Security Policy Dr. Fossett's Dental Office Term Paper

Pages: 3 (1254 words)  ·  Bibliography Sources: 0  ·  File: .docx  ·  Level: College Senior  ·  Topic: Education - Computers

Security Policy of a Dental Office

Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the rapidly changing technologies within the dental office and aims ensure that the facility is properly protected and all security objectives are met. This security policy provides clear direction and support for security. XYZ is the owner of this policy and is therefore responsible for the review and enforcing of controls authorized by the policy.

Access Privileges will be unique for each user and determined by the system administrators; Account refers to access privileges assigned to a user; E-mail is the electronic mail and exchange of information; Data Ownership is any data stored on the office's computers - it is owned by XYZ's office; Web Server is the web server operated by to office to access the internet and external data sources; Information Security represents the attempt to preserve confidentiality, integrity and availability of data Policy Owner is XYZ who is responsible for policy maintenance and reviewDownload full Download Microsoft Word File
paper NOW!

TOPIC: Term Paper on Security Policy Dr. Fossett's Dental Office Assignment

SYSTEM - This policy covers all freestanding computers, networked computers, timeshared computers, servers or terminals owned, leased or operated by XYZ's Dental Office. This also entails any network or networked component that links the before mentioned devices with any external network or network component including all peripherals, software, data and media associated with these devices; telephones, modems, fax machines, recording devices or other devices forming part of the office's voice network. Users cannot attempt to circumvent any system security, network security or any protection or resource restrictions placed on their account. The users must not attempt to capture or decode passwords or access codes, read or capture any data without authority or attempt to create or install any form of malicious software (for example worms, viruses, sniffers) which may affect computing or network equipment, software or data. User must not attach any unauthorised device or signal to the system or connect any equipment providing external access to the system (for example, a modem) without the proper authorization.

GENERAL - XYZ's system provide support the office's medical research, community service and administrative work and should not be used for any other purpose. No person will utilize the system for private purpose, including private commercial, political or religious purposes. It is acknowledged that there will be some use of communications for personal purposes, but this must clearly not interfere with obligations owed by the office or third parties or otherwise breach any part of this policy.

ACCESS - Access to the system is controlled by the formal user registration process and includes using unique user-ids which represent that any user can be linked and made responsible for their actions; users must have authorization from the system owner; users must sign a statement indicating that they have been informed and that they understand this policy; when in breach of these policies, users can be immediately removed or have their access rights amended as needed.

USER PASSWORD Management - Passwords will be used to authenticate user's identity and to establish system accountability. Passwords are intended to protect the system's resources and data from unauthorized access. Appropriate password selection enhances the security of the user-id and password combination, thus users must follow good security practices when choosing passwords.

PASSWORD SELECTION - Passwords must be at least seven characters in length and cannot be a dictionary-based word or a phone number type combination. Passwords must contain at least 1 number and 1 non-alphabetic character such as "% or *." Passwords must remain confidential at all times and cannot be shared with peers of subordinates. Users are responsible to avoid any written record of their password unless this written record can be stored securely. Employees are required to… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Download full paper (3 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Security Policy Term Paper

Security Policy and Risk Strategy Essay

Dr. King's Letter From Birmingham Jail Term Paper

Dr. Kings Leadership Style Research Paper

Security Policies Given the Highly Sensitive Nature Essay

View 200+ other related papers  >>

How to Cite "Security Policy Dr. Fossett's Dental Office" Term Paper in a Bibliography:

APA Style

Security Policy Dr. Fossett's Dental Office.  (2005, February 14).  Retrieved November 26, 2021, from

MLA Format

"Security Policy Dr. Fossett's Dental Office."  14 February 2005.  Web.  26 November 2021. <>.

Chicago Style

"Security Policy Dr. Fossett's Dental Office."  February 14, 2005.  Accessed November 26, 2021.