Information Resources and Technology Procedure
|Section||Policy Name||Policy Number|
|Physical Security||Physical Security of Morgan Hall Computer Room||3.01.01|
This procedure documents the steps to ensure physical security to the servers and other contents of Morgan Hall.
Supports 3.01 Server Physical Security Access.
The custodian for the Morgan Hall Computer Room is Computing Services Operations Manager.
The Computer Room is always locked.
The Computing Services Operations Manager must authorize key access to the computer room. A list of personnel authorized a key will be maintained.
A second list will be maintained of staff, primarily students, authorized to check out a key from Work Control. These individuals are only to keep the key for the work shift needed and must return the key at the end of their work shift.
Non Keyed Access
The Computing Services Operations Manager will maintain a list of staff allowed access to the Computer room. Computer Operators must insure that a staff member is on that list before allowing access.
An individual on the access list may escort other individuals into the computer room. A log is maintained by the operator on duty of all escorted access.
This procedure applies to the computer room on the second floor of Morgan Hall.
|Date Approved||Revision 1 Date||Revision 2 Date||Revision 3 Date||Revision 4 Date||Revision 5 Date|