Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that ***** facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction and support for security. XYZ is the owner of this ***** and is *****re*****e responsible for the review and enforcing of controls authorized by the policy.

***** AND DEFINITIONS: Access Privileges will ***** unique for each user ***** determined by the system administrators; Account refers to access privileges assigned to a user; E-mail is the electronic mail and exchange ***** information; Data Ownership is any data stored on ***** office's computers - it is owned by ***** office; Web Server is the web server operated by to office ***** access the internet and external data sources; ***** ***** represents ***** attempt to preserve confidentiality, integrity ***** availability of ***** Policy Owner ***** XYZ who is ***** for policy maintenance and review

SYSTEM - Th***** policy covers all freestanding computers, networked *****, timesh*****d computers, servers or terminals owned, leased ***** ***** by *****'s Dental Office. This also entails ***** network or networked component ***** links the be*****e mentioned devices with any external network or network component including all peripherals, software, data and media associated ***** ***** devices; telephones, modems, fax machines, recording devices or other devices forming part of the office's voice network. Users cannot ***** to circumvent any system security, network security or any protection ***** resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read or ***** any data without auth*****ity or attempt to create ***** inst***** any form of malicious s*****tware (for example worms, viruses, sniffers) which may affect computing or ***** equipment, software or data. User must not attach ***** unauth*****ised device or signal ***** the system or connect any equipment providing ***** access to ***** system (for *****, a modem) without the proper *****uthorization.

***** ***** XYZ's system provide support the office's medical research, community service and administrative work and should not be used for ***** other purpose. No person will utilize the system ***** private purpose, including private commercial, political or religious *****s. It is acknowledged that ********** will be some use of communications for personal purposes, but this must *****ly not interfere with obligations owed by the office or third ********** ***** otherwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal *****r registration process and includes using unique user-ids which represent that ***** user can ***** linked and made responsible for their actions; users ***** have authorization from the system owner; ***** must sign a statement indicating ***** they ***** been informed ***** that they understand this policy; when in breach ***** these policies, users can be immediately removed or have ***** access rights amended as


Download complete paper (and others like it)    |    Order a brand new, custom paper

© 2001–2017   |   Dissertation on Security Policy of a Dental Office Introduction: Information Technology Security   |   Dissertations Writing