PHYSICAL ACCESS CONTROL
|
|
|
- Archibald Hudson
- 10 years ago
- Views:
Transcription
1 Contact: Administrative Services Issued: June 24, 2013 Supersedes: Keys - Administration and Control of Keys, September 2007; and Keys - Issuance and Retrieval, March 1986 Pages: 13 OVERVIEW PHYSICAL ACCESS CONTROL The purposes for physical access controls are to enhance the personal safety of the campus community and to secure University property. A successful program is dependent on every member of the community being diligent in the stewardship of physical access devices and alert to their surroundings. The implementation of physical access controls must be balanced with the University s value of being an open and welcoming place to study, teach, research, and collaborate. I. SCOPE The policy applies to all members of the campus community and governs physical access controls for all facilities managed by UCSB (University facilities). Physical access controls may involve mechanical key systems, specialized security access systems, lockbox systems, card access control systems, or any system designed to control room or facility egress. II. DEFINITIONS See Appendix A. III. POLICY A. s 1. To enhance the safety of the campus community and its assets and assure compliance with applicable building safety, fire and life safety codes, and the Americans with Disability Act (ADA), only University authorized access controls shall be used on University facilities. 2. All access control systems installed in University facilities shall comply with campus standards, unless exempted in writing by the senior associate vice chancellor for Administrative Services. 3. All installations or changes to access control systems and equipment shall be performed by or overseen by Campus Design and Facilities, under an approved work order or building project contract. 4. Unauthorized locks or suspicious looking access controls (such as chains looped through door handles) must be reported to the Police Department, as soon as possible. The Police will contact the department access controller (DAC) or business officer to determine whether the locks are unauthorized. In an emergency situation or if the unauthorized locks create a safety violation, the Police shall remove the lock(s) or shall contact Campus Design and Facilities Customer Service to remove the lock(s). In ordinary situations, when the DAC becomes aware of an unauthorized lock, s/he shall have it removed by the department or shall send a work order request to Campus Design and Facilities Customer Service to have it removed, to ensure the safety of the campus community and compliance with this policy. B. Devices
2 Page 2 of All department and unit heads must establish and maintain controls for the issuance, possession, and storage of all access control devices that provide access to University facilities and vehicles. Access control devices may include but are not limited to mechanical keys, key cards, fobs (for limited short-term use), and keypad data. 2. Access control cards for University facilities shall be obtained through the University Center Access Card unit, with one exception. The Police Department may produce access control cards for Police Department employees. 3. Mechanical keys and fobs for University facilities shall be obtained through Campus Design and Facilities Customer Service. 4. Access control devices that provide access to University facilities and vehicles are the property of the University of California and must be returned when: a) requested by the issuing department, b) the business necessity for access ends, or c) in response to a lawful order. a. If the access control device is an access card or other electronic device, the department shall advise its DAC to deactivate the department s access authorization when access to that department s assigned space is no longer a business necessity. b. When an access control device is no longer needed, it must either be securely destroyed or stored depending on the type of device. If the access control device holder is ending his/her affiliation with UCSB, and the access control device contains an individual s image, the department shall deactivate access authorizations and securely destroy the access control device. If the returned access control device is a mechanical key or generic electronic device (such as a fob, as might be issued to short term visitor scholars or contractors), the department shall deactivate access authorizations on the electronic device and securely store the mechanical key or generic device and update the department s inventory log. The DAC shall notify ( ) the campus access control database administrator to ensure the campus access control system database remains up-to-date. c. Excess access control devices (such as mechanical keys or fobs) that are no longer needed by a department shall be hand delivered to Campus Design and Facilities Customer Service. Department inventory logs shall be updated to record the transfer of the access control devices to Campus Design and Facilities Customer Service. 5. The loss or theft of a University access control device shall be reported to the DAC as soon as possible, but no later than 24 hours from the loss or theft. The DAC shall deactivate access authorizations on electronic device(s) and notify the campus access control database administrator to ensure the campus access control system database remains up-to-date. If level A1 or A2 mechanical master keys (see Appendix B) are lost or stolen, the DAC shall report the loss or theft to the UCSB Police Department. IV. RESPONSIBILITIES A. The senior associate vice chancellor, Administrative Services (or designee) serves as the campus access control director and is responsible for the campus access control program. S/he shall review all requests for new access control systems or modifications to existing access control systems that diverge from campus standards. The review shall be in consultation with the relevant executive vice chancellor or vice chancellors, and chief of Police (or designee). Exceptions to the campus standards or this policy require approval from the campus access control director.
3 Page 3 of 13 B. Campus access control device providers are the University Center (access cards) and Campus Design and Facilities (mechanical keys and short-term-use fobs). These specified access control device providers are the only departments authorized to fabricate or requisition and distribute access control devices for UCSB managed facilities and vehicles, with two exceptions: 1) when original keys are furnished directly by the manufacturer, under new (building or alterations) contracts and 2) the Police Department may fabricate or requisition electronic access card devices for the Police Department. Campus access control device providers are responsible for implementing procedures for fabrication, issuance, inventorying, tracking, and securing devices under their control and for documenting access control transactions. C. Campus access control managers (CACMs) are responsible for the administration of access control systems and procedures within their designated areas, in coordination with the campus access control database administrator. CACMs are: Housing and Residential Services - for all residential housing; Police Department - for Police Department employees; University Center - for the UCen and Thunderdome; and Campus Design and Facilities (Customer Service) - for all other University facilities. CACMs, for their designated areas, shall: 1. Implement access control procedures and secure access control system(s). Security measures are to meet or exceed standards presented in UC Business and Finance IS-3, Electronic Information Security. These include partitioning access control privileges internal to UCSB; protecting against external unauthorized access; and having backup and recovery systems and procedures. 2. Provide training to new department access controllers in their designated area(s). 3. Maintain accurate records of all access control transactions. Transaction records shall be moved into the access control system s archive at the end of each fiscal year. Transaction records shall be retained in the archive for five fiscal years after their deposit and thereafter destroyed. All stored access control records are subject to audit. 4. Ensure relevant emergency access control devices are secured in lock-boxes and kept up-todate to assure timely entry into all buildings by authorized emergency personnel. 5. Add, extend, or deactivate authorized access control devices as authorized by the campus access control director or department access controllers, and consistent with this policy. (DACs may activate or change department level authorized access permissions for active access control devices. See Section III.F.) 6. Maintain an inventory of and secure unissued access control devices. 7. Document and maintain records of the destruction/recycling of any defective devices. 8. Consult with Chief of Police (or designee) and DAC regarding lost or stolen mechanical master access control devices (level AL1 or AL2, Appendix B) and affiliated risks or concerns. 9. Routinely evaluate access control systems and requested modifications for functionality and effectiveness. Re-key mechanical systems as appropriate. All installations and modifications repairs and maintenance shall comply with University policy and standards and be conducted
4 Page 4 of 13 by or under the oversight of Campus Design and Facilities, unless otherwise authorized in writing by the senior associate vice chancellor, Administrative Services (or designee). Requests for repair or re-keying shall be administered according to campus policies and Campus Design and Facilities procedures. D. Campus Design and Facilities Lock Shop is solely responsible for: 1. Performing all lock work for campus managed facilities, except work performed by contractors working under the direction of Campus Design and Facilities. 2. Fabricating and duplicating (or overseeing the fabrication and duplication of) mechanical keys for all campus managed facilities. 3. Issuing mechanical keys to authorized DACs for re-issue within their department; obtaining DAC signatures on key issuance; and maintaining and securing records of key transactions in accordance with UC Records Retention Schedules and University policy. 4. Recovering costs for mechanical keys and lock work in accordance with an authorized work order. 5. Inventorying and securely maintaining unissued mechanical key stock. E. Each divisional control point is responsible for ensuring their deans, directors, department chairs, and administrative officers designate department access controllers and oversee the implementation of this policy for their respective areas. 1. Departments shall document: the access controller s name (and alternate s name, as appropriate), telephone number, department name and building location; and shall send the information to the relevant divisional control point for compiling into a master list of department access controllers for the relevant division. 2. Each control point shall send their divisional master list of department access controllers to the campus access control database administrator. 3. Departments are responsible for notifying their control points of all changes to their department designations. 4. Control points are responsible for keeping their divisional master lists of department access controllers up-to-date and for promptly sending updated lists to the campus access control database administrator in Campus Design and Facilities Customer Service. 5. Only the designated access controllers on the master list and the campus access control director (or designee) are authorized to request access control actions from the campus access control database administrator. F. Department access controllers (DACs) are responsible for the access control procedures for their designated areas. DACs shall: 1. Obtain authorization from their dean/director/chair to requisition new access control systems or initiate the modification of existing access control systems and send the authorization to Campus Design and Facilities. All installations and modifications shall comply with university policy and standards and be conducted by or under the oversight of Campus Design and Facilities.
5 Page 5 of 13 Deviations from campus standards require the prior written approval of the senior associate vice chancellor, Administrative Services. 2. Implement department access control procedures. 3. Review requests for access and, when determined appropriate for University business purposes, initiate the process for obtaining an access control device from the relevant access control device provider (Section IV.B.). The campus standard is to issue one access control device per individual, per access control system. Individuals who have already been assigned more than one device per access control system may retain the 2 nd device until they separate from the department, but are requested to return any additional devices to their DACs. 4. Once the access control device has been created: a. For mechanical keys: 1) The DAC shall pick up the keys from Campus Design and Facilities. The DAC (or designee) will present identification at pickup and sign for the keys. Keys shall not be sent through the mail. If lock work is completed on-site, keys will be given only to the DAC (or designee), subsequent to obtaining the DAC s (or designee s) signature on the receipt. 2) The DAC shall issue the key(s) to the department authorized recipient; obtain a signature from the recipient; and retain a record of the issuance and receipt. b. For electronic access control devices: 1) The device holder will bring the device to the authorized DAC. 2) The DAC shall activate access permissions that have been authorized by the department that manages the space, using the campus access control system software. 3) The DAC shall retain a record of the authorizations. c. For every device issued, the DAC shall notify the device holder of his/her stewardship responsibilities (see Section IV.G-H.); and shall retain records that document the device number, name of recipient, date of issue, access permissions given, date of return or loss, and date permissions were deactivated. Records shall be retained in compliance with the UC Records Retention Schedule and secured and disclosed in compliance with University policy. All department access control records are subject to audit. d. Maintain an inventory of and store unassigned department access control devices in a secure location with restricted access. Document and retain records of the destruction of any defective devices. e. Recover or disable access control devices, upon employee separation from the department, the end of the contract term, or completion of the business necessity for access. Departments should consult with Human Resources Labor Relations or Academic Personnel if they intend to have their DAC recover or deactivate an access control device assigned to an employee on a long term leave, investigatory leave, or when absence from the campus is for an extended period of time. If the individual is separating from the University, within a week of separation, notify the campus access control database administrator to deactivate the access card.
6 Page 6 of 13 f. Verify annually, in consultation with the department business officer, that employees (who have been issued access control devices) are employed by the department and that their access privileges are up-to-date. Routinely verify that access privileges for contractors, guests, vendors, or volunteers are still justified for University business purposes. If access is no longer appropriate for the access control device holder, recover the access control device(s) and if an electronic device revoke their access authorization. If the individual has separated from the University, within a week of separation, notify the campus access control database administrator to deactivate the electronic access control device(s). g. Report unrecovered, lost or stolen mechanical master access control devices (level AL1 and AL2 - Appendix B) to the Police Department. Report all missing access control devices to the department business officer for a risk evaluation. 5. Departments are responsible for all costs associated with mechanical key replacement and required re-keying of locks due to the loss of an access control device by their access control device holder. If the same access control device holder subsequently loses another access control device, a department may consult with Human Resources to determine whether they can recover the costs from the access control device holder directly. If repeated losses occur, departments may consider revoking the access control holder s privilege of being assigned an access control device. 6. When access control systems or access permissions to buildings or rooms change, e.g. doors are added, rekeyed, or systems are reprogrammed, the DAC shall notify the Police Department, Communications Services, Information Technology (in OIST), Campus Fire Marshal and other affected users and activate new access authorizations, as appropriate. G. All individuals issued a university access control device are required to: 1. Secure and be responsible for the access control device issued to him/her. Access control devices shall be used only by the individual to whom the access control device was assigned. 2. Return excess access control devices to their DAC. (The campus standard is one access control device per individual, per access control system. Individuals who have been assigned more than one device per access control system may retain the 2 nd device until they separate from the department, but are requested to return any additional devices to their DACs. 3. Return the access control device to the department access controller upon separating from the department, at the end of his/her contract, the completion of the business necessity for access, or when requested by the DAC or supervisor. (NOTE: individuals may be liable for theft, per 484 of the California Penal Code, if devices are not returned.) 4. Report the loss or theft of all access control devices to the department access controller within 24 hours of the discovery of the theft or loss. Individuals with access control cards enabled with other functions will also need to notify each service provider to deactivate the card for each function, such as Dining Services for meal function, University Library for book check-out, et al. 5. In addition, report the loss or theft of master mechanical access control devices to the University Police Department within 24 hours of the discovery of the theft or loss. (See Appendix B. for a description of AL1 and AL2 devices.) H. All members of the campus community and visitors are responsible for helping to enhance the personal safety of the campus community and to secure University property by:
7 Page 7 of Keeping their access control devices in a safe place. 2. Not lending their access control devices to others. 3. Not propping doors open or leaving them unlocked during hours when the facility is normally closed to the public. 4. Reporting unusual access control locks or other access activity that is out of the ordinary to the DAC or Police Department. V. TECHNOLOGY STANDARD A. The campus standard for all electronic access control systems installed in University owned or managed facilities is Lenel On Guard. All exterior door access control systems installed in University owned or managed facilities shall meet or interface with the campus standard, unless exempted in writing by the senior associate vice chancellor, Administrative Services (or designee). Electronic access control systems for interior doors that are initiated after the implementation of this policy shall also meet or interface with the campus standard. B. All exterior door access control systems that do not interface with or meet the campus standard shall be identified and a feasibility study conducted to evaluate the efficacy of changing the system to one that meets the campus standard. C. UCSB s standard access control device is the multipurpose UCSB Access ID Card. It is an electronically programmable access card that permits access into University facilities when activated by an authorized University department access controller and campus access control database administrator. In addition, it has the capability to be used as an identification card, debit card, record work time in KRONOS, check out University Library books, and purchase meals on campus. VI. SANCTIONS A. Violations of this policy shall be reviewed consistent with campus practice and, where applicable, due process procedures for academic and staff employees, contract employees, students, and nonaffiliates. Those found in violation of this policy may be subject to sanctions that may include: loss of access privileges; payment of replacement or rekeying costs and, in some cases, disciplinary action, up to and including termination. Departments shall consult with Academic Personnel (academic employees), Employee & Labor Relations (staff and contract employees), Dean of Students (students) or Administrative Services (non-affiliates) prior to implementing sanctions in accordance with this policy. B. It is a crime (California Penal Code 469) and violation of University policy to knowingly make, duplicate, possess, or use access control devices to University facilities or vehicles without the approval of the University s authorized official. Violators may be prosecuted. VII. IMPLEMENTING PROCEDURES A. Eligibility 1. Eligibility for access control devices (cards, fobs, mechanical keys) is determined by business necessity. Campus access control managers and department access controllers shall determine access permissions in accordance with Appendix B. Deviations from Appendix B require the approval of the senior vice chancellor, Administrative Services.
8 Page 8 of Although all access control devices require care, those assigned master keys must take extra measures to secure the device when not in use. In general, when not in use, campus grand master keys must be physically secured in either an unmovable key safe or an unmarked locked storage cabinet/drawer in a locked area. In most cases, master keys shall not leave University property, unless the device is to be used at a remote University facility. In no circumstances shall master keys be left unattended or in unlocked vehicles or offices. B. Cards 1. The standard physical access control card shall bear the University seal, a unique identifier number, the assigned card holder s first and last name, a photograph of the individual, affiliation (such as academic, staff, student, guest), a return to name or address (access cards issued by the UCen Access Unit shall have UCen Access Desk named as the return to name/address), and a statement that the card is the property of the University of California and must be surrendered upon request by an authorized University official. Access control cards shall not, under any circumstances, display social security numbers or dates of birth. Generic, short-term access control devices may be issued provided the DAC uses the same rigorous issuance, tracking, and control procedures established for standard access control cards. The generic access control device shall not be issued to employees or students for long-term use, but may be used for contractors and department guests (such as short-term visiting scholars who are on campus less than one year). 2. Although not displayed on the access control card, the access control card has two expiration dates registered in the access control system: a. The access permission authorization expiration date that is set by the DAC and may be changed by the DAC at any time; and b. The over-riding card expiration date that is set by the campus access control database administrator. 1) The card expiration date for faculty and staff is scheduled for ten years from the access control card issuance date. For students, the card expiration date is scheduled for five years and for contractors, visitors, and others, the access control card is scheduled for 6 months from its issuance date. Scheduling predetermined access control card expiration dates serves as a precautionary security measure that encourages regular evaluations of active/inactive access cards. 2) DACs can view which cards are set to expire and when, and may extend the card expiration date by a request to the campus access control database administrator, if the access control card continues to be needed for University business purposes. (Note: DACs can modify access permission authorizations independently, at any time to meet University business need. See Section VII.B2.a.) C. Requests for Access Control Devices All requests for access into University managed property shall be directed to the relevant authorized department access controller (DAC). Access activation of issued electronic access control devices shall comply with this policy and the applicable campus access control manager s and the DAC s procedures. D. Requests for Replacement Access Control Devices
9 Page 9 of In the event of loss or theft or a defective mechanical access control device, the assigned device holder shall notify the DAC. A replacement mechanical access control device may be issued in accordance with the department s procedure and this policy. 2. In the event of loss or theft or a defective electronic access control card/device, the assigned device holder shall notify the DAC and contact the relevant CACM for a replacement device. a. The CACM shall issue a replacement electronic access control device in accordance with the CACM s procedures and University policy. The electronic access control device holder shall take the replacement access control device to his/her DAC for authorization activation in accordance with the DAC s department s procedure. b. The DAC may activate approved access authorizations for the replacement device and deactivate authorizations for the lost/stolen/defective electronic access control device; annotate his/her records with the change; and notify the campus access control database administrator of the replacement transaction to ensure the campus access control database remains up-to-date. E. Changes in Access Requirements due to Promotions, Relocations, Separations, Contract Expirations/Terminations Departments shall implement procedures to ensure the department access controllers (DACs) are notified when the access requirements for an individual (employee, vendor, contractor, et al.) who has been issued an access control device have changed. 1. Access Control Cards a. If the change is an individual s transfer to another department, the department access controller shall deactivate the department s authorization for access; the new department s DAC may activate the same access control card with the new department s access permissions, as appropriate. b. If the change is an individual separating from or ending a visit to the University or a contractor whose contract is expiring, the DAC(s) shall deactivate the departments access permissions and the home department DAC shall notify the campus access control database administrator to totally deactivate the access control device. Whenever possible, the home department DAC should try to recover the device from an individual who is separating from/leaving the University and destroy any access control device that displays an individual s name and image. A record of the destruction shall be retained in accordance with the UC Records Retention Schedules. c. DACs shall deactivate generic, short-term access control devices issued to individuals whose access permissions are no longer necessary for University business purposes or their affiliation with the University has changed. Changes shall be documented. DACs may place these generic access control devices in their department inventory provided they have procedures in place to secure and track them. If the department does not have a secure place to store unissued access control devices, the devices shall be sent to the campus access control database administrator for secure storage and reissuance. 2. Mechanical Keys a. Mechanical keys shall be recovered from transferring or separating employees or students or others whose contracts are expiring or whose responsibilities no longer necessitate
10 Page 10 of 13 independent access. DACs may return recovered mechanical keys to the department s inventory and document the transfer or, if in excess of a department s needs, they shall be returned to Campus Design and Facilities. Their transfer shall be documented. b. If mechanical keys are not recovered or combination locks are involved, the department access controller, in consultation with his/her department head, campus access control manager, and Police Department shall determine whether locks must be changed. The Police Department shall be notified of unrecovered keys. F. Changes to Access Requirements due to Facility Additions or Modifications Facility additions or modifications that involve access control systems shall be communicated to the access control database administrator. The access control database administrator will update the access control system and notify 1) affected DACs, who shall notify their affected access control device holders and 2) all Level One access control device holders. The relevant DAC shall update/activate access permissions in keeping with department authorizations and Appendix B. G. Records Management Records of requests, replacements, authorizations, and changes for control access devices shall be securely maintained by the department access controllers. All records pertaining to access control systems activity shall be securely maintained by the relevant access control managers. All records pertaining to campus access control database activity shall be securely maintained by the campus access database administrator. All records shall be maintained in a manner that protects the integrity and availability of the records for the duration of the retention period established in the UC Retention Schedule. H. Personal Emergency Access to Buildings and Rooms In case of a personal emergency, such as when an employee locks his/her home or vehicle keys in his/her office and can t otherwise retrieve them, the individual should first contact their supervisor, building manager, or department access controller to gain access. If unsuccessful, the individual may contact the UCSB Police Dispatch who will attempt to contact the department access controller. The individual s identity, university affiliation, and access authorization shall be verified prior to being granted access. I. Restricted Access Areas Departments with restricted areas that require additional access controls, such as clean rooms and specialized labs, shall develop written procedures for controlling access to the restricted areas, in consultation with the applicable department access controller, campus access control manager, Environmental Health and Safety, and the campus Police Department. The procedures shall include: 1. Eligibility requirements for access. 2. How to request access. 3. Who approves access. 4. Who issues the access control device. 5. Who will maintain and secure the access control records. 6. How will access control devices be recovered from individuals when the need for access changes, such as a change of responsibilities, separations, or contract terminations/expirations. 7. Other considerations, as appropriate.
11 Page 11 of 13 J. Contractors, Guests, Vendors, Volunteers (Temporary Access Control Privileges) Issuance and recovery of temporary access control devices shall be in accordance with this policy and the procedures established by the applicable campus access control managers and department access controllers. Access control device expirations shall correspond to the university business need for access privileges, as determined by the department access controllers. K. Verification Department access controllers, in consultation with their department business officer, shall annually verify that employees who have been issued access control devices are employed by the department and that their access privileges are up-to-date. They shall also routinely verify that access privileges for contractors, guests, vendors, or volunteers are still justified for University business purposes. If access control is no longer appropriate, the DAC shall recover the access control devices and deactivate access authorizations for the electronic access control devices and notify the campus access control database administrator to deactivate the electronic device(s). VIII. RESOURCES A. Access Card Application and Authorization Record for Departments B. Environmental Health and Safety C. Facilities Management D. Facilities - Department-Funded Services and Alterations or Additions to Existing Facilities (5521) E. Non-affiliates, Conduct of F. Police Services and Responsibilities APPENDIX A. DEFINITIONS A. Access Control - Control of entry/exit to an area by any means (generally mechanical or electrical). B. Campus Access Control Database Administrator University career employee(s) designated to oversee, administer, and monitor the physical access control database and application; liaison with providing vendor. Contact Campus Design and Facilities Customer Service. C. Access Control Device A mechanical or electronic device, including but not limited to a key, an access card or electronic disk (fob), or combination lock that is used to control access to a university facility, property, or vehicle. D. Campus Access Control Director The senior associate vice chancellor for Administrative Services or designee. E. Campus Access Control Managers (CACMs) University career employees designated by 1) Housing and Residential Services, 2) the University Center, 3) Police Department, 4) the Recreational Center and 5) Campus Design and Facilities. They are responsible for overseeing the management of electronic access control system(s) for their respective areas, in consultation with the campus access control database administrator. See Section III. Responsibilities.
12 Page 12 of 13 F. Department Access Controllers (DACs) - University career employees designated by the department head to perform department access controller responsibilities in accordance with this policy. G. Campus Card Access System - A computerized card access control system which may be used to maintain and control access to university facilities, property, and vehicles. H. Card/Key Access Control Records Records maintained by department access controllers and campus access control managers that document access control transactions, including to whom a device(s) has been assigned, his/her access privileges, and the date the device was issued/recovered. These records shall contain the minimum amount of information about the person necessary for identification purposes. Social Security numbers and birth dates or other restricted (notice triggering) information must not be used, recorded, or stored. I. Key - Any mechanical device used to operate a mechanically controlled mechanism for entry/exit to a controlled area. J. Key Coding - Numerical combinations which control the variety of keys a department uses without jeopardizing security. K. Knox Box (Lockbox) System - An access control system designed for emergency building access, used by service departments or police/fire personnel. L. Mechanical Key Systems - Any mechanical device used to operate a mechanically controlled mechanism for entry/exit to a controlled area. These locks may be individually keyed or operate with a building master key. M. Specialized Security Access Control Systems - Any specialized security lock or change of keying for special areas. These may include manual/mechanical or electrical push-button combination locks, with key-override, or other electronic system. The system provides entry access to various doors exterior to or within a building. They may provide automatic locking and unlocking capabilities of specific doors or groups of doors at prearranged times or as initiated in an emergency. N. University Facilities A facility, property, or vehicle that is owned or managed by the University.
13 Page 13 of 13 APPENDIX B. Eligibility for Access Control Devices Device Type Access Level Eligibility to Carry/Use Approval(s) Required Great Grand Master* AL 1 Opens all groups of locks keyed under different Building (Grand) Masters and Knox Boxes. Emergency operation center director, senior associate vice chancellor for Administrative Services, fire marshal, police chief, designated police/fire/eh&s personnel, designated Campus Design and Facilities employees, designated IT/communications employees. Senior associate vice chancellor, Administrative Services. Building (Grand) Master* AL 2 Opens all locks within one building. Designated Physical Facilities custodial employees (on a shift basis only), building managers, designated police/fire/eh&s employees. Senior associate vice chancellor, Administrative Services. The relevant dean s approval is also required for issuance to building managers in academic buildings. Department Master* AL 3 Opens a given group of locks within a building. Department heads (or their designees) and building managers, for those areas under their jurisdiction. Department head. Individual AL 4 Opens one lock or two or more locks keyed alike (generally within one building). Academic and staff employees, visiting scholars, students, or contracted workers as required for University business purposes. Department head or designated department access controller; and for Housing residents, as designated by Housing and Residential Services. Building Entrance AL 5 Opens main exterior door(s). Academic and staff employees, visiting scholars, students, or contracted workers as required for University business purposes. These should only be issued when an individual must work other than normally scheduled hours. Department head or designated department access controller; and for Housing residents, as designated by Housing and Residential Services. Utility AL 6 Opens electrical rooms and utility closets. Designated Campus Design and Facilities employees, building managers, designated police/fire/eh&s personnel, and designated Communication Services/IT employees. Department Head or designated department access controller. *Although all access control devices require care; those assigned masters must take extra measures to secure the device when not in use. In general, when not in use, campus grand masters must be physically secured in either an unmovable key safe or an unmarked locked storage cabinet/drawer in a locked area. In most cases, masters do not need to leave University property, unless the device is to be used at a remote University facility. In no circumstances shall masters be left unattended or in unlocked vehicles or offices.
Access Control Regulations
Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE:
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE: CATEGORY: Real Estate and Facilities PAGE: 1 of 6 SUPERSEDES: APPROVER: Larry Marbert Vice President, Real Estate and Facilities
KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS
Facilities Management Revised 4/12/2010 KEY / CARD ACCESS CONTROL POLICY FOR FACULTY, STAFF AND STUDENTS I. Purpose II. Scope The purpose of the Key/ Card Access Control Policy is to provide reasonable
Security, Access Management and Key Control Policy and Procedures
1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment
How To Manage Keys At Trent University
POLICY ACCESS CONTROL Category: Approval: Responsibility: Date: Operations & Governance PVP Vice President Administration Date initially approved: September 1, 2005 Date of last revision: April 2012 Definitions:
University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1
University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
ASSOCIATED STUDENTS, INCORPORATED CALIFORNIA STATE UNIVERSITY, LONG BEACH DATE REVISED: 04/10/2013
Cash Handling BACKGROUND AND PURPOSE...1 POLICY STATEMENT...2 WHO SHOULD KNOW THIS POLICY...2 DEFINITIONS...2 STANDARDS AND PROCEDURES...3 1.0 CONDITIONS FOR EMPLOYMENT IN CASH HANDLING ENVIRONMENT...3
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
FACILITIES MANAGEMENT DEPARTMENT
FACILITIES MANAGEMENT DEPARTMENT Policy Title: Key Control and Card Access Policy Policy Number D-12 Section: Safety and Security Effective Date: April 12, 2007 Last Review: April 12, 2007 Purpose: The
8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON
OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
The purpose of Mohawk College s Purchasing Card Policy ( policy ) is to:
Policy Number: CS-1002-2009 Policy Title: Purchasing Card Policy Policy Owner: Chief Financial Officer Effective Date: December 2, 2009 Revision Date: April 17, 2013 1. PURPOSE The purpose of Mohawk College
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
UNIVERSITY EQUIPMENT
Authority: History: Source of Authority: 05.164 Related Links: Responsible Office: UNIVERSITY EQUIPMENT Vice Chancellor for Business Affairs Effective September 20, 1994; Updated October 16, 1995; Updated
Overview. Responsibility
Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed
PITT. Community College PROCUREMENT CARD POLICY PROCEDURES
PITT Community College PROCUREMENT CARD POLICY & PROCEDURES PCC Purchasing & Contracts Office 2064 Warren Drive Facility Service Complex Winterville, NC 28590 Phone (252) 493-7279 / Fax (252) 321-4214
THE EVERGREEN STATE COLLEGE
The Evergreen State College Procurement Card Guide JP Morgan Chase VISA THE EVERGREEN STATE COLLEGE PROCUREMENT CARD HANDBOOK For Cardholders & Authorized Users Card Custodians Approving Officials Rev
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
Cleveland State University Purchasing Card Policy and Procedure Revised June 2014. Program Overview
Cleveland State University Purchasing Card Policy and Procedure Revised June 2014 Purpose This policy describes the proper use of a Cleveland State University (the University) purchasing card. It is in
Identity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
University Credit Card Policies and Procedures Index
University Credit Card Policies and Procedures Index I. Background II. III. Policies A. Authorized Purchases B. Unauthorized Purchases C. Applying for a Card D. Expiration and Reissuance of Cards E. Changing
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
INSTITUTIONAL COMPLIANCE PLAN
INSTITUTIONAL COMPLIANCE PLAN Responsible Party: Board of Trustees Contact: Institutional Compliance Office Original Effective Date: 02/16/2012 Last Revised Date: 10/13/2014 Contents I. SCOPE OF THE PLAN...
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
VCU Identity Theft Prevention Policy
VCU Identity Theft Prevention Policy POLICY STATEMENT AND PURPOSE Responsible Offices: Office of the Senior Vice President for Finance and Administration Office of the Provost and Vice President for Academic
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
39C-1 Records Management Program 39C-3
39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE
WINONA STATE UNIVERSITY TRAVEL CREDIT CARD PROGRAM USERS GUIDE 1 WSU TRAVEL CARD PROGRAM Part 1. Authority MnSCU System Procedure 7.3.3 Credit Cards, provides authority for a college, university or office
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
MS 760 Overseas Imprest Management
MS 760 Overseas Imprest Management Effective Date: January 7, 2013 Responsible Office: Office of Chief Financial Officer Supersedes: 5/15/84 V.2; MS 731 Issuance Memo Issuance Memo 01/07/2013 Table of
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that
Chapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016
Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016 1 Table of Contents I. Overview A. Introduction..3 B. Definitions.... 3 II. Card Issuance A. Cardholder Eligibility...4
AQ0600 - CORPORATE CREDIT CARD (BMO COMMERCIAL) CODE OF RESPONSIBILITY
AQ0600 - CORPORATE CREDIT CARD (BMO COMMERCIAL) CODE OF RESPONSIBILITY 1.0 PURPOSE To provide guidelines for Interior Health Staff requesting and using corporate credit cards. 2.0 DEFINITIONS Health Shared
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Saint Louis University Merchant Card Processing Policy & Procedures
Saint Louis University Merchant Card Processing Policy & Procedures Overview: Policies and procedures for processing credit card transactions and properly storing credit card data physically and electronically.
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.
Policy Number: 339 Policy Title: Credit Card Processing Policy, Procedure, & Standards Review Date: 07-23-15 Approval Date: 07-27-15 POLICY: All individuals involved in handling credit and debit card transactions
Appendix A. CAR Special Investigative Units Standards
Appendix A CAR Special Investigative Units Standards The reduction of insurance fraud, by monitoring and coordinating the investigation of suspicious claims, is an important goal of Commonwealth Automobile
6-8065 Payment Card Industry Compliance
0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card
Data Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
LIVINGSTON COUNTY CREDIT CARD PROCEDURES
LIVINGSTON COUNTY CREDIT CARD PROCEDURES INTRODUCTION Livingston County is introducing an alternative approach to purchasing products and services through the use of credit cards. A credit card purchase
CHARLOTTE SCHOOL of LAW IDENTIFICATION BADGE POLICY
CHARLOTTE SCHOOL of LAW IDENTIFICATION BADGE POLICY PURPOSE: The purpose of the Identification Badge Policy is: To provide a consistent method of identification of those authorized to be on campus To provide
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
