Software Policy 


Contact us

 

Introduction

Fiber Group Shpk uses many types of computer software to perform its business operations and relies upon the correct functioning and security of that software at all times. It is imperative therefore that steps are taken to ensure that only approved software is used within the organization and that no classified information is put at risk.

This policy sets out how software will be acquired, registered, installed and developed within Fiber Group Sh.p.k.

This control applies to all systems, people and processes that constitute the organization’s information systems, including board members, directors, employees, suppliers and other third parties who have access to Fiber Group Sh.p.k systems.

The following policies and procedures are relevant to this document:

  • Acceptable Use Policy
  • Change Management Process
  • Access Control Policy
  • Information Security Policy

1. Software Policy

1.1 Purchasing Software

All computer software to be used within the organization must be approved. This is necessary to ensure that:

  • Licensing requirements are addressed
  • The software works effectively with the standard corporate software image
  • Use of the software can be supported by the IT Service Desk
  • Best value for money is obtained in procurement
  • A record is kept of installed software within the organization

Under no circumstances should software be purchased using local departmental budgets.

1.2 Software Registration

All software in use within Fiber Group Sh.p.k must be correctly licensed. This is a legal requirement and compliance is monitored by various industry bodies including FAST (Federation Against Software Theft).

All installed software programs will be registered in the name of the organization, not the individual. Purchased software is a corporate asset and licenses will frequently be reused as the shape of the organization changes.

Under no circumstances will corporate software be copied (other than for backups) or installed for use on non-corporate machines, such as at home.

Asset management software will be used to keep track of all installed instances of software titles and regular audits will be carried out. Any user with unlicensed software installed will be asked to remove it; it is the responsibility of users to ensure that all the software on their computer equipment is licensed.

1.3 Software Installation

Software will be installed by the IT Service Desk or appropriate technical team or supplier upon request and any required licenses have been purchased if required.

Software will not be installed prior to a valid license being ordered.

By default, IT Service Desk will install on user equipment following licensed software, purchasing licenses where required:

Item
Description
Version
Justification
Windows 10 
Licensed Operating System
Windows 10 Pro
Supported version
Chrome
Web Browser
Latest version
Application required or business purpose
Sophos or Trendmicro agent
Sophos Antivirus or TrendMicro Security Agent 
Latest version
Antivirus is required for security purpose
Zabbix Agent
Zabbix agent collects data such as CPU, memory, disk and network interface usage from a device.
Latest version
Agent required for monitoring purpose
Adobe PDF
Adobe application for read PDF files
Latest version
Application for business purpose
LibreOffice
Office productivity software suite
Latest version
Application for business purpose
7Zip
Utility for compressing and decompressing files
Latest version
Application for business purpose
The user will not install any software that is licensed to them personally, whether or not it is free, shareware or commercial. This includes evaluation versions of software programs.

1.4 Removal of Software

In the event that a software program is no longer required the IT Service Desk should be informed. The software will then be removed from the device in question and where possible the license will be re-used elsewhere within the organization.

Users must not remove licensed software from their devices without informing the IT Service Desk as this potentially represents a waste of a corporate asset.