Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Copyright Notice

Security Policy of a Dent*****l Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that ***** facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction and support for security. XYZ is the owner of this ***** and is there*****e responsible for the review and enforcing of controls authorized by ***** policy.

***** AND DEFINITIONS: Access Privileges will be unique for each user ***** determined by the system administrators; Account refers to access privileges assigned to a user; E-mail is ***** electronic mail and exchange ***** information; Data Ownership is any data stored on the office's computers - it is owned by ***** office; Web Server is the web server operated by to office to ***** the internet and external data sources; Information ***** represents ***** attempt to preserve confidentiality, integrity and availability of data ***** Owner is XYZ who is ***** for policy maintenance and review

SYSTEM - This policy covers all freestanding computers, networked *****, timesh*****d computers, servers or terminals owned, leased or operated by XYZ's Dental Office. This also entails ***** network or *****ed component that links the be*****e mentioned devices with any external network or network component including ***** peripherals, software, ***** and media associated ***** these devices; telephones, modems, fax machines, recording devices or other devices f*****ming part of the office's voice network. Users cannot ***** to circumvent any system security, network security or any protection ***** resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read or ***** any data without auth*****ity or ***** to create or install any form of malicious software (for example worms, viruses, sniffers) which may affect computing or ***** equipment, software ***** data. User ***** not attach any unauthorised device or signal to the ***** or connect any equipment providing external access to the system (for example, a modem) without the proper *****uthorization.

***** ***** XYZ's system provide support the office's medical research, community service and administrative work ***** should not be used ***** any other purpose. No person will utilize the system for private purpose, including private commercial, political or religious purposes. It is acknowledged ***** there ***** be some use of communications ***** personal purposes, but this must *****ly not interfere with obligations owed by the office or third parties or ********** breach any part of this *****.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids ***** represent that ***** user can ***** linked and made responsible for ***** actions; *****s must have authorization from ***** system owner; users must sign a statement indicating that they have been informed and ***** they understand this policy; when in breach ***** ***** policies, ***** can be immediately removed or have their access rights amended as


Download entire paper (and others like it)    |    Order a one-of-a-kind, custom-written paper

© 2001–2017   |   Research Paper about Security Policy of a Dental Office Introduction: Information Technology Security   |   Thesis Paper Examples