Access Policy. An access control policy is established, documented, and reviewed based on business and information security requirements.
Access Policy. Cisco shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Cisco shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and network services. Cisco shall restrict and tightly control the use of utility programs that might be capable of over- riding system and application controls.
Access Policy iManage enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy. CiteRight enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy. Acuity maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Microsoft maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Vertice shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Vertice shall maintain a record of security privileges of Representatives that have access to Data, networks, and network services. Vertice shall restrict the use of utility programs that might be capable of overriding system and application controls.
Access Policy. Supplier shall determine appropriate access control rules, rights, and re- strictions for each specific user’s roles towards their assets. Supplier shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and net- work services.
Access Policy. A. Prior to providing access to the Datacenter, it is required that everyone that will enter the space read, fully understand and sign the DLR 11101 -
Access Policy. A. Prior to providing access to the Turn-Key Datacenter™, it is required that everyone that will enter the space read, fully understand and sign the DLR 11101 - Pre-Work Information & Acknowledgement. A copy of the signed form will be kept on file with the Building Management. For a copy of this document, please contact Building Management.
B. Customer shall develop an “Access and Authorization Plan” before move-in that specifies process and permissions for granting access to the customer space. The plan should designate those that can grant access into the customer’s space “Customer Authorizers”
1. The plan must include the following:
a. The names of all employees of the customer that will require access into the Turn-Key Datacenter™ space.
b. Names of company(s) and employees of Vendors/Contractors and under what conditions they must meet in order to be allowed into the customer space unescorted.
c. It is the responsibility of the Customer to provide and update the access list. Customer should provide updates for, any changes in personnel that require removal from access to the Turn-Key Datacenter™.
2. Turn-Key Datacenter™ access is restricted to personnel with an approved business need. Only designated “Customer Authorizers” may approve an individual’s access into the Turn-Key Datacenter™.
3. Visitor(s) not on the approved access list will not be allowed to enter the customer space. Security will contact the “Customer Authorizers” and inform them that a visitor(s) has arrived and is in the waiting area. It will be the customer’s responsibility whether to escort the visitor(s) or have Security issue a access badge.
4. Access cards will expire upon 90 consecutive days of non-usage.