Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental ***** will be achieved by implementing these controls, policies, procedures and standards. This approved ***** policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This ***** policy provides clear direction and support for security. XYZ is the owner of this ***** ***** is *****refore responsible for the review and enforcing of controls authorized by the policy.

***** AND DEFINITIONS: Access Privileges will ***** unique for each user ***** determined by ***** system administrators; Account refers to access privileges assigned to a user; E-m*****il is the electronic mail and exchange of information; Data Ownership is any data stored on the office's computers - it is owned by ***** office; Web Server is ***** web server operated by to office to access the internet and external data sources; Information Secur*****y represents the attempt ***** preserve confidentiality, integrity ***** availability of data Policy Owner is XYZ who is responsible for policy maintenance and review

SYSTEM - Th***** policy covers all freestanding *****, networked computers, timesh*****d *****, servers or terminals *****, leased ***** ***** by XYZ's Dental Office. This also entails any network or networked component that links the before mentioned devices with any external network or netw*****k component including all peripherals, software, ***** and media associated ***** ***** devices; telephones, modems, fax machines, recording devices or other devices forming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read ***** capture any data without authority or ***** to create ***** inst***** ***** form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or network equipment, software or data. User ***** not attach any unauthorised device or signal to the ***** or connect any equipment providing ***** access to ***** system (f***** example, a modem) ***** the proper *****uthorization.

***** - XYZ's system provide support the o*****fice's medical research, community service ***** administrative work and should ***** be used for any other purpose. No person will utilize the system ***** private purpose, including private commercial, political or religious purposes. It is acknowledged ***** there will ***** some use of communications for personal purposes, but this must clearly not interfere with obligations owed by the office or third parties or ********** breach any part of this *****.

ACCESS - Access to the system is controlled by the formal *****r registration process and includes using unique user-ids ***** represent that any user can be linked and made responsible for ********** actions; *****s must have authorization from the system owner; users must sign a statement indicating that they ***** *****en informed ***** that they understand this policy; when in breach ***** these policies, ***** can be immediately removed or have their ***** rights amended as

. . . . [END OF ESSAY PREVIEW]

Download entire paper (and others like it)    |    Order a brand new, custom-written paper

© 2001–2016   |   Dissertations on Security Policy of a Dental Office Introduction: Information Technology Security   |   Dissertations Model