Hdl Handle:
http://hdl.handle.net/10675.2/584093
Title:
Workstation Configuration Policy
Authors:
Information Technology Support and Services
Abstract:
The purpose of this document is to establish standards for the base configuration of workstation computers that are authorized to operate within Georgia Health Sciences University. Since data that is created, manipulated and stored on these systems may be proprietary, sensitive or legally protected, it is essential that the computer systems and computer network, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is also critical that these systems and machines be protected from misuse and unauthorized access. Therefore, ITSS requires that all access to workstations be authorized and that all data be safeguarded
Affiliation:
Georgia Health Sciences University
Issue Date:
Dec-2005
URI:
http://hdl.handle.net/10675.2/584093
Type:
Working Paper
Language:
en_US
Description:
Workstation Configuration Policy
Appears in Collections:
Administrative Policies and Procedures Archived Policies

Full metadata record

DC FieldValue Language
dc.contributor.authorInformation Technology Support and Servicesen
dc.date.accessioned2015-12-18T16:03:49Zen
dc.date.available2015-12-18T16:03:49Zen
dc.date.issued2005-12en
dc.identifier.urihttp://hdl.handle.net/10675.2/584093en
dc.descriptionWorkstation Configuration Policyen
dc.description.abstractThe purpose of this document is to establish standards for the base configuration of workstation computers that are authorized to operate within Georgia Health Sciences University. Since data that is created, manipulated and stored on these systems may be proprietary, sensitive or legally protected, it is essential that the computer systems and computer network, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is also critical that these systems and machines be protected from misuse and unauthorized access. Therefore, ITSS requires that all access to workstations be authorized and that all data be safeguardeden
dc.language.isoen_USen
dc.subjectcomputeren
dc.subjectconfigurationen
dc.subjectComputer Networken
dc.subjectComputer Systemsen
dc.titleWorkstation Configuration Policyen_US
dc.typeWorking Paperen
dc.contributor.departmentGeorgia Health Sciences Universityen
This item is licensed under a Creative Commons License
Creative Commons
All Items in Scholarly Commons are protected by copyright, with all rights reserved, unless otherwise indicated.