Afghan coordination logistic unit is a non-political, non-religious, non-profit structure that provides voluntary humanitarian, Construction, Health, Education, and Agriculture services to people in Afghanistan. We bring people together with a common goal to aid our fellow man. Help Build Hope in Afghanistan!
Afghan coordination logistic unit – ACLU – has worked on different projects in Afghanistan since 2005 and is registered with the Ministry of Economic Islamic Republic of Afghanistan. Fortunately, several years passed from the beginning of ACLU activities in the Field of Health, Education, Agriculture, Livelihood, Construction, WASH, and consultancy from other successful ACLU communities. With experienced and professional personnel in all sectors, ACLU will assist people and implement programs for society’s needs, insisting on progress, along with Afghanistan so that we can be a strong hand to our sad people.
Vision: ACLU’s vision is to see a developed Afghanistan with every person having equal rights to live in this world with dignity. We are a dedicated team striving to bring growth to our community.
Mission: ACLU’s mission is to contribute to a developing and self-sustaining Afghan society through engagement in Health, Education, Agriculture, WASH, Construction, Livelihood, and logistic services.
Analyzing the entire scenario as presented above, a group of professional Afghans consisting of expert designers, architect engineers, and proven trainers are dedicated to the stability and economic prosperity of Afghanistan.
Advocacy: Considers advocacy as an effective tool to influence laws and policy changes through leading advocacy campaigns, media usage, and policy advocacy.
The current document is ACLU's Information Technology Policy and Procedure Manual, which includes core principles, accountability, and conflict of interest. After approval of the CC, all ACLU employees must sign it upon signing their contract and it will be implemented in all issues mentioned within.
Information Technology (IT) Policy
1. Purpose
The purpose of this IT Policy is to provide a framework for the secure and effective use of Information Technology (IT) resources within ACLU. This policy ensures that all staff use technology responsibly, in line with organizational goals, data protection regulations, and security best practices.
2. Scope
This policy applies to all employees, contractors, consultants, interns, and volunteers using IT systems, devices, software, and data belonging to ACLU, whether on-site or remotely.
3. Objectives
- Protect the integrity, confidentiality, and availability of ACLU data and systems.
- Ensure responsible and ethical use of IT resources.
- Prevent misuse or unauthorized access to ACLU systems.
- Promote a reliable and efficient IT environment to support operations and services.
4. Acceptable Use Policy
- ACLU IT resources must be used only for official, organizational purposes.
- Personal use of email and internet is permitted within reasonable limits, provided it does not interfere with work or violate laws or organizational values.
- Users must not download or install unauthorized software or access prohibited websites.
- Social media must be used responsibly and professionally if accessed during work hours.
5. Data Security & Protection
- All organizational data must be stored on official ACLU servers or cloud storage systems.
- Sensitive data must be encrypted and access controlled.
- Staff must not share passwords or leave devices unattended while logged in.
- Backup of data must be performed weekly, with storage at a secure offsite location.
6. Password Policy
- Passwords must be at least 8 characters long, include letters, numbers, and symbols, and be changed at least every 90 days.
- Users must never share their passwords.
- Use of two-factor authentication (2FA) is strongly recommended where possible.
7. Email and Communication
- Official communication must be conducted through ACLU email accounts.
- Phishing or suspicious emails must be reported immediately to the IT department.
- Users must not send confidential data over unencrypted email.
8. Software and Licensing
- Only licensed software approved by the IT department may be installed.
- Pirated or unauthorized software is strictly prohibited and may lead to disciplinary action.
- Updates and patches must be applied regularly to ensure security.
9. Hardware Usage
- All IT hardware is the property of ACLU and must be used responsibly.
- Users are responsible for maintaining cleanliness and functionality of their devices.
- Any loss or damage must be reported immediately to IT.
10. Remote Access & Mobile Devices
- Remote access is allowed via secure VPN or approved methods.
- Mobile devices must be secured with passwords or biometrics.
- Confidential data should not be stored locally on personal devices.
11. Monitoring & Auditing
- ACLU reserves the right to monitor IT systems and usage to ensure policy compliance.
- Regular IT audits will be conducted to identify vulnerabilities and maintain system integrity.
12. IT Support
- ACLU’s IT team is responsible for providing technical support, managing networks, and ensuring cybersecurity.
- All issues must be reported via the official IT support ticket or help desk.
13. Internet Usage
- Internet access is intended for work-related activities.
- Streaming, gaming, or downloading large non-work files is prohibited unless approved.
- Users must not engage in activities that violate local or international cyber laws.
14. Breach of Policy
Violations of this policy may lead to verbal/written warnings, suspension of IT privileges, termination of contract, or legal action.
15. Review and Updates
This IT Policy will be reviewed annually and updated to reflect new risks, technologies, or regulatory changes.
16. Acknowledgment
All staff must sign the IT Policy Acknowledgment Form confirming they have read, understood, and agreed to abide by the policy.
Position: Deputy Director
Signature: ___________________
Position: Director
Signature: ___________________