SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
Information Security Policy Plan
Resort Reservation System
Prepared by:
Mel Benjamin U. Montes
BSI-BA III
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
Introduction
Resort reservation systems (RRS) are platforms utilized by hospitality
establishments to manage bookings and guest records. These systems efficiently
handle the inventory of available accommodations and facilitate the reservation process
for customers. The RRS stores personal information obtained from guests during the
booking process, including contact details and preferences. Additionally, it maintains
records of reservations made and any additional services requested by guests.
Agreements between resorts and guests should outline the following:
This outlines of the terms and conditions governing the reservation process, including
cancellation policies, payment terms, and any special requests;
Guests are required to agree to the resort's privacy policy, which details how their
personal information will be collected, stored, and used;
Guests may be invited to provide feedback and reviews about their experience with the
resort reservation system and their stay at the resort;
Guests may be required to acknowledge their understanding of the security measures
implemented by the resort to protect their personal information within the reservation
system;
Responsibilities
These are the following roles of each users of the system:
Admin/Employee – are responsible for managing the resort reservation system,
including setting up rooms, rates, and availability.
Guests – are responsible for creating accurate reservations through the resort
reservation system, providing correct information such as dates of stay, room
preferences, and contact details.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
Information Classification
Classifying information is a must on our system. However, we will only classify
information which allows us to finish the tasks given to us. Accessing personal data will
only be allowed when it is needed for processing. We classify information into different
categories so that the information will be protected, and will only be usable whenever it
is needed.
• Unclassified – the information that doesn’t need to be protected, such as
borrowed books, and returning of books, etc.
• Student confidential – this information includes student log-ins, borrower
personal records, borrowed history, etc.
Librarian confidential - this information could protect the all borrowers of
information’s.
We have categorized the information we keep as follows:
System
Type of Information Classification Level
Involved
Student Data Student Librarian Confidential
Student borrowed history Student Librarian Confidential
Borrowed and Returning books Student Unclassified
Librarian Records Admin Librarian Confidential
Librarian Logins Admin Librarian Confidential
Accidental dissemination of confidential information could cause great harm to the
school library and school. The main purpose of this policy is to reduce, or if possible,
avoid those incidents.
Student Data – Information gathered about student individual to borrow a books.
Student borrowed history – Logs of students borrowed books.
Borrowed and returning books – Data of borrowed and returning books.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
Librarian Records – manage all process to create, receive, store, access and dispose
of records.
Librarian Logins – History logs.
SYSTEM
ADMINISTRATOR
Librarian
Library Library Student
users users Teachers/
Instructor
TOPOLOGY
Star Topology – A system require a network to centralize all the transaction.
NETWORK SECURITY POLICY
Firewall
Passwords
System Logs
SECURITY MEASURE FOR LOGIN
Login Captcha Code
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
DATA CLASSIFICATION
TOP SECRET SECRET CONFIDENTIAL PUBLIC
Admin Account Student Account Student Profile Books
Staff Account Transaction
Reports
History Log
Data Support Regulations
Systems Manager Data Account
System Logs
Admin Account
Administrator Admin logs / Reports
Borrowed and Return Books
Students Transaction
Firewall – Firewall with secure port locking for block unwanted access
Passwords – account password recording using MD5 decoding or hash tables
System logs – Monitoring employee logins, out and transactions
Encryption Policy
The encryption policy in this system is only the librarian/admin can access the system if
the student want to borrow and return a book only the school id should presented to the
librarian to borrow and return the book.
Data and Backup Policy
The important data should back up are the data from books, borrowed and return
books, report, barcode.
The librarian backup every end of the using manual export from Xamp and save.
After the exportation is directly save to the flash that only the librarian can used.
Only the librarian/admin can allowed to back up the database from xamp and the
procedure to back up is manual.
Responsibilities, rights, and duties of personnel
In this system all responsibilities and duties is on the hand of the admin/librarian
because all the transaction from adding of books, borrowing of books, returning of book,
and generating report, etc. are the duties of the admin to protect and secured the data
from the system.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines
In the system the big responsibilities is the admin/librarian because he/she only
can access all the function in the system.
The student is only presented their id for them to borrow a book.