your .ie domain...................................... 16
4Peripherals......................................................................... 18
4.1
Guide to buying a printer for your small business....... 18
4.2
What will you use the printer for?.............................. 18
4.3
Device versus Cartridge?.......................................... 18
4.4
LaserJet or Inkjet?................................................... 19
4.5
Black & white or colour?........................................... 19
4.6
All in one machines?................................................ 19
4.7
Other things to consider........................................... 19
5
Data Security and Integrity................................................. 20
5.1
Business Continuity................................................. 20
5.2
Data Management................................................... 20
5.2.1Methods................................................................. 20
�3
6
7
8.
�
4
5.3
Anti-Virus & Malware................................................ 21
5.3.1Anti-Spam............................................................... 21
5.4Firewall................................................................... 22
5.5
Software Updates.................................................... 22
5.6
Wireless Security..................................................... 22
5.7
Protection against internal threats............................ 23
5.8Encryption............................................................... 23
5.9
Remote Access........................................................ 23
ICT Policies........................................................................ 25
6.1
Policy Documents.................................................... 25
6.2
Internet Usage......................................................... 25
6.3
Data Protection........................................................ 25
Administration and Procurement......................................... 27
7.1
ICT Procurement...................................................... 27
7.2
Framework Agreements and Contracts....................... 27
Useful Links....................................................................... 28
Introduction
“Breaking down the jargon”
The reality of modern working
life is that information and
communications technology is
integral to any business – and
equally to any community or
voluntary organisation. Even if you
consider yourself a technophobe
you cannot ignore the influence
and the pervasiveness of modern
technology. It is difficult to find
many organisations that do not
now use email, host a website,
or run an accounts package to
maximise business efficiency.
This guide aims to help break down
some of the jargon associated with
computer technology and give you
the tools to make some informed
choices for your ICT strategy. The
guide is a point in time reference.
Technology has a rapid rate of
change and it is therefore strongly
recommended to research the
most up to date information when
buying new ICT equipment.
�5
1. Desktop/Server
1.1 PC/Mac
�
6
Let’s first look at some of the
terms you will come across when
you buy a computer. There are two
main types of computer available
– PC which means Personal
Computer and Apple Mac (Mac).
PCs are made by hundreds of
different companies, whereas only
Apple makes the Mac. This means
that PCs are more widespread and
consequently cheaper.
Macs are no longer the specialist
computer they used to be and are
more and more compatible with PC
software but are still an expensive
second choice for most people.
If you are only familiar with using
a PC, you will find a Mac pretty
different.
When you buy a computer you
need to compare several aspects
to find the one that best suits your
requirements.
Ultimately you must decide what
you will use the computer for and
decide which functions are most
important. Do you need it to be
very fast? Will you be saving a lot
of documents?
1.2 The components
and what they do
CPU: (Central Processing Unit)
The main chip or brain in your
computer, also known as the
processor. New models are
released practically weekly so keep
an eye on the model number and
try to get the latest and greatest
depending on your budget.
Generally more important than
the model number is the speed
of the CPU which is measured in
gigahertz. The bigger the number,
the faster your computer will
perform tasks. Terms like dual
core and quad core mean there are
two or more CPUs working together
to maximise performance.
Memory: The bigger the memory,
the more space your computer
has to work things out, and so
the faster it will run. Memory
is measured in gigabytes, and
you should always get the most
memory you can afford. The
majority of computers allow
additional memory to be fitted
easily and cost-effectively post
purchase.
Hard disk: This is where your
computer stores documents and
programs. They usually have quite
a large capacity and are difficult to
fill. The latest models now use an
ultra-fast memory called flash and
the type of drives that provide this
are SSD which stands for Solid
State Drives. These drives are
more expensive than traditional
hard disks and consequently you
will need a trade-off between
speed and capacity. Traditional
hard disks now ship with at least
500gb of capacity where as an
entry level SSD might only have
16gb with the largest at 256. If
you do reach capacity it’s easy
to buy a second external hard
disc and just plug it in. Hard disk
capacity is measured in Giga
Bytes.
Operating system: This is the
software that runs your computer
– the best known one is Microsoft
Windows. Most computers come
with an operating system already
loaded. The current version of
Windows is Windows 8.
DVD or CD drive: Most are also
burners, meaning you can create
your own CDs or DVDs as well as
playing them.
USB: (Universal Serial Bus) A
really easy way to connect files
or external components to your
computer. It’s a standard plug
on many devices, including your
mouse, keyboard, printer etc. USB
uses something called plug and
play technology, which means just
that – you plug it in, and off you
go. Your computer will know you’ve
attached something and will tell
you if it needs help getting the
device to work. USB theoretically
allows you to connect well over a
hundred devices at once. To get
more ports it is possible to use
something called a USB hub which
is like your old electrical plug
double adapters.
WiFi: This is wireless network
access and is virtually standard
on new laptops. If you require a
desktop computer you may need to
buy an additional wireless adapter
in order to be able to join a
wireless network. It allows you to
connect to the internet without the
need for cables and gives you the
ability to connect in public places
where WiFi access is available.
�7
Browser: If you downloaded this
document from our website you
used a browser. The main ones
used are Microsoft Internet
Explorer, Google Chrome and
Mozilla Firefox. The Internet
Explorer browser is always
pre-loaded on a new Windows
computer.
Broadband: This is internet
access. You will pay a broadband
provider (sometimes known as an
ISP, or Internet Service Provider)
to give you internet access, which
can be delivered through your
phone line. Broadband is “always
on”, meaning you don’t have
to dial up the internet, it’s just
there. Your provider will give you
any equipment including routers,
cables and all the other help you
need to get online.
Broadband has been slow to
rollout in rural Ireland due to
infrastructural factors and your
choices may be limited by your
location. There is a new satellite
broadband provider who claims
to be able to service the whole
island, www.qsat.ie has more
information.
�
8
Download and upload: Download is
when you get something from the
internet and make a copy on your
computer. Upload is the reverse,
where you send something to the
internet.
Bandwidth: The amount of
bandwidth dictates how much
information you are allowed
to upload or download on your
broadband connection. Many
Internet Service Providers (ISPs)
will give you a monthly contractual
limit to the amount of bandwidth
you can use but generally it’s quite
hard to hit with everyday use.
1.3 Servers
A computer server can be defined
as a computer dedicated to run
one or more services in order to
facilitate the needs of multiple
users or computers on a network.
Examples of services provided
include File Server, Database
Server, Email Server, Print Server,
Network Server or Web Server.
As your ICT network grows you
will require a server to provide
secure logon to access shared
files or services called a domain
controller. This will authenticate
the user through the use of
credentials like username and
password. You will also provide a
file share service so that electronic
files can be easily shared
throughout the organisation.
Servers can be purchased online
at supplier websites such as
www.dell.ie or through resellers
for products such as HP, IBM and
Fujitsu.
Considerations would be similar
to the ones outlined above for
PC specs. CPU, Disk Capacity,
Network cards, Memory and
Software Operating systems being
the key components.
Your server will need to be
accessible and reliable, so when
purchasing servers it is important
to look for redundancy i.e. in
the event of failure that there
is a redundant fallover option.
Components to consider for
redundancy are extra hard disks to
be placed in a RAID configuration
(a method for pooling hard disks
for performance and redundancy),
Extra Network Cards and extra
power supplies.
�9
2. Software
2.1 Guide to buying
software for your
organisation
Now that you have invested in your
small business ICT infrastructure
you are going to need applications
to run on it that maximise
the return on investment. The
applications that build on your
infrastructure hardware are called
software. Buying software can
be as easy as visiting your local
computer retailer, paying some
money and getting a suite of
software. However, this is not
necessarily the most cost effective
way of making such a purchase.
Is it vital that you have the latest
version of software to run your
organisation or will older software
suffice?
�
10
Software can be expensive. Full
copies of the more popular office
software can cost a few hundred
euros and specialised design
software can cost thousands. By
buying cost effectively you will save
your small business money, while
ensuring your software remains
legal.
2.2 ENCLUDEit Donation
Programme
Your organisation may qualify
for heavily discounted software
purchases under the ENCLUDEit
Donation Programme.
The ENCLUDEit Technology
Donation Programme is a
partnership between ENCLUDE
and TechSoup, the San Franciscobased non-profit technology
capacity building organisation that
links technology donations from
leading software and hardware
manufacturers and the Irish NonGovernmental (NGO) sector.
The programme assists
organisations by making donated
software available for a very low
administrative fee, thereby helping
them to make the most of their
ICT purchases and infrastructure.
Whilst the administrative fees
vary, registered charities with
valid CHY numbers will still make
savings of between 92-96% on
typical retail prices. Receiving
technology product donations frees
up stretched NGO budgets for both
technology priorities and other
programme areas.
This programme is made possible
by generous donations from
technology product manufacturers
including Microsoft,Cisco,
Mailshell, SAP and Symantec. They
wish to help the NGO sector and
ENCLUDEit help them to do so.
Full details on eligibility criteria and
how to avail of these offers can be
found at www.encludeit.org.
2.3 What software do
you need?
The best place to start will
be to consider what software
you actually need to run your
organisation. For most small
businesses the following
software is essential:
• An operating system. For most
PCs the choice would be a
copy of Microsoft Windows
and as mentioned earlier
this is usually pre-loaded on
purchased PCs
• Office software. This
encompasses the software
you typically need to run your
organisation including a word
processor (for letters and
documents), a spreadsheet
(for financial analysis) and
an email program. Microsoft
Office is the most popular
package in use today. Google
also provides a free but less
feature rich alternative but
generally the purchase of an
Office Suite of software is a
good investment.
Other software packages that
may be of use include:
• A database package for record
keeping
• A book-keeping or accounts
package
• Presentation software
• Project management software
• Specialised design software
such as CAD or CAM products
• Desktop publishing software
for newsletters and highly
formatted documents
• Photo editing and design
software
Information on keeping your
software up to date is contained
in section 5.5, Software
Updates.
2.4 What is a software
licence?
As soon as you install your
software you will be asked to
agree to an End User Licence
Agreement or EULA. This is a
�11
contract between you and the
software vendor that sets out
the responsibilities of the vendor
and the fit for purpose nature of
the product. It is important to
read this agreement to ensure
you understand the terms and
conditions.
With software that you buy already
boxed up from a supplier there
will be a hard copy of the software
licence, probably with anti-forgery
devices such as holograms and
silver strips in the paper (like a
bank note).
This licence is your proof of
ownership and your guarantee that
the software is genuine.
In recent years software piracy has
been prevalent and the pirates
have been very effective at copying
legal software and selling copies
cheaply. This is an illegal activity
and your organisation can also be
at risk from legal action if you are
seen to be using pirated software.
Perhaps a more common violation
of software licencing is buying
a single licence product and
installing it on multiple machines
in the organisation. Again this is
an illegal activity and you should
hold a volume licence to be in
compliance.
�
12
2.5 Can my computers
use the software I buy?
This is a very valid question which
must be considered when buying
software. If you have a PC that is
more than 2 -3 years old then it
may have a problem running some
of the latest software packages.
This is due to the speed of the
PC and its ability (or lack of) to
process the more complex, newer
software. In addition, if you intend
to undertake complex design type
work such as CAD/CAM then you
will need a PC with a suitably high
specification.
Software packages will have
minimum requirements information
printed on the box, or if you are
downloading, it will be available on
the website. Check this information
against your PC spec to ensure
your device is compatible with the
software you hope to run on it.
One of the main things to look for
is whether it is 32bit or 64bit. The
terms 32-bit and 64-bit refer to the
way a computer’s processor (also
called a CPU), handles information.
The 64-bit version of Windows
handles large amounts of random
access memory (RAM) more
effectively than a 32-bit system.
2.6 Open source,
freeware and shareware
It is possible to obtain some
software free of charge or at very
low cost. Open source software
is openly developed and shared
in the public domain. Developers
throughout the world contribute
to developing the software on
the basis that no one owns
the work and it is always made
freely available to others. This
development work is primarily
focused on the more technical side
of computing, but there is some
open source organisation software
that may be of interest.
As always be very careful about
what you download and who you
download from. Not all freeware or
shareware is of good quality and
indeed some of it may damage
your PC or carry out inappropriate
actions such as logging your key
strokes which will compromise
your PC security. See our guide on
PC security in Section 6 for details
on malware and viruses.
You also need to consider the
compatibility issues of using nonmainstream software. If you are
sent a file in one popular format
and you do not have the correct
software loaded you may not be
able to read the data. Likewise
you may end up sending out files
in non-universal formats which can
cause unnecessary complications
for the recipient.
2.7 Software Upgrades
Software manufacturers are
constantly adding new features
and functionality to their products.
This means that every 18 months
or so there will be a new release of
the next version of a product. The
process of moving up to this next
version is called upgrading.
The cost of this upgrade is often
a lot less than if you bought the
new product off the shelf, and you
may find yourself saving 40 – 70%
of the full retail price. Although
software manufacturers will always
like you to upgrade to the latest
version of the software there may
be little or no business benefit in
doing so. It is perfectly acceptable
to be running “older” software
as long as you are still getting
business benefit and it is still fit
for purpose.
Issues may arise when the
software is a certain number of
years old as you may find the
manufacturer has withdrawn
support for the product. At this
point it would be good practice to
invest in an upgrade as you may
run into compatibility and security
related issues. �13
3. Network
3.1 What is a Local
Area Network (LAN)?
A Local Area Network is a
computer network which connects
devices, typically in a small area,
such as a single building or office.
A LAN will connect several PCs
together and also enable users
to share other equipment such
as laser printers. A LAN will also
enable your employees to share
applications, files, databases and
Internet connections.
3.2 Choosing the right
type of network for your
business
�
14
If you run an organisation with
only a few workstations, then
you may be tempted to set up
a less expensive peer-to-peer
(P2P) network employing a
simple unmanaged switch which
is connected to all the client
computers which have network
interface cards (NIC) installed.
As your organisation grows so
will the need for collaboration
and improved access to files. In
this case, a central document
repository is essential, where all
users access a single computer
(server) where their documents are
stored.
This server should be regularly
backed-up to protect any sensitive
and mission critical data. Please
refer to section 5 for more
information on data management.
At this point you may want to set
up a domain controlled network.
This is a more structured and
manageable infrastructure where
all the devices added to the
domain are centrally authenticated
and secured. It facilitates the
management of users and
computers that connect to your
network and gives administrators
the tools necessary to control
access, security and more
advanced functions like group
policies. Group policies can
standardise various windows
functions such as mapped drives,
internet security and windows
updates. The most popular
business domain type is Microsoft
Active Directory.
3.3 Help installing a
Local Area Network
If you don’t have the in-house
expertise to install a LAN for your
organisation, it is best advised
to hire a technical expert to
implement the right solution for
your company.
As well as the initial installation
you should also include on-going
support to provide assistance if
anything goes wrong.
3.4 TCP/IP address
In basic terms it is the address
by which your machine will be
identified on the internet. TCP/
IP stands for transmission control
protocol/internet protocol. IP has
the task of delivering packets of
data from the source host to the
destination host solely based on
these addresses.
3.5 Small business
domain names – What
types are there?
If you are thinking of establishing a
web presence for your organisation
one of your first tasks will be to
choose a suitable domain name
for your venture. With dozens of
domain name types available
these days you must decide
which are the right ones for your
organisation?
3.6 Domain Name Types
The following are some key domain
name types:
• ie – Ireland’s standard domain
name suffix
• com – short for ‘commercial’
this is the most popular domain
suffix on earth
• org – used by global non-profit
organisations
• net – short for ‘network’
• org.uk – used by UK non-profit or
charitable organisations
• plc.uk – for use by UK public
limited companies
• info – a new domain suffix, short
for information provider
• me.uk – individual domain name
suffix
• ltd.uk – for use by UK limited
companies of the same name
• biz – a shortened version of
business
• tv – originally the suffix for the
Polynesian island of Tuvalu
but now frequently used by
television broadcasters
• eu – European Union suffix
• mobi – For sites delivering
services to mobile devices
In addition to these domain name
types, a multitude of newer ones
have appeared over the past few
years – including country-specific
suffixes (e.g. “.co” – Colombia,
�15
and “.at” – Austria), which provide
a unique domain name type for the
country in question.
The most important domain types
for small businesses in Ireland
are .ie (for obvious reasons),
followed by .com – the original,
and most commonly recognised
suffix. Although many of the
newer domain names may appear
‘clever’, most end users want to
be able to trust a website. The
.ie domain, in particular, has
been proven to provide some
reassurance to web visitors, in
contrast to more niche domains,
such as .mobi.
3.7 Registering your .ie
domain
The IEDR is an independent not-forprofit organisation that manages
the .ie country code Top Level
Domain (ccTLD) namespace in
the public interest of the Irish and
global Internet communities. The
IEDR strongly recommends that
you use a listed IE Registrar for
your domain name application.
Registrars provide competitive
rates for registration and hosting
services.
�
16
Please note that your Registrar
is responsible for providing all
the support you will need for your
application. When you choose
to apply through a listed IE
Registrar, they will give you all the
information and assistance you
need in registering your domain
name and are your primary point of
contact for any queries relating to
your domain.
• A list of all Registrars can be
found at https://www.iedr.ie/
list-of-registrars/
• To check an existing .ie domain
or to check for availability of a
new .ie domain please access
the.ie WHOIS service at http://
www.iedr.ie
Ideally, you should secure the
top two domains (.com and .ie)
simultaneously. Obtaining the
.net and .org names is also
recommended to protect your
business identity. These are next
in line of the most commonly
registered domain name type.
New variants are invented all the
time, once you’ve secured the
most important ones, it is then
up to you if you want to buy up all
possible variants of your domain
name identity. Be aware that each
different domain you buy will cost
extra, so decide whether it’s worth
buying the less common suffixes.
Don’t forget that you will also be
liable for the costs of renewing
your domain names every few
years. �17
4. Peripherals
4.1 Guide to buying a
printer for your small
business
Printer options for your office or
home office are so plentiful and
inexpensive that you may feel
there is no need to research your
options. However, because there
are so many different types of
printer and because the associated
hidden costs can be significant,
it is important to understand the
implications of each before you
buy.
Printers follow a loss leader
business model. You buy the
printer for less than it costs
to manufacture, and then pay
a relatively high price for ink
cartridges or toner. Over the
lifetime of a printer this generates
more profit for the manufacturer
than just selling you a printer
alone. This is why you need to
think wisely about your purchase.
4.2 What will you use
the printer for?
�
18
Do you just need to print a Word
document or email now and
again, or will you be printing
off hundreds of sheets a day?
This is important to work out in
advance. Even modern printers
are delicate pieces of machinery
and a small laser printer designed
for the domestic market may not
cope with five hours of non-stop
printing every day. Make sure the
printer you choose is up to the job.
Generally the more printing you
do, the more robust a printer you
should choose. Also, check if your
chosen printer can take envelopes
or larger sizes of paper if needed.
4.3 Device versus
Cartridge?
Research the cost of a new
cartridge before buying the printer
and find out how many sheets it
will print on average. From those
figures you can work out the
estimated cost per page. It can
make a lot of sense to spend
more on the printer up front to
reduce the cost of cartridges over
time. Remember that some printer
cartridges can also be refilled
which will make them cheaper but
may result in a degradation of the
print quality.
4.4 LaserJet or
Inkjet?
Laser printing costs have
become more competitive in
recent years so businesses
should look at it first. Inkjet
may well be cheaper and
perfectly suitable for a
home but there is a more
professional finish to a laser
print job.
4.5 Black & white or
colour?
Full colour printing is now cheaper
and easier than in the past but
can still be relatively expensive.
The cost of colour laser printer
cartridges is prohibitive. Most
businesses get by just fine with
a black and white printer. If you
only do a little colour printing but
do it regularly, it might be more
cost effective to get two printers;
one for black and white and one
for colour. It may be worthwhile
exploring the option to outsource
your colour printing.
4.6 All in one machines?
There are a lot of multifunction
machines on the market that allow
you to print, fax and photocopy
with one machine. These are a
great idea in principle and they are
very handy for a small office but
you should ask yourself how often
you actually need to photocopy or
fax. There are always trade-offs
when you add more functionality to
a single device. If it’s really just a
printer you need then you should
get yourself a dedicated printer.
4.7 Other things to
consider
Speed - It’s worth knowing the
speed a document will print,
especially if you print in large
volumes. Most modern laser-jet
printers are fast enough that you
don’t need to worry too much
about it.
Resolution – resolution is
measured in DPI which stands for
dots per inch. The higher the DPI
the better the quality of print.
Connectivity - The majority of
printers are now connected via
USB cable but WI FI and Bluetooth
wireless connectivity are now
commonplace especially on home
or small office-style desk-jets.
�19
5. Data Security and Integrity
5.1 Business Continuity
Business continuity refers to
those activities performed daily
to maintain service, consistency,
and recoverability. These activities
include many daily actions such
as project management, system
backups, change control and help
desk.
The fundamentals of business
continuity are the standards,
supporting policies, guidelines,
and procedures needed to ensure
business can continue without
stoppage, irrespective of adverse
circumstances or events.
5.2 Data Management
�
20
For most not for profit
organisations the most important
asset that they hold is their data.
With that in mind a key function
should be the protection and
management of that data.
The most important element
of good data management is
ensuring that all of your data
is backed up so in the event of
disaster or more likely human
error you have a recovery option.
Backups should be performed in a
schedule depending on a number
of factors including the rate of data
change and the available storage
resources. Schedules can vary
from hourly, to nightly to weekly but
a good rule of thumb is to perform
incremental backups (only backs
up changes) nightly and a full
backup weekly or at least monthly.
This full backup can then be
archived and marked as a record
of data for that particular month.
5.2.1 Methods
Third party software is available to
help with your backup scheduling
and ease the administration of
backing up multiple systems.
Reputable companies like
Symantec, CA and Acronis have
tried and trusted packages that
are available at reasonable rates.
There are many other freeware
and low cost options available on
the internet but these should be
investigated and trialled before
entrusting your vital data recovery
to them.
Backups were traditionally sent
to a tape device so that they
can be taken offsite to ensure
another level of disaster recovery
and this is still a preferred
option. However, the reduction
in the price of hard disk and the
increased performance of disk to
disk backups means that a mix
of the two technologies is now
the standard. The third option in
addition to tape and disk backup
is backup to the cloud. This is
an alternative to taking tapes
off site in that you backup your
data to the internet where it is
securely stored by a 3rd party.
This is an increasingly attractive
option and will become the norm
but current costs for hosting are
prohibitive depending on the size
of your data requirement. Microsoft
and Amazon are just two of the
companies with backup to cloud
offerings.
5.3 Anti-Virus &
Malware
Anti-Virus is software traditionally
used to protect from viruses but
has evolved to encompass all
aspects of what is now termed
Malware meaning malicious,
hostile or intrusive software.
Most anti-virus software works on
a subscription basis with annual
renewals entitling you to download
the latest protection. Companies
that dominate the market are
Macafee, Sophos and Norton.
A popular alternative for smaller
companies (less than 30
employees) is AVG which is a free
anti-virus package that offers
basic protection without the bells
and whistles of a centralised
management console.
5.3.1Anti-Spam
Spam is the annoying unsolicited
email that fills up our mailboxes.
There are various anti-spam
techniques to deal with the
problem.
Anti-Spam software usually
analyses key words or monitors
email addresses to block mail from
being delivered. The issues are
that it can often pick up mails that
are legitimate and block them from
delivery so the quarantine location
for blocked mails must also be
monitored.
Some of the products used by
organisations include Spam Titan
and Kaspersky which operate at
the gateway level or some built in
functions of the e-mail application
like Microsoft Exchange. Gmail
also has built in spam filtering.
�21
5.4 Firewall
5.6 Wireless Security
A firewall is a set of rules that
restrict access to your PC from the
internet. As the name suggests
it tries to build a security wall
between potential hackers and
your device. Windows comes with
its own built in firewall application
but there are other hardware and
software solutions available which
will help to control access to your
network at the gateway layer.
Sharing high speed broadband
around your organisation is
relatively easy now due to the
availability of relatively cheap
wireless routers. Most routers
are set up to work straight out
of the box meaning that anyone
can potentially connect to them.
This poses a potential security
threat as someone with a laptop
or mobile device outside your
office premises could access your
internet connection or maybe even
access your network.
When setting up a router
you should add a level of
authentication. This means
setting a password that each
person requires to login. WEP is
the most basic security but this
can be broken relatively easily
and we therefore recommend the
selection of the more secure WPA
encryption. Many routers will allow
a further level of security whereby
only devices that it knows will be
allowed to access the network.
This is done by keeping a record
of the MAC address of the devices
to be granted network access all
network cards will have this unique
identifier. All of these configuration
options should be discussed
and explored with your Network
provider.
5.5 Software
Updates
�
22
One of the best ways to keep
your computer safe is to
ensure your software is always
fully up-to-date. As potential
vulnerabilities are discovered
in programs, the software
manufacturers release fixes
or patches for download. If
you don’t have the latest
fixes, you are leaving yourself
open to security threats. You
should ensure every piece of
software you are running is
set to automatically update,
especially your operating
system (i.e. Windows). If you
feel that downloading patches
is slowing your computer then
you can set the updates to be
performed at night.
5.7 Protection against
internal threats
Anybody that has access to your
ICT systems is a potential threat
whether by accidently deleting
files or records or something
more malicious. On that basis it is
important to secure your network
through authentication so that you
can identify and audit usernames
and the actions carried out by
those users during their logged
on sessions. It is also a good
idea to grant access on a minimal
privilege basis, i.e. ensure that
each user only has the access
levels that they need to carry out
their day to day duties. If they
need access to additional files or
folders they can request it from
the IT administrator provided it
is accompanied by permission
from the relevant business owner.
This is especially important with
regard to personal data concerning
employees, employment & scheme
participants, board members,
volunteers and clients/users. The
granting of access to electronic
data and hard copy files must
be continuously monitored and
managed, that is, access levels
should be removed when staff
transfer or move from a particular
unit.
5.8 Encryption
Encryption is a means of
safeguarding sensitive personal
information stored on laptops
or mobile devices from loss or
theft. Email messages in transit
are automatically encrypted.
There are administration
overheads associated with this
type of solution as issues such
as changing passwords can be
complicated. Its use is recommend
if you feel the information
carried on mobile devices could
compromise the organisation if put
in the wrong hands.
5.9 Remote Access
Allowing external users, partners
or employees remote access to ICT
systems has become an essential
part of providing a modern
ICT service in the business
environment. In Irish community
and voluntary organisations, this
access could justifiably extend
to board members, volunteers,
work placements and interns.
With this increased availability of
your network comes an increased
security risk. The safest and most
secure method of allowing remote
access is through a virtual private
network or VPN.
The VPN connection across the
�23
Internet is technically a wide area
network (WAN) link between the
sites but appears to the user as
�
24
a private network link—hence the
term “virtual
6. ICT Policies
6.1 Policy Documents
It is a good idea for your board
to adopt policies to ensure the
prudent use of ICT facilities
in pursuit of the charitable/
other non-profit purposes for
which your organisation was
established. Organisations
and employers of all sizes
have experienced instances of
staff and other users using the
work ICT facilities and internet
for personal purposes or even
personal gain, or for illegal or
unethical purposes. Even with
very good technology levels and
security strategies you may still
be open to this kind of abuse of
systems, so it is imperative that
employees and other systems
users are required to adhere
to a set of standards. At a
minimum you should have an
Internet Usage Policy document
that must be signed by all
employees and other users. In
addition a general ICT Usage
Policy covering email, instant
messaging, printing, security etc.
is recommended.
6.2 Internet Usage
As previously mentioned an
internet usage policy should be
put in place to ensure that all
employees are made aware of
what the internet should and
should not be used for during work
hours.
Alongside this policy you should
consider the option of using
monitoring and blocking software
to help enforce the policy.
These software packages can
block inappropriate sites, limit
the hours that the internet is
available for and produce usage
reports with regard to time spent
online and most visited sites.
Examples of such software would
be WebMarshall, Guardian and
WebTitan.
6.3 Data Protection
Data protection is fundamentally
about people’s right to privacy.
Individuals can access and correct
data about themselves. If you
keep information about people
(staff, volunteers, users or clients,
board members, work placement
participants, etc) you must comply
�25
with data protection principles.
In essence, you are a data
controller if you can answer YES to
the following question:
• Do you keep or process any
information about living people?
• Retain it no longer than is
necessary for the specified
purpose or purposes
• Give a copy of his/her personal
data to any individual, on
request.
Types of Data Controller
These provisions are binding
on every data controller. Any
failure to observe them would
be a breach of the Act. The data
protection commissioner provides
comprehensive guidelines at
http://dataprotection.ie.
Data controllers can be either
individuals or “legal persons”
such as companies, government
departments and voluntary
organisations. Examples of
cases where the data controller
is an individual include; general
practitioners, pharmacists,
politicians and sole traders, where
these individuals keep personal
information about their patients,
clients, constituents etc.
There are eight main rules that a
data controller must comply with:
�
26
• Obtain and process the
information fairly
• Keep it only for one or more
specified and lawful purposes
• Process it only in ways
compatible with the purposes
for which it was given to you
initially
• Keep it safe and secure • Keep it accurate and up-to-date
• Ensure that it is adequate,
relevant and not excessive
7. Administration and
Procurement
7.1 ICT Procurement
The Department of Public
Expenditure & Reform has
developed procurement
arrangements in the areas of ICT,
telecoms, and data networking
on behalf of non-commercial
public sector bodies including
bodies funded by the public
sector. The purpose is to leverage
volumes and secure benefits
from economies of scale. These
arrangements deliver value for
money, provide goods and services
under public service terms and
conditions, and reduce the
complexity, cost and time spent on
procurement processes.
Detailed information can be found
on http://ictprocurement.gov.ie/.
establish the terms governing
contracts to be awarded during
a given period, in particular with
regard to price.
Frameworks are generally
established after a
competitive tendering
process and may be used
for supplies, works or
services.
Comprehensive detail on
frameworks and contracts
can be found at
http://www.procurement.ie
7.2 Framework
Agreements and
Contracts
A framework agreement is defined
as an agreement between one
or more contracting authorities
and one or more suppliers. The
purpose of the agreement is to
�27
8. Useful Links
• Pobal, www.pobal.ie
• Data Protection Commissioner, www.dataprotection.ie
• Virus Protection www.avg.com ; www.macafee.com; www.norton.
com
• Hardware Vendors www.dabs.ie; www.dell.ie; www.komplett.ie ; www.
elara.ie
• Website Cookie information http://www.irishtimes.com/newspaper/
finance/2012/0305/1224312777027.html
• Good Practice http://ncte.ie/GoodPractice/
• ICT Procurement http://ictprocurement.gov.ie/; http://www.
procurement.ie
• Software for Charity, Educational or Community Group http://
encludeit.org/
• Create an IT Security Policy http://www.enterprise-ireland.com/
ebusinesssite/guides/internal_security/internal_security_index.asp
• Internet and Email Policy Usage Policy for Staff http://
humanresources.about.com/od/policiesandsamples1/a/email_policy.
htm
http://www.gfi.com/internet-monitoring-software/sample-internetusage-policy
Templates and further supporting documentation are available on
www.pobal.ie
Published by Pobal, Dublin, 2013
�
28