FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center
|
|
- Amber Maxwell
- 5 years ago
- Views:
Transcription
1 FACILITY USER GUIDE Colocation in Key Info s Agoura Court Data Center Page 1 of 11 Key Info Facilities User Guide v2.4
2 Table of Contents Welcome... 3 GETTING STARTED... 4 Colocation Access... 4 Proof of Insurance... 5 Keys & Locks... 5 Access Hours... 6 Staffing at Data Center... 6 Bringing Your Equipment to the Data Center... 6 Installing Equipment... 7 Managed Equipment Install... 7 Remote Hands / Tech Support Trash Removal... 8 WORKING IN THE DATA CENTER... 8 Colocation Space Use... 8 Tech Workspace Area... 9 Smoking Area... 9 Visitor Access to the Data Center... 9 Acknowledgement Facility User Guide Acknowledgment Form Page 2 of 11 Key Info Facilities User Guide v2.4
3 Welcome Thank you for choosing Key Info s colocation service. To simplify your move to our facility and ensure security of all personnel and equipment, this guide was created to explain how to access the data center and the policies that are in place to provide a secure environment. If you have any questions or concerns, do not hesitate to call our Client Support Team at NOTE: This guide may be modified at any time and updates will be posted on our Client Portal and/or distributed via . Page 3 of 11 Key Info Facilities User Guide v2.4
4 Colocation Access GETTING STARTED Prior to accessing the facility, we require a designated primary and secondary contact to be named as Authorized Security Contacts. Those two individuals will be authorized to access the Data Center, add or change personnel who may access the facility, change the status of that access, inquire on security issues, or allow temporary visitors in the Data Center. Only change requests submitted in writing on Company letterhead or via company from the Authorized Security Contacts can authorize those changes. In the case that the Authorized Security Contacts are both unavailable, written changes to authorized personnel and Authorized Security Contacts may be changed by a Legal Officer of the client(i.e. CEO, CFO, CTO). The information to be provided must include each individual s name, organization, position, and contact information including and phone number. Those individuals selected for access will be required to have a hand scan created and be issued a photo badge. If you need to grant access to third-party vendors, you may authorize them through the same process as granting access to your own employees, but we will require each designated vendor or contractor to appear in person to perform a hand scan and have a photo badge issued. Vendors and contractors must meet the same insurance/documentation requirements as specified in our agreement. Hand scans and badges are performed only at our Agoura Hills facility and during normal business hours. An appointment is preferred. If an authorized person no longer needs access (such as employee termination or vendor changes), we request that the primary or secondary Authorized Security Contact immediately contact our Client Support team at to have the access credentials disabled. We also need the change requests submitted in writing on Company letterhead or via company from the Authorized Security Contacts. Page 4 of 11 Key Info Facilities User Guide v2.4
5 Authorized individuals and visitors must have a Key Info issued security badge visible on their person at all times. Security doors may not be propped open. If a door is left open for longer than 60 seconds the alarm will sound and personnel will be summoned. Proof of Insurance All colocation clients must procure and maintain the following insurance coverage during their time of occupation of any colocation space in our Data Centers. The client must also add Key Info as additionally insured to their general liability insurance policy: 1. Worker s Compensation in compliance with all applicable local statutes. A. Employer s Liability with limits of $500,000 for each accident. 2. Commercial general liability with combined single limits of $1,000,000 each occurrence. A. All Risk property insurance covering all of the customer s personal property located in the Colocation space. These coverages must be provided before performance a hand scan and issuing badges. Keys & Locks Key Info Colocation cabinets and cages are secured individually, either with combination or keyed locks. If a key lock is used, Key Info will provide two sets of keys at no charge. Keys are stamped as DO NOT DUPLICATE. If you require additional key(s) contact your Sales representative. All keyed locks will be rekeyed by Key Info upon vacancy of the colocation space. If you require your locks to be changed contact our Support group. It is required that all cabinets and cages remain locked while you are not on site. Page 5 of 11 Key Info Facilities User Guide v2.4
6 Access Hours The Data Center is available for clients to access at any time 24x365. Staffing at Data Center The Data Center is manned 7am-6pm Monday-Friday. An on-call Client Support team member can be reached at any time at Bringing Your Equipment to the Data Center Once the hand scan and badge process is complete, and the cabinet combination or keys have been issued, equipment can be moved into your Colocation space at any time, If the Colocation space is not yet available, equipment can be placed in our secure temporary on-site storage. The Client Support team will provide notification once the colocation space is available. Key Info will accept and hold any shipment that is sent to the Data Center on a short term basis. If equipment is being shipped to the Data Center, please notify the Client Support team that equipment is coming. Please have all shipped equipment sent to: (Your company name) c/o Key Information Systems Agoura Court, First Floor Agoura Hills, CA Please make sure to include your primary contact information somewhere on the shipping label. If you are personally transporting large equipment to the Data Center, it is strongly recommended that you schedule the delivery of this equipment with our Client Support team. Page 6 of 11 Key Info Facilities User Guide v2.4
7 Installing Equipment Key Info maintains a hot and cold row designation for thermal efficiency. All equipment, including networking equipment, must be installed in accordance with the row designations. As such, all equipment intakes must be mounted facing the cold row and all equipment exhausts must vent to the hot row. Managed Equipment Install Our Professional Services team will install your equipment if agreed to in the contract. A Managed Equipment Installation will be handled in the same way as described above. All equipment should be shipped to the Data Center, and our Professional Services Team will physically install that equipment in the assigned racks and/or cages, provide power, and configure the network. In order for our Professional Services team to properly install your equipment, we ask that you provide the following details (preferably in electronic form) when you schedule this service: Equipment list with quantities and descriptions Detailed cabling instructions Physical equipment rack diagrams Power requirements Network preferences Contact information Any other special instructions This will require an SOW prepared by PSG We request you send all documentation/directions to our Client Support team. We also ask that you clearly identify your equipment with your company name on the shipping boxes to ensure the proper identification of what is being shipped. Page 7 of 11 Key Info Facilities User Guide v2.4
8 Remote Hands / Tech Support. Key Info offers technical support to colocation clients as an additional offering. A Client Support team member performing Remote Hands will perform simple equipment troubleshooting and configuration assistance such as: Restarts / Reboots of Servers Card or Disk Drive Swaps Our Professional Services team can provide more extensive support to our clients that require Testing Diagnostic Services Trash Removal In order to maintain a clean and efficient data center, empty equipment boxes must be removed from the Data Center. Empty cardboard must be removed from the Data Center and cannot be stored in any part of the Data Center. WORKING IN THE DATA CENTER Colocation Space Use The Colocation space is only to be used for the placement and maintenance of computer and telecommunications equipment. No food or drinks are allowed in the Colocation facility. Firearms, drugs and alcohol are completely prohibited at all times. Additional policies are as follows: Page 8 of 11 Key Info Facilities User Guide v2.4
9 1. Cabling must not be installed or altered in the existing signal and power trays, or on top of cabinets. 2. Floor tiles must not be moved and no attempts to penetrate the tile should be made. 3. Equipment must be secured before, during and after physical installation. Please notify a Client Support team member if equipment needs to be secured overnight. 4. The Client Support team is the single point of contact for all questions and issues. If an on-site technician is needed the on-call technician will contact them to make arrangements. Tech Workspace Area Key Info offers a workspace for customers to use on a first-come, first-serve basis. The workspace is equipped with telephones and Internet access as well as a workbench for setup/configuration/diagnostic work that would otherwise obstruct aisles and exits. The workspace is available for you to use; however, you cannot drill, solder, or saw in the workspace areas. Key Info does offer private conference rooms that are available during normal business hours with prior reservation. The workspace is intended for temporary daily use only. Please remove all materials in the workspace when you leave. Smoking Area Smoking is not allowed in the Data Center/Colocation areas. This includes the use of vaporizers and similar products. Air sampling equipment is in active use for smoke/fire detection within the Data Center. Smoking is permitted outside the building, away from entrances. Please deposit cigarette butts and other waste in appropriate receptacles. Visitor Access to the Data Center The Primary or Secondary contact must give prior notice to the Client Support team when visitors plan to access the Colocation facility. Visitors will not be allowed to access the Colocation areas unless escorted by an Page 9 of 11 Key Info Facilities User Guide v2.4
10 authorized Client or Client Support team member. During business hours all visitors must sign in at the front desk. A government photo ID will be held in exchange for a visitor badge. Visitor badges must be returned to Key Info personnel at the end of each visit. Acknowledgement I acknowledge that I have read, understood, and will adhere to the policies above. This Facilities User Guide is available at: By signing page 11 of the Agoura Court Facilities User Guide, I acknowledge that I will review the document annually to be aware of all current rules. Page 10 of 11 Key Info Facilities User Guide v2.4
11 Facility User Guide Acknowledgment Form I further acknowledge that I have received a copy of the Key Info Facility User Guide and understand that it contains important information on the company's general Data Center and Card Key Access policies. SIGNATURE DATE NAME (TYPED OR PRINTED) Page 11 of 11 Key Info Facilities User Guide v2.4
n+2 DATA CENTER CONTROL POLICY
This Data Center Control Policy (the Control Policy ) forms a part of the Master Services Agreement between n+2 LLC ( n+2 ) and Client (the Agreement ), in which this Control Policy is incorporated by
More informationData Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
More informationCenteris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information
Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document
More informationCommunications Room Policy
Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents
More informationTimico Data Centres: Access Policy
Timico Data Centres: Access Policy Timico Ltd 2012 Page: 1 of 6 1 Contents 1 Contents... 2 2 Version control... 2 3 Overview... 3 4 Introduction... 3 5 Rules of conduct... 3 6 Access request procedure...
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationPoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS
PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS Version 14 November 19, 2014 Digital Realty Table of Contents INTRODUCTION... 3 ACCESS TO THE POP ROOMS, ISP & OSP... 3 PoP- MoP Forms... 3 Who must
More informationCenturyLink Data Center North American Facility User Guide
CenturyLink Data Center North American Facility User Guide page 1 of 18 NORTH AMERICAN FACILITY USER GUIDE Table of Contents 1.0 - Welcome... 3 1.1 - CenturyLink Data Center Facility Classifications...
More informationData Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
More informationColocation Area shall mean the location within a A2000 owned or leased Facility in which Space ordered by Customer is located.
Colocation Agreement This Service Schedule is applicable only where Customer orders Data Center Services and associated services. Data Center Facility Services may also be designated as A2000 Colocation
More informationMASTER SERVICE AGREEMENT DATA CENTER POLICIES & PROCEDURES
Access to CoreSpace facilities may be used only for the purpose intended and in accordance with specific instructions. CoreSpace s Colocation Customer ( Customer ) and its representatives agree to observe
More informationUITS Data Center Access Policies and Procedures
UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...
More informationSECTION 15 KEY AND ACCESS CONTROLS
15.1 Definitions A. The definitions in this section shall apply to all sections of the part unless otherwise noted. B. Definitions: Access Badge / Card a credential used to gain entry to an area having
More informationPolicies & Procedures Effective Date: January 24, Key Control
LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More information26 th Annual Taste of Morgan Hill 2015 Presented by the Morgan Hill Chamber of Commerce Downtown Morgan Hill September 26 &
26 th Annual Taste of Morgan Hill 2015 Presented by the Morgan Hill Chamber of Commerce Downtown Morgan Hill September 26 & 27 2015 Pre-packaged/Food Sample Booth Vendor Application GENERAL INFORMATION:
More informationPolicies & Procedures Facility User Guide
Policies & Procedures Facility User Guide April 2017 Table of Contents 1.0 WELCOME... 3 2.0 SECURITY POLICIES... 5 2.1 AUTHORIZING YOUR ACCESS... 5 2.2 REQUESTING ACCESS... 5 2.3 CUSTOMER S VENDOR AND
More informationPhysical and Environmental Security Policy Document Number: OIL-IS-POL-PES
Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental
More informationData Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)
Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning
More informationAIMS CUSTOMER HAND BOOK THANK YOU FOR CHOOSING AIMS AS YOUR PREFERRED SERVICE PROVIDER.
AIMS CUSTOMER HAND BOOK THANK YOU FOR CHOOSING AIMS AS YOUR PREFERRED SERVICE PROVIDER. It is our pleasure to provide you with the fullest of Informations to enable you to obtain the best from our services.
More informationCCBC is equipped with 3 computer rooms, one at each main campus location:
Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationSabey Data Center Properties CONSOLIDATED WORK RULES
Sabey Data Center Properties CONSOLIDATED WORK RULES Contents Overview... 2 Building Security... 2 General... 2 Access Badge Display... 2 Security Rounds... 2 Access to Secure Spaces... 2 Emergency Exits...
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationDigital Intelligence Systems, LLC PeopleSoft Guide Vendors
Digital Intelligence Systems, LLC PeopleSoft Guide Vendors Version 1.0 July 2016 CONTENTS INTRODUCTION... 3 1.1 Change Password... 3 PROFILE INFORMATION... 5 2.1 Identifying Information... 6 2.2 Address...
More informationSFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc.
SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES June 2016 STATUS Version 12 NYSE Group, Inc. 2016 Page 1 About This Document The following documents should be read in conjunction
More informationWELCOME HEADQUARTERS TO THE NEW GENCO. 700 Cranberry Woods Drive Cranberry Township, PA INSIDE:
WELCOME TO THE NEW GENCO HEADQUARTERS 700 Cranberry Woods Drive Cranberry Township, PA 16066 INSIDE: Arriving on Day 1 Page 2 Parking Page 2 Entrances Page 2 Badges & Access Page 3 Security Page 3 Setting
More informationARTS & CRAFTS APPLICATON
ARTS & CRAFTS APPLICATON Located in beautiful historic downtown Morgan Hill, California, the Taste of Morgan Hill is held the last weekend in September each year. Attendance estimates are about 50,000
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationData Center Colocation Service Level Agreement
Data Center Colocation Service Level Agreement Contents Terminology... 2 Service Description... 2 Power... 2 Conditioned Space... 3 Fire Suppression... 3 Service Reporting... 3 Hardware Replacement...
More informationSPECTRUM ENTERPRISE. Colocation Services Addendum
LEGAL SPECTRUM ENTERPRISE Colocation Services Addendum This Colocation Services Addendum ( Colocation Addendum ) governs the Spectrum Enterprise Colocation Service ( Colocation Service ) and constitutes
More informationStatement of Work for Support Line for Cisco
Statement of Work for Support Line for Cisco This Statement of Work specifies an optional Service selected by you on the Schedule of a related IBM Service Suite Statement of Work (SOW). This Statement
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationLake County Housing Authority North U.S. Highway 45 Grayslake, IL 60030
Proposal for Services Security Camera Replacement Must be received by 10:00 a.m. on March 30, 2018 Services to be provided at Shiloh Towers 1525 27 th St. Zion, IL A Mandatory Pre-bid Meeting will be held
More informationSERVICE DESCRIPTION COLOCATION
Contents Service Overview.... 3 Key Features... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Internal Kick-Off... 6 Customer Kick-Off... 7 Provisioning & Testing.... 7 Billing....
More informationServer Colocation Standards
Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke
More information2018 PO BOX 604, BANNING, CA STAGECOACHDAYS.ORG SEPTEMBER 6-9 VENDOR APPLICATION
Vendor Name: Contact Person: Address: City: 2018 PO BOX 604, BANNING, CA 92220 STAGECOACHDAYS.ORG SEPTEMBER 6-9 VENDOR APPLICATION State: Zip Code: Phone: ( ) - Cell: ( ) - CDL#: Email: VENDOR TYPE: Check
More informationKOIL Park User Guide
KOIL Park User Guide KOIL Park ( the Facility ) is operated by Mitsui Fudosan Co., Ltd. ( the Company ). KOIL Park members ( Members ) and persons who temporarily use the Facility ( Users ) must observe
More informationUnited Council for Neurologic Subspecialties Examination Registration and Testing Guidelines
United Council for Neurologic Subspecialties Examination Registration and Testing Guidelines VERY IMPORTANT INFORMATION This message serves as your notification to register for the 2018 UCNS Behavioral
More informationFacility Security Policy
1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,
More informationThe Recovery and Monitoring Program of New Jersey (Keep this sheet for your files)
Welsh Commons, 1364 Welsh Road, Suite C-2, North Wales, PA 19454-1913, USA 800-732-DRUG (3784) Fax: 215371-1126 Internet: http://www.firstlab.com E-mail: mail@firstlab.com The Recovery and Monitoring Program
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationRFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service
RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...
More information1.0 Executive Summary
Statement of Work - 1 - Power and Cooling Assessment for Data Center Professional Services Service 1.0 Executive Summary Table of Contents 1.0 Executive Summary 2.0 Features & Benefits 3.0 Details of Service
More informationTable of Contents. SV3 Visitor Registration Tenant Job Aid. 1. Introduction Accessing the SV3 Portal Schedule Visitor...
Table of Contents 1. Introduction... 2 2. Accessing the SV3 Portal... 2 3. Schedule Visitor... 3 1. Introduction This Job Aid is for entering registered visitors into SV3 using the new user experience
More informationPRODUCT DESCRIPTION PRODUCT FEATURES
Page 1 2003-02-26 PRODUCT FEATURES! PRODUCT AND USAGE " Information signage to facility occupants and visitors. " Identifying important locations while maintaining facility decor and theme. " Flexible
More informationPhysical and Environmental Security Standards
Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...
More informationHPE Hardware Support Exchange Service
Data sheet HPE Hardware Support Exchange Service HPE Contractual Support Services Hewlett Packard Enterprise offers a reliable and fast hardware exchange service for eligible HPE and multivendor products.
More informationAutodesk Professional Certification & Authorized Certification Center
Autodesk Professional Certification & Authorized Certification Center Global Program Guide Version 9 January, 2013 Autodesk has set these standards, which are applicable at the date of issue of this document.
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationNVMS Frequently Asked Questions
NVMS Frequently Asked Questions General and Profile Information 1. What types of services does NVMS request? 2. How do I get work from NVMS? 3. What information and forms does NVMS need in order for me
More informationData Center HANDBOOK
Data Center HANDBOOK 1.0 Introduction 4 2.0 Facilities 4 2.1 Access to Facilities 4 2.2 Shipping Equipment to the Data Center 5 2.3 Data Center Addresses 5 2.4 Shipping Equipment from the Data Center 5
More informationInformation Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T
Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Department/School/Division: Effective USC Account Number (Required): 1. General Conditions 1.1. This agreement
More informationJuly 11, To: Prospective Vendors
July 11, 2018 To: Prospective Vendors The City of Oakley will be hosting the 6th Annual Heart of Oakley event on Saturday, September 22nd, 2018. We invite you to join us to sell your wares, market your
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationIndicate whether the statement is true or false.
Indicate whether the statement is true or false. 1. In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.
More informationCOVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM
This document outlines all features and functions available to Entity Business Contacts in the Certification Portal. It details the functions that you as an Entity User have including the account registration
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationAlcohol Event Registration User Guide
Alcohol Event Registration User Guide Contents Introduction... 1 Form Completion... 1 Form Initiation... 1 Saving to Complete Later... 5 Student Affairs Reviewer Submission... 6 Primary Social Host Submission...
More informationTOTAL NUMBER OF UNITS: # NUMBER OF BUILDINGS: # AVERAGE OCCUPANCY RATE: % IS MOTEL SEASONAL? YES NO IF YES, # OF MONTHS OPENED?
1411 SW Morrison Street, Suite 400 Portland, OR 97205-1945 800-527-7397 Fax 800-742-5176 BUSINESS NAME: APPLICANT S NAME: LOCATION OF PREMISES: YEARS OWNED? OWNER MANAGED? IF NO, DESCRIBE MANAGEMENT: YEARS
More informationAccess Procedures. 1.2 The University Archives Centre is open free of charge by appointment for use by staff, students and external researchers.
Access Procedures 1 Introduction 1.1 London South Bank University Archives Centre collects, preserves and makes accessible the original and unique archives created and accumulated by the University, its
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationPrivacy Act; System of Records; Amendment of the EPA Personnel Emergency
ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OEI-2016-0235; FRL-9954-87-OLEM] This document is scheduled to be published in the Federal Register on 11/03/2016 and available online at https://federalregister.gov/d/2016-26487,
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents
More informationSPECIAL EVENT PERMIT APPLICATION
SPECIAL EVENT PERMIT APPLICATION Complete the application and return to Neighborhood & Community Services. Email: emily.angel@bgky.org Mail-in: Attn: Neighborhood Services Fax-in: 270-393-3077 P.O. Box
More informationOUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN
OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN LOCATION OF SERVICE REQUIRED 141 Voortrekker road Parow Cape Town Areas: Offices Entrance foyers Balcony Toilets Basements Conference rooms Store rooms
More informationSc r a n t o n Wi lk e s-ba r r e
Telephone (570) 562-0600 Fax # (570)562-1344 Welcome to Scranton Wilkes-Barre Auto Dealers Exchange. Please fill out all information on the dealer application. An incomplete application will not be considered
More informationColocation Specific Terms and Conditions
Colocation Specific Terms and Conditions 1 DEFINITIONS These Specific Terms and Conditions are to be read in conjunction with our General Terms and Conditions. All definitions contained within these Specific
More informationTender Number: 4638 Date Created : April 3, 2017 Contact Person: John Brennan Telephone: (902)
Tender Number: 4638 Date Created : April 3, 2017 Contact Person: John Brennan Telephone: (902) 368-5138 Email jebrennan@gov.pe.ca Procurement Services Request for Quotation (RFQ) Tender Source: PROCUREMENT
More informationColocation Service Terms
Colocation Service Terms Last Updated: March 24, 2017 The following Service Terms apply only to the specific Services to which the Service Terms relate. In the event of a conflict between the terms of
More informationAPPLICATION DEADLINE Postmarked by January 12, 2018
APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Marketplace Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest
More informationIT Security Standard Operating Procedure
IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationProcess Serving Information Sheet
Process Serving Information Sheet Thanks for your interest in process service through our company. The following information explains some of the processes involved in completing your service: 1. To serve
More informationUniversity Facilities Management (UFM) Access Control Procedure (non-residence areas)
University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure
More informationLevel 1 Interconnection Services at MIX Annex A Technical and Organizational Specifications
Level 1 Interconnection Services at MIX Annex A Technical and Organizational Specifications Page 1 of 8 DOCUMENT CODE : MIX-109E VERSION : 3.0 ENGLISH TRANSLATION DEPARTMENT : BOARD OF DIRECTORS STATUS
More informationSOLICITATION AMENDMENT
North Dakota University System Core Technology Services 4349 James Ray Dr. Grand Forks, ND 58202 September 29, 2014 Solicitation Number and Title: CTS-14-001 Datacenter Operations, Monitoring and Maintenance
More informationInstallation Service. 1.0 Executive Summary. Factory Trained Technician Train Customer Support Staff On Basic Operation Of The Equipment
Installation Service Statement of Work Start-up Service for Cooling Start-up - 1 - Service for Cooling Service 1.0 Executive Summary Table of Contents 1.0 Executive Summary 2.0 Features & Benefits 3.0
More informationAdministrative Procedure
Administrative Procedure Number: 403 Effective: 9/19/05 Supercedes: 7/10/02 Page: 1 of 15 Subject: LOCK/KEY CONTROL POLICY 1.0. PURPOSE: To establish the policy and procedures for the coordination of a
More information2018 Bourse Application Packet
2018 Bourse Application Packet Version 1.0 October 29, 2018 Welcome to the Baltimore Stamp and Coin Show! It is my pleasure to host the show and serve you during the show. I think it is only fair that
More informationData Center Work Rules SV1-FAC-FPO-MGT-1427
Page 1 of 13 Data Center Work Rules Policy 1.0 RESPONSIBILITIES: 1.1 It is the responsibility of all contractors to comply with this policy. 1.2 It is the responsibility of the Project Manager to ensure
More informationSupplier Registration Guide
2016 Supplier Registration Guide SODIC eprocurement Portal https://eprocurement.sodic.com 6/1/2016 Supplier User Guide Register on the Portal Dear Valued Supplier, Welcome to SODIC eprocurement Portal
More informationGreater TEXAS Federal Credit Union 6411 North Lamar Blvd. Austin, TX (512) Toll Free: (800) Fax: (512)
Terms and Conditions for Remote Deposit This Remote Deposit Capture Agreement contains the terms and conditions that govern the use of Remote Deposit Capture provided to you by Greater Texas Federal Credit
More informationTHE SLAC ARCHIVES AND HISTORY OFFICE PURPOSE
Archives and History Office Service Level Agreement 2015/2016 THE SLAC ARCHIVES AND HISTORY OFFICE PURPOSE The SLAC Archives and History Office exists to support the archival needs of the laboratory, as
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationSouth Carolina Environmental Certification Board Computerized Certification Examination Information
South Carolina Environmental Certification Board Computerized Certification Examination Information The South Carolina Environmental Certification Board examinations are delivered at three locations in
More informationSDBOR Technology Control Plan (TCP) Project Title:
SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?
More informationInstallation Guide for Flex Tap
Installation Guide for Flex Tap 800-0216-001 Rev. A 9/12 Contents Introduction....1 Key Features....2 About This Guide....3 Unpacking and Inspection....3 Rack Mounting the Flex Tap Panel....3 Loading the
More informationWireless Communication Device Policy Policy No September 2, Standard. Practice
Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to
More information<PROJECT NAME> IMPLEMENTATION PLAN
IMPLEMENTATION PLAN Version VERSION HISTORY [Provide information on how the development and distribution of the Project Implementation Plan was controlled and tracked.
More informationCity of Santa Rosa SPECIAL EVENT PERMIT APPLICATION
City of Santa Rosa SPECIAL EVENT PERMIT APPLICATION Return To: Recreation & Parks Department speventpermit@srcity.org 55 Stony Point Road Phone: (707) 543-4512 Santa Rosa, CA 95401 Fax: (707) 543-3288
More informationData Sharing Agreement. Between Integral Occupational Health Ltd and the Customer
Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services
More informationVACCINES FOR CHILDREN ANNUAL ENROLLMENT IN FLORIDA SHOTS
Florida SHOTS VACCINES FOR CHILDREN ANNUAL ENROLLMENT IN FLORIDA SHOTS Contact Information www.flshots.com Free help desk: 877-888-SHOT (7468) Monday Friday, 8 A.M. to 5 P.M. Eastern STEP 1: Log onto Florida
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationRobert B. Zajonc Experimental Laboratories
Robert B. Zajonc Experimental Laboratories The Research Center for Group Dynamics Running experiments in the RCGD Labs What you need to know... http://www.rcgd.isr.umich.edu/rcgdlabs.htm Running in the
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationPCA Staff guide: Information Security Code of Practice (ISCoP)
PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation
More informationNetwork Infrastructure, Desktop, and Server Support Service Level Agreement
Network Infrastructure, Desktop, and Server Support Service Level Agreement INTRODUCTION This service level agreement ( SLA ) describes the core services provided to customers by Micro- Management Systems,
More information