Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2 3 4 5 6
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental ***** will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This ***** policy provides clear direction and support for security. XYZ is the owner of this policy and is therefore responsible for the review and enforcing of controls authorized by the *****.

TERMS AND DEFINITIONS: Access Privileges will be unique for each user and determined by the system administrators; Account refers to access privileges assigned to a user; E-mail is ***** electronic mail and exchange ***** in*****mation; Data Ownership is any data stored on the office's computers - it is owned by ***** office; Web Server is ***** web server operated by to office ***** ***** the internet and external data sources; Information Security represents ***** attempt to preserve confidentiality, integrity ***** availability of data ***** Owner is ***** who is responsible for policy maintenance and review

SYSTEM - ***** policy covers all freestanding computers, networked *****, timeshared computers, servers or terminals owned, leased ***** operated by XYZ's Dental Office. Th***** also entails ***** network or networked component ***** links the before mentioned devices with any external network or network component including ***** peripherals, software, data and media associated with ***** devices; telephones, modems, fax machines, recording devices or o*****r devices forming part of the office's voice network. Users cannot ***** to circumvent any system security, network security or any protection or resource restrictions placed on *****ir account. The users must not attempt to capture or decode passwords or access codes, read ***** capture any data without authority or ***** to create ***** install any form of malicious software (for example worms, viruses, sniffers) which may affect computing or ***** equipment, ***** or data. User must not attach any unauthorised device or signal to the ***** or connect any ***** providing ***** access to ***** system (for example, a modem) ***** the proper authorization.

GENERAL ***** XYZ's system provide support the office's medical research, community service ***** administrative work and should ***** be used ***** any other purpose. No person will utilize the system for private purpose, including private commercial, political or religious *****s. It is acknowledged that there ***** ***** some use of communications for personal purposes, but this must clearly not interfere with obligations owed by the office or third *****ies ***** *****wise breach any part of this *****.

ACCESS - Access to ***** system is controlled by the formal user registration process and includes using unique **********ids which represent that ***** user can be linked and made responsible for their actions; users ***** have authorization from the system owner; ***** must sign a statement indicating ***** they ***** *****en informed ***** that they understand this policy; when in breach of these *****, users can be immediately removed or have their access rights amended as


Download complete paper (and others like it)    |    Order a one-of-a-kind, custom-written paper

© 2001–2018   |   Term Paper on Security Policy of a Dental Office Introduction: Information Technology Security   |   Thesis Papers Model