POLICY
To ensure minimum level
of security is maintained by all trust staff that has access to the IT Room
and/or server room.
PROCEDURES
Users should not
expect that internet is confidential
or private but usually this would be the case. stahl Hotel retains the right to
access or view users e-mail. This right will only be exercised where we
genuinely believe that the user has not complied with this policy.
Prohibited Use
1. A list (Server room access list) of
authorized staff is currently listed in Apendix A. IT. Server room access list
2. A procedure for the safe use of the
room facilities within the IT Server room in X-Ray will be made available from
the facilities directorate. This will mainly be concerned with the safe use of
the fire safety system in the room
3. Staff must wear their identification
badge at all times, and visitors must wear visitors’ passes (available At Security Office)
4. All authorized staffs are required to
sign in and out of the IT server room access log. These log sheets are retained
by the Head of IT. All visitors must also be recorded in the IT server rooms
access log
5. All
individuals accessing the
IT server rooms
must sign in
and out of the
IT server room
access log. This
includes all visitors,
who must be accompanied by a member of the IT staff
at all times. These log sheets are retained by the Head of IT
6. Inclusion onto the IT server room
access list must be approved and signed off by Head of IT. These inclusions
will be documented and retained by the Head of IT
7. Entry into the IT server rooms by
tailgating other staff is not permitted
8. The use of mobile phones, pagers or
other equipment that emits radio waves within the IT server room is forbidden
unless specific exemption is obtained from the Head of IT
9. Food and drink must not be taken into
the server rooms.
10. On a monthly basis the Head of IT
will review the access log: the log will be signed at the last entry and dated
No comments:
Post a Comment