REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY
|
|
|
- Duane Gilbert
- 10 years ago
- Views:
Transcription
1 LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY Version: 2
2 Table of Contents I. Acronyms and Abbreviations 3 II. Clarification of Terms 4 1. Preamble 5 2. Purpose and objectives 5 3. Scope of Application 5 4. Legal Framework 5 5. Policy Content 6 6. Safety 7 7. Data Centre Use 9 8. Environment Administration of the Policy Policy Review Default Inception Date Enquiries 13
3 I. Acronyms and Abbreviations AC Alternating Current CCTV Closed Circuit Television CoGHSTA Cooperative Governance, Human Settlement and Traditional Affairs GITO Government Information Technology Office(r) UPS Uninterruptable Power Supply
4 II. Clarification of Terms Access Control: mechanisms and policies that restrict access to resources. Alternating Current: an electrical current that frequently reverses direction. Biometrics: process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as a means of confirming identity. _) Closed Circuit Television: the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. Data Centre: facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices. Fire Extinguishers: an active fire protection device used to extinguish or control small fires, often in emergency situations. Raised floor: a floor that provides an elevated structure above a solid substrate (often a concrete slab) to create a hidden void for the passage of mechanical and electrical services. Tailgating: entering an area without authorization verification by following someone who has access. Uninterruptable Power Supply: an electrical apparatus that provides emergency power to a load when the input power source, typically mains power,
5 1. Preamble Data Centers are found in almost all organizations. These data centers host the server environment and electronic data. Due to the sensitivity nature of these data centers, a policy is imperative to guide the Department on the proper mechanisms to manage this room as well to protect information 2. Purpose and objectives The purpose of this document is to provide guidelines and procedures relating to access control, environmental control, and operations of CoGHSTA ICT Data Centre. 3. Scope of Application This policy is applicable to CoGHSTA employees granted privilege access to Data Centre and cabinet rooms, service providers and consultants, entity. and any other 4. Legal Framework 4.1. State Information Technology Agency act (Act no 88 of 1998) 4.2. Protection of Information Act (Act no 84 of 1982) 4.3. Minimum Information Security Standards (MISS), Second Edition March Departmental ICT Security Policy 4.5. Departmental Disaster Recovery Plan
6 5. Policy Content 5.1 Background The vulnerability of business critical information systems and the data they contain within the Data Centre makes the site a high value asset, which requires a high degree of protection A range of security measures are therefore in place to protect employees, information and physical assets, along with the reputation of CoGHST A and interested third parties with equipment in the Data Centre. 5.2 Entry Systems and Access Control Access shall be controlled via Biometrics fingerprint system and all doors shall be fitted with sensors to detect unauthorized or prolonged opening Staff and visitors shall not adjust or otherwise tamper with door fittings. Any suspected faults with doors, lights or any security equipment should be reported to Security Services and/or IT Manager immediately Any person requiring access to the Data Centre shall sign the log book located within the upper ground security reception area upon arrival Only authorised IT and Security Services personnel shall have access to the Data Centre via the biometrics system. Any other personnel including full time employees, contractors and vendors shall be escorted by authorised IT and/or Security personnel during office hours Tailgating into restricted areas is prohibited. Care shall therefore be taken by all authorised staff to prevent these. During deliveries, authorised staff shall supervise such work at all times. r
7 5.3. Contractor Access after hours Security Services shall be responsible for access control and security of the Data Centre outside normal working hours In case where contractors require access to Data Centre after hours, Security Services shall be responsible to provide such access and protection The IT Manager will authorize the use and changes to be made in the Data Centre Close circuit television Internal, entry and exits area of the Data Centre shall be monitored by a closed circuit television (CCTV) to capture all Data Centre activities CCTV shall be integrated and monitored by Security Services. 6. Safety 6.1. Overview In addition to the safety precautions outlined herein, the Data Centre safety precautions shall be applied in conjunction with CoGHSTA Occupational Health and Safety policy. 6.2 Signs and Information Safety signs and information shall be posted at access points to the Data Centre and cabinet rooms General notices shall also be posted around the Data Centre providing detailed information on first aid, emergency contacts and general Health and Safety issues.
8 6.3. Health and safety Considerations No one should attempt to lift heavy equipment without suitable help No one should attempt to lift equipment in and out of racks unaided, particularly where height makes the task more dangerous Ear defenders shall be made available and be worn if working in the Data Centre for periods longer than 30 minutes Anyone working in the Data Centre for prolonged periods should let staff know of their presence. Users are advised to take regular breaks from working to avoid adverse effects from temperature and noise levels in particular Flexible safety barriers shall be available and be used to lift up raised floor tiles Emergency Exits and Fire Alarm Procedures When the fire alarm is triggered at the Data Centre, normal emergency procedures shall be followed as stipulated by CoGHSTA emergency evacuation procedures. Lifts shall not be used, only emergency stair ways shall be used Fire Detection and Fire Extinguishers Fire and smoke detection system shall be fitted and linked to audible and virtual alarms If an alarm is activated the Data Centre shall be evacuated immediately to avoid gas inhalation and the incident shall be reported to Security Services and IT Manager.
9 6.6. Electrical Safety Only qualified electrical technicians shall have access to electrical systems, IT staff and other personnel should contact the relevant electrical personnel when encountering electricity problems Request shall be authorised by the IT Manager. 7. Data Centre Use 7.1 Hours of Operation The Data Centre will be operated during office hours to authorised personnel between 7:30 am to 16:30 pm Access afterhours for maintenance purposes will be authorised and delegated by the IT Infrastructure Manager. 7.2 Equipment delivery Delivery of equipment shall be supervised by authorised personnel upon approval by the Senior Manager: IT 7.3. Control of Equipment No unused equipment and spares shall be left at the Data Centre Alternate storage facility shall be available for such purpose.
10 7.4. Prohibited Items The following items are prohibited from the Data Centre: Combustible materials such as paper and cardboard (except reference manuals as needed) Food and drink Tobacco products Explosives and weapons Hazardous materials Alcohol, illegal drugs and other intoxicants Electro-magnetic devices that could cause interference with computer and telecom equipment Radioactive materials Photographic or recording equipment (other than backup media) Cables and Wiring Cables and wires shall be structured and labelled when running under the raised floor, wall, and equipment racks. 8. Environment 8.1. Air Conditioning Under floor air conditioning shall be provided in the Data Centre. It shall deliver enough cooling per rack in accordance with design specification Service shall be done at least three times a year by a reputable maintenance service provider for Air dale equipment. Certificate for maintenance shall be submitted to the Department. performed
11 8.2. C02 Fire Extinguisher Under floor air conditioning shall be provided in the Data Centre. It shall deliver enough cooling per rack in accordance with design specification Service shall be done at least annually by a reputable maintenance service provider for C02 gas shall be done. Certificate for maintenance performed shall be submitted to the Department Power and Lighting Provisioning Two single phase power sockets shall be available in each rack and shall be fed directly from the main switch Adequate power light shall be available to ensure that all equipment in the Data Centre are clearly visible Lights shall be switched off when no access to the Data Centre is required UPS Provisioning All major equipment at the Data Centre shall be powered on by a UPS system, should the AC power goes down. The UPS system should sustain power to those devices for at least 5 minutes to allow graceful shutdown Service shall be done at least annually by a reputable maintenance service provider for APC Galaxy equipment. Certificate for maintenance performed shall be submitted to the Department Temperature and Humidity Temperature and Humidity monitoring devices shall be implemented and set to monitor deviations against baseline set according to standard recommended by GITO.
12 8.6. Environment Monitoring A number of monitors shall be put in place to report on issues affecting the Data Centre environment. Monitoring system shall report to designated IT and Security personnel, monitoring shall include: Temperature and Humidity alarms Fire and Smoke Detectors UPS malfunctioning or discharge during normal AC power operation Daily monitoring Dust Prevention The Data Centre shall be well ventilated to prevent dust from affecting equipment Equipment to be installed in the Data Centre shall be dust freed outside before introduced Waste Disposal and Cleaning Cardboard and other items that can generate dust and that are easily combustible should remain outside the Data Centre Waste bin shall be available outside the Data Centre main entrance for easy disposal of other items of waste Change and Configuration Management The IT Manager is responsible for all changes that shall take place at the Data Centre All changes to be made shall be requested to and authorised by the IT Manager The IT Manager will monitor and review the Data Centre access log book on a regular basis.
13 9. Administration of the Policy 9.1. GITO/CFO is responsible for enforcing this policy and continuously ensuring monitoring and compliance. 10. Policy Review This policy shall be reviewed Bi-annually. 11. Default Non-compliance of this policy shall constitute violation of the policy and shall be treated in terms of the departmental disciplinary code and procedure policy. 12. Inception Date This policy comes into effect from the date of approval by Member of Executive Council. 13. Enquiries Enquiries about the policy should be directed to the Government Information Technology Office.
14 Document Title ICT Data Centre Physical Access and Environmental Control Policy Compiled by : GOV1ent Information Technology Office Senior Manager I~j/12./ ';LD ; It Date (ICT Infrastructure and Systems) Acknowledge by : /~'iI ~. General Manager (GITO) A(I/,Z] Date Qualified by: ~ Senior Manager 25 /12-/2 )/0 Date I (Research and Policy Coordination) Recommended by:." ~~ 05~/D If )oils. S mor General Manager (Corporate Services) Dat6, Adopted by: Approved by :?77/~'7z75./ ~~ Date/ I ~ Member of the Executive Council 0'\\\ \ '2O\S Date
MARULENG LOCAL MUNICIPALITY
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure
Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Hong Kong, China. We can colocate standard rack-mountable servers or
Data Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
REVIEWED ICT CHANGE MANAGEMENT POLICY
LI_M_POPO PROVINCIAL GOVERNMENT ~EP.j8L-C OF SO;_;-H.'\FR1C.... DEPARTMENT OF CO-OPERATIVE GOVERNANCE. HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT CHANGE MANAGEMENT POLICY Version: 2 Table of
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
CS&T Data Center Hosted Shared Services Policies & Work Rules
CS&T Data Center Hosted Shared Services Policies & Work Rules Last Modified 07-08-2014 1 Personal Accountability Failure to comply with the following procedures is grounds for immediate removal from the
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Rules of Conduct and Safety
Rules of Conduct and Safety ETISALAT DATA CENTER RULES - V2.4 Contents Definitions... 2 Introduction... 3 Safety Instructions... 3 Upon entering the Data Center... 3 Privacy Notice / Camera Surveillance...
HealthcareBookings.com Security Set Up
HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
Customer Guide to the DATAONE Datacenter
Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY
Customer Manual. for colocation customers of M247 Ltd. v2.1.0. Classification: A (Public)
Customer Manual for colocation customers of M247 Ltd v2.1.0 Classification: A (Public) M247 Ltd 1 Ball Green Stretford, Manchester M32 0QT T +44 (0)161 615 1270 F +44 (0)161 8655 763 [email protected] http://m247.com
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Fire Risk Assessment Safety Checklist
Fire Risk Assessment Safety Checklist This checklist has been prepared to help you comply with The Regulatory Reform Fire Safety Order 2005 What is the Regulatory Reform (Fire Safety) Order 2005? The Regulatory
DATA CENTRES UNDERSTANDING THE ISSUES TECHNICAL ARTICLE
DATA CENTRES UNDERSTANDING THE ISSUES TECHNICAL ARTICLE Molex Premise Networks EXECUTIVE SUMMARY The term data centre usually conjures up an image of a high-tech IT environment, about the size of a football
NeuStar Ultra Services Physical Security Overview
NeuStar Ultra Services Physical Security Overview Mission-critical network operations must have the highest standards of quality, security and reliability. NeuStar Ultra Services currently locates its
Guidelines for. the employment EXTERNAL COMPANIES
Guidelines for the employment of EXTERNAL COMPANIES on the grounds of Institut für Mikroelektronik Stuttgart Allmandring 30a 70569 Stuttgart Contents 1. Purpose and objective... 3 1.1 General directions...
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
singapore//singapore data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Singapore. We can colocate standard rack-mountable servers or other
Standard: Data Center Security
Information Security Standards Data Center Security Standard IS-DCS Effective Date TBD Email [email protected] # Version 3.0 Contact Mike Cook Phone 408-924-1705 Standard: Data Center Security Page 1 Executive
melbourne//australia data center specifications internet + intellectual property + intelligence tel: +61 2 9948 8888 fax: +61 2 9948 1111
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Melbourne,. We can colocate standard rack-mountable servers or other
ANNEXURE 07: CHECK-LIST FOR OFF-SITE STORAGE FACILITIES
ANNEXURE 07: CHECK-LIST FOR OFF-SITE STORAGE FACILITIES NAME OF PRIVATE STORAGE FACILITY: DATE VISITED: 1. COMPANY PROFILE 1.1 What is the company's mission? 1.2 How does that mission compare with the
TENDER FOR TECHNICAL BUILDING MAINTENANCE SERVICES TERMS OF REFERENCE. April 2013 OVERALL PURPOSE
ANNEX 3 EUROPEAN UNION DELEGATION TO GEORGIA ADMINISTRATION TENDER FOR TECHNICAL BUILDING MAINTENANCE SERVICES TERMS OF REFERENCE April 2013 OVERALL PURPOSE Offices of the EU Delegation The Contractor
Colocation Center Policies & Procedures
Integra Integra Telecom, Inc. has adopted the following Policies and Procedures related to our Colocation Services and use of our Colocation Centers. The Policies and Procedures are subject to change as
EXHIBIT A SCOPE OF WORK
EXHIBIT A SCOPE OF WORK 1. (Contractor) shall provide fire alarm system maintenance/repair/testing services as described herein to the California Department of Veterans Affairs (hereinafter CDVA, CalVet,
Data Center Overview Document
Overview NetSource is a Chicago area (Naperville) hosting company that owns and operates its own world class datacenter. The initial datacenter buildout was put into operation in 2007 and expanded in 2013.
PLAN REVIEW GUIDE FOR FIRE ALARM
PLAN REVIEW GUIDE FOR FIRE ALARM PROJECT NAME: PERMIT # PROJECT ADDRESS: CONTACT PERSON: PHONE Fire alarm system installation information shall be provided on the appropriate architectural and electrical
Document Details. 247Time Backup & Disaster Recovery Plan. Author: Document Tracking. Page 1 of 12
Document Details Title: Author: 247Time Backup & Disaster Recovery Plan Document Tracking Page 1 of 12 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 DEFINED REQUIREMENT... 3 2 DISASTER OVERVIEW...
Restaurant & café guide
'Helping our customers stay in business by reducing risk' NZI Risk Solutions TM About NZI Risk Solutions NZI has extensive experience in providing expert risk management advice to help our commercial customers
Overview of Fire Alarm Systems and Maintenance
Overview of Fire Alarm Systems and Maintenance By Mr. David Goh Vice President Fire Safety Managers Association Convener of Working Group for CP 10 : 2005 Er. Matthew Kwek Committee Member Fire Safety
Frankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
TECHNOLOGY RESEARCH AND DEVELOPMENT More Than Alarm Anna Kołodziej-Saramak
TECHNOLOGY RESEARCH AND DEVELOPMENT More Than Alarm Anna Kołodziej-Saramak The purpose of the voice alarm systems (VAS) is to inform people about hazards in a possibly efficient way (which, unfortunately,
Fire Safety Log Book
Fire Safety Log Book Company... Address........ Responsible Person. Competent Person. Date Started For Additional Information: Safety Management (UK) Ltd Holme Suite, Clawthorpe Hall Business Centre, Burton
Health & Safety Policy For Locations Hosting Film Production Companies
Health & Safety Policy For Locations Hosting Film Production Companies Throughout this document, the location will be referred to as The Venue and the film production company as The Contractor. The following
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Safety and Health Office WORKPLACE SAFETY CHECKLIST
Location: Date: Inspected by: Safety and Health Office WORKPLACE SAFETY CHECKLIST WORK ENVIRONMENT Ventilation Removal of fumes and dust Temperature and humidity control Noise levels Vibration Lighting
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose
School of Engineering University of Glasgow
School of Engineering University of Glasgow Electronics Workshops Rankine Building 319A (2 Technicians) 510 (1 Technician) 712A (4 Technicians, 1 Modern Apprentice) James Watt South 619 (2 Technicians)
WASTE Application Form - Dublin Waste to Energy SECTION J ACCIDENT PREVENTION & EMERGENCY RESPONSE
SECTION J ACCIDENT PREVENTION & EMERGENCY RESPONSE Describe the existing or proposed measures, including emergency procedures, to minimise the impact on the environment of an accidental emission or spillage.
Datacenter Assessment
The Netmagic team has compiled this Checklist to help you evaluate, compare and select datacenter facilities to meet your hosting, business continuity and disaster recovery needs. Based on industry best
Standard Comms Rooms Specification
Standard Comms Rooms Specification Room Configuration Electrical General Distribution Boards Small Power Lighting Containment Fire Detection General To be defined in the project brief but should meet requirements
CalMod Design-Build Electrification Services
SECTION 28 16 00 INTRUSION DETECTION SYSTEM PART 1 - GENERAL 1.1 DESCRIPTION A. This section describes the detailed technical requirements for the Intrusion Detection System (IDS), where the Contractor
Austin Independent School District Police Department Policy and Procedure Manual
Policy 8.07 Austin Independent School District Police Department Policy and Procedure Manual Life Safety Systems I. POLICY The proper operations of the AISD Life Safety Systems (LSS) are essential for
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Administrative Procedure
Administrative Procedure Effective: 12/21/2012 Supersedes: N/A Page: 1 of 5 Subject: SECURITY ALARMS 1.0. PURPOSE: The purpose of this procedure is to coordinate and control the installation, monitoring,
FLA S FIRE SAFETY INITIATIVE
Improving Workers Lives Worldwide FLA S FIRE SAFETY INITIATIVE Preventing fires and saving lives by empowering workers and factory managers SCENARIO 1 OCCURS AT FACTORY ABC, WHICH HAS NOT IMPLEMENTED NECESSARY
UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
Security Control Standard
Department of the Interior Security Control Standard Physical and Environmental Protection April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS. 1. All Floors (inspect from top floor to basement): Yes No
General Inspection FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS 1. All Floors (inspect from top floor to basement): Yes are fire exits and directional signs properly illuminated? is the emergency
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Law No. (9) of 2012 Amending some provisions of Law No. (13) of 1997 Concerning the Civil Defense
Law No. (9) of 2012 Amending some provisions of Law No. (13) of 1997 Concerning the Civil Defense We, Hamad Bin Khalifa Al-Thani, Emir of the State of Qatar Having pursued the Constitution, And the Law
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION
PERMITS AND INSPECTIONS FIRE ALARM SYSTEM SUBMITTAL CHECKLIST AND APPLICATION 911 Assigned PROJECT LOCATION Subdivision: Lot: Blk: Sec: PROJECT New Construction Addition/Remodel Demolition Other: Number
FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS
FIRE SAFETY SELF-INSPECTION FORM FOR CULTURAL INSTITUTIONS The attached self-inspection form is intended for staff use at regular, frequent intervals. It should not take the place of two other vital measures
Data Center Presentation
Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details
OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
USER S MANUAL. MaxPower 400-600 UPS. Uninterruptible Power System 28-2MAXPO0018
USER S MANUAL MaxPower 400-600 UPS Uninterruptible Power System 28-2MAXPO0018 IMPORTANT SAFETY INSTRUCTIONS SAVE THESE INSTRUCTIONS This manual contains important instructions for models MaxPower 400 and
About Injazat. Enterprise Cloud Services. Premier Data Center. IT Outsourcing. Learning and Development Services. Enterprise Application Services
About Injazat Injazat Data Systems is an industry-recognized market leader in the region for Information Technology Outsourcing, Cloud and Data Center Managed Services delivered from the region s 1st Tier
BUILDING OWNERS - SERVICE RELATED ISSUES FOR FIRE ALARM SYSTEMS
BUILDING OWNERS - SERVICE RELATED ISSUES FOR FIRE ALARM SYSTEMS Owners have numerous responsibilities as it pertains to the maintenance and operation of a building s fire safety equipment. The liabilities
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
fulfils all requirements for extended protection of the criteria catalogue The appendix is part of the certificate and consists of 4 pages.
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Infineon Technologies IT-Services GmbH Lakeside B05 2 9020 Klagenfurt, Österreich to confirm that its
Data Center Management
Data Center Management How Cisco IT Operates, Manages, and Protects Its Data Center A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview The Cisco IT Operations Data Center on the San Jose, California
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Zone B: comprises of NOC room, reception area, Help Desk area, Call Centre, Testing/Monitoring room. This zone requires approximately 1500 sq. feet.
Annexure 1 Best practices and Guidelines to Physical Security of the State Data Centre The Data Centre should ideally be built in a central location within the building complex. An approximate area of
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
FIRE SAFETY FOR OFFICE WORKERS
FIRE SAFETY FOR OFFICE WORKERS This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the program and the subject
Fire Safety Risk Assessment Checklist for Residential Care Premises
Checklist for Residential Care Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole site YES or
SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS
SECURITY SYSTEM NOTES Installing/Service Company For Service Call Installation Date / / Central Station Duress Code EMERGENCY ACTIVATION KEYS (check if enabled) Fire Auxiliary Emergency Police PROGRAMMED
Workplace Safety Inspections Adopt a systematic approach by inspecting 8 areas of safety:
Workplace Safety Inspections Adopt a systematic approach by inspecting 8 areas of safety: 1. MANAGEMENT - An indication that the safety management system is working effectively is a good starting point.
APPLICATION FOR PHARMACY PROFESSIONAL LIABILITY INSURANCE
APPLICATION FOR PHARMACY PROFESSIONAL LIABILITY INSURANCE (Claims Made Basis) APPLICANT S INSTRUCTIONS: 1. Answer all questions. If the answer requires detail, please attach a separate sheet. 2. Application
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
Colocation Service Definition. SD008 v1.3 Issue Date 19 Feb 09
Colocation Service Definition SD008 v1.3 Issue Date 19 Feb 09 Colocation Service Definition Service Overview InTechnology offers secure data centre environments for your business critical systems, applications
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
CITY OF PHILADELPHIA DEPARTMENT OF LICENSES AND INSPECTIONS ANNUAL CERTIFICATION FOR FIRE ALARM SYSTEMS
CITY OF PHILADELPHIA DEPARTMENT OF LICENSES AND INSPECTIONS ANNUAL CERTIFICATION FOR FIRE ALARM SYSTEMS PROPERTY ADDRESS (BRT Address Required) TESTING CONTRACTOR (Name and Address) License No. ANNUAL
