Essay - Security Policy of a Dental Office Introduction: Information Technology Security...

1 2 3 4 5 6 7 8 9 10
Copyright Notice

Security Policy of a Dental Office

INTRODUCTION: Information Technology Security for XYZ's Dental ***** will be achieved by implementing these controls, policies, procedures and st*****ards. This approved ***** policy reflects the rapidly changing technologies within the dental office and aims ensure that ***** facility is properly protected and all security objectives are met. ***** ***** policy provides clear direction and support for security. XYZ is the owner of this policy and is *****refore responsible for the review and enforcing ***** controls authorized ***** ***** *****.

***** AND DEFINITIONS: Access Privileges will ***** unique for each user and determined by the system administrators; Account refers to access privileges assigned to a *****; E-mail is ***** electronic mail and exchange of information; Data Ownership is any data stored on the *****'s computers - it is owned by ***** office; Web Server is ***** web server operated by to office ***** ***** the internet and external data sources; ***** Security represents the attempt to preserve confidentiality, integrity and availability of ***** ***** Owner ***** XYZ who is responsible for policy maintenance and review

SYSTEM - This policy covers all freestanding *****, networked computers, timesh*****d computers, servers or terminals owned, leased or operated by XYZ's Dental Office. This also entails any netw*****k or networked component that links the before mentioned devices with any external network or netw*****k component including all peripherals, software, data and media associated ***** ***** devices; telephones, modems, fax machines, recording devices or other devices forming part of the office's voice network. Users cannot ***** to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read ***** ***** any data without authority or ***** to create ***** inst***** ***** form of malicious s*****tware (for example worms, viruses, sniffers) which may affect computing or netw*****k equipment, software or data. User must not attach any unauthorised device or signal ***** the system or connect any ***** providing external access to ***** system (for *****, a modem) without the proper authorization.

***** ***** XYZ's system provide support the office's medical research, community service and administrative work and should ***** be used ***** ***** other purpose. No person will utilize the system for private purpose, including private commercial, political or religious *****s. It is acknowledged ***** there ***** be some use of communications for personal purposes, but this must *****ly not interfere with obligations owed ***** the office or third ********** or *****wise breach any part of this policy.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique *****-ids which represent that ***** user can ***** linked and made responsible for their actions; *****s must have authorization from the system owner; users must sign a statement indicating that they have been informed ***** that they understand this *****; when in breach ***** these *****, ***** can be immediately removed or ***** ***** ***** rights amended as


Download full paper (and others like it)    |    Order a one-of-a-kind, custom-written paper

© 2001–2017   |   Research Papers about Security Policy of a Dental Office Introduction: Information Technology Security   |   Book Report Example