Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This security policy provides clear direction ***** support for security. XYZ is the owner of this policy and is *****refore responsible for the review and enforcing of controls authorized by the *****.

***** AND DEFINITIONS: Access Privileges will be unique for each user and determined by ***** system administrators; Account refers to access privileges assigned to a user; E-mail is the electronic mail and exchange of in*****mation; Data Ownership is any data stored on the *****'s computers - it is owned by *****'s office; Web Server is the web server operated by to office to access the internet and external data sources; Information ***** represents the attempt to preserve confidentiality, integrity and availability of ***** ***** Owner ***** XYZ who is responsible for policy maintenance and review

SYSTEM - ***** policy covers all freestanding *****, networked computers, timeshared computers, servers or terminals owned, leased or ***** by *****'s Dental *****. This also entails ***** netw*****k or networked component that links the **********e mentioned devices with any external network or network component including all peripherals, software, data and media associated with ***** devices; telephones, modems, fax machines, recording devices or o*****r devices forming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not ***** to capture or decode passwords or access codes, read ***** capture any data without authority or attempt to create ***** install ***** form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or ***** equipment, software ***** data. User ***** not attach any unauthorised device or signal ***** the system or connect any ***** providing ***** access to the system (f***** example, a modem) ***** the proper *****uthorization.

***** ***** XYZ's system provide support the office's medical research, community service ***** administrative work and should not be used for any other purpose. No person will utilize the system ***** private purpose, including private commercial, political or religious *****s. It is acknowledged that there will ***** some use of communications for personal purposes, but this must clearly not interfere with obligations owed ***** the office or third parties ***** o*****rwise breach any part of this policy.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids ***** represent that any user can be linked and made responsible for ***** actions; ********** ***** have authorization from the ***** owner; users must sign a statement indicating that they have been informed and that they understand this *****; when in breach ***** these policies, ***** can be immediately removed or ***** their ***** rights amended as


Download complete paper (and others like it)    |    Order a brand new, custom paper

Other topics that might interest you:

© 2001–2016   |   Research Paper about Security Policy of a Dental Office Introduction: Information Technology Security   |   Book Reports Models