Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction and support for security. XYZ is the owner of this ***** and is therefore responsible for the review and enforcing ***** controls authorized ***** ***** policy.

TERMS AND DEFINITIONS: Access Privileges will ***** unique for each user ***** determined by the system admin*****trators; Account refers to access privileges assigned to a user; E-m*****il is ***** electronic mail and exchange of information; Data Ownership is any data stored on the *****'s computers - it is owned by XYZ's office; Web Server is ***** web server operated by to office to ***** the internet and external data sources; ***** Security represents the attempt ***** preserve confidentiality, integrity and availability of data ***** Owner ***** XYZ who is ***** for policy maintenance and review

SYSTEM - This policy covers all freestanding *****, networked computers, timesh*****d *****, servers or terminals *****, leased ***** operated by *****'s Dental Office. This also entails any network or networked component that links the before mentioned devices with any external network or netw*****k component including ***** peripherals, software, data and media associated ***** ***** devices; telephones, modems, fax machines, recording devices or o*****r devices f*****ming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read or capture any data without authority or attempt to create or install ***** form of malicious software (for example worms, viruses, sniffers) which may affect computing or network equipment, ***** or data. User ***** not attach any unauthorised device or signal ***** the system or connect any ***** providing external access to ***** system (for *****, a modem) ***** the proper *****uthorization.

GENERAL - XYZ's system provide support the office's medical research, community service and administrative work and should not be used for any o*****r purpose. No person will utilize the system f***** private purpose, including private commercial, political or religious *****s. It is acknowledged ***** *****re ***** be some use of communications for personal purposes, but this must clearly not interfere with obligations owed by the office or third *****ies ***** otherwise breach any part of this policy.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique **********ids which represent that any user can be linked and made responsible for *****ir actions; users ***** have authorization from the system owner; ***** must sign a statement indicating that they have *****en informed ***** ***** they understand this policy; when in breach of these *****, users can be immediately removed or have their ***** rights amended as


Download complete paper (and others like it)    |    Order a brand new, custom-written paper

Other topics that might interest you:

© 2001–2016   |   Thesis Papers on Security Policy of a Dental Office Introduction: Information Technology Security   |   Research Papers Writing