DOOR ACCESS CONTROL SYSTEM POLICY
|
|
|
- Martina Mills
- 9 years ago
- Views:
Transcription
1 DOOR ACCESS CONTROL SYSTEM POLICY 1 PURPOSE 1.1 Electronic door access control systems are widely used in the National University of Singapore (NUS) to control access to buildings, offices and facilities. The use of door access control systems is to provide optimal physical security for the campus community and to protect the assets of NUS. 1.2 This policy seeks to: a. provide security for NUS while enabling freedom of access to the NUS community; b. facilitate management of all electronic door access control systems (DACS) installed in NUS, and c. enhance security by providing procedures for the administration of all electronic door access control systems. 2 DEFINITIONS 2.1 For the purposes of this policy, the following definitions apply: a. NUS Door Access Control System (NUS DACS) Card-based system that is centrally linked to NUS IT network and used in conjunction with NUS access cards. b. Access Control Device Any mechanical or electronic, including but not limited to a key or an access card. c. Individual/Individuals Staff, Students or Visitors. d. NUS the National University of Singapore, comprising campuses in Kent Ridge, Bukit Timah, University Town and all other off-campus facilities. e. NUS access card - Staff card, matriculation card, term card and temporary card. f. Site Administrator (SA) Staff appointed by Users to manage the DACS. g. Term Contractor Term Contractor supplying and maintaining DACS. Page 1 of 8
2 h. Users Administrative Offices, Faculties, Research Institutes and Residential Occupants, Data Centres, Wire Centres and any other entities of NUS that employs DACS i. Exit Door - a door provided at the doorway of an exit for passage of people (according to fire code). 3 SCOPE 3.1 This policy defines the DACS and procedures to govern the procurement, installation, administration and usage of the DACS in NUS. 3.2 This policy is applicable to all Users. Users shall keep existing system but shall comply when they need to upgrade the existing system. 4 NUS DOOR ACCESS CONTROL SYSTEM 4.1 NUS DACS is card-based and is used in conjunction with NUS access cards. NUS DACS is centrally linked and consists of an access control database, access control devices installed in the individual premises and management computer terminals. In order for authorised Individuals to access a facility, their card number has to be added to the authorised access list by the Site Administrator (SA). When accessing a facility, the holder of the authorised NUS access cards will have to tap on the card reader to access. 4.2 The following group shall be responsible for the following: a. Computer Centre (CC) to advise and manage all IT related issues relating to DACS b. Office of Campus Security (OCS) to develop and ensure compliance with DACS policy c. Office of Estate Development (OED) to coordinate procurement and installation of DACS for New and Addition & Alteration (A&A) projects managed by OED d. Office of Facilities Management (OFM) to facilitate a term maintenance contract for users to maintain DACS e. Office of Safety, Health and Environment (OSHE) to advise on safety standards and ensure compliance with statutory and university regulations f. Users (refer to definition) User shall be responsible for management and maintenance of their DACS Page 2 of 8
3 5 INSTALLATION OF DOOR ACCESS CONTROL SYSTEM 5.1 For consistency in security standards and efficiency in managing incidents during an emergency or crisis, Users shall install NUS DACS which is linked to the central door access database. Any deviations will need to be approved by Director, OCS. Users shall only install DACS that are in compliance. Users that have older DACS that are in non compliance are required to ensure compliance whenever they undergo upgrading works to their DACS. 5.2 OFM will appoint and facilitate a term contract for the maintenance of NUS DACS. Users shall approach OFM to tap the term maintenance of DACS based on the contract rates. Users will liaise with OCS, CC, OFM and OSHE to coordinate the maintenance of DACS. 5.3 All DACS installed in NUS shall be registered with OCS and OSHE (for lab doors). It is the responsibility of Users to register with OCS whenever DACS is installed at their premises. 5.4 The funding for installation of the all DACS is to be provided by Users. Any DACS installed shall be the Assets of the Users and they shall manage and maintain the DACS (see Section 8.1). 5.5 Users shall coordinate with OCS/OSHE to ensure that installation of new DACS complies with policy and statutory fire and safety regulations. Access Controls for Laboratories 5.6 To cater for the events involving unexpected power failure, malfunctioning of DACS, activation of fire alarm or other emergencies that require the evacuation of the occupants in the laboratories, the Exit Door serving any laboratories shall be designed to be fail secure. 5.7 A fail secure mechanism shall be installed that meets the following criteria: a. Occupants shall continue to have unrestricted egress through the exit door b. Only designated personnel (as determined by the lab/department) be allowed to enter the laboratory during such events mentioned in 5.6. c. Provisions made for laboratory access for such designated personnel shall not rely on electric, electronic or other controls whose operation may be affected by such events mentioned in 5.6. d. Provisions shall be made for emergency responders to bypass the door control system and enter the laboratory. Page 3 of 8
4 Access Controls for Data Centres/Wire Centres 5.8 DACS controlled doors of Data Centres / Wire Centres shall only allow access by authorized personnel. 6 APPOINTMENT OF SITE ADMINISTRATOR 6.1 Responsibility for the proper management of door access control systems rests with Users. The Dean/Director/Head shall appoint a Site Administrator (SA), who shall be a permanent staff member of NUS, to coordinate management of access list and all functional work areas relating to DACS. It is recommended that 2 SAs (Primary and Alternate) be appointed for DACS. This is to ensure that there is always a backup SA who can manage the access control system in the absence of the Primary SA. Dean/Director/Head shall also appoint a staff member of senior position to oversee the operation and conduct of SAs. 6.2 For NUS DACS, Users shall appoint up to 2 SAs and appointments should be made by the Dean/Director/Head. The SA/s appointed shall be permanent staff members. Individual user accounts will be given to each appointed SA and Users shall provide the following information to OCS before the issuance of user account to the SA: a. Department Name b. Name of Site Administrator c. Designation d. Staff Number e. Address f. Office Number g. Mobile Phone Number h. Doors to be controlled by the SA i. Appointment duration (if not permanent) 6.3 Users must inform OCS in writing if there is a change of SA. The new SA should be appointed and trained to manage the DACS when the existing SA is still available. Users shall ensure properly documented handover before the newly appointed SA takes over. 6.4 Users shall take disciplinary action against Individuals who deliberately disable the DACS. Page 4 of 8
5 7 SITE ADMINISTRATOR S RESPONSIBILITIES 7.1 SAs are required to determine the DACS operational hours so as to regulate access to facilities under their charge. The DACS shall be activated on a 24-hour basis to ensure the effective usage of DACS. However, depending on the human traffic and level of activities at the facility during office hours, Users may activate DACS only after office hours. For such facilities, on special occasions (e.g. department retreat) when there is a need to adjust DACS operational hours (e.g. to lock doors during office hours), the SA shall be responsible for the locking/unlocking of DACS-controlled doors. 7.2 To facilitate the operation of DACS, SAs shall attend to queries regarding the DACS installed and liaise with the contracted maintenance service provider for all maintenance issues. In the event of a malfunction, SAs shall be responsible for activating the maintenance service provider, and shall take necessary measures to secure access to the facility before the arrival of the maintenance service provider. 7.3 SAs shall be responsible for granting access rights to authorised Individuals. Access to DACS controlled doors shall only be granted to Individuals who are authorised in the facility. Users shall have internal guidelines for their appointed SA/s to govern the granting of access. There should also be a system in place to communicate access changes to accommodate Individuals who are newly hired, enrolled, retired or have resigned. While users may have more stringent guidelines, the following are some considerations when granting access to Individuals: a. Escort: If the need for access is infrequent, arises because of a special circumstance, or is short term, arrange for a responsible Individual to provide access. b. Temporary Access: When access is needed on a temporary rather than permanent basis, a clear time frame for access should be established. If user has to issue temporary access device (e.g. temporary card or term card), there should be a proper handing and taking over procedure. c. Hours of Work: If the facility is unlocked during an Individual s normal working hours, and access is not needed at other times, User may not grant access to the Individual. d. Access Area: User should only grant access to the least number of areas required for an Individual to perform his or her work. This may range from access to a single level in a single facility to multiple levels in multiple facilities. Page 5 of 8
6 7.4 If there is a need to grant temporary access rights, there should be documented approval before the granting of access. The documented approval should include the following information: a. Name of person b. NRIC/Foreign Identification number c. Staff/Matriculation number d. Designation e. Address f. Office Number and Mobile Phone Number g. Reasons for accessing the premise h. DACS controlled doors granted access i. Approved access duration j. Approval given by Dean/Director/Head or the appointed officer 7.5 SAs are also responsible for the timely removal of access rights when access authorization for an Individual expires. For facilities whereby the common doors are managed by OCS, the SA shall inform OCS when the Individuals are no longer authorised to access the facilities. 7.6 SAs shall ensure that activity records are not released to unauthorised persons. 8 MAINTENANCE OF DOOR ACCESS CONTROL SYSTEM 8.1 Users shall enter into a contract for regular maintenance for DACS installed. Amongst others, the maintenance service should cover emergency response by the maintenance service provider within an acceptable timeframe (should be less than 4 hours) to minimise downtime and inconvenience to facility occupants. 8.2 OFM will facilitate a term maintenance contract for NUS DACS. Users may procure the maintenance service based on the contract terms and conditions. The contract shall entail a periodical audit check by the maintenance vendors to ensure that the DACS and their supporting infrastructure are functioning as per design intent. 8.3 The funding for maintenance of all DACS is to be provided and borne by Users. 8.4 When the system malfunctions and the SA is not contactable, OFM or OCS shall have the right to activate the Supplier or any other vendors to respond and carry out the necessary repair and maintenance works. The costs incurred shall be borne by Users. Page 6 of 8
7 9 ACCESS DEVICE 9.1 Users may issue access devices (e.g. NUS access card, transponder, RFID tag etc) to facilitate usage of the installed DACS. There should also be a system in place to manage the issuance of access devices. When issuing access devices, Users shall ensure that they have the particulars of the receiver. The particulars should minimally include the name, identification number, contact number, address, address, organization and designation. 9.2 To ensure the effectiveness of the DACS, it is the responsibility of holders of access devices to ensure that they report any loss of access devices to the issuer or system owner as soon as they are aware of the loss. The holder shall not share their access device at all times. 10 EMERGENCY & SECURITY 10.1 When there is a need to perform security patrol duties in DACS controlled premises, OCS will request the SA to grant the officer/s access. Access shall be granted to authorize OCS personnel and access device shall be provided to facilitate the access. For NUS DACS, the staff card of OCS personnel may be used to facilitate access OCS may request for relevant information (e.g. access records) of the DACS from Users for investigations and audit purposes. The Users shall provide OCS with the required information. For NUS DACS, OCS may also retrieve access records directly from the system during an investigation. OCS shall ensure that access records are not released to unauthorized persons For NUS DACS, OCS has the authority to override any existing command of the system in emergencies where there is an imminent threat to life and property (e.g. fire, crime in progress). Approval, however, must be given by at least one of the following personnel: - Director, OCS - Deputy Director, OCS - Head Operations Division, OCS - Director, OSHE - Deputy Director, OSHE - Head Emergency Management Division, OSHE 10.4 OCS/OFM/OSHE shall conduct selective audits to ensure compliance to policy. Users shall be required to facilitate the audits by providing relevant information and evidence. Based on the findings of the audits, OCS/OFM/OSHE may recommend measures to improve the management of the DACS. It is the responsibility of Users to ensure that the necessary corrective measures are implemented. Page 7 of 8
8 11 COMPLIANCE AND INDEMNITY 11.1 It is the responsibility of Users with DACS at their facilities to comply with the Door Access Control System Policy. Failure in compliance would be deemed as a violation of NUS security practices as promulgated in this policy Failure by Users to observe the provisions of this policy may result, whether directly or indirectly, in NUS being involved in claims and/or suffering damages, losses and/or expenses. 12 CHANGES TO POLICY 13.1 NUS reserve the right to amend this policy or implement additional policies when necessary. Users shall be informed of policy changes via broadcast or timely updated documents. Users shall be solely responsible for staying informed about NUS policies, whenever such amendments have been made available to Users. Professor Yong Kwet Yew Vice President (Campus Infrastructure) 17 February 2014 Page 8 of 8
8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON
OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose
Administrative Procedure
Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,
Access Control Regulations
Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed
SCHOOL SECURITY POLICY & PROCEDURES
ORWELL PARK SCHOOL Nacton, Ipswich IP10 0ER SCHOOL SECURITY POLICY & PROCEDURES Date: January 2013 Status: Approved Review Date: January 2014 1 ORWELL PARK SCHOOL SECURITY POLICY AND PROCEDURES 1. PURPOSE
Security, Access Management and Key Control Policy and Procedures
1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment
Criminal Background Check Policy
Authority: Board of Regents Policy 20-19 Criminal Background Check Policy No: S-14.5 Date: March 10, 2008, amended February 2013 The Board of Regents Policy 20-19 requires that a criminal background check
It s the Business! Business continuity considerations for all organisations
It s the Business! Business continuity considerations for all organisations It ll never happen to me That s what they all say isn t it? But it happens a lot more than you d think. Statistics show that
Emergency Management Policy v. 6.04 Page 1 of 12
UC Policy Library Emergency Management Policy Policy Statements and Delegations Last Modified January 2016 Review Date February 2017 Approval Authority Vice-Chancellor Contact Person Senior Risk and Insurance
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
Health and Safety Policy and Procedures
Health and Safety Policy and Procedures Health & Safety Policy & Procedures Contents s REVISION AND AMENDMENT RECORD : Summary of Change Whole Policy 4.0 05 Nov 08 Complete re-issue Whole Policy 4.1 10
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
Policy & Procedure. Submitted by: Robert Ferrara
Policy & Procedure Subject: Security Alarm Systems Policy Applicable Documents: None Submitted by: Robert Ferrara Approved by: Effective Date: 06/01/2011 I. Title Security Alarm Systems II. Policy Statement
Customer Guide to the DATAONE Datacenter
Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY
Health and Safety Policy
Health and Safety Policy October 2014 1 October 2014 Contents: Introduction 1. STATEMENT OF INTENT AND POLICY OBJECTIVES 2. RESPONSIBILITIES AND ACCOUNTABILITIES FOR HEALTH AND SAFETY 2.1 The Director
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1
University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,
Data Centre & Facilities Access Procedures
University of Manitoba - Information Services & Technology Data Centre & Facilities Access Procedures Effective Date: Review Date: Approving Body: Applies to: March 1, 2012 March 1, 2017 Mike Langedock,
Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By
Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
PHYSICAL ACCESS CONTROL
Contact: Administrative Services Issued: June 24, 2013 Supersedes: Keys - Administration and Control of Keys, September 2007; and Keys - Issuance and Retrieval, March 1986 Pages: 13 OVERVIEW PHYSICAL ACCESS
Rolling Meadows, Illinois: Code of Ordinances
ARTICLE II. ALARM SYSTEMS DIVISION 1. GENERALLY Sec. 34-26. Definitions. The following words, terms and phrases, when used in this article, shall have the meanings ascribed to them in this section, except
Method Statement Switchboard Services
CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version 1 Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...
Data Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
To lead, manage and monitor the running of the boarding house in accordance with the Ofsted National Minimum standards for boarding schools
JOB DESCRIPTION BOARDING HOUSEMISTRESS Job Title: Job Purpose: Responsible to: Responsible for: Boarding Housemistress To lead, manage and monitor the running of the boarding house in accordance with the
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Working Relationship with Local Law Enforcement Authorities. Department of Safety and Security Scope of Authority. How to Report On-Campus Crime
Working Relationship with Local Law Enforcement Authorities The working relationship with local police departments is limited to the reporting of crimes and information sharing. The working relationship
A guide to access control for offices
A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.
HEALTH AND SAFETY POLICY AND PROCEDURES
HEALTH AND SAFETY POLICY AND PROCEDURES 1 Introduction 1. The Health and Safety at Work etc. Act 1974 places a legal duty on the University to prepare and revise as often as may be appropriate, a written
HEALTH & SAFETY POLICY
HEALTH & SAFETY POLICY 1. STATEMENT OF INTENT & POLICY OBJECTIVES The Council, as the governing body of the School, recognises and accepts the responsibilities placed on it as 'Employer' by the Health
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
City of Belmont Contractor Induction Program
City of Belmont Contractor Induction Program Page 1 of 17 14 March 2011 Source: OSH Date: 13/12/2013 City of Belmont Contractor Induction Program Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION...
SAFETY and HEALTH MANAGEMENT STANDARDS
SAFETY and HEALTH STANDARDS The Verve Energy Occupational Safety and Health Management Standards have been designed to: Meet the Recognised Industry Practices & Standards and AS/NZS 4801 Table of Contents
Job Description. Part A: Job purpose The post of Event Manager is one of 3 reporting to the Operations Manager
Job Description Job Title: Post No: Grade: Division: Location: Responsible to: Event Manager G The Cheltenham Trust Cheltenham Town Hall & Pittville Pump Room Operations Manager Responsible for: Operations
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Facilities. Visitor and Contractor Parking Policy
Facilities Visitor and Contractor Parking Policy Facilities Visitor and Contractor Parking Policy Contents Page 1 Introduction....................................................1 2 Administration of
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY
SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY UNIT DESCRIPTOR This unit covers the competencies required to create and maintain a safe and secure hotel property both inside the property and the surrounding
Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.
Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 [email protected] Page 1 of 10 Contents I. Protecting our clients data...2 II. Information
Aylesford School. and Sixth Form College. wonder aspiration respect discipline RISK MANAGEMENT POLICY. Finance and Premises Committee
Aylesford School and Sixth Form College wonder aspiration respect discipline RISK MANAGEMENT POLICY Written: January 2015 Review Date: January 2017 Lead: Site Manager Via: Finance and Premises Committee
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)
OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained
When you make a holiday rental booking using Wotusee.com the following terms and conditions apply.
When you make a holiday rental booking using Wotusee.com the following terms and conditions apply. You must be 18 years and over to book holiday rental displayed on Wotusee.com. 1) Supplier goods and services
CHARLOTTE SCHOOL of LAW IDENTIFICATION BADGE POLICY
CHARLOTTE SCHOOL of LAW IDENTIFICATION BADGE POLICY PURPOSE: The purpose of the Identification Badge Policy is: To provide a consistent method of identification of those authorized to be on campus To provide
Human Resources ATTENDANCE MANAGEMENT POLICY AND PROCEDURE. Agreed June 2013
Human Resources ATTENDANCE MANAGEMENT POLICY AND PROCEDURE Agreed June 2013 To be reviewed 2015 Contents Page 1. Scope and Policy 3 2. Accountability 3 3. Learner Involvement 3 4. Process 4.1 Rules for
Business Continuity Plan
Business Continuity Plan IMMEDIATE ACTIONS Manager/Supervisor 1. Ensure emergency services contacted 2. Ensure safety of personnel 3. Co-ordinate with the emergency services 4. Contact Senior members of
University Emergency Management Plan
University Emergency Management Plan This plan has been designed to be consistent with the format of the Emergency Action Plans held by the departments and buildings of the University. This will enable
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
REPORT 4 FOR DECISION. This report will be considered in public
REPORT 4 Subject: Safety Readiness for the Summer 2013 Events Programme Agenda item: Public Item 7 Report No: 4 Meeting date: 28 May 2013 Report to: Board Report of: Mark Camley, Interim Executive Director
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Title of the Policy: Surveillance Policy
Title of the Policy: Surveillance Policy Functional Area: University Police Applies To: All Faculty and Staff Policy Reference(s): Number: Version 1.0 Date First Issued: March 15, 2016 Date Last Reviewed:
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Hospitality Services Service Level Standards
Hospitality Services Service Level Standards Contents 1. Introduction and Purpose 2. Customer Promise 3. Definition of Services 4. Performance Tracking and Reporting 5. Complaints Management 6. Training
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
1.001 University Board of Trustees Powers and Duties
1.001 University Board of Trustees Powers and Duties (1) Pursuant to Article IX, section 7(c), Florida Constitution, the Board of Governors shall establish the powers and duties of the board of trustees
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
Asbestos Management Policy (Version 3)
Asbestos Management Policy (Version 3) Contents Page Introduction 3 College Policy Statement for Asbestos Management 3 Objectives (of this Policy and Procedure) 3 Application of Policy 4 Licensed Asbestos
FIRE SAFETY MANUAL. Table of contents can be found on the left side of this document.
FIRE SAFETY MANUAL Table of contents can be found on the left side of this document. 1. INTRODUCTION The University of Regina strives to preserve life and property by recognizing that a prompt, efficient
Health, Security, Safety and Environment (HSE)
Health, Security, Safety and Environment (HSE) Content: 1 Objective 2 Application and Scope 21 Application of HSE Directive with underlying documents 22 Scope of HSE Management system 3 Framework for our
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
2014/15 HIRE OF SCHOOL PREMISES GATEACRE SCHOOL. I. K. THORNHILL BUSINESS MANAGER May 2014
GATEACRE SCHOOL 2014/15 HIRE OF SCHOOL PREMISES I I. K. THORNHILL BUSINESS MANAGER May 2014 CONTENTS 1) PRINCIPLES OF HIRE 2) CONDITIONS OF USE 3) HIRE AGREEMENT 4) HIRE REQUEST FORM 5) HIRE CHARGES 6)
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
UPP Residential Services Fire Risk Assessment
UPP Residential Services Fire Risk Assessment TS11151-R02-DRAFT1 15 August 2011 for: Keynes College University Road Canterbury Kent Recommended latest review date 14 August 2011 Executive summary This
GRANITE SCHOOL DISTRICT LOCKDOWN AND SCHOOL SAFETY PROGRAM
GRANITE SCHOOL DISTRICT LOCKDOWN AND SCHOOL SAFETY PROGRAM GRANITE SCHOOL DISTRICT Lockdown Program Overview Due to the number and variety of school buildings and other facilities within the District,
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE:
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Access Control REFERENCE: CATEGORY: Real Estate and Facilities PAGE: 1 of 6 SUPERSEDES: APPROVER: Larry Marbert Vice President, Real Estate and Facilities
CYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan
POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan Introduction The Point University Emergency Response Plan establishes guidelines for campus-wide communication, service coordination and safety
ALARM SYSTEMS INFORMATION & REQUIREMENTS
Revised 9/14/2011 ALARM SYSTEM FEES Alarm system permit fee (annually) $50 Alarm system service fee $50 if in excess of 5 alarms per year (12 alarms for apartments) ARTICLE 4.500 ALARM SYSTEM BUSINESSES
Key Management Policy
THE LAMBTON COLLEGE OF APPLIED ARTS AND TECHNOLOGY Issued Date: Supersedes Date: Policy #: January 04, 2006 October 02, 2003 4000-4-7 Key Management Policy Policy It is the policy of the Lambton College
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
Safety & Security October 2015
Safety & Security October 2015 Intro PCC Facilities and College Police constantly monitor and strive to improve security and safety at the college. This presentation will cover improvement projects that
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Policy for the Control of Fire
London School of Economics & Political Science Policy for the Control of Fire First Draft: Final Draft: Approved by Estate Strategy Committee: Next Review Date: 29.10.2013 29.10.2013 04.11.2013 29.10.2014
IT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
Ulster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
Guidance Document For The Use of Lasers and Intense Pulse Light in Licensed Special Treatment Premises Within The London Borough of Brent
Guidance Document For The Use of Lasers and Intense Pulse Light in Licensed Special Treatment Premises Within The London Borough of Brent This guidance document relates to lasers and intense pulsed light
NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager 17.09.12
POLICY BUSINESS CONTINUITY Policy owners Policy holder Author Head of Services Specialist Operations Contingency Planning Business Continuity Manager Policy No. 132 Approved by Legal Services 17.09.12
CODE ENFORCEMENT AND CERTIFICATION OF INSPECTORS FOR PUBLIC SCHOOLS, CHARTER SCHOOLS AND JUNIOR COLLEGES
DEPARTMENT OF PUBLIC SAFETY CODE ENFORCEMENT AND CERTIFICATION OF INSPECTORS FOR PUBLIC SCHOOLS, CHARTER SCHOOLS AND JUNIOR COLLEGES 8 CCR 1507-30 [Editor s Notes follow the text of the rules at the end
SCHEDULE 25. Business Continuity
SCHEDULE 25 Business Continuity 1. Scope 1.1 This schedule covers TfL s requirements in respect of: any circumstance or event which renders, or which TfL considers likely to render, it necessary or desirable
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Induction & Orientation of Educators, Students & Volunteers
1 Induction & Orientation of Educators, Students & Volunteers Purpose It is a requirement of the Education and Care Services National Regulations that staffing arrangements are documented in policy. To
