Mar 29, 2024  
Policies and Procedures Manual 
    
Policies and Procedures Manual

08:08:09 Information Technology Access to Secure Areas


Revision Responsibility: Executive Director of Information and Educational Technologies & Chief Information Officer
Responsible Executive Officer: Vice President for Business & Finance

Purpose

Access to the computer room and network closets are restricted to authorized personnel and will remain secured at all times. This policy establishes rules and procedures for accessing the computer room and network closets.


Policy

Definitions: For the purposes of this policy all definitions are defined in the Information Technology Definitions Policy

  1. The main computer room will be physically secured at all times. It is secured by and electronic access control system or manual push button lock that requires a known code. Access control system access will be managed by the central management system and access control device assigned to the employee. Only authorized employees will have access via their access control device. Manual door access codes will be changed when: 
     
    1. an authorized person leaves employment or changes institutional roles,
       
    2. a year has passed since the last code change, or
       
    3. at the discretion of IET leadership.
       
  2. A list of authorized personnel will be kept by the IET Executive Aide and changes will be approved by the Chief Information Security Officer (CISO).
     
  3. Authorized personnel will be approved through the standard TSR process.
     
  4. When the access code is changed, Campus Police will receive the new access code in a sealed envelope to be used for emergency purposes only. Upon use of this code, Campus Police will notify IET personnel and the access code will be changed.
     
  5. Network closets are to be secured at all times. All institutional employees with master keys have access to these rooms and therefore inherently are authorized for access as necessary. Any non-authorized person who requires access to the computer room or network closets must meet the following criteria:
     
    1. Must be supervised by an authorized person(s).
       
    2. Must have a legitimate institutional purpose requiring access.
       
    3. Must complete the visitor sign-in access form. 11/15; 09/17