Premium Essay

Security and Maintenance Plan

In:

Submitted By anonymousangel32
Words 370
Pages 2
Central Arkansas Family Doctor’s PLLC Security and Maintenance Plan

Overview
Central Arkansas Family Doctor’s IT personnel will be trained for the management, planning, quality testing, so that future renovation and implementation of new hardware, software, network updates , network security methods, and practices to sustain a strong, compatible, and reliable network communication between all three of the medical facilities.

Cost
Regulatory cost for planning, installing, and designing , including employee training can be found within the Cost analysis and Training Plan.

Security
Central Arkansas Family Doctors Clinic will be responsible for securing the Central office, and management of security.

Standard Operation/Business practices
Backup of files and database storage will take place at the central office every 24 hours.
The system will automatically reboot and backup files at 3am every morning.
Configuration management, problem report management, customer support, lifecycle testing, risk identification, data sharing and risk mitigation will be will be handled by CAFD IT personnel, and network management.

Roles and Responsibilities
IT management at the Little Rock Central Office will be responsible for network maintenance, Security updates, help desk support, documentation training and security operations. CAFD clinic will rely on experienced network engineers, current and future IT staff as well as contract employee’s and interns. Office managers will be responsible for reporting power outages, theft, willful obstruction, and any damage related with networking equipment.

Business Owner Management
Every employee, customer, and stakeholder will be informed about maintenance and security via email. The network administrators plan for backups, and maintenance keep the network safer, without inconveniencing customer and

Similar Documents

Free Essay

Security and Maintenance Plan

...Security and Maintenance Plan Section Overview > Section 1 Operating Procedures > Section 2 Security and Maintenance Plan > Section 3 Policy > Section 4 Security & Maintenance Schedule > Section 5 Security & Maintenance Checklist Section One Operating Procedures This plan constitutes the “Standard Operating Procedures” relating to physical, cyber, and Procedural security for all (Utility) for all server rooms. It contains a comprehensive overview of the (Utility)’s security program, and in some sections, makes reference to other relevant plans and procedures. Security personnel, operators, and selected server personnel shall be familiar with the information and procedures associated with this Security Plan. Section 2 Security and Maintenance Plan Purpose This policy is to be used as a reference when issuing keys within the (Utility). It will also Explain our policy for returning keys, reporting lost or stolen keys, the use of unauthorized Duplicate keys and loaned keys. The key system will be entered into the computer-based Key Control Program for on-going Maintenance and will be maintained by the Key Administrator. The Facilities Department will program cores and cut keys, and the Key Administrator will issue keys. 6. Issuing Authority – Keys will be authorized in writing for issuance to employees of the (Utility) by one of the following individuals: a) General Manager b) Executive Managers or their designees c) Department...

Words: 1848 - Pages: 8

Premium Essay

Software Failure

...activities involved in the development, integration and testing of information system? (10 Marks) b) What entails Implementation and Disposition Phases of the system development? (4 Marks) c) Discuss the differences between Implementation and Disposition phases based on tasks and activities. (10 Marks) d) What are the activities associated with the operations and maintenance phase of systems development. (8 Marks) e) Identify and discuss the types of maintenance. (8 Marks) f) Compare and contrast roles and responsibilities during development phase and integration and testing phases of systems development. (10 Marks) Lecturer: Nick Gachui. Date Due: August 2014.   a) What are the tasks and activities involved in the development, integration and testing of information system? i. Development  Code and Test Software Code each module according to established standards.  Integrate Software Integrate the software units and software components and test in accordance with the integration plan. Ensure that each module satisfies the requirements of the software at the conclusion of the integration activity.  Conduct Software Qualification Testing. Conducting qualification testing in accordance with the qualification requirements for the software item. Ensure that the implementation of each software requirement is tested for compliance. ii. Integration  Conduct System Qualification...

Words: 2123 - Pages: 9

Free Essay

Sec 402 Wk 8 Assignment 2 Implementing Network

... Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures Write a four to five (4-5) page paper in which you: 1. Create an information flow diagram, using Visio or Dia, which: a. Illustrates how remote users will securely connect to the government agency’s network. b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server. Note: The graphically depicted solution is not included in the required page length. 2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list: a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items. b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment. 3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you: a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan. b. Indicate specific activities, personnel / resources required, and frequency of execution. More Details hidden... Activity mode aims to provide quality study...

Words: 832 - Pages: 4

Free Essay

Capstone

...Security Maintenance Plan: 1. Introduction: Dr. Joe Bob’s Family Practice is in need of an offsite security maintenance plan to maintain the highest level of security for patient medical files in case of an emergency, disaster, or critical intrusion on the network system. Techs Rx, Inc. has agreed with Dr. Joe Bob’s Family Practice, to put in place a security maintenance plan for Dr. Joe Bob’s Family Practice. This plan will involve an offsite data storage company by the name of First Choice Data Management, Inc. The security maintenance plan will provide offsite storage of electronic medical records of all patients and include an onsite inspection by a representative of First Choice Data Management. The representative will inspect the health and condition of all critical files of the network, and perform the necessary operations to correct all deficiencies of the file system. Tech Rx, Inc will be responsible for contacting First Choice Data Management, Inc. and setting up Dr. Joe Bob’s Family Practice with the first initial request to the offsite storage facility. This will be done only one time, and only for the first initial set up. After the first initial setup, a manager from Dr. Joe Bob’s Family Practice will be responsible for any transactions thereafter. 2. Budget/Cost: Techs Rx, Inc. recommends that Dr. Joe Bob’s Family Practice contracts the services of a certified and technically competent IT consulting firm to maintain all critical...

Words: 2254 - Pages: 10

Premium Essay

Health Care Security

...PART A 1. Incident Reporting: a. The types of incidents that should be reported would be larceny, damage to property, breaking/entering, suspicious person, trespass, disturbance, missing person, patient restraint, assault, domestic, visitor restriction, auto accident, personal injury, alarm activated/reset, maintenance, lost and found. There is also the issue of workplace violence, which has increased and has become a serious issue in health care. Our health care workers are at higher risk for experiencing violence than workers in any other industry. Workplace violence includes any incident at the workplace that results in physical or psychological injury to someone, damage to property, or loss of productivity (Sells, 2000, p. 338). b. The expectation for reporting incidents in the workplace is to make the management aware so that they can be committed to the safety of their employees and also to set expectations regarding what is acceptable and unacceptable behaviors. Also, as employees they must do their parts in properly reporting the violent incidents to management. The security team will provide the employee with the incident report form or reporting tool. This form can also be used by external sources such as, police if they need to do a follow on the situation. The documentation will provide factual detail of what happen if the person is prosecuted or for other legal reasons. Mandatory reporting is required by some facilities, and that include incidents...

Words: 5467 - Pages: 22

Premium Essay

Its410 Portfolio

...company wide database system needs to be implemented. We are currently running a Microsoft Access database system in each department however these databases are not able to communicate with each other and the IT department has no solution in place for database maintenance and backup. It is my recommendation that the company move to a more secure, robust, centralized database server company wide. The database system recommended is Microsoft SQL Server 2005 for its ability to be a central database to handle, customer information, widget inventory, company payroll, and other sensitive data. Our current process requires users to open separate databases to retrieve information or call other users to obtain information out of another database. This current setup is not only inefficient it is also not secure and provides not backup for disaster recovery. I have created a comprehensive plan that will outline all of the requirements for upgrading our systems to Microsoft SQL Server 2005. The following will be addressed: * Installation requirements for SQL Server 2005 * Databases being used * Data types needed * Database Objects * Mail * Security * Database Protection * Availability * Maintenance and monitoring The first step in transitioning over to a Microsoft SQL Server 2005 system will be to prepare our server systems and make sure they meet the minimum requirements for installing. The minimum requirements for Microsoft SQL Server 2005 are...

Words: 4256 - Pages: 18

Premium Essay

Management Plan

...Property name: ________________ Address: ________________ Owner: ________________ MANAGEMENT PLAN TEMPLATE (This template is intended to serve as a helpful tool. HTF Contractors may elect to use it or not.) TABLE OF CONTENTS (List topics & page numbers.) I. MANAGEMENT (ON-SITE & OFF-SITE) • What management functions are performed on-site and by whom? (Property management company or sponsor organization?) • What management functions are performed off-site and by whom? • List property management staffing positions, and describe the roles and responsibilities of each position. • When and how is the property management company evaluated? • When and how is the management plan updated? • How are staff informed of contractual and management plan requirements? • Describe the property performance standards, including vacancy rates, rent collection ratio, turnover timeframes, etc. II. ACCOUNTING & RECORDKEEPING PROCEDURES • What records are kept on-site? • What records are maintained off-site? • Describe the checks and balances in your accounting system and the fiscal oversight. III. MARKETING • Describe procedures to ensure compliance with all applicable fair housing laws. • What strategies are used to reach eligible households? • If special needs households are served, what is the marketing strategy to reach that population? IV. LEASING PROCEDURES • How is household income...

Words: 647 - Pages: 3

Premium Essay

Community Observation

...Auxiliary services such as transportation, maintenance, and security, provide an important component in the operation of a school district. These services provide students, district staff, and the community with a safe and secure learning environment. In interviewing the directors from these three service areas, I learned their responsibilities and duties; their day to day activities, and the federal and state laws which regulate their operation. I learned that these services provide vital resources and if not provided, can impact the support of the instructional environment which a school district provides. The director of transportation, Mr. Carter oversees the maintenance of all district owned vehicles and must ensure the safe and efficient...

Words: 1356 - Pages: 6

Free Essay

Riordan Web Based Plan

...Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that followThe following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan. Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online ProcessingRiordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed...

Words: 2477 - Pages: 10

Premium Essay

Enterprise Security Plan Cmgt/430

...Enterprise Security Plan CMGT/430 Enterprise Security Plan This Enterprise Security Plan (ESP) for Riordan Manufacturing employees the levels of security required to protect the network and resources utilized to communicate. It is intended purpose is to formulate a means to counterattack against security risk from potential threat. The ESP servers as a way to identify risks and to ensure a contingency plan is in place to protect the availability, integrity, and confidentiality of the Riordan organization's information technology (IT) system. The ESP benefits all employees however it is most beneficial to information resource managers, computer security officials, and administrators as it is a good tool to use for establishing computer security policies. The ESP in its basic form is a systematic approach to addressing the company’s network, its capability, the threats it is susceptible to and a mitigation strategy that addresses those threats if and should they occur. In addition to addressing the threats the ESP will also make provisions for establishing contingency plans in case of a disaster. The information covered by this plan includes all information systems, IT resources, and networks throughout the Riordan global organization owned or operated by employees in the performance of their job duties, whether written, oral, or electronic. Further it establishes an effective set of security policies and controls required to identify and mitigate vulnerabilities that...

Words: 2085 - Pages: 9

Premium Essay

Est1 Task 1

...implementation of the EHRS system, support and maintenance will be required on a regular basis. The current and future workflows consist of a backup plan, in the event problems might arise. Over the next two years there will be ongoing training, maintenance, IT support and system updates. The support and maintenance after the implementation will yield improved productivity, it will enhance billing and collection, quality and coordination of care, and workflow will be streamlined. Job-specific training will be provided by specially trained “super-users” as coaches. Training will be continuous because new employees and contract employees who will need to be trained, and the training plan must account for them. The EHR system is also constantly changing and being updated, so continuing education and refresher courses must be available to system users. The staff will be trained by superusers, superusers are specialists in healthcare systems. Ideally, they have...

Words: 422 - Pages: 2

Free Essay

Group Study

...our spirit all aided us to surmount difficulties during doing the research and show our ability confidently as well. We are also indebted to HUCFL Second - year English students for their cooperation to complete our questionnaires and their active contributions to suggest feasible solutions for our research topic. Last but not least, we can’t help mentioning the remarkable efforts of our group members. They conducted the research to the best of their ability and worked very hard to perfect the research as well as possible. Their merits are thankworthy. ABSTRACT Our research was carried out to investigate the attitude of HUCFL Second- year English students toward the school facility protection and some solutions for school facility maintenance. Due to the important of school facilities in the cause of HUCFL’s education- training and its status quo, we carried out the small- scale research to examine main causes of HUCFL’s facility damage. We delivered 20 questionnaires randomly to the Second – year English students and we thereafter analyzed the data collected from those questionnaires. Based on the research findings, we had the clear understanding about the concerned reality of HUCFL’s school facilities and the close relationship between the lack of students’ awareness and the degraded quality of the facilities. What is more, we realized that the students’ responsibility for protecting the school facilities is the main...

Words: 3960 - Pages: 16

Premium Essay

Security Plan

...Your Company Security Plan for Unclassified Data Version 1.3 March 20, 2012 Developed By: Your Committee Committee Your Company Important Disclaimer: The Aerospace Industries Association of America, Inc. (“AIA”) has no intellectual property or other interest in this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data. By developing this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data Plan and making it freely available to anyone, AIA assumes no responsibility for this Guideline’s content or use, and disclaims any potential liability associated therewith. Executive Overview From time to time an AIA member company may be requested to provide the DOD, a prime contractor or an industry partner an Information Technology Security Plan for unclassified data. This security plan could be required at the enterprise, program or application level depending on the unique requirements of the request. This request might be challenging for those members that have never been required to provide such a document. This “Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data” provides a template and guidance to assist member companies in the development of a security plan to meet their customers or partners needs. Please keep in mind that this document is provided as a guideline and not a mandatory standard. AII member companies are encouraged to use this guideline. Use...

Words: 2097 - Pages: 9

Premium Essay

Electronic Library Card Catalog System

...Project Plan For NORSU Electronic Library Card Catalog System Researchers: Project Leader: Medura, Jess Linguaje, Ed Lorence Los Baños, Marilyn Maquiling, Marres Contents 1. Overview…………………………………………………………………………………………………………………………...3 2. Goals and scope………………………………………………………………………………………………………….….….4 2.1 Project Goals…………………………………………………………………………………………………………4 2.2Project Scope…………………………………………………………………………………………..……….……5 2.2.1 Included………………………………………………………………………………………………………….….5 2.2.2 Excluded .................................................................................................................5 3. Organization……………………………………………………………………………………………………………………….6 3.1 Organizational Boundaries and Interfaces…………………………………………………………….…...6 3.1.1 Resource Owners……………………………………………………………………………………………….6 3.1.2 Receivers…………………………………………………………………………………………………….……..6 3.1.3 Cross Functions…………………………………………………………………………………………………..7 3.2 Project Organization…………………………………………………………………………………………………..8 3.2.1 Project Manager…………………………………………………………………………………………….….8 3.2.2 Project Team……………………………………………………………………………………………………..9 4. Schedule and Budget…………………………………………………………………………………………………………10 4.1 Work Breakdown Structure…………………………………………………………………….…………...11 4.2 Schedule and Milestone………………………………………………………………………….……………12 4.3 Budget.......................................................................................................................13 4.4 Development Process…………………………………………………………………………………………...

Words: 4136 - Pages: 17

Free Essay

Emergency Management Plan Chemical Spill/Release

...University | Emergency Management Plan | Chemical Spill/Release | | Erik Gohl | 11/7/2011 | | Purpose Events which interfere with the normal operations of Hennepin Technical College (HTC) are unavoidable. The purpose of this document is to explain the actions, roles, and responsibilities that are to be taken by individuals and departments in the event of a spill or release of a hazardous chemical or waste. (Homeland Security, 2011) Emergency Management Team The Emergency Management Team (EMT) shall consist of the following individuals: College President College Vice President(s) College Environmental Health and Safety (EHS) Officer Director of Security Maintenance Supervisor Administrator on Duty (AOD) Lead Custodian on Duty Faculty/Staff Emergency and Non-Emergency Hazardous Chemical and Waste Spill/Release A non-emergency spill/release is one of no more than five gallons where the substance can be absorbed, neutralized or otherwise controlled at the time of the release by employees in the immediate area and presents no hazard to people or the environment. The staff or faculty member for, and familiar with, the chemical or waste should attend to non-emergency releases. The front desk should be notified by dialing “0” if assistance is needed in locating the Maintenance Supervisor or maintenance staff. All recovered materials shall be assumed to be, and treated as, a hazardous waste. (HTC Emergency Plan, 2005) An emergency spill/release...

Words: 1382 - Pages: 6