Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


Copyright Notice

Security Policy of a Dent*****l Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved ***** policy reflects the rapidly changing technologies within the dental office and aims ensure that ***** facility is properly protected and all security objectives are met. This security policy provides clear direction and support for security. XYZ is the owner of this policy and is *****re*****e responsible for the review and enforcing of controls authorized by ***** policy.

***** AND DEFINITIONS: Access Privileges will ***** unique for each user and determined by the system admin*****trators; Account refers to access privileges assigned to a *****; E-mail is the electronic mail and exchange ***** information; Data Ownership is any data stored on the office's computers - it is owned by ***** office; Web Server is the web server operated by to office ***** access the internet and external data sources; ***** Security represents ***** attempt to preserve confidentiality, integrity ***** availability of ***** ***** Owner is XYZ who is responsible for policy maintenance and review

SYSTEM - ***** policy covers all freestanding computers, networked *****, timesh*****d computers, servers or terminals owned, leased or ***** by *****'s Dental Office. Th***** also entails any network or *****ed component ***** links the be*****e mentioned devices with any external network or network component including ***** peripherals, software, data and media associated with ***** devices; telephones, modems, fax machines, recording devices or other devices f*****ming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection ***** resource restrictions placed on *****ir account. The users must not attempt to capture or decode passwords or access codes, read ***** ***** any data without authority or attempt to create ***** install ***** form of malicious s*****tware (for example worms, viruses, sniffers) which may affect computing or ***** equipment, software or data. User must not attach any unauth*****ised device or signal ***** the system or connect ***** equipment providing external access to the system (f***** *****, a modem) without the proper authorization.

***** - XYZ's system provide support the o*****fice's medical research, community service and administrative work and should not be used for any other purpose. No person will utilize the system for private purpose, including private commercial, political or religious purposes. It is acknowledged that there ***** be some use of communications ***** personal purposes, but this must clearly not interfere with obligations owed ***** the office or third ********** or otherwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids which represent that ***** user can ***** linked and made responsible for their actions; *****s ***** have authorization from the system owner; users must sign a statement indicating that they have been informed ***** that they understand this policy; when in breach ***** these policies, users can be immediately removed or ***** their access rights amended as

. . . . [END OF RESEARCH PAPER PREVIEW]

Download complete paper (and others like it)    |    Order a one-of-a-kind, custom-written paper

Other topics that might interest you:

© 2001–2016   |   Term Papers about Security Policy of a Dental Office Introduction: Information Technology Security   |   Term Papers Models