DataCentre Access Policies & Procedures

Size: px
Start display at page:

Download "DataCentre Access Policies & Procedures"

Transcription

1 DataCentre Access Policies & Procedures

2 Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5 DataCentre Etiquette Rules... 5 Ownership of Equipment... 5 Appendix A: DataCentre Access Agreement... 6 Appendix B: DataCentre Unescorted Access Request Procedure... 7 Appendix C: DataCentre Escorted Access Request Procedure... 7 Appendix D: DataCentre Approved Vendor Access Procedure... 7 Appendix E: DataCentre Etiquette

3 Purpose The ICONZ-Webvisions DataCentres provide stable environments, enhanced security, alarms, uninterrupted power (UPS and generators), high-speed network connectivity, 24x7 Operator coverage and other features required by the mission-critical resources they contain. The policies and procedures described in this document have been developed to maintain a secure, safe environment and must be followed by individuals working in or visiting the DataCentres. All individuals requesting access or maintaining servers in the DataCentre must understand and agree to these procedures. Overview The ICONZ-Webvisions DataCentres contain ICONZ-Webvisions and ICONZ-Webvisions Customers computing and networking resources. Access is controlled to protect both the physical resources and the data from unauthorised use, accidental or malicious damage and theft. Access to the DataCentres will only be granted when a legitimate business need is demonstrated. This access policy and procedure document specifies the criteria for granting access to specific individuals or groups. Failure to follow these policies is considered grounds for dismissal and/or prosecution. Failure of a vendor, consultant, or contractor to follow these policies is grounds for termination of agreements and subsequent legal action. Any questions regarding policies and procedures should be addressed to the ICONZ-Webvisions Cloud Platform & Engineering Manager. This DataCentre Access Policy may be suspended in the event of an emergency that requires access for medical, fire, or police personnel. ICONZ-Webvisions shall give not less than 10 Business Days notice of any changes to its access policies and procedures. DataCentre Access Unescorted electronic swipe access and escorted unsupervised 24x7 access to the DataCentres will only be given to individuals with an approved and demonstrated business need to access the DataCentres on a regular basis, those individuals requiring infrequent access will be granted escorted and/or supervised access as needed. Individuals with Unescorted Access may escort and supervise unauthorised individuals provided all individuals are signed in and out at reception. Electronic swipe keys belonging to authorised individuals may not be loaned to unauthorised individuals; such action is grounds for disciplinary or legal action. Any employee or vendor that forgets or misplaces their electronic swipe key will be restricted to Escorted Access to the DataCentres until their electronic swipe key is replaced. Violations of the agreement may result in removal of access. Individuals that violate the policies and have their access removed may face additional disciplinary or legal actions, pending review by the ICONZ-Webvisions Cloud Platform & Engineering Manager. 3

4 DataCentre Access Levels Definitions Unescorted Access Status Authorised to enter the DataCentres unescorted 24/7 and is provided with an electronic swipe key with access to DataCentre floors and biometric scanner access for DataCentre doors. Escorted Access Status Authorised to enter the DataCentres escorted 24/7. Access to the DataCentres will be provided by an individual with Unescorted Access, however individuals with Escorted Access are authorised to remain in the DataCentre unsupervised once access has been granted. Levels of Access A. Employee Employees that work inside the DataCentre or have been granted the access based on their job requirements will have Unescorted Access to the DataCentre. Electronic swipe keys must be visible at all times when in the DataCentre. Please see Appendix B: DataCentre Unescorted Access Procedure on page 7 for more information. B. Customer Approved employees or contractors of ICONZ-Webvisions Customers who purchase Colocation services will be given Escorted Access to their rack/s in the DataCentre in order to install/de-install equipment, perform regular scheduled maintenance and repair work and have general access to their colocated equipment. Unescorted Access may be given temporarily at times to perform specific work such as equipment migration from one floor to another. Please see Appendix C: DataCentre Escorted Access Procedure on page 7 for more information. C. Vendor Approved ICONZ-Webvisions Vendors will be given Unescorted Access to the DataCentre in order to perform regular scheduled maintenance or repair work. All other ICONZ-Webvisions Vendors will be granted Escorted Access or alternatively Unescorted Access may be given temporarily at times to perform specific work. Please see Appendix D: DataCentre Approved Vendor Access Procedure on page 7 for information about vendor access. D. DataCentre Tours DataCentre tours must be pre-approved by the Engineering Team Leader and occur during normal business hours (Monday Friday 9:00am 5:00pm). All visitors must sign in and out at reception and be accompanied by an ICONZ-Webvisions employee while touring the DataCentres. 4

5 Periodic Review & Termination of Access The Engineering Team Leader will review the electronic swipe key access list every 90 days and will remove any individuals who no longer have a legitimate business need to access the DataCentres. As part of the employee exit procedure the Engineering Team are notified when employees leave ICONZ-Webvisions. The relevant Department Manager will request the immediate removal of access rights if the employee has DataCentre access. Customers must advise ICONZ-Webvisions when an approved employee or contractor is no longer in their employ or they no longer wish for that employee or contractor to have access to their equipment colocated in the DataCentre. DataCentre Access Log The Access log for the DataCentre must be maintained at all times by the ICONZ-Webvisions Customer Care Team. The log is kept online in the ICONZ-Webvisions CRM system and each entry includes Full Name, Date and Time details. All individuals with Escorted Access status entering the DataCentre must present their ICONZ-Webvisions photo ID Tag or another form of approved photo identification, such as Drivers License or Passport. All other unauthorised individuals must sign in and out at reception as they enter and exit for audit purposes. DataCentre Etiquette Rules It is mandatory that all people working within the DataCentre adhere to the posted rules of etiquette. This will insure DataCentre safety and efficiency. Please see Appendix E: DataCentre Etiquette on page 7 for more information. Ownership of Equipment ICONZ-Webvisions acknowledges that it has and gains no rights (legal or equitable) over any Customers equipment, servers or systems colocated in the DataCentre subject to the Customers Service Agreement. No dispute, breach or termination of the Service Agreement will be grounds for denying the Customer and/or its agent s access to the Customers equipment and the removal of such equipment. Where ICONZ-Webvisions has removed the Customers Escorted Access Status, an ICONZ-Webvisions employee will accompany and supervise the Customer s employee/s or contractor/s in order to provide access to the Customers equipment. 5

6 Appendix A: DataCentre Access Agreement Company Name Applicant Name Job Title Applicant Phone Applicant Physical Address (used to courier ID Tag) Justification for Access Those granted DataCentre access must abide by the following rules: 1. An individual that has Unescorted Access MUST formally sign in and out ALL visitors that are accompanying them into the DataCentre. 2. Individuals with access privilege must abide by all policies and procedures as described in the ICONZ-Webvisions DataCentre Access Policies and Procedures document. 3. Violating these rules can result in DataCentre access being revoked and/or disciplinary or legal action. 4. Read and abide all DataCentre access policies and procedures. I fully understand and agree to these rules. I also agree to provide my full cooperation during any investigation concerning a security matter, which might have occurred in the DataCentre during a time when my presence in the facility has been recorded. Abuse of this access privilege and/or non-compliance with this agreement may result in removal of access and/or disciplinary or legal action. Applicant s Signature ICONZ-Webvisions Authorising Manager Signature Date Date Access Level Unescorted Access Escorted Access INTERNAL USE ONLY Date Photo Taken (Y/N) Photo Serial Number Floor # Rack # Access Level (e.g. 24/7) Barcode # Entered in CRM (Y/N) 6

7 Appendix B: DataCentre Unescorted Access Request Procedure 1. Each employee requesting Unescorted Access to the DataCentres must complete a DataCentre Access Agreement form. 2. The Cloud Platform & Engineering Manager must sign the Access Agreement form before access can be granted. 3. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 4. The electronic swipe key will then be authorised for access to the DataCentres and the employee will be setup with biometric access on their first entry to the DataCentres. Appendix C: DataCentre Escorted Access Request Procedure 1. The request to add an authorised person must come in writing from an existing authorised person or alternatively an authorised signatory for the company e.g. Director, Owner, General Manager, CTO, CEO 2. Each Customer employee or contractor requesting Escorted Access to the DataCentres must complete a DataCentre Access Agreement form and have their photo taken hours notice is required to process applications for DataCentre Access. 4. The Operations Manager must sign the Access Agreement form before access can be granted. 5. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 6. The CRM record will be created and photo ID Tag will then be provided for Escorted Access to the DataCentres. Appendix D: DataCentre Approved Vendor Access Procedure 1. Each individual vendor requesting Unescorted Access to the DataCentres must complete the DataCentre Access Agreement Form. 2. The Cloud Platform & Engineering Manager must sign the Access Agreement form before access can be granted. 3. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 4. In the event that the request is denied, the vendor and sponsoring ICONZ-Webvisions department will be informed by If Unescorted Access is approved, the electronic swipe key will then be authorised for access to the DataCentres and the vendor will be setup with biometric access on their first entry to the DataCentres. Appendix E: DataCentre Etiquette 1. All work areas must be kept clean and free of debris. Staff performing work in the DataCentres must ensure that they have left the areas as clean as they were before beginning their work. 2. To reduce fire hazards rack enclosures must be kept neat and free of manuals, media, boxes and unused equipment. Rack enclosures are not storage cabinets and must only be used for functioning equipment. 3. Doors on all racks should remain closed at all times except during maintenance. 4. Cables should never be strung outside of rack enclosures. 5. Under no circumstances should any Customer or a Customer s Contractor: a. Lift floor tiles without prior knowledge, consent, and oversight of ICONZ-Webvisions staff. b. Tamper with or interfere with the normal function of the Transformers or Power Distribution Units (PDU). c. Tamper with or interfere with the normal function of the Air Conditioning units. d. Plug any device into another rack s power supply. e. Remove any cables or power connections from equipment other than their own. 6. The Cloud Platform & Engineering Manager should be contacted immediately if any customer or vendor requests access to the DataCentre plant room, infrastructure and/or environmental systems. 7

8 7. Suspicious activity or access and/or broken or faulty equipment must be reported to ICONZ-Webvisions staff immediately. 8. If there is a fire or the fire alarm sounds, staff performing work in the DataCentres must exit following the exit signs via the stairs immediately to the assembly point on Airedale Street. As part of our fire exit policy we do not actively check the DataCentre floors for visitors. 9. Under no circumstance should any food and beverages of any kind be within the DataCentre. 8

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy

Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to

More information

Data Centre & Facilities Access Procedures

Data Centre & Facilities Access Procedures University of Manitoba - Information Services & Technology Data Centre & Facilities Access Procedures Effective Date: Review Date: Approving Body: Applies to: March 1, 2012 March 1, 2017 Mike Langedock,

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

IT FACILITY STANDARD NO. 5 DATA CENTER & IT FACILITY ACCESS

IT FACILITY STANDARD NO. 5 DATA CENTER & IT FACILITY ACCESS Function Affected: IT Facilities including data centers and network rooms (BDFs and IDFs) Issued Date: 06/01/15 Issue Superseded: 12/15/13 Number of Pages: 6 I. Background The UCSF data centers and network

More information

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL

More information

MARULENG LOCAL MUNICIPALITY

MARULENG LOCAL MUNICIPALITY MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details

More information

PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL

PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL Page 1 of 19 Contents Data Center Access Control... 3 Access Authorization Procedure... 6 Visitor and Vendor Access... 8 Equipment Ordering

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements

More information

CO-LOCATION SPACE SCHEDULE OF SERVICES Schedule 1

CO-LOCATION SPACE SCHEDULE OF SERVICES Schedule 1 CO-LOCATION SPACE SCHEDULE OF SERVICES Schedule 1 1. THIS SCHEDULE - INTERPRETATION 1.1 The terms of this Co-Location Space Schedule of Services ( Schedule 1 ) apply together with, in addition to and form

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Customer Guide to the DATAONE Datacenter

Customer Guide to the DATAONE Datacenter Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY

More information

Rules of Conduct and Safety

Rules of Conduct and Safety Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

Physical Security Policy Template

Physical Security Policy Template Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Corrections Management (Maintenance and Capital Upgrades) Policy 2014

Corrections Management (Maintenance and Capital Upgrades) Policy 2014 Australian Capital Territory Corrections Management (Maintenance and Capital Upgrades) Policy 2014 Notifiable instrument made under the Corrections Management Act 2007, section 14(1) (Corrections policies

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...

More information

Chromebook Procedures and Information for Students and Parents

Chromebook Procedures and Information for Students and Parents for Students and Parents Central R-3 High School 1:1 With Chromebooks Procedures & Information For Students and Parents The mission of the 1:1 program in the Central R-3 High School is to create a collaborative

More information

MEETINGS. Application for Hire

MEETINGS. Application for Hire MEETINGS Application for Hire HIRING INFORMATION ACON s Meeting Centre at 414 Elizabeth Street, Surry Hills has a range of multi-purpose meeting rooms that are made available to groups and organisations

More information

CS&T Data Center Hosted Shared Services Policies & Work Rules

CS&T Data Center Hosted Shared Services Policies & Work Rules CS&T Data Center Hosted Shared Services Policies & Work Rules Last Modified 07-08-2014 1 Personal Accountability Failure to comply with the following procedures is grounds for immediate removal from the

More information

Tablet 1:1 Initiative

Tablet 1:1 Initiative Tablet 1:1 Initiative Handbook Overview This handbook is intended to provide essential information about the use of student Tablet computers in. The one to one student and teacher Tablet program provides

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access Page 1 Walton Centre Remote working Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access Page 2 Table of Contents Section

More information

Physical and Environment IT Security Standards

Physical and Environment IT Security Standards Physical and Environment IT Security Standards Author s Name: Jo Brown Author s Job Title: Head of Technical Services Division: Corporate Department: Technical Services Version Number: 1.0 Ratifying Committee:

More information

Facts About the South Dakota Identity Theft Program

Facts About the South Dakota Identity Theft Program South Dakota Association of Rural Water Systems Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where

More information

Chromebook Policy and Information for Students and Parents

Chromebook Policy and Information for Students and Parents 1 Chromebook Policy and Information for Students and Parents The mission of the 1:1 program in the Meadow Heights High School is to create a collaborative learning environment for all learners. This environment

More information

Security April 2015. Solving the data security challenge with our enhanced private and hybrid cloud services

Security April 2015. Solving the data security challenge with our enhanced private and hybrid cloud services Security April 2015 Secure cloud solutions with guaranteed UK data sovereignty. Solving the data security challenge with our enhanced private and hybrid cloud services This paper enables discussion around

More information

2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04

2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property

More information

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS) Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment

More information

LifeWays Operating Procedure

LifeWays Operating Procedure 11-02.01 MAINTENANCE REPAIR AND FACILITIES COORDINATION PURPOSE: To provide light maintenance, after-hours security on-call coverage and Meeting Room set-up for 1200 N. West Avenue (Jackson), and 25 Care

More information

Student Network Acceptable Use Policy Lone Jack C-6 School District

Student Network Acceptable Use Policy Lone Jack C-6 School District Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Colocation Master Services Vol.1.0

Colocation Master Services Vol.1.0 Colocation Master Services Vol.1.0 THIS COLOCATION MASTER SERVICE AGREEMENT ( Colo MSA or Colocation MSA ) shall apply to Service Orders or Agreements ( agreement(s), service order(s), or contract(s) )

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

CHAPTER 1. Student and Parent/Guardian Loan Agreement for ipads

CHAPTER 1. Student and Parent/Guardian Loan Agreement for ipads CHAPTER 1 Student and Parent/Guardian Loan Agreement for ipads Penncrest High School 2014-2015 1 Introduction: Rose Tree Media School District fully understands the importance of technology to the educational

More information

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head:

Effective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Policy Title: Effective Date: Revision Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Every 2 years or as needed Purpose: The purpose of

More information

Information Systems (IS) Visiting Worker Information Security Policy

Information Systems (IS) Visiting Worker Information Security Policy Information Systems (IS) Visiting Worker Information Security Policy www.afbini.gov.uk INFORMATION SYSTEMS (IS) VISITING WORKER INFORMATION SECURITY POLICY Reference: AFBI POL 02/09 Date: 25 March 2009

More information

Colocation Center Policies & Procedures

Colocation Center Policies & Procedures Integra Integra Telecom, Inc. has adopted the following Policies and Procedures related to our Colocation Services and use of our Colocation Centers. The Policies and Procedures are subject to change as

More information

DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL

DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL Revised on May 18, 2011 Section 1 ACCESS CONTROL SYSTEM (ACS) DESCRIPTION Monitoring building access and the general security of buildings and facilities

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08 - Basic Rancho Cordova Data Center Tenant Guide 2014-08 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 PURPOSE... 3 2 COMPUTER ROOM GUIDELINES... 4 2.1 GENERAL SITE GUIDELINES... 4 2.2 CABINET GUIDELINES...

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

For parents this document should be read in conjunction with the Osper Cardholder Terms and Conditions.

For parents this document should be read in conjunction with the Osper Cardholder Terms and Conditions. Version: 10.08.15 Osper Service Terms Introduction This document explains your legal rights and obligations in relation to your use of the Osper Service ( Osper ), including use of the Osper App. Parents

More information

Department of Information Technology

Department of Information Technology Department of Information Technology ISSUE DATE: 6/3/08 EFFECTIVE DATE: 9/1/08 Facilities TITLE: Physical Access Control for DoIT POLICY NUMBER: DOIT-773-3102-001-A REVISED DATE: NEXT REVIEW DATE: 9/1/09

More information

Software compliance policy

Software compliance policy Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who

More information

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6

More information

ROSE HILL SCHOOLS USD 394 Laptop Policy

ROSE HILL SCHOOLS USD 394 Laptop Policy ROSE HILL SCHOOLS USD 394 Laptop Policy The laptop, carrying case and all other accessories that have been issued to the student are the property of Rose Hill Schools USD 394. These items are on loan to

More information

Customer Manual. for colocation customers of M247 Ltd. v2.1.0. Classification: A (Public)

Customer Manual. for colocation customers of M247 Ltd. v2.1.0. Classification: A (Public) Customer Manual for colocation customers of M247 Ltd v2.1.0 Classification: A (Public) M247 Ltd 1 Ball Green Stretford, Manchester M32 0QT T +44 (0)161 615 1270 F +44 (0)161 8655 763 support@m247.com http://m247.com

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

CHS 1:1 With Chromebooks Procedures and Info for Students and Parents. 1. Receiving Your Chromebook. 2. Returning Your Chromebook

CHS 1:1 With Chromebooks Procedures and Info for Students and Parents. 1. Receiving Your Chromebook. 2. Returning Your Chromebook CHS 1:1 With Chromebooks Procedures and Info for Students and Parents The mission of the 1:1 program in at Carmel High School is to create a collaborative learning environment for all learners. This environment

More information

APPLICATION & RULES FOR OWNERS, CONTRACTORS, MOVERS

APPLICATION & RULES FOR OWNERS, CONTRACTORS, MOVERS THE STRATFORD AT PELICAN BAY CONDOMINIUM ASSOCIATION, INC. Remodeling, Renovating, Altering, Repairing and Moving APPLICATION & RULES FOR OWNERS, CONTRACTORS, MOVERS 5601 TURTLE BAY DR. NAPLES, FL 34108

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes. Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.net Page 1 of 10 Contents I. Protecting our clients data...2 II. Information

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Defending your data against physical threats

Defending your data against physical threats Defending your data against physical threats Facts and guidelines for Datacentre Security Management 1 2 Physical security A vital link in data centre defence The exponential rise in data centres is matched

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Colocation Service Terms & Conditions

Colocation Service Terms & Conditions Colocation Service Terms & Conditions Issue Date: 19/10/12 Version: 1.5 Page 1 of 12 Schedule 2 Colocation Service Terms & Conditions 1. Preamble 1.1. These Colocation Service Terms & Conditions provide

More information

ARTICLE 10. INFORMATION TECHNOLOGY

ARTICLE 10. INFORMATION TECHNOLOGY ARTICLE 10. INFORMATION TECHNOLOGY I. Virtual Private Network (VPN) The purpose of this policy is to provide guidelines for Virtual Private Network (VPN) connections to Education Division s resources.

More information

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further

More information

UK Dedicated Servers Limited. Acceptable Use Policy

UK Dedicated Servers Limited. Acceptable Use Policy UK Dedicated Servers Limited Acceptable Use Policy Last Revision 10/12/2014 Telephone: 03450 915 620 Postal Address: UK Dedicated Servers Limited 61 Somers Road Industrial Estate Rugby Warwickshire CV22

More information

William Jewell College Jewellverse Policies

William Jewell College Jewellverse Policies William Jewell College Jewellverse Policies Prior to receiving a William Jewell College network account, all students, faculty and staff are required to read and sign the College s Acceptable Use Policy.

More information

Huddersfield New College Further Education Corporation

Huddersfield New College Further Education Corporation Huddersfield New College Further Education Corporation Card Payments Policy (including information security and refunds) 1.0 Policy Statement Huddersfield New College Finance Office handles sensitive cardholder

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

MOUNT CARMEL HEALTH SYSTEM MEDICAL EDUCATION POLICY/PROCEDURE

MOUNT CARMEL HEALTH SYSTEM MEDICAL EDUCATION POLICY/PROCEDURE DEPARTMENT OVERSIGHT AND MAINTENANCE: ADMINISTRATIVE DEFINITIONS Vendor: Patient Care Areas: Associates: Includes sales representatives, service technicians, clinical and or training personnel, third party

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures

Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures 2015-2016 DPS Tablet Assigned to: Tablet TAG: Serial Number: Distribution of Devices Surface Pro Tablets and accessories

More information

County Identity Theft Prevention Program

County Identity Theft Prevention Program INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

ISS Data Centre. Hosting & Access Policy

ISS Data Centre. Hosting & Access Policy ISS Data Centre Hosting & Access Policy Approved on: 20 January 2011 Document Revision History Version Date Summary of change(s) 0.1 20 Oct 2010 Initial Draft 0.2 03 Nov 2010 Updated following review with

More information

Physical Protection Policy Sample (Required Written Policy)

Physical Protection Policy Sample (Required Written Policy) Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

Purchasing Card Procedure Manual

Purchasing Card Procedure Manual Purchasing Card Procedure Manual Draft 05/26/11 Table of Contents PURCHASING CARD PROGRAM... 3 ACQUIRING A PURCHASING CARD... 3 TRAINING... 4 ACTIVATION AND RENEWAL... 4 CARDHOLDER ROLES & RESPONSIBILITIES...

More information

Student Laptop User Charter

Student Laptop User Charter Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION

Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION Internode Pty Ltd ABN 82 052 008 581 Phone: 13 66 33 1/502 Hay Street, Subiaco WA 6008 15 October 2013 Rules of interpretation and capitalised

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the

More information

Conditions for ICT Partner Solutions Service Schedule for Phoenix Co-Lo Services

Conditions for ICT Partner Solutions Service Schedule for Phoenix Co-Lo Services Conditions for ICT Partner Solutions Service Schedule for 1. Definitions and Interpretation The following definitions shall apply to the provision of the Service, in addition to those in the General Terms

More information

Colocation Access Policy

Colocation Access Policy Colocation Access Policy Sites DCN1 and DCN2 By Christian Clarke, IT Operations Manager CWCS Managed Hosting Portland Street Beeston Nottingham NG9 2LP Page 1 of 5 Contents 1.0 Policy Statement... 3 2.0

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business

CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Palacios High School. Creating a Culture of excellence through High Expectations. Student/Parent Laptop Handbook

Palacios High School. Creating a Culture of excellence through High Expectations. Student/Parent Laptop Handbook Palacios High School Creating a Culture of excellence through High Expectations Student/Parent Laptop Handbook 2014-2015 Page 2 of 18 Table of Contents Purpose of the Laptop Checkout Initiative 3 Terms

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

COMMERCIALISM INTEGRITY STEWARDSHIP. Security Breach and Weakness Policy & Guidance

COMMERCIALISM INTEGRITY STEWARDSHIP. Security Breach and Weakness Policy & Guidance Security Breach and Weakness Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Security Breach & Weakness

More information