DOI Information Technology Security Policy Handbook, v3.1, Sec. PE-8.



Similar documents
Rules & Regulations Handbook

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

KEY, SWIPE CARD AND ELECTRONIC FOB POLICY

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CHANGE MANAGEMENT PLAN TEMPLATE

Fire Safety Policy/Procedures

Employee Off-Cycle Review

DataCentre Access Policies & Procedures

Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy

PHYSICAL ACCESS CONTROL

PERFORMANCE APPRAISAL FOR MIDDLE MANAGEMENT

2. Employees must wear their ID tag at all times while on the premises.

Site Traffic Management Plan

Code Adam/Amber Alert Policies and Procedures. Campus Plan for Code Adam, Normal Operating Hours

2.09 Key and Card Access Systems Approved by Executive Committee: 8/17/04

TargetingMantra Privacy Policy

COUNSELING AND GUIDANCE, REFERRAL TO OTHER SERVICES AND OTHER GOODS AND SERVICES

Data Center Access Policies and Procedures

PROGRAM REVIEW REPORT

CRISIS MANAGEMENT PLAN

CUNY New York Workplace Violence Policy and Procedures

POLICY STATEMENT AND REGULATIONS

Sample Features in a Contact Management System. Softek Services, Inc. Washington, DC (202)

MODESTO CITY SCHOOLS Administrative Regulation

Process and Procedures for Offering Student Online Courses in Maryland Public Schools

Master Document Audit Program

Evacuation Procedures

CAMPUS GUIDE TO THE NEW GRADUATE PROGRAM APPROVAL PROCESS

EMPLOYEE PERFORMANCE REVIEW FORM

Revised June, 2002 FACILITY ACCESS AND IDENTIFICATION BADGE POLICY AND PROCEDURES

Performance Appraisal System

4. Appendices - supplemental information that supports the documentation related to the standards provided in the report.

Alcohol Policy. Updated & Adopted: September 21, Article I POLICIES AND PROCEDURES

MPH Project/Thesis Handbook

USGS EOS SYSTEMS ENGINEERING MANAGEMENT PLAN (SEMP)

Effective Employee Onboarding

DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Small Business Process

MERCURY TOURS. Draft: Systems Test Plan for Search Flights Version 1.0. Prepared by: Jeme Terner (Sr. QA Engineer) January, 2010.

Enter & View Report Dr Hendow Bransholme Health Centre Goodhart Road, Hull

SUBJECT: ADMINISTRATIVE, FISCAL & QUALITY ASSURANCE/IMPROVEMENT CONTRACT COMPLIANCE MONITORING

Dryden Centerwide Procedure (DCP) Code X. DMS Audit Preparation and Execution

AN ORDINANCE GOVERNING RANDOLPH COUNTY COURTHOUSE SECURITY AND BUILDING PROCEDURES

Easing the Transition: Moving Your Relative to a Nursing Home

U. S. COAST GUARD & NATIONAL PARK SERVICE ANNUAL COLORADO RIVER MEMORANDUM OF AGREEMENT MEETING

How To Handle An Emergency

GREENWOOD INTERNATIONAL SCHOOL

Higher Education Administration Internship Handbook

BRITISH SCHOOL OF GENEVA HEALTH AND SAFETY POLICY

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

Gersh & Sarah Lemberg Children'ʹs Center, Inc. 457 Old South St, MS #044, Brandeis University Waltham, MA

At the Pearson VUE Test Center

ELDERLY SERVICES PROGRAM (ESP SM ) NON MEDICAL TRANSPORTATION SERVICE SPECIFICATIONS EFFECTIVE JANUARY 2010 (BCESP)

How To Evacuate The University Of California Building

DEPAUW UNIVERSITY PERFORMANCE APPRAISAL PROGRAM Hourly Employees

Regulations for the 25% State Commercial Tax Credit Program Prepared by the Division of Historic Preservation

Orienting Your New Employee. Building Blocks for Supervisors Series

The Federal Work Study FWS Program

Aylesford School. and Sixth Form College. wonder aspiration respect discipline RISK MANAGEMENT POLICY. Finance and Premises Committee

Amendments to the 2012 INTERNATIONAL FIRE CODE

Solar Eclipse Trackers, Logs and Queues. Release 8.7.2

APPENDIX C EHS CONTRACTOR QUALIFICATION QUESTIONNAIRE

BOSTON COLLEGE ENVIRONMENTAL HEALTH AND SAFETY LABORATORY GUIDE FOR RENOVATIONS, REMODELS, MOVES AND TERMINATIONS

Community Center HANDBOOK

Performance Appraisal System Evaluation Form Managers

Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007

Supplier IT Security Guide

University of Southern California

US DEPARTMENT OF HOMELAND SECURITY TRANSPORTATION SECURITY ADMINISTRATION HUMAN CAPITAL MANAGEMENT POLICY

Traffic Management Plan - Depot Procedure

Dear Keller High School Families,

HARASSMENT, INTIMIDATION AND INSTITUTIONAL VANDALISM - Policy No. C006

Conflict of Interest Electronic Document Quick Reference Guide

Repton Primary School. Traffic Management Plan

Transcription:

USGS EROS ADMINISTRATIVE PROCEDURE SUBJECT / TITLE: Computer Room Visitor Access 1.0 References. DOI Information Technology Security Policy Handbook, v3.1, Sec. PE-8. 2.0 Purpose. To describe the process associated with the entrance and exit of visitors into any of the USGS EROS computer rooms. A visitor is anyone who does not have a USGS EROS issued card key that gains him/her access to a USGS EROS computer room. The scope of this procedure is Centerwide for all federal and contractor employees. 3.0 Overview. Department of the Interior (DOI) policy (as defined in the DOI Information Technology Security Policy Handbook, v3.1, Sec. PE-8) requires the logging of all personnel who enter DOI computer rooms. The USGS EROS card key system accomplishes this logging for those whose card keys allow him/her into computer rooms. Manual entrance and exit (logging) is required for all others. This procedure defines that logging process. 4.0 Definitions. Visitor. A visitor is anyone who does not have a USGS EROS issued card key that gains him/her access (opens the door) to a USGS EROS computer room. Authorized Staff. An authorized staff is either a USGS EROS federal or contractor employee who has been issued a USGS EROS card key allowing him/her access to a computer room. 5.0 Procedure. 5.1 Roles and Responsibilities. All USGS EROS federal and contractor staff have the responsibility to understand and follow this procedure. Designated visitor access log points of contact (POCs) are responsible for ensuring that an access notice is posted outside the entrance/exit of each computer room and for maintaining a log for all visitors to sign in and out. Any person who allows one or more visitors into a computer room is responsible for ensuring that the visitor(s) are logged in and logged out as they enter and exit the computer room. Page 1 of 6

5.2 Process. Computer Room Visitor Access Process Flow Provide Visitor Access Logs Log visitors in and out of computer rooms File Visitor Access Logs Page 2 of 6

5.2.1 Provide Visitor Access Logs. The designated visitor access log POC will ensure a log (Appendix A) is always accessible for visitors at the entrance/exit(s) of each computer room. New logs will be provided on a periodic basis. 5.2.2 Log Visitors In and Out of Computer Rooms. Authorized staff (whose card key allows computer room access) will accompany incoming visitors and guide him/her to the appropriate visitor access log. Note that per DOI, USGS, and EROS procedures, visitors must be monitored at all times while in the computer rooms. It is the responsibility of their sponsor/host to ensure this is accomplished. A computer room access notice (Appendix B) will be posted outside each entrance/exit of each computer room to remind USGS EROS federal and contractor staff and visitors of this requirement. Authorized staff will ensure visitors complete the access log with the required information. Authorized staff will ensure visitors sign out (indicate time out) when exiting the computer room. For those who may host large tours of the computer rooms it is permissible to save time by prefilling a visitor log and bringing that prefilled log to the respective computer room(s). The signature block and the Time In entry should be completed when the tour enters the computer room, and Time Out entries should be completed once everyone has exited. The tour s visitor access log should be left attached to the clipboard. 5.2.3 File Visitor Access Logs. The designated visitor access log POC will provide the previous period s visitor logs to the USGS IT Security Manager (or his/her designee) by mutually agreed upon times and dates. The USGS IT Security Manager will file and maintain the visitor logs according to USGS IT Security and Records Management policies. Activity Summary Inputs Activities Outputs Individual(s) without proper card key access to a computer room 1. Provide Visitor Access Logs 2. Log visitors in and out of computer rooms 3. File Visitor Access Logs Forms/Templates Computer Room Visitor Access Log Form Computer Room Access Notice Completed Visitor Logs Filed Visitor Logs Page 3 of 6

Tools (***Required; **Recommended; *Suggested) Tool Visitor Access Log*** Measurements Number of visitors for any given period 6.0 Appendices. Use To log and track the entrance and exit of personnel who do not have card key access to a computer room Appendix A. Example - USGS EROS Computer Room Visitor Access Log. Appendix B. Example - USGS EROS Computer Room Access Notice. Page 4 of 6

Appendix A. Example - USGS EROS Computer Room Visitor Access Log EROS Computer Room Visitor Access Log Begin End Log Dates: Computer Room: Door: Visitor Name (Please Print) Visitor Organization / Affiliation Visitor Signature Purpose of Visit Person / Organization Visiting Date of Access Time In Time Out Page 5 of 6

Appendix B. Example - USGS EROS Computer Room Access Notice Page 6 of 6