Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and st*****ards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that ***** facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction ***** support for security. XYZ is the owner of this policy and is therefore responsible for the review and enforcing of controls authorized by the *****.

***** AND DEFINITIONS: Access Privileges will be unique for each user and determined by the system admin*****trators; Account refers to access privileges assigned to a user; E-m*****il is ***** electronic mail and exchange ***** in*****mation; Data Ownership is any data stored on the *****'s computers - it is owned by ***** office; Web Server is ***** web server operated by to office to ***** the internet and external data sources; Information Security represents the attempt ***** preserve confidentiality, integrity and availability of ***** Policy Owner is XYZ who is responsible for policy maintenance and review

SYSTEM - Th***** policy covers all freestanding computers, networked *****, timesh*****d computers, servers or terminals owned, leased ***** operated by *****'s Dental *****. This also entails ***** network or *****ed component ***** links the be*****e mentioned devices with any external network or netw*****k component including all peripherals, software, data and media associated with these devices; telephones, modems, fax machines, recording devices or other devices f*****ming part of the office's voice network. Users cannot ***** to circumvent any system security, network security or any protection ***** resource restrictions placed on *****ir account. The users must not attempt to capture or decode passwords or access codes, read or ***** any data without auth*****ity or attempt to create ***** install any form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or network equipment, software or data. User must not attach any unauth*****ised device or signal to the ***** or connect any equipment providing ***** access to the system (f***** *****, a modem) ***** the proper authorization.

GENERAL ***** XYZ's system provide support the office's medical research, community service ***** administrative work and should ***** be used for any o*****r purpose. No person will utilize the system ***** private purpose, including private commercial, political ***** religious *****s. It is acknowledged that there ***** ***** some use of communications for personal purposes, but this must clearly not interfere with obligations owed ***** the office or third parties or otherwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal *****r registration process and includes using unique user-ids which represent that ***** user can be linked and made responsible for *****ir actions; ********** must have authorization from the system owner; users must sign a statement indicating that they ***** been informed and ***** they understand this policy; when in breach of these policies, users can be immediately removed or have their ***** rights amended as

. . . . [END OF THESIS PAPER PREVIEW]

Download complete paper (and others like it)    |    Order a brand new, custom-written paper

© 2001–2017   |   Research Paper about Security Policy of a Dental Office Introduction: Information Technology Security   |   Book Reports Sample