Information Resources and Technology Procedure

Section Policy Name Policy Number
Physical Security Physical Security of Morgan Hall Computer Room 3.01.01

Procedure Purpose

This procedure documents the steps to ensure physical security to the servers and other contents of Morgan Hall.

Policy Supported

Supports 3.01 Server Physical Security Access.

Procedure Description

The custodian for the Morgan Hall Computer Room is Computing Services Operations Manager.

Locks

The Computer Room is always locked.

Key Access

The Computing Services Operations Manager must authorize key access to the computer room.  A list of personnel authorized a key will be maintained.

A second list will be maintained of staff, primarily students, authorized to check out a key from Work Control.  These individuals are only to keep the key for the work shift needed and must return the key at the end of their work shift.

Non Keyed Access

The Computing Services Operations Manager will maintain a list of staff allowed access to the Computer room.  Computer Operators must insure that a staff member is on that list before allowing access.

An individual on the access list may escort other individuals into the computer room.  A log is maintained by the operator on duty of all escorted access.

Procedure Scope

This procedure applies to the computer room on the second floor of Morgan Hall.

Date Approved Revision 1 Date Revision 2 Date Revision 3 Date Revision 4 Date Revision 5 Date
6/6/2012