DataCentre Access Policies & Procedures
|
|
- Caroline Joseph
- 8 years ago
- Views:
Transcription
1 DataCentre Access Policies & Procedures
2 Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5 DataCentre Etiquette Rules... 5 Ownership of Equipment... 5 Appendix A: DataCentre Access Agreement... 6 Appendix B: DataCentre Unescorted Access Request Procedure... 7 Appendix C: DataCentre Escorted Access Request Procedure... 7 Appendix D: DataCentre Approved Vendor Access Procedure... 7 Appendix E: DataCentre Etiquette
3 Purpose The ICONZ-Webvisions DataCentres provide stable environments, enhanced security, alarms, uninterrupted power (UPS and generators), high-speed network connectivity, 24x7 Operator coverage and other features required by the mission-critical resources they contain. The policies and procedures described in this document have been developed to maintain a secure, safe environment and must be followed by individuals working in or visiting the DataCentres. All individuals requesting access or maintaining servers in the DataCentre must understand and agree to these procedures. Overview The ICONZ-Webvisions DataCentres contain ICONZ-Webvisions and ICONZ-Webvisions Customers computing and networking resources. Access is controlled to protect both the physical resources and the data from unauthorised use, accidental or malicious damage and theft. Access to the DataCentres will only be granted when a legitimate business need is demonstrated. This access policy and procedure document specifies the criteria for granting access to specific individuals or groups. Failure to follow these policies is considered grounds for dismissal and/or prosecution. Failure of a vendor, consultant, or contractor to follow these policies is grounds for termination of agreements and subsequent legal action. Any questions regarding policies and procedures should be addressed to the ICONZ-Webvisions Cloud Platform & Engineering Manager. This DataCentre Access Policy may be suspended in the event of an emergency that requires access for medical, fire, or police personnel. ICONZ-Webvisions shall give not less than 10 Business Days notice of any changes to its access policies and procedures. DataCentre Access Unescorted electronic swipe access and escorted unsupervised 24x7 access to the DataCentres will only be given to individuals with an approved and demonstrated business need to access the DataCentres on a regular basis, those individuals requiring infrequent access will be granted escorted and/or supervised access as needed. Individuals with Unescorted Access may escort and supervise unauthorised individuals provided all individuals are signed in and out at reception. Electronic swipe keys belonging to authorised individuals may not be loaned to unauthorised individuals; such action is grounds for disciplinary or legal action. Any employee or vendor that forgets or misplaces their electronic swipe key will be restricted to Escorted Access to the DataCentres until their electronic swipe key is replaced. Violations of the agreement may result in removal of access. Individuals that violate the policies and have their access removed may face additional disciplinary or legal actions, pending review by the ICONZ-Webvisions Cloud Platform & Engineering Manager. 3
4 DataCentre Access Levels Definitions Unescorted Access Status Authorised to enter the DataCentres unescorted 24/7 and is provided with an electronic swipe key with access to DataCentre floors and biometric scanner access for DataCentre doors. Escorted Access Status Authorised to enter the DataCentres escorted 24/7. Access to the DataCentres will be provided by an individual with Unescorted Access, however individuals with Escorted Access are authorised to remain in the DataCentre unsupervised once access has been granted. Levels of Access A. Employee Employees that work inside the DataCentre or have been granted the access based on their job requirements will have Unescorted Access to the DataCentre. Electronic swipe keys must be visible at all times when in the DataCentre. Please see Appendix B: DataCentre Unescorted Access Procedure on page 7 for more information. B. Customer Approved employees or contractors of ICONZ-Webvisions Customers who purchase Colocation services will be given Escorted Access to their rack/s in the DataCentre in order to install/de-install equipment, perform regular scheduled maintenance and repair work and have general access to their colocated equipment. Unescorted Access may be given temporarily at times to perform specific work such as equipment migration from one floor to another. Please see Appendix C: DataCentre Escorted Access Procedure on page 7 for more information. C. Vendor Approved ICONZ-Webvisions Vendors will be given Unescorted Access to the DataCentre in order to perform regular scheduled maintenance or repair work. All other ICONZ-Webvisions Vendors will be granted Escorted Access or alternatively Unescorted Access may be given temporarily at times to perform specific work. Please see Appendix D: DataCentre Approved Vendor Access Procedure on page 7 for information about vendor access. D. DataCentre Tours DataCentre tours must be pre-approved by the Engineering Team Leader and occur during normal business hours (Monday Friday 9:00am 5:00pm). All visitors must sign in and out at reception and be accompanied by an ICONZ-Webvisions employee while touring the DataCentres. 4
5 Periodic Review & Termination of Access The Engineering Team Leader will review the electronic swipe key access list every 90 days and will remove any individuals who no longer have a legitimate business need to access the DataCentres. As part of the employee exit procedure the Engineering Team are notified when employees leave ICONZ-Webvisions. The relevant Department Manager will request the immediate removal of access rights if the employee has DataCentre access. Customers must advise ICONZ-Webvisions when an approved employee or contractor is no longer in their employ or they no longer wish for that employee or contractor to have access to their equipment colocated in the DataCentre. DataCentre Access Log The Access log for the DataCentre must be maintained at all times by the ICONZ-Webvisions Customer Care Team. The log is kept online in the ICONZ-Webvisions CRM system and each entry includes Full Name, Date and Time details. All individuals with Escorted Access status entering the DataCentre must present their ICONZ-Webvisions photo ID Tag or another form of approved photo identification, such as Drivers License or Passport. All other unauthorised individuals must sign in and out at reception as they enter and exit for audit purposes. DataCentre Etiquette Rules It is mandatory that all people working within the DataCentre adhere to the posted rules of etiquette. This will insure DataCentre safety and efficiency. Please see Appendix E: DataCentre Etiquette on page 7 for more information. Ownership of Equipment ICONZ-Webvisions acknowledges that it has and gains no rights (legal or equitable) over any Customers equipment, servers or systems colocated in the DataCentre subject to the Customers Service Agreement. No dispute, breach or termination of the Service Agreement will be grounds for denying the Customer and/or its agent s access to the Customers equipment and the removal of such equipment. Where ICONZ-Webvisions has removed the Customers Escorted Access Status, an ICONZ-Webvisions employee will accompany and supervise the Customer s employee/s or contractor/s in order to provide access to the Customers equipment. 5
6 Appendix A: DataCentre Access Agreement Company Name Applicant Name Job Title Applicant Phone Applicant Physical Address (used to courier ID Tag) Justification for Access Those granted DataCentre access must abide by the following rules: 1. An individual that has Unescorted Access MUST formally sign in and out ALL visitors that are accompanying them into the DataCentre. 2. Individuals with access privilege must abide by all policies and procedures as described in the ICONZ-Webvisions DataCentre Access Policies and Procedures document. 3. Violating these rules can result in DataCentre access being revoked and/or disciplinary or legal action. 4. Read and abide all DataCentre access policies and procedures. I fully understand and agree to these rules. I also agree to provide my full cooperation during any investigation concerning a security matter, which might have occurred in the DataCentre during a time when my presence in the facility has been recorded. Abuse of this access privilege and/or non-compliance with this agreement may result in removal of access and/or disciplinary or legal action. Applicant s Signature ICONZ-Webvisions Authorising Manager Signature Date Date Access Level Unescorted Access Escorted Access INTERNAL USE ONLY Date Photo Taken (Y/N) Photo Serial Number Floor # Rack # Access Level (e.g. 24/7) Barcode # Entered in CRM (Y/N) 6
7 Appendix B: DataCentre Unescorted Access Request Procedure 1. Each employee requesting Unescorted Access to the DataCentres must complete a DataCentre Access Agreement form. 2. The Cloud Platform & Engineering Manager must sign the Access Agreement form before access can be granted. 3. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 4. The electronic swipe key will then be authorised for access to the DataCentres and the employee will be setup with biometric access on their first entry to the DataCentres. Appendix C: DataCentre Escorted Access Request Procedure 1. The request to add an authorised person must come in writing from an existing authorised person or alternatively an authorised signatory for the company e.g. Director, Owner, General Manager, CTO, CEO 2. Each Customer employee or contractor requesting Escorted Access to the DataCentres must complete a DataCentre Access Agreement form and have their photo taken hours notice is required to process applications for DataCentre Access. 4. The Operations Manager must sign the Access Agreement form before access can be granted. 5. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 6. The CRM record will be created and photo ID Tag will then be provided for Escorted Access to the DataCentres. Appendix D: DataCentre Approved Vendor Access Procedure 1. Each individual vendor requesting Unescorted Access to the DataCentres must complete the DataCentre Access Agreement Form. 2. The Cloud Platform & Engineering Manager must sign the Access Agreement form before access can be granted. 3. All submitted DataCentre Access Agreement forms will be filed online in Sharepoint. 4. In the event that the request is denied, the vendor and sponsoring ICONZ-Webvisions department will be informed by If Unescorted Access is approved, the electronic swipe key will then be authorised for access to the DataCentres and the vendor will be setup with biometric access on their first entry to the DataCentres. Appendix E: DataCentre Etiquette 1. All work areas must be kept clean and free of debris. Staff performing work in the DataCentres must ensure that they have left the areas as clean as they were before beginning their work. 2. To reduce fire hazards rack enclosures must be kept neat and free of manuals, media, boxes and unused equipment. Rack enclosures are not storage cabinets and must only be used for functioning equipment. 3. Doors on all racks should remain closed at all times except during maintenance. 4. Cables should never be strung outside of rack enclosures. 5. Under no circumstances should any Customer or a Customer s Contractor: a. Lift floor tiles without prior knowledge, consent, and oversight of ICONZ-Webvisions staff. b. Tamper with or interfere with the normal function of the Transformers or Power Distribution Units (PDU). c. Tamper with or interfere with the normal function of the Air Conditioning units. d. Plug any device into another rack s power supply. e. Remove any cables or power connections from equipment other than their own. 6. The Cloud Platform & Engineering Manager should be contacted immediately if any customer or vendor requests access to the DataCentre plant room, infrastructure and/or environmental systems. 7
8 7. Suspicious activity or access and/or broken or faulty equipment must be reported to ICONZ-Webvisions staff immediately. 8. If there is a fire or the fire alarm sounds, staff performing work in the DataCentres must exit following the exit signs via the stairs immediately to the assembly point on Airedale Street. As part of our fire exit policy we do not actively check the DataCentre floors for visitors. 9. Under no circumstance should any food and beverages of any kind be within the DataCentre. 8
Data Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
More informationLouisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
More informationData Centre & Facilities Access Procedures
University of Manitoba - Information Services & Technology Data Centre & Facilities Access Procedures Effective Date: Review Date: Approving Body: Applies to: March 1, 2012 March 1, 2017 Mike Langedock,
More informationCITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
More informationIT FACILITY STANDARD NO. 5 DATA CENTER & IT FACILITY ACCESS
Function Affected: IT Facilities including data centers and network rooms (BDFs and IDFs) Issued Date: 06/01/15 Issue Superseded: 12/15/13 Number of Pages: 6 I. Background The UCSF data centers and network
More informationREVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
More informationMARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
More informationPENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL
PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL Page 1 of 19 Contents Data Center Access Control... 3 Access Authorization Procedure... 6 Visitor and Vendor Access... 8 Equipment Ordering
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements
More informationCO-LOCATION SPACE SCHEDULE OF SERVICES Schedule 1
CO-LOCATION SPACE SCHEDULE OF SERVICES Schedule 1 1. THIS SCHEDULE - INTERPRETATION 1.1 The terms of this Co-Location Space Schedule of Services ( Schedule 1 ) apply together with, in addition to and form
More informationPhysical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
More informationCustomer Guide to the DATAONE Datacenter
Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY
More informationRules of Conduct and Safety
Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...
More informationData Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
More informationPhysical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
More informationDRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationCorrections Management (Maintenance and Capital Upgrades) Policy 2014
Australian Capital Territory Corrections Management (Maintenance and Capital Upgrades) Policy 2014 Notifiable instrument made under the Corrections Management Act 2007, section 14(1) (Corrections policies
More informationIdentity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
More informationInformation Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
More informationChromebook Procedures and Information for Students and Parents
for Students and Parents Central R-3 High School 1:1 With Chromebooks Procedures & Information For Students and Parents The mission of the 1:1 program in the Central R-3 High School is to create a collaborative
More informationMEETINGS. Application for Hire
MEETINGS Application for Hire HIRING INFORMATION ACON s Meeting Centre at 414 Elizabeth Street, Surry Hills has a range of multi-purpose meeting rooms that are made available to groups and organisations
More informationCS&T Data Center Hosted Shared Services Policies & Work Rules
CS&T Data Center Hosted Shared Services Policies & Work Rules Last Modified 07-08-2014 1 Personal Accountability Failure to comply with the following procedures is grounds for immediate removal from the
More informationTablet 1:1 Initiative
Tablet 1:1 Initiative Handbook Overview This handbook is intended to provide essential information about the use of student Tablet computers in. The one to one student and teacher Tablet program provides
More informationWalton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access
Page 1 Walton Centre Remote working Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access Page 2 Table of Contents Section
More informationPhysical and Environment IT Security Standards
Physical and Environment IT Security Standards Author s Name: Jo Brown Author s Job Title: Head of Technical Services Division: Corporate Department: Technical Services Version Number: 1.0 Ratifying Committee:
More informationFacts About the South Dakota Identity Theft Program
South Dakota Association of Rural Water Systems Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where
More informationChromebook Policy and Information for Students and Parents
1 Chromebook Policy and Information for Students and Parents The mission of the 1:1 program in the Meadow Heights High School is to create a collaborative learning environment for all learners. This environment
More informationSecurity April 2015. Solving the data security challenge with our enhanced private and hybrid cloud services
Security April 2015 Secure cloud solutions with guaranteed UK data sovereignty. Solving the data security challenge with our enhanced private and hybrid cloud services This paper enables discussion around
More information2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
More informationPurpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)
Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment
More informationLifeWays Operating Procedure
11-02.01 MAINTENANCE REPAIR AND FACILITIES COORDINATION PURPOSE: To provide light maintenance, after-hours security on-call coverage and Meeting Room set-up for 1200 N. West Avenue (Jackson), and 25 Care
More informationStudent Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationColocation Master Services Vol.1.0
Colocation Master Services Vol.1.0 THIS COLOCATION MASTER SERVICE AGREEMENT ( Colo MSA or Colocation MSA ) shall apply to Service Orders or Agreements ( agreement(s), service order(s), or contract(s) )
More informationPolicy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
More informationCHAPTER 1. Student and Parent/Guardian Loan Agreement for ipads
CHAPTER 1 Student and Parent/Guardian Loan Agreement for ipads Penncrest High School 2014-2015 1 Introduction: Rose Tree Media School District fully understands the importance of technology to the educational
More informationEffective Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head:
Policy Title: Effective Date: Revision Date: Subject Matter Experts / Approval(s): TAC: LASO: C/ISO: Front Desk: Technology Support Lead: Agency Head: Every 2 years or as needed Purpose: The purpose of
More informationInformation Systems (IS) Visiting Worker Information Security Policy
Information Systems (IS) Visiting Worker Information Security Policy www.afbini.gov.uk INFORMATION SYSTEMS (IS) VISITING WORKER INFORMATION SECURITY POLICY Reference: AFBI POL 02/09 Date: 25 March 2009
More informationColocation Center Policies & Procedures
Integra Integra Telecom, Inc. has adopted the following Policies and Procedures related to our Colocation Services and use of our Colocation Centers. The Policies and Procedures are subject to change as
More informationDFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL
DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL Revised on May 18, 2011 Section 1 ACCESS CONTROL SYSTEM (ACS) DESCRIPTION Monitoring building access and the general security of buildings and facilities
More informationSAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law
More informationTenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08
- Basic Rancho Cordova Data Center Tenant Guide 2014-08 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 PURPOSE... 3 2 COMPUTER ROOM GUIDELINES... 4 2.1 GENERAL SITE GUIDELINES... 4 2.2 CABINET GUIDELINES...
More informationCOUNCIL POLICY NO. C-13
COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative
More informationFor parents this document should be read in conjunction with the Osper Cardholder Terms and Conditions.
Version: 10.08.15 Osper Service Terms Introduction This document explains your legal rights and obligations in relation to your use of the Osper Service ( Osper ), including use of the Osper App. Parents
More informationDepartment of Information Technology
Department of Information Technology ISSUE DATE: 6/3/08 EFFECTIVE DATE: 9/1/08 Facilities TITLE: Physical Access Control for DoIT POLICY NUMBER: DOIT-773-3102-001-A REVISED DATE: NEXT REVIEW DATE: 9/1/09
More informationSoftware compliance policy
Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who
More informationGeorgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure
Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6
More informationROSE HILL SCHOOLS USD 394 Laptop Policy
ROSE HILL SCHOOLS USD 394 Laptop Policy The laptop, carrying case and all other accessories that have been issued to the student are the property of Rose Hill Schools USD 394. These items are on loan to
More informationCustomer Manual. for colocation customers of M247 Ltd. v2.1.0. Classification: A (Public)
Customer Manual for colocation customers of M247 Ltd v2.1.0 Classification: A (Public) M247 Ltd 1 Ball Green Stretford, Manchester M32 0QT T +44 (0)161 615 1270 F +44 (0)161 8655 763 support@m247.com http://m247.com
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationCHS 1:1 With Chromebooks Procedures and Info for Students and Parents. 1. Receiving Your Chromebook. 2. Returning Your Chromebook
CHS 1:1 With Chromebooks Procedures and Info for Students and Parents The mission of the 1:1 program in at Carmel High School is to create a collaborative learning environment for all learners. This environment
More informationAPPLICATION & RULES FOR OWNERS, CONTRACTORS, MOVERS
THE STRATFORD AT PELICAN BAY CONDOMINIUM ASSOCIATION, INC. Remodeling, Renovating, Altering, Repairing and Moving APPLICATION & RULES FOR OWNERS, CONTRACTORS, MOVERS 5601 TURTLE BAY DR. NAPLES, FL 34108
More informationNetwork Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
More informationSecurity Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.
Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.net Page 1 of 10 Contents I. Protecting our clients data...2 II. Information
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationDefending your data against physical threats
Defending your data against physical threats Facts and guidelines for Datacentre Security Management 1 2 Physical security A vital link in data centre defence The exponential rise in data centres is matched
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
More informationColocation Service Terms & Conditions
Colocation Service Terms & Conditions Issue Date: 19/10/12 Version: 1.5 Page 1 of 12 Schedule 2 Colocation Service Terms & Conditions 1. Preamble 1.1. These Colocation Service Terms & Conditions provide
More informationARTICLE 10. INFORMATION TECHNOLOGY
ARTICLE 10. INFORMATION TECHNOLOGY I. Virtual Private Network (VPN) The purpose of this policy is to provide guidelines for Virtual Private Network (VPN) connections to Education Division s resources.
More informationSPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081
SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081 POLICY: COMPUTER/INTERNET ACCEPTABLE USE POLICY AGREEMENT Overview Access to information is fundamental to citizenship and the foundation for further
More informationUK Dedicated Servers Limited. Acceptable Use Policy
UK Dedicated Servers Limited Acceptable Use Policy Last Revision 10/12/2014 Telephone: 03450 915 620 Postal Address: UK Dedicated Servers Limited 61 Somers Road Industrial Estate Rugby Warwickshire CV22
More informationWilliam Jewell College Jewellverse Policies
William Jewell College Jewellverse Policies Prior to receiving a William Jewell College network account, all students, faculty and staff are required to read and sign the College s Acceptable Use Policy.
More informationHuddersfield New College Further Education Corporation
Huddersfield New College Further Education Corporation Card Payments Policy (including information security and refunds) 1.0 Policy Statement Huddersfield New College Finance Office handles sensitive cardholder
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
More informationMOUNT CARMEL HEALTH SYSTEM MEDICAL EDUCATION POLICY/PROCEDURE
DEPARTMENT OVERSIGHT AND MAINTENANCE: ADMINISTRATIVE DEFINITIONS Vendor: Patient Care Areas: Associates: Includes sales representatives, service technicians, clinical and or training personnel, third party
More informationIntermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
More informationIT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
More informationUK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
More informationNetwork & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
More informationINFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationAUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008
AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
More informationDecatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures
Decatur Public Schools Microsoft Surface Pro 3 Tablet Acceptable Use Policy and Procedures 2015-2016 DPS Tablet Assigned to: Tablet TAG: Serial Number: Distribution of Devices Surface Pro Tablets and accessories
More informationCounty Identity Theft Prevention Program
INTRODUCTION CHAPTER OSCEOLA COUNTY IDENTITY THEFT PREVENTION PROGRAM The Osceola County Board of County Commissioners is committed to protecting consumers who do business with Osceola County, and as such
More informationVersion 1.0. Ratified By
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience
More informationSupply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
More informationISS Data Centre. Hosting & Access Policy
ISS Data Centre Hosting & Access Policy Approved on: 20 January 2011 Document Revision History Version Date Summary of change(s) 0.1 20 Oct 2010 Initial Draft 0.2 03 Nov 2010 Updated following review with
More informationPhysical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
More informationPhysical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
More informationPurchasing Card Procedure Manual
Purchasing Card Procedure Manual Draft 05/26/11 Table of Contents PURCHASING CARD PROGRAM... 3 ACQUIRING A PURCHASING CARD... 3 TRAINING... 4 ACTIVATION AND RENEWAL... 4 CARDHOLDER ROLES & RESPONSIBILITIES...
More informationStudent Laptop User Charter
Student name Family name Given name Year Level Parent/Carer name Family name Given name Purpose The St Margaret s Anglican Girls School Laptop Program aims to improve student learning experiences both
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationOur Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION
Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION Internode Pty Ltd ABN 82 052 008 581 Phone: 13 66 33 1/502 Hay Street, Subiaco WA 6008 15 October 2013 Rules of interpretation and capitalised
More informationIM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
More informationCONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY
CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the
More informationConditions for ICT Partner Solutions Service Schedule for Phoenix Co-Lo Services
Conditions for ICT Partner Solutions Service Schedule for 1. Definitions and Interpretation The following definitions shall apply to the provision of the Service, in addition to those in the General Terms
More informationColocation Access Policy
Colocation Access Policy Sites DCN1 and DCN2 By Christian Clarke, IT Operations Manager CWCS Managed Hosting Portland Street Beeston Nottingham NG9 2LP Page 1 of 5 Contents 1.0 Policy Statement... 3 2.0
More informationICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
More informationCAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationPalacios High School. Creating a Culture of excellence through High Expectations. Student/Parent Laptop Handbook
Palacios High School Creating a Culture of excellence through High Expectations Student/Parent Laptop Handbook 2014-2015 Page 2 of 18 Table of Contents Purpose of the Laptop Checkout Initiative 3 Terms
More informationC-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationCOMMERCIALISM INTEGRITY STEWARDSHIP. Security Breach and Weakness Policy & Guidance
Security Breach and Weakness Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Security Breach & Weakness
More information