Data Center Access Procedures Sample Clauses

Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized Google employees, contractors and visitors are allowed entry to the data centers. Only Google employees and contractors are permitted to request electronic card key access to these facilities. Data center electronic card key access requests must be made through e-mail, and requires the approval of the requestor’s manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they wish to visit; (ii) sign in at on-site security operations (iii) and reference an approved data center access record identifying the individual as approved.
AutoNDA by SimpleDocs
Data Center Access Procedures. Access to the datacenter follows Algolia’s Physical Security policy allowing only pre-approved authorized personnel to access the Algolia equipment.
Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors are allowed entry to the data centers. Only authorized employees and contractors are permitted to request electronic card key access to these facilities. Data center electronic card key access requests must be made through e-mail, and require the approval of the requestor's manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they wish to visit; (ii) sign in at on-site security operations; and (iii) reference an approved data center access record identifying the individual as approved. ● On-site Data Center Security Devices. Google's data centers employ an electronic card key and biometric access control system that is linked to a system alarm. The access control system monitors and records each individual's electronic card key and when they access perimeter doors, shipping and receiving, and other critical areas. Unauthorized activity and failed access attempts are logged by the access control system and investigated, as appropriate. Authorized access throughout the business operations and data centers is restricted based on zones and the individual's job responsibilities. The fire doors at the data centers are alarmed. CCTV cameras are in operation both inside and outside the data centers. The positioning of the cameras has been designed to cover strategic areas including, among others, the perimeter, doors to the data center building, and shipping/receiving. On-site security operations personnel manage the CCTV monitoring, recording and control equipment. Secure cables throughout the data centers connect the CCTV equipment. Cameras record on site via digital video recorders 24 hours a day, 7 days a week. The surveillance records are retained for up to 30 days based on activity.
Data Center Access Procedures. Access to the datacenter follows Sightengine’s Physical Security policy allowing only pre-approved authorized personnel to access Sightengine equipment.
Data Center Access Procedures. Access to the Company Data Center without a valid security card requires that all Customers present valid id and sign in with a valid signature for a Company staff member to grant them access. Customers accessing the data must have their identification and security card available for inspection at all times. Failure to adhere to the sign-in and sign-out procedures could result in revocation of access to the space.
Data Center Access Procedures. TeleSign maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors are allowed entry to the data centers. Only authorized employees and contractors are permitted to request electronic card key access to these facilities. Data center electronic card key access requests must be made through e-mail, and requires the approval of the requestor’s manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they wish to visit; (ii) sign in at on-site security operations (iii) and reference an approved data center access record identifying the individual as approved.

Related to Data Center Access Procedures

  • SAFETY PROCEDURES The Contractor shall:

  • POST ONLINE PUBLIC AUCTION PROCEDURES 4.1. Successful E-bidders shall and undertake to sign the Memorandum of Sale at the office of the Auctioneer within 3 working days from the date of auction, failing which the deposit paid will be forfeited to the Assignee bank and the sale will be deemed cancelled/terminated and the property may be put up again for subsequent auction without further notice to the said E-Bidders. The Auctioneer shall send the Memorandum of Sale for stamping and thereafter forward the same together with the required deposit paid under Clause 2.4 above and the differential sum paid under this clause (if any) to the Assignee bank.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!