Essay - Security Policy of a Dental Office Introduction: Information Technology Security...


Copyright Notice

Security Policy of a Dent*****l Office

INTRODUCTION: Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and st*****ards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This ***** policy provides clear direction and support for security. XYZ is the owner of this ***** ***** is *****re*****e responsible for the review and enforcing of controls authorized by the policy.

***** AND DEFINITIONS: Access Privileges will ***** unique for each user and determined by the system administrators; Account refers to access privileges assigned to a *****; E-m*****il is the electronic mail and exchange of information; Data Ownership is any data stored on the *****'s computers - it is owned by ***** office; Web Server is the web server operated by to office ***** ***** the internet and external data sources; Information Secur*****y represents the attempt to preserve confidentiality, integrity and availability of data ***** Owner is ***** who is ***** for policy maintenance and review

SYSTEM - ***** policy covers all freestanding computers, networked computers, timeshared computers, servers or terminals *****, leased or operated by XYZ's Dental *****. This also entails any network or networked component that links the before mentioned devices with any external network or netw*****k component including all peripherals, software, ***** and media associated with *****se devices; telephones, modems, fax machines, recording devices or other devices f*****ming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on ********** account. The users must not ***** to capture or decode passwords or access codes, read ***** capture any data without authority or attempt to create ***** inst***** ***** form of malicious ***** (for example worms, viruses, sniffers) which may affect computing or netw*****k equipment, s*****tware or data. User must not attach any unauth*****ised device or signal to the ***** or connect ***** equipment providing ***** access to the system (for example, a modem) ***** ***** proper *****uthorization.

***** ***** XYZ's system provide support the office's medical research, community service and administrative work and should not be used for any o*****r purpose. No person will utilize the system ***** private purpose, including private commercial, political ***** religious purposes. It is acknowledged ***** there ***** ***** some use of communications for personal purposes, but this must clearly not interfere with obligations owed ***** the office or third parties ***** otherwise breach any part of this *****.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids which represent that ***** user can be linked and made responsible for their actions; *****s must have authorization from the system owner; users must sign a statement indicating that they have been informed ***** that they understand this policy; when in breach ***** these *****, users can be immediately removed or ***** ***** ***** rights amended as

. . . . [END OF ESSAY PREVIEW]

Purchase a full, non-asterisked paper below    |    Pay for a unique, customized paper

100% Complete, University Essays & Thesis Papers to Purchase

© 2001–2014   |   Book Report about Security Policy of a Dental Office Introduction: Information Technology Security   |   Thesis Papers Samples