Data Center Access Policies and Procedures
|
|
|
- Griffin Sherman
- 10 years ago
- Views:
Transcription
1 Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6,
2 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data Center Access - Levels of Access!4 Periodic Review and Termination of Access!5 Data Center Access Log!5 Access Exception Reporting!5 Appendix A: Data Center Access Agreement!6. Appendix B: Data Center Unescorted Access Request Procedure!7 Appendix C: Data Center Etiquette!8 Appendix D: Data Center Approved Vendor Access Procedure!9 2
3 UITS Data Center Access Policies and Procedures Introduc6on The UITS Data Centers provide stable environments, enhanced security, fire suppression equipment and alarms, uninterrupted power (UPS and generators), high- speed network connectivity, 24x7 Operator coverage and other features required by the mission-critical resources they contain. The policies and procedures described in this document have been developed to maintain a secure, safe environment and must be followed by individuals working in or visiting the Data Centers. All individuals requesting access or maintaining servers in the Data Center must understand and agree to these procedures. Overview The UITS Data Centers contain the University of Arizonaʼs enterprise computing and networking resources. Access is controlled to protect both the physical resources and the enterprise data from unauthorized use, accidental or malicious damage and theft. Access to the Data Centers will only be granted when a legitimate business need is demonstrated. This access policy and procedure document specifies the criteria for granting access to specific individuals or groups. Failure to follow these policies is considered grounds for dismissal and/or prosecution. Failure of a vendor, consultant, or contractor to follow these policies is grounds for termination of agreements and subsequent legal action. Any questions regarding policies and procedures should be addressed to the UITS Infrastructure Services Operations Center (ISOC) Assistant Director. This Data Center Access Policy may be suspended in the event of an emergency that requires access for medical, fire, or police personnel. Data Center Access CatCard swipe access and unsupervised 24x7 access to the Data Centers will only be given to individuals with an approved and demonstrated business need to access the Data Centers on a regular basis, those individuals requiring infrequent access will be granted escorted access as needed. Individuals with unescorted access may escort and supervise unauthorized individuals provided all individuals are logged on entry and exit. CatCards belonging to authorized individuals may not be loaned to unauthorized individuals; such action is grounds for disciplinary action. There are no temporary or ʻblankʼ access cards available. Any employee or vendor that forgets or misplaces their CatCard will be restricted to escorted access to the Data Centers until their CatCard is replaced. Violations of the agreement can result in removal of access. Individuals that violate the policies and are removed from the list may face additional disciplinary actions, pending review by the responsible ISOC Assistant Director. 3
4 Data Center Access - Levels of Access A. Escorted Individuals that have an infrequent need for Data Center access will be granted Escorted status and will not have CatCard swipe access. Escorted access will be provided primarily during normal business hours. Data Centers that do not have 24x7 Operations coverage will have after-hours escorted access on an emergency or pre-arranged basis only. Individuals requesting escorted access must be signed in and out in the Data Center access log by a member of the ISOC staff. They are required to provide identification on demand and leave the facility when requested to do so. They must not allow any other person access to the Data Center. B. Unescorted Employees that work inside the Data Center and other individuals that have been granted the access based on their job requirements and a demonstrated legitimate business need will have 24/7 access to the Data Center. CatCards must be visible at all times when in the Data Center. Please see Appendix B: Data Center Unescorted Access Procedure on page 7 for more information. C. Vendor Approved vendors with CatCards may be granted unescorted access to the Data Center to perform scheduled maintenance or repair work. Vendors not approved for unescorted access may be granted escorted access. Please see Appendix D: Data Center Approved Vendor Access Procedure on page 9 for information about vendor access. D. Data Center Tours Tours must be pre-approved by the ISOC Assistant Director. All visitors must sign in and out and must be escorted while touring the Data Centers. E. Maintenance and Custodial Staff University maintenance and custodial staff will need to be escorted when accessing the Data Centers. All facilities staff must sign the access log upon entering and leaving the Data Center and inform the ISOC staff of any maintenance work. The ISOC staff must enter any maintenance work in the operations log. F. First Responders Campus first responders are granted unescorted access. The list of campus first responders is provided to Amer-X by the UAPD. 4
5 Periodic Review and Termina6on of Access The ISOC Assistant Director will review the access list every 90 days and will remove any individuals who no longer have a legitimate business need to access the Data Centers. The UITS CIO office will review the access list quarterly. As part of the employee exit procedure the ISOC staff is notified when employees leave the department. The ISOC Manager will request the immediate removal of access rights if the employee has Data Center access. Data Center Access Log The Access logs at each Data Center must be maintained at all times by the ISOC staff. All escorted individuals entering the Data Center must sign the log as they enter and exit for audit purposes. Access Excep6on Repor6ng Any unauthorized access to the Data Center must be logged by the Data Center Staff in the daily operations log and must be reported to the on-duty ISOC Manager who will determine if the incident needs to be reported to the campus police. Attempts to forcibly enter the Data Center must be immediately reported to campus police. The onduty ISOC Manager must also report the incident in writing to the ISOC Assistant Director. Data Center E6queJe Rules It is mandatory that all people working within the Data Center adhere to the posted rules of etiquette. This will insure Data Center safety and efficiency. Please see Appendix C: Data Center Etiquette on page 8 for more information. 5
6 Appendix A: Data Center Access Agreement Applicant Name: Applicant CatCard#:! Applicant Department: Office Phone: Emergency Contact Phone :!!!! Supervisors Name: Supervisors Justification for Access: Requested Access: UITS Site 1 Data Center q UITS Site 2 Data Center q Switch Room Data Center q Research Data Center q Those granted Data Center access must abide by the following rules: UA CatCards must be worn visibly at all times. Individuals must not touch equipment or supplies belonging to other departments. Access must not be used to allow any unauthorized person into the Data Center. An individual that has access MUST formally log in and out ALL visitors that are accompanying them into the Data Center. Individuals with access privilege must abide by all policies and procedures as described in the UITS Data Center Access Policies and Procedures document. Violating these rules can result in Data Center access being revoked and/or disciplinary action.. Read and abide all Data Center access policies and procedures. I fully understand and agree to these rules. I also agree to provide my full cooperation during any investigation concerning a security matter, which might have occurred in the Data Center during a time when my presence in the facility has been recorded. Abuse of this access privilege and/or non-compliance with this agreement may result in removal of access and/or disciplinary action. Applicant s Signature: Date: Applicant s Supervisor Name: Applicant s Supervisor Signature: Access Level: Unescorted Access q Date: Vendor Access q IS Assistant Directors Signature: Date: 6
7 Appendix B: Data Center Unescorted Access Request Procedure 1. Each employee requesting unescorted access to the Data Centers must complete a Data Center Access Agreement form. 2. The employeeʼs manager must sign the Access Agreement form before it can be submitted for review. 3. The ISOC Assistant Director will review all access requests. The applicant and their supervisor will be notified of the decision by All submitted Data Center Access Agreement forms will be filed in the ISOC office. 5. The employeeʼs CatCard will then be authorized for access to the authorized Data Centers specified in the access request form. 6. If the Access Request form indicates an access request to more than one Data Center, the access requests will be evaluated and authorized separately. 7. An employee's manager may appeal a denial of access via to the ISOC Assistant Director. The should include an expanded explanation for the employee access requirements. In the event that the denial is uphold, an appeal can be delivered, in writing, to the Infrastructure Services Senior Director. The decision of the Infrastructure Services Senior Director is final. 7
8 Appendix C: Data Center Etiquette 1. All work areas must be kept clean and free of debris. Staff performing work in the Data Centers must ensure that they have left the areas as clean as they were before beginning their work. 2. To reduce fire hazards rack enclosures must be kept neat and free of manuals, media, boxes and unused equipment. Rack enclosures are not storage cabinets and must only be used for functioning equipment. 3. Doors on all racks should remain closed at all times except during maintenance. 4. Cables should never be strung outside of rack enclosures. Cabling between rack enclosures of adjacent racks is accepted provided sufficient pass-through chassis are in place. 5. Under no circumstances should any customer: a. Lift floor tiles without prior knowledge, consent, and oversight of the ISOC staff. b. Tampering with or interfering with the normal function of the Transformers or Power Distribution Units (PDU). c. Tampering with or interfering with the normal function of the Air Conditioning units. d. Plugging any device into another cabinetʼs power supply. e. Removing any cables or power connections from equipment other than those covered by your SLA. 6. The Data Center Manager should be contacted immediately if any customer requests access to the Data Center machine room infrastructure and/or environmental systems. 7. Under no circumstance should any food and beverages of any kind be within the raised floor area of Data Center. Food and beverages must only be consumed in the break room or the Operations Center. Beverages and other consumables many only be transported to and from the break room in spill proof containers. 8
9 Appendix D: Data Center Approved Vendor Access Procedure Note: A Departmental Sponsored Visitor (DSV) ID must be obtained before a CatCard can be issued. The vendor must request a DSV from the UITS department sponsoring the vendorʼs access to the Data Center. CatCardʼs can be purchased at the CatCard office in the Student Union at a cost of $25/per card. 1. All members of a Vendorʼs maintenance team granted unescorted access to the Data Center must display the University CatCard that was issued specifically for that individual. Sharing CatCards is strictly prohibited. 2. Each individual vendor requesting unescorted access to the Data Centers must complete the UITS Policies and Procedures Access agreement form. The form must be signed by the Assistant Director of the UITS department sponsoring the vendor. 3. The ISOC Assistant Director will evaluate and authorize the request if there is a legitimate business need. In the event that the request is denied, the vendor and sponsoring UITS department will be informed by After approval of the access request, the access agreement form will be filed in the ISOC office and the Vendors CatCard will be authorized for swipe access. 9
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
Data Centre & Facilities Access Procedures
University of Manitoba - Information Services & Technology Data Centre & Facilities Access Procedures Effective Date: Review Date: Approving Body: Applies to: March 1, 2012 March 1, 2017 Mike Langedock,
IT FACILITY STANDARD NO. 5 DATA CENTER & IT FACILITY ACCESS
Function Affected: IT Facilities including data centers and network rooms (BDFs and IDFs) Issued Date: 06/01/15 Issue Superseded: 12/15/13 Number of Pages: 6 I. Background The UCSF data centers and network
REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
MARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Data Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements
ROSE HILL SCHOOLS USD 394 Laptop Policy
ROSE HILL SCHOOLS USD 394 Laptop Policy The laptop, carrying case and all other accessories that have been issued to the student are the property of Rose Hill Schools USD 394. These items are on loan to
MOUNT CARMEL HEALTH SYSTEM MEDICAL EDUCATION POLICY/PROCEDURE
DEPARTMENT OVERSIGHT AND MAINTENANCE: ADMINISTRATIVE DEFINITIONS Vendor: Patient Care Areas: Associates: Includes sales representatives, service technicians, clinical and or training personnel, third party
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Rules of Conduct and Safety
Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
CS&T Data Center Hosted Shared Services Policies & Work Rules
CS&T Data Center Hosted Shared Services Policies & Work Rules Last Modified 07-08-2014 1 Personal Accountability Failure to comply with the following procedures is grounds for immediate removal from the
Department of Information Technology
Department of Information Technology ISSUE DATE: 6/3/08 EFFECTIVE DATE: 9/1/08 Facilities TITLE: Physical Access Control for DoIT POLICY NUMBER: DOIT-773-3102-001-A REVISED DATE: NEXT REVIEW DATE: 9/1/09
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)
CSU, Chico Credit Card Handling Security Standard Effective Date: July 28, 2015 1.0 INTRODUCTION This standard provides guidance to ensure that credit card acceptance and ecommerce processes comply with
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04
2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04 A. Keys 1) Sul Ross State University maintains a centralized key and lock system to enhance the control and security of property
Physical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL
PENN STATE DATA CENTERS POLICY IMPLEMENTATION AND PROCEDURES MANUAL Page 1 of 19 Contents Data Center Access Control... 3 Access Authorization Procedure... 6 Visitor and Vendor Access... 8 Equipment Ordering
Administrative Procedure
Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,
Data Center Operational Policy
POLICY NAME: Data Center Operational Policy Effective Date: Policy Owner: Policy Number: Related Policies: Purpose: Scope: Policy Statement: Definitions: Responsibilities: The policy will become effective
Health and Safety Policy
Health and Safety Policy October 2014 1 October 2014 Contents: Introduction 1. STATEMENT OF INTENT AND POLICY OBJECTIVES 2. RESPONSIBILITIES AND ACCOUNTABILITIES FOR HEALTH AND SAFETY 2.1 The Director
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
STCC Contractor/Vendor Rules and Regulations
STCC Contractor/Vendor Rules and Regulations STCC maintains specific rules and regulations that apply to all contractors and vendors who perform work or provide services. It is the responsibility of the
Inspection, Testing and Maintenance
Page 18 ABOUT CODE CORNER CCFS would like to remind you to check with your local Authority Having Jurisdiction (AHJ) for questions and opinions concerning your local Fire and Building Codes. The information
Policy Title-Aquia Data Center Operational Policy & Procedure. Policy ID - TSD-ADC001. Version - Version: 1.0. Supersedes Version 1.
Policy Title-Aquia Data Center Operational Policy & Procedure Policy ID - TSD-ADC001 Version - Version: 1.0 Supersedes Version 1.0 Review Date One (1) year from effective date. Policy & Procedure - Provides
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320
TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources
Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure
Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Access Control Regulations
Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed
Customer Guide to the DATAONE Datacenter
Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
Student Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1
University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,
HEALTH & SAFETY POLICY
HEALTH & SAFETY POLICY 1. STATEMENT OF INTENT & POLICY OBJECTIVES The Council, as the governing body of the School, recognises and accepts the responsibilities placed on it as 'Employer' by the Health
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Application for DOC Electronic Monitoring / House Arrest
ALASKA DEPARTMENT OF CORRECTIONS Electronic Monitoring/House Arrest Program 630 G Street, Suite 114 Anchorage, Alaska 99501 Main: (907) 269-0927 Fax (907) 222-4699 Application for DOC Electronic Monitoring
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
All individuals with access to Twin Falls School District technology and computer networks will:
Twin Falls School District #411 Computer and Network Use Policy 201 Main Avenue West Twin Falls, Idaho 83301 Telephone: 208-733-6900 Fax: 208-733-6987 Technology users responsibilities go beyond general
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
2. Employees must wear their ID tag at all times while on the premises.
3. Physical Access Controls Access control must prevent unauthorized entry to facilities, maintain control of employees and visitors and protect company assets. There must be written and verifiable procedures
Austin Independent School District Police Department Policy and Procedure Manual
Policy 8.07 Austin Independent School District Police Department Policy and Procedure Manual Life Safety Systems I. POLICY The proper operations of the AISD Life Safety Systems (LSS) are essential for
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.
Policy Number: 339 Policy Title: Credit Card Processing Policy, Procedure, & Standards Review Date: 07-23-15 Approval Date: 07-27-15 POLICY: All individuals involved in handling credit and debit card transactions
The purpose of Mohawk College s Purchasing Card Policy ( policy ) is to:
Policy Number: CS-1002-2009 Policy Title: Purchasing Card Policy Policy Owner: Chief Financial Officer Effective Date: December 2, 2009 Revision Date: April 17, 2013 1. PURPOSE The purpose of Mohawk College
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Miami University Purchasing Card Policy & Procedure
Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15)
Lighthouse Christian School Responsible Use Agreement Version 2.0 (2014-15) Student Name Date Responsible Use Agreement (in four parts) Part 1: Responsible Internet and Network Use Part 2: Responsible
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
William Jewell College Jewellverse Policies
William Jewell College Jewellverse Policies Prior to receiving a William Jewell College network account, all students, faculty and staff are required to read and sign the College s Acceptable Use Policy.
Tablet 1:1 Initiative
Tablet 1:1 Initiative Handbook Overview This handbook is intended to provide essential information about the use of student Tablet computers in. The one to one student and teacher Tablet program provides
