Preview

2.7 Remote Access Policy Case Study

Good Essays
Open Document
Open Document
827 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
2.7 Remote Access Policy Case Study
2.7 Remote Access Policy
2.7.1 It is the responsibility of all Meditech employees, contractors and vendors with remote access privileges to Meditech ‘s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Meditech.
2.7.2 Secure remote access must be strictly controlled. Control will be enforced by two factor authentication.
2.7.3 Vendor accounts with access to the company network will only be enabled during the time period it is required and will be removed or disabled once it is no longer required.
2.7.4 Remote access connection will be setup to be disconnected automatically after 30 minutes of inactivity
2.7.5 All hosts that are connected to Meditech internal networks
…show more content…
To ensure that security risks are identified and controlled, such access, whether on site or remote, must be managed in accordance with the “Method Statement - Managing third party access”.
2.8.4 Third parties might occasionally require physical access to areas where Meditech IT equipment is located such as data centres and wiring centres. Such access must be agreed in advance with the relevant Meditech manager and is subject to formal risk assessment. Access controls must be used and logs maintained.
2.8.5 For any third party access, Meditech and third party must agree in advance a code of practice and non-disclosure agreement to protect University information and working practices.
2.8.6 Third party access arrangements will be reviewed on an annual basis to ensure information security risks are being managed effectively and validate that access is still
…show more content…
The making and taking of personal calls is allowable provided users keep these to a minimum.
2.9.2 Users must respect the privacy of others at all times and not attempt to access calls where the user is not the intended recipient or log into voice mail accounts that the user is not expressly authorised to access.
2.9.3 Meditech mobile phones devices are to be used for work-related purposes. A taxable benefit will not be treated as arising where any private use is incidental.
2.9.4 Mobile phone devices are assigned to a position or function and not to individual; however the post holders name is supplied to the mobile phone device supplier.
2.9.5 The mobile phone device may only be used by an assigned Meditech employee and must not be used by any other Meditech employees or third parties without the prior authorisation of the local mobile phone device administrator.
2.9.6 Users must ensure that they use Meditech mobile phone devices at all times in a manner which is lawful, ethical and efficient. Meditech may withdraw a mobile phone device from any employee who it believes is not complying with this policy or who misuses a mobile phone device in any

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bus 505

    • 490 Words
    • 2 Pages

    2. What might the implications of a decision about purchasing PDA devices for physicians it this medical center?…

    • 490 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    Mobility: The ability to access information anywhere in your practice and not be limited to fixed stations offers significant advantages, in particular within your examination rooms where you may want to use a wireless tablet or laptop and carry it with you from room to room.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Final Exam Paper

    • 645 Words
    • 3 Pages

    You may use the clients phone for personal use to inform a friend that you need to stay longer…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 107

    • 1747 Words
    • 7 Pages

    Modern telephone systems offer a variety of features. Some are essential communication tools; other features that people will likely use on a more discretionary basis. One common and frequently used feature of today’s telephone systems is voice mail. If you can’t take am incoming call, voice mail allows callers to record messages which you can access at your convenience. An auto-attendant feature, useful for businesses, consists of a centralized recorded message to greet callers and direct their calls to the right numbers. You can use a phone systems conference – calling feature to allow a number of people to participate in a call at the same time. Each system allows different numbers of people to participate, and all remain on the call until they hang up. Telephone systems offer various features for managing incoming calls, one useful feature is call transfer, which allows me to transfer calls from my number to another number. Another much used feature is call holding if you are on the phone and receive an incoming call, you can put the first call on hold and attend to the second call. One more feature within the trust is call mute/secrecy, with allows me to mute the call so that the person on the other end of the phone can’t hear what I’m discussing, which helps with confidentiality because they can’t hear client or patient information.…

    • 1747 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    References: Erbetta, J. (1999, March). Security issues in telemedicine. Journal of telemedicine and telecare, 5(1), 123.…

    • 608 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NR 361 Week 7 DQ 1 Use of Personal Communication Devices in Patient Care Settings…

    • 251 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It 255 Final Project

    • 1588 Words
    • 7 Pages

    Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure effective telephone communications, employees should always use the approved greeting and speak in a courteous and professional manner. Please confirm information received from the caller, and hang up only after the caller has done so. Computer and E-mail Usage Computers and other media of electronic communications ("Media") are the property of the Firm which has a legitimate business interest in the proper utilization of its property. Therefore, any use of the Firm's property, and any electronic communications sent or received, may be monitored…

    • 1588 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Nut Task2

    • 1026 Words
    • 5 Pages

    Using computerized management systems in this facility would increase quality of care by allowing us to access patient data from any location, view that data in real time, receive auto alerts for new and abnormal results, protect the security of our patients by having user defined access. As far as the patient care part of it, there would be less risk of medication and transcription errors because of the bar code scanning, care plans would be established and on the system so they could be enforced and patient care would be within the patient’s chart. These things would all result in saving time and being more efficient, which would increase quality of care. (Meditech, 2010)…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The goal of this project is to arrange for all employees to have a smartphone. Guidelines of this project are to save money and before a deadline of two-four weeks. The project management team will work as quickly as possible to gather estimates from various cell phone providers. Once all the estimates are completed we will recommend and wait for a final decision and the go ahead. We will also try and be under budget and meet or beat the deadline of two weeks.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A mobile phone would be taken as a risk management control measure by staff as in case of accident e.g. road traffic collision it would be imperative to be able to summon the emergency services asap.…

    • 2589 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The article centers around characteristics of professionalism and socialization within the profession. The growth of electronics devices such as smartphones and tablets has “changed the way we communicate” (Papadakos 1307). These devices have proliferated into the medical sector.The use these devices in the hospital scenes has resulted in a potential growth of distractions. Ritchtel asserts that hospitals have invested much in computers and smartphones and other devices in the hands of medical staff for instant access to drug information, case studies, and patient data. However, with the many positive contributions it has brought to the industry, it also has an adverse effect. Doctors and nurses can be too focused on the devices and overlook the patients’ needs.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Business Studies

    • 1263 Words
    • 6 Pages

    From the person taking the calls view, you need to keep the callers personal information private and respect their privacy,…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In spite of having at least some knowledge on drawbacks of cell phones people still don’t lessen its use. But instead a single person keeps innumerous mobile phones in use whether it is necessary or not. The habit of using mobile phones recurrently would harm us and others as well. We should not draw on mobile phones at critical public places where it is strictly prohibited like that of hospital especially near Operation Theater as it may also result in death of the…

    • 455 Words
    • 2 Pages
    Good Essays