Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and st*****ards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This security policy provides clear direction and support for security. XYZ is the owner of this policy ***** is *****refore responsible for the review and enforcing ***** controls authorized by the *****.

TERMS AND DEFINITIONS: Access Privileges will ***** unique for each user and determined by the system admin*****trators; Account refers to access privileges assigned to a user; E-mail is ***** electronic mail and exchange of in*****mation; Data Ownership is any data stored on the *****'s computers - it is owned by ***** office; Web Server is the web server operated by to office to access the internet and external data sources; Information ***** represents ***** attempt ***** preserve confidential*****y, integrity ***** availability of ***** ***** Owner is XYZ who is ***** for policy maintenance and review

SYSTEM - ***** policy covers all freestanding *****, networked computers, timeshared computers, servers or terminals owned, leased ***** ***** by *****'s Dental *****. Th***** also entails ***** network or *****ed component that links the be*****e mentioned devices with any external network or network component including all peripherals, software, data and media associated with ***** devices; telephones, modems, fax machines, recording devices or o*****r devices forming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not ***** to capture or decode passwords or access codes, read ***** capture any data without authority or attempt to create ***** inst***** ***** form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or network equipment, software or data. User must not attach any unauthorised device or signal ***** the system or connect ***** ***** providing external access to the system (for example, a modem) without ***** proper *****uthorization.

***** ***** XYZ's system provide support the office's medical research, community service ***** administrative work and should ***** be used for any other purpose. No person will utilize the system for private purpose, including private commercial, political or religious purposes. It is acknowledged ***** ********** will be some use of communications ***** personal purposes, but this must *****ly not interfere with obligations owed ***** the office or third *****ies ***** otherwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal *****r registration process and includes using unique user-ids ***** represent that ***** user can ***** linked and made responsible for ***** actions; ********** ***** have authorization from ***** ***** owner; users must sign a statement indicating ***** they ***** been informed ***** that they understand this policy; when in breach ***** these *****, users can be immediately removed or have their access rights amended as

. . . . [END OF RESEARCH PAPER PREVIEW]

Download full paper (and others like it)    |    Order a brand new, custom paper

© 2001–2017   |   Dissertations about Security Policy of a Dental Office Introduction: Information Technology Security   |   Term Papers Samples