Skip to main content

Policies

Go Search
Home
  
Policies > Wiki Pages > Access to Protected Information Technologies Locations  

Access to Protected Information Technologies Locations

Purpose:
To ensure security of protected Information Technologies locations and to enable logging of access to critical protected Information Technologies locations.
 
Statement:
All protected Information Technologies areas must be kept locked at all times.  Card access is the preferred means of securing these areas; when card access is not available, access will be available via an Information Technologies' submaster key.  Video monitoring will be used in three secure locations (primary data center, secondary data center and the network core).
 
Details:
For emergency access to Information Technologies' protected locations, an appropriate supervisor in Campus Police or Facilities may grant temporary access to a protected location, provided that Information Technologies is notified via telephone or email in a timely fashion. 
 
  • Doors to critical protected Information Technologies locations must remain closed at all times.
  • All WSC Users must individually use their personal OneCard to log access to protected Information Technologies locations.
  • If multiple users need to access a protected Information Technologies location, then *each* user must record their access to the location to log his/her entry.
  • Vendors/guests (non-WSC employees) must be escorted by appropriate Information Technologies staff into any protected Information Technologies locations.  Prior to access into a protected area, vendors must first obtain a visitor access badge from the Information Technologies Help Desk, where they also will manually log their arrival and departure.  All visitor access cards must be returned to the Help Desk as a precondition for payment of services. Visitor logs will be saved for a minimum of 90 days.
  • Video from 3 secure locations will be saved for 90 days.
 
Additional Info:
  • Information Technologies will maintain master list of access to Information Technologies secure areas.
  • Best practice assumes that all secure Information Technologies areas will be accessible by card readers.
  • Whenever possible, key access to secure Information Technologies areas is prohibited.
  •  

    Approved By:  Managers & CIO

    Date of Origination: 1/18/2008

    Last Review: February, 2012

    Last modified at 2/14/2012 7:20 AM  by Ramsdell, Nancy