Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
Copyright Notice

Security Policy of a Dent*****l Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction ***** support for security. XYZ is the owner of this ***** and is *****re*****e responsible for the review and enforcing ***** controls authorized ***** the policy.

TERMS AND DEFINITIONS: Access Privileges will ***** unique for each user and determined by ***** system admin*****trators; Account refers to access privileges assigned to a *****; E-m*****il is the electronic mail and exchange of information; Data Ownership is any data stored on ***** *****'s computers - it is owned by XYZ's office; Web Server is the web server operated by to office to access the internet and external data sources; Information ***** represents ***** attempt ***** preserve confidential*****y, integrity and availability of data ***** Owner is XYZ who is ***** for policy maintenance and review

SYSTEM - This policy covers all freestanding computers, networked computers, timeshared *****, servers or terminals owned, leased or operated by ***** Dental *****. This also entails any netw*****k or networked component that links the before mentioned devices with any external network or network component including all peripherals, software, data and media associated with *****se devices; telephones, modems, fax machines, recording devices or other devices forming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection ***** resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read or ***** any data without authority or attempt to create or install ***** form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or netw*****k equipment, software or data. User must not attach any unauthorised device or signal to the ***** or connect ***** ***** providing external access to the system (for *****, a modem) without the proper authorization.

***** - XYZ's system provide support the office's medical research, community service and administrative work ***** should ***** be used for any o*****r purpose. No person will utilize the system ***** private purpose, including private commercial, political or religious *****s. It is acknowledged that there ***** be some use of communications for personal purposes, but this must clearly not interfere with obligations owed by the office or third parties or o*****rwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids which represent that ***** user can be linked and made responsible for ********** actions; users ***** have authorization from the system owner; ***** must sign a statement indicating ***** they have *****en informed and that they understand this policy; when in breach ***** these *****, users can be immediately removed or have their ***** rights amended as

. . . . [END OF DISSERTATION PREVIEW]

Download entire paper (and others like it)    |    Order a one-of-a-kind, customized paper

© 2001–2017   |   Term Paper on Security Policy of a Dental Office Introduction: Information Technology Security   |   Dissertation Model