Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
86 views6 pages

Montes PHP

The document outlines a resort reservation system, including responsibilities of users like admins and guests, terms and conditions, privacy policies, and security measures to protect personal information. It discusses classifying information, topologies, and security policies like encryption, passwords, and backups to protect the system.

Uploaded by

montesmossaiah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views6 pages

Montes PHP

The document outlines a resort reservation system, including responsibilities of users like admins and guests, terms and conditions, privacy policies, and security measures to protect personal information. It discusses classifying information, topologies, and security policies like encryption, passwords, and backups to protect the system.

Uploaded by

montesmossaiah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY


National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

Information Security Policy Plan

Resort Reservation System

Prepared by:

Mel Benjamin U. Montes

BSI-BA III
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

Introduction

Resort reservation systems (RRS) are platforms utilized by hospitality


establishments to manage bookings and guest records. These systems efficiently
handle the inventory of available accommodations and facilitate the reservation process
for customers. The RRS stores personal information obtained from guests during the
booking process, including contact details and preferences. Additionally, it maintains
records of reservations made and any additional services requested by guests.
Agreements between resorts and guests should outline the following:

This outlines of the terms and conditions governing the reservation process, including
cancellation policies, payment terms, and any special requests;

Guests are required to agree to the resort's privacy policy, which details how their
personal information will be collected, stored, and used;

Guests may be invited to provide feedback and reviews about their experience with the
resort reservation system and their stay at the resort;

Guests may be required to acknowledge their understanding of the security measures


implemented by the resort to protect their personal information within the reservation
system;

Responsibilities
These are the following roles of each users of the system:

 Admin/Employee – are responsible for managing the resort reservation system,


including setting up rooms, rates, and availability.
 Guests – are responsible for creating accurate reservations through the resort
reservation system, providing correct information such as dates of stay, room
preferences, and contact details.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

Information Classification
Classifying information is a must on our system. However, we will only classify
information which allows us to finish the tasks given to us. Accessing personal data will
only be allowed when it is needed for processing. We classify information into different
categories so that the information will be protected, and will only be usable whenever it
is needed.

• Unclassified – the information that doesn’t need to be protected, such as


borrowed books, and returning of books, etc.
• Student confidential – this information includes student log-ins, borrower
personal records, borrowed history, etc.
 Librarian confidential - this information could protect the all borrowers of
information’s.

We have categorized the information we keep as follows:

System
Type of Information Classification Level
Involved
Student Data Student Librarian Confidential
Student borrowed history Student Librarian Confidential
Borrowed and Returning books Student Unclassified
Librarian Records Admin Librarian Confidential
Librarian Logins Admin Librarian Confidential

Accidental dissemination of confidential information could cause great harm to the


school library and school. The main purpose of this policy is to reduce, or if possible,
avoid those incidents.
Student Data – Information gathered about student individual to borrow a books.
Student borrowed history – Logs of students borrowed books.
Borrowed and returning books – Data of borrowed and returning books.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

Librarian Records – manage all process to create, receive, store, access and dispose
of records.
Librarian Logins – History logs.

SYSTEM
ADMINISTRATOR

Librarian

Library Library Student


users users Teachers/
Instructor
TOPOLOGY
 Star Topology – A system require a network to centralize all the transaction.
NETWORK SECURITY POLICY
 Firewall
 Passwords
 System Logs

SECURITY MEASURE FOR LOGIN


 Login Captcha Code
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

DATA CLASSIFICATION
TOP SECRET SECRET CONFIDENTIAL PUBLIC
Admin Account Student Account Student Profile Books
Staff Account Transaction
Reports
History Log

Data Support Regulations


Systems Manager Data Account
System Logs
Admin Account
Administrator Admin logs / Reports
Borrowed and Return Books
Students Transaction

 Firewall – Firewall with secure port locking for block unwanted access
 Passwords – account password recording using MD5 decoding or hash tables
 System logs – Monitoring employee logins, out and transactions
Encryption Policy
The encryption policy in this system is only the librarian/admin can access the system if
the student want to borrow and return a book only the school id should presented to the
librarian to borrow and return the book.
Data and Backup Policy
 The important data should back up are the data from books, borrowed and return
books, report, barcode.
 The librarian backup every end of the using manual export from Xamp and save.
 After the exportation is directly save to the flash that only the librarian can used.
 Only the librarian/admin can allowed to back up the database from xamp and the
procedure to back up is manual.
Responsibilities, rights, and duties of personnel
In this system all responsibilities and duties is on the hand of the admin/librarian
because all the transaction from adding of books, borrowing of books, returning of book,
and generating report, etc. are the duties of the admin to protect and secured the data
from the system.
SOUTH EAST ASIAN INSTITUTE OF TECHNOLOGY
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi, 9505
South Cotabato, Philippines

 In the system the big responsibilities is the admin/librarian because he/she only
can access all the function in the system.
 The student is only presented their id for them to borrow a book.

You might also like