Privacy Policy
1. Introduction
Welcome to the Utrax Agency Ltd - Information Technology (IT) Security Policy. The purpose of this IT Security Policy is to protect the information assets, infrastructure, and personnel of Utrax Agency Ltd. This policy outlines the principles and practices for securing our IT resources, ensuring data integrity, confidentiality, and availability while enabling a productive and safe environment.
2. Scope of the Policy
This policy applies to all employees, contractors, consultants, temporary workers, and other personnel accessing or using Utrax Agency Ltd information assets. It covers all systems, networks, applications, and data owned or operated by Utrax Agency Ltd.
3. Information Security Objectives
- Protect information assets from threats.
- To provide guidelines on the security of information ensuring the confidentiality, integrity, and availability of data.
- Establish accountability through secured and monitored access.
- Comply with legal, regulatory, and contractual obligations.
- To provide guidelines for the acquisition and use of both ICT hardware and software.
- To regulate and control access to Utrax ICT infrastructure and resources.
- To avail guidelines on the administration of ICT infrastructure and other related resources.
- To establish how to deal with emergency issues related to loss of information (in case of a deserter).
- To give guidelines on the use of the websites, official mail and social media as communication channels for the Ministry.
4. Information Security Policy Statements
4.1 Access Control
- Access to information and systems must be based on least privilege and role-based access principles.
- Multi-factor authentication (MFA) is mandatory for all remote access.
- Access rights must be reviewed semi-annually to ensure they remain appropriate.
- Information stored on electronic and computing devices whether owned or leased remains the sole property of Utrax Agency LTD and must be protected in accordance with the Data Protection Standard.
- All mobile and computing devices that connect to Utrax network must comply with the Network Access Policy.
- System and user level passwords must comply with the Password Policy. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
- All computing devices must be secured with a password-protected screensaver. Users must lock the screen or log out when the device is unattended.
- Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
4.2 Data Protection
- All sensitive and confidential data must be encrypted at rest and in transit.
- Personal Identifiable Information (PII) and financial data must be handled in compliance with relevant laws.
- Data retention policies must be enforced, with data stored only for as long as required by legal, regulatory, or business needs.
- Under no circumstances is an employee to engage in any activity that is illegal under local or international law while utilizing Utrax's ICT resources.
- Accessing data, a server or an account for any purpose other than conducting official business is prohibited.
- Avoid introduction of malicious programs into the network or server (viruses, worms, Trojan horses, e-mail bombs, etc.).
- Avoid revealing your account password to others or allowing use of your account by others.
- Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's terminal session, via any means, locally or via the Internet/Intranet/Extranet is prohibited.
- Avoid sending unsolicited email messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material (email spam).
4.3 Technology Hardware and Software Acquisition
Utrax's ICT equipment is in form of hardware as well as software. These include desktops, laptops, communication infrastructure like switches, routers, and servers. It also includes a wide range of software both applications and operating.
Procedures
- All the procurement of technology will follow the standard procedure as provided for in the Public Procurement and Disposal Act (PPDA).
- The service provider to be procured must meet the guidelines by the National Technology Authority of Uganda (NITA U).
- ICT Department will from time to time provide specifications to guide the acquisition of both hardware and software.
- No equipment whether a donation or procured will be put use before verification the ICT department.
4.3.1 Software Usage
- Only software purchased in accordance with this policy will be used within Utrax.
- Prior to the use of any software, the employee must receive instructions on any licensing agreements relating to the software, including any restrictions on use of the software.
- All employees must receive training for all new software. This includes new employees to be trained to use existing software appropriately. This will be the responsibility of Head ICT department.
- Unless express approval from Head ICT department is obtained, software cannot be loaded on an employee's Personal computer.
- Where an employee is required to use software on personal computer, an evaluation of providing the employee with a portable computer should be undertaken in the first instance. Where it is found that software can be used on the employee's personal computer, authorisation from ICT department is required to purchase separate software if licensing or copyright restrictions apply. Where software is purchased in this circumstance, it remains the property of Utrax and must be recorded on the software register.
4.3.2 Breach of the Guidelines
- Unauthorised software is prohibited from being used. This includes the use of software privately owned by an employee, contractor and used with Utrax ICT infrastructure.
- The unauthorised duplicating, acquiring or use of software copies is prohibited. Any employee, who makes, acquires or uses unauthorised copies of software will be referred to the accounting officer for disciplinary action. The illegal duplication of software or other copyrighted works is not condoned.
- Where an employee is aware of a breach of the use of software in accordance with this policy, they are obliged to notify the Head ICT department immediately. In the event that the breach is not reported and it is determined that an employee failed to report the breach, then that employee will be referred to the Accounting Officer for disciplinary action.
4.4 Security of Information Technology
Confidentiality, Integrity and Availability (CIA) of information are very important pillars of any organisation information management. The procedures under this chapter aim at ensuring that these pillars are upheld so that there is no compromise to Utrax's information and technology infrastructure. Protection against damages and liability created when unauthorized access occurs, and also against threats and physical damages to the infrastructure is emphasized.
Physical Security
- All communication infrastructure (servers, routers, switches and other network assets), must be secured.
- Appropriate access control measures must always be provided so that only authorized personnel are allowed access to the technology infrastructure.
- Security and safety of all portable technology, such as laptop, notepads, iPad will be the responsibility of the employee who has been issued with the device.
4.4.1 Information Security
- All Utrax critical data will to be backed up and secured on a monthly basis.
- All technology that has internet access must have anti-virus software installed.
- It is the responsibility of Head ICT Department to install all anti-virus software and ensure that this software remains up to date on all technology used by Utrax Agency LTD.
- All information used within the Utrax is to adhere to the privacy laws and confidentiality requirements.
- Any employee breaching this will face disciplinary actions.
4.4.2 Network Access
- All users accessing any of Utrax's network infrastructure must get authorization from the Network administrator.
- The access and use of the network resources shall be restricted to official duties only.
- All Wi-fi enabled devices must be secured with password and user authentication.
- All computers and devices on the network must be logically and physically secured when leaving them unattended.
- All devices must run up to date software applications and properly configured firewall.
- All network resources are the property of the company and can be subject to monitoring without recourse to the staff and the company reserve the right to grant or deny access to the network.
4.4.3 Technology Access
- Every employee will be issued with a unique identification code to access the company technology for example Wi-Fi and will be required to set a password for access to domain services every six months.
- Each password is to be at least 8 characters and alpha-numeric and is not to be shared.
- Head ICT Department is responsible for the issuing of the identification code and initial password for all employees.
- Where an employee forgets the password or is 'locked out' after three attempts, then Head ICT Department is responsible to reissue a new initial password that must be changed when the employee logs in using the new initial password.
4.5 ICT Governance
Effective ICT Governance provides a conducive environment for the alignment of all ICT investments in a rationalized manner that is aligned towards enabling the Utrax Agency LTD meet its goals and objectives. This contributes to the attainment of value for money, management of risks and effective ICT utilization.
Procedures
ICT Committee
The Board of Directors shall appoint an ICT Committee whose role and duties include:
- Ensure that ICT strategy is aligned with the strategic objectives of the Ministry.
- Monitoring the quality of the ICT projects.
- Providing advice (and sometimes making decisions) about changes to the ICT projects.
- Providing support, guidance and oversight function to the ICT Division.
ICT Department
The Department shall be responsible for the day to day running of the ICT activities in Utrax Agency LTD and these shall include:
- Coordinate the development of ICT strategy that supports the company's business objectives and helps build a strong competitive advantage.
- Support employees to make the most effective use of ICT resources, by providing various forms of user support.
- Develop and operate a network to support effective communication and collaboration.
- Protect the ICT infrastructure and corporate data against attacks from viruses, cybercriminals and other threats.
- Develop tools to collect, store, manage, secure and distribute data to employees who need access to the latest information to make decisions about strategic, financial and operational issues.
- Conduct a technology audit annually to ensure that all information technology policies are being adhered to.
- Maintain and manage all service agreements for the Ministry's technology.
4.6 Data and Information Management
This includes data generation, storage, protection and sharing. This part of the policy provides guideline for the management of the data generated and in possession of Utrax.
- All data / information generated and / or received at different levels in all forms and in possession belongs to Utrax Agency LTD.
- Units responsible for Data / information Processing (Registries, Depository, Resource Centre) shall process the Data / information in their custody for the purpose of easy access.
- Data / information shall be accessed by only authorized personnel.
- Database Administrator shall be responsible for all the electronic information management.
4.7 Management of ICT Service Agreements
For the purpose of this policy, ICT Service Agreement means an official commitment that prevails between a service provider and Utrax Agency LTD. Particular aspects of the service quality, availability, responsibilities are agreed between the service provider and Utrax. This chapter therefore provides guidelines for all ICT service agreements entered into on behalf of Utrax.
ICT service agreements may include following:
- Provision of general ICT services and equipment
- Provision of network hardware and software
- Repairs and maintenance of ICT equipment
- Provision of business software
- Website design, hosting, maintenance and updates
All ICT service agreements must be reviewed by Utrax's legal Department or solicitor general before the agreement is entered into. The service agreements shall be approved by the Accounting Officer.
All ICT service agreements, obligations and renewals will be recorded and a record kept in accordance the records management procures of Utrax.
4.8 Emergency Management of Information Technology
For the purpose of this policy, attention is given to the following as ICT emergency issues:
- Internet Failure
- Email Service Failure
- ICT Hardware Failure
- Virus or other security breach
- Website Disruption
This provides guidelines for emergency management of all information technology within the Utrax. All Technology failure and disruptions shall be reported to the ICT Department immediately to take necessary action.
It is the responsibility of ICT Department to undertake tests on emergency procedures to ensure that they are appropriate and minimize disruption to Ministry operations.
All actions must be taken immediately to minimize disruption to business operations.
5.0 Implementation Strategy
The policy will be implemented through development and approval of manuals in the areas identified in the policy statement and others that may be relevant in operationalizing this policy.
- ICT Department in partnership with the IT Committee shall be responsible for monitoring the implementation and compliance of these policies and where necessary, take appropriate remedial measures.
- ICT Department shall ensure the policies' enforcement and Utrax wide dissemination as well as training, awareness and sensitization of this policy.
- Violations of the policy areas listed here within shall be addressed by the appropriate mechanism.
6.0 Monitoring and Evaluation
- Realization of the objectives of this policy will require consistent monitoring and evaluation of the outcome indicators.
- Utrax recognises the role of the of ICT committee as the overall body that undertakes monitoring and evaluation of the ICT sector in the country. Therefore, the Utrax will play a leading role as far as the overall monitoring and evaluation of this policy is concerned.
- In addition, ICT Department with the help of ICT Committee will lead the process of monitoring and evaluation of the ICT programmes and projects at different levels.
- A monitoring and evaluation framework shall be developed to provide guidance.
- The policy shall be subjected to a mid-term review every three (3) years and a long term review every five (5) years in order to cater for the fast rate of technology innovation and advancement.
© 2025 Utrax Agency Ltd. All rights reserved.
For inquiries, contact: help@utrax.co.ug