Sabey Data Center Properties CONSOLIDATED WORK RULES
|
|
- Kristina Simpson
- 6 years ago
- Views:
Transcription
1 Sabey Data Center Properties CONSOLIDATED WORK RULES
2 Contents Overview... 2 Building Security... 2 General... 2 Access Badge Display... 2 Security Rounds... 2 Access to Secure Spaces... 2 Emergency Exits... 2 Data Center Access... 2 Access Requests/Tickets... 2 Keys/Access Cards... 2 Data Center Support Infrastructure Management... 3 Site Operations and Maintenance... 3 Procedures... 3 Method of Procedure (MOP)... 3 General Work Rules... 3 Individual Responsibilities... 3 Accidents/Illnesses... 4 Critical Environment Work Rules... 4 Work in Data Center Space (MOP Required)... 4 Tools and Equipment... 4 Housekeeping... 5 Critical Power/Network Connectivity... 5 Circuit Installation (MOP Required)... 5 Standards... 5 Energized Work and Lock-out/Tag-out Procedures (MOP Required)... 6 Mechanical Work (MOP Required)... 6 Safety... 6 Fire Alarm System/Building Evacuation... 6 Emergency Management... 7 How to Report an Emergency... 7 Medical Emergencies... 7 Chemical Storage and Spill Response... 7 Deliveries/Shipments... 7 SDCP Consolidated Work Rules Personal Accountability
3 OVERVIEW This document establishes rules and guidelines for work performance in facilities operated by Sabey Data Center Properties. It provides guidance for staff, suppliers/vendors or anyone else who does work which could impact data center operations. It is imperative that all concerned comply with all applicable provisions for any work that has impact potential to data center operations. Any exception will be considered on a case-by-case basis and determination will be made by local data center management on whether to approve as a one-time event or institute a change in the overall guidelines document. BUILDING SECURITY General Do not seek to defeat security controls (e.g. interlocks). Any person requiring such an action shall contact Security. Access Badge Display All personnel must display an access badge at all times while in the facility. Temporary badges are to be turned in at the Security Desk when a person leaves the site at the end of the work period for the day. Security Rounds The data center security staff conducts rounds of the building. They are authorized to stop work if they feel safety requirements are not being followed or if any threat to data center operations or personnel safety exists. Access to Secure Spaces No tailgating/piggybacking into secured areas is permitted. Every person with an access card that passes through a doorway with a card reader should scan his/her card. Emergency Exits Emergency exits doors are located throughout the facility with appropriate signage and directions. Note: emergency exits are not to be used in non-emergency situations. DATA CENTER ACCESS Access Requests/Tickets All access requests must be generated and approved through the Customer Portal. Once approval is received, individuals are required to present a US government-issued ID to Security in order to be issued with an access card or visitor badge. Keys/Access Cards Contact Sabey Data Center Management for access to any secure areas such as roof, equipment rooms, storerooms, equipment panels, power panels, etc. 2
4 DATA CENTER SUPPORT INFRASTRUCTURE MANAGEMENT Site Operations and Maintenance The onsite facilities operations crew is responsible for the operation, maintenance, safety, and security of the facility. Route any requests for Sabey support services through the Sabey Customer Portal. Procedures To control the risk of unintended failure, all employees, contractors, technicians, etc., must comply with all relevant procedures and processes in the Data Center and other critical environment. Method of Procedure (MOP) A Method of Procedure (MOP) is required for any work in the Data Center and critical infrastructure areas that has potential to impact critical environment operations or degrade redundancy of critical support systems. MOP will be developed by entity performing the work and approved by data center operations management before work commences. Every MOP must identify the equipment/system being worked on, potential risk to other equipment/systems and critical environment operations, mitigation strategies and a back-out plan. GENERAL WORK RULES Individual Responsibilities All vendors, contractors, and other service providers must be appropriately attired and act in a professional manner. No firearms, explosive chemicals, or weapons of any type are allowed on site. No smoking of any kind (including electronic cigarettes) is allowed inside the building. Smoking is restricted to designated areas outside the building, and must comply with local laws. (For example, in Washington State and New York, no smoking is allowed within 25 feet of a building entrance.). Offensive or inappropriate behavior will not be permitted and offenders will be removed from the premises. Absolutely no food and/or drink are permitted in the data center or other critical environment space. It is the responsibility of EVERYONE to ensure that a visitor is escorted at all times Report anything unusual or suspicious to site security immediately. Access controlled and fire rated doors must not be propped open. Do not use emergency exits unless there is a real emergency. Report any leaks from valves, spills, or any other abnormal condition to the Security and/or data center operations immediately. 3
5 Accidents/Illnesses Report all incidents to your supervisor or escort immediately. Seek prompt medical attention. If necessary use the medical facility designated by your employer. File all required claim forms (available in onsite facilities management office). Your supervisor or escort will initiate an accident/incident investigation report Your supervisor or escort will ensure compliance with all corrective actions, as required. CRITICAL ENVIRONMENT WORK RULES Work in Data Center Space (MOP Required) Schedule all work through data center operations All vendors/contractors must announce their arrival at the Security front desk and check in with data center operations before starting work Do not leave tools, equipment, or materials unattended; or placed on top, in front of, or leaned up against infrastructure equipment. To protect finished floors from heavy computer equipment rolling or spot loads, use 1 plywood or tempered masonite taped with 3 duct tape at all seams Maintain containment using proper blanking plates or other measures, as appropriate. Do not change the position of ANY switch or valve without first contacting facilities. Only facilities personnel are PERMITTED TO POWER DOWN ELECTRICAL CIRCUITS, except in an emergency. Do not take photos in data centers or critical work spaces without prior approval from data center management. In the event of an audible alarm or unusual noises on any piece of equipment in the data center, please contact your project manager, building operations, or a Security Officer immediately. Cable management covers and rack skins must be placed flat on the floor outside of travel areas, and not leaned against racks or equipment in the Computer Room. Perform work only during days and times specifically approved under change control procedures. Cutting and/or drilling in the data center is not allowed unless prior approved. When drilling or cutting is performed, an inspected and approved HEPA filtered vacuum cleaner must be used during the drilling to minimize the amount of dust particles and fragments emitted in to the space. Hammer drilling must be performed outside of regular business hours. All work shall require the disabling of the smoke detection system and must be inspected by the Fire Safety Director prior to enabling upon the completion of work. Tools and Equipment Tools or instruments that require calibration must display a dated calibration label. Only "NON UPS" electrical outlets will be used to power maintenance equipment. Observe all warning signs posted in any area of the Data Center. Avoid safety cones, barricades, caution tape, or other safety equipment that have been installed to guide you around hazardous areas. 4
6 Be especially careful around any computer hardware that has had the protective outer metal skin removed. With its covers off, such equipment is usually more susceptible to nearby electrical disturbances or dust. Only work in such equipment when properly grounded (for example, with a grounding wrist strap). Housekeeping Leave the area cleaner than it was when the work commenced. Put all trash or debris in trash bins while working. Do not place liquids in trash bins in or around data halls. Remove and properly dispose all packing materials from computer equipment/components prior to it entering the active data hall space. No cardboard or wood is allowed in the data halls. Customers may neatly store materials only within their leased premises. Any storage in data halls must be in non-flammable containers. Direct any requests for temporary storage to the data center operations team via the Customer Portal. Clean all work areas of tools, equipment, and debris at the end of each shift. Store tools, equipment and materials in designated storage locations or as directed. Clean all work areas using a HEPA vacuum. Only authorized cleaning personnel may use a damp mop in a data hall, with an absolute minimum amount of water and cleaning solution. All moisture containers will be limited to the perimeter area at the ends of the cabinet rows. Broom sweeping and/or the use of unfiltered Shopvacs is not permitted. CRITICAL POWER/NETWORK CONNECTIVITY Circuit Installation (MOP Required) Access to critical power distribution components, including electrical panel boards, RPP s, and PDU s is strictly restricted to building operations or designated personnel. All panel cover removals in critical areas will be performed by two people in order to prevent accidents or incidents. Standards All circuits must be dedicated home runs with no splices or intermediate plugs or connections unless approved by data center operations management. All network cable installations must conform with approved standards Internally connecting power between adjacent racks or cabinets is not permitted. Independent stand-alone micro-ups systems are not permitted in the data center. Lithium-ion batteries are not permitted in the data center, except in use of personal electronic devices (e.g. cell phones). Only authorized personnel can make final power connections. All power cables and receptacles must be tested prior to installation. All power cables must be clearly labeled at both ends with permanent tags. All electrical panel doors must be kept locked at all times. Dual power circuits must originate from two appropriately paired PDU s. 5
7 Panel schedules must be updated on completion of any circuit installation. Provide updated schedules to data center operations for update of the master documentation. Energized Work and Lock-out/Tag-out Procedures (MOP Required) Unless otherwise authorized, complete work after the associated equipment is de-energized with hazardous energy appropriately locked out. If required, only perform energized work after proper planning, including preparation, review and approval of an Energized Work Permit. Follow all precautions contained in the Energized Work Permit. NEVER leave open, energized equipment unattended. All authorized personnel must provide their own equipment locks and tags, and fill out each tag completely and legibly (print with ink). Inform onsite buildings operation team of any component to be locked out and notify building operations before unlocking any tagged out piece of equipment. Log all actions in the site lock-out/tag-out log. Building operations reserves the right to install its own lock during these types of operations. Mechanical Work (MOP Required) The supervising technician/mechanic must notify data center operations before starting any work. Open torches or welding equipment are not permitted in the Data Center unless prior approved. Any such work must follow the Hot Work Permit process, initiated with a request in the Customer Portal. No valves or switches shall be operated without specific previous permission from data center operations. Potentially hazardous work areas (e.g. work overhead) must be cordoned-off with yellow caution tape. Any work which should involve a fire alarm impairment should be initiated via the Customer Portal and follow the appropriate Red Tag permit process. SAFETY Fire Alarm System/Building Evacuation The facility is fully equipped with a comprehensive fire detection and suppression system as required by code. Pre-action water sprinklers, very early smoke detection (VESDA) and smoke purge systems provide added protection in the data halls. If there is any fire or smoke in the facility, the fire alarm system will be activated and there will be audible annunciation and flashing strobe lights throughout the facility. In that situation, do the following: Move directly to the designated assembly area Do not block fire lanes, entrances or exits to buildings. Remain in assembly area until a headcount is taken and you have been released to return into the facility. 6
8 If at any time you are in the facility and notice smoke or fire anywhere, do the following: Contact building security to report fire and activate the building fire alarm system at any nearby pull station. Follow all building announcements and Instructions Use a fire extinguisher to put out a small fire, if you have been trained to do so. Evacuate the building immediately, and move directly to your evacuation assembly area. Remain in the assembly area until a headcount is taken and you are released to return to the building or leave the site. Each building has a designated assembly area. Please familiarize yourself with these areas. Emergency Management The data center operations management (or designate) is the responsible authority during any life safety emergency or abnormal conditions in the data center. He/she will liaise with the emergency responders to resolve or mitigate any emergencies and escalate as necessary. Data center operations staff will serve as backup in the absence of data center operations management. How to Report an Emergency Dial Security (Front Desk), who will obtain information regarding the emergency and dial the local Emergency Services number, or dial 911 directly. Medical Emergencies Dial Security for all medical emergencies, or dial 911 directly. Security will dial the local Emergency Services number and arrange to escort the emergency responders to the victim Stay with the victim until the emergency responders arrive. Remain calm, and be prepared to assist the emergency responders if help is needed. Chemical Storage and Spill Response All chemicals must have the approval of data center management before being brought inside the building. When requesting approval, include the chemical s Safety Data Sheet. All chemicals shall be stored only in designated storage areas. Contents shall be clearly labeled on their exterior. Hazardous waste and spill supplies shall be stored only in designated storage areas. Report any chemical spill or release to data center management. Do not attempt to contain/clean-up any spill or release, unless properly trained to do so. Spills will either be handled by the facilities team, or an outside contractor. DELIVERIES/SHIPMENTS The dock area is for unloading only - no parking is permitted. Any delivery improperly addressed, of suspicious nature or not pre-authorized runs risk of rejection Use the customer portal or make alternate arrangements for receiving shipments. Additional restrictions apply at certain sites. Contact the local data center operations staff for additional information. 7
9 SDCP CONSOLIDATED WORK RULES PERSONAL ACCOUNTABILITY Failure to follow or comply with the preceding Data Center policies and procedures is grounds for immediate removal from the site. All persons allowed access to critical areas must review these Work Rules and demonstrate their knowledge of the procedures most applicable to their activity on site. By signing below you are acknowledging that you have read and understand the Data Center Work Rules and Safety Requirements and agree to comply in full. Name (print) LAST FIRST MI Signature Company Address Date 8
Data Center Work Rules SV1-FAC-FPO-MGT-1427
Page 1 of 13 Data Center Work Rules Policy 1.0 RESPONSIBILITIES: 1.1 It is the responsibility of all contractors to comply with this policy. 1.2 It is the responsibility of the Project Manager to ensure
More informationPoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS
PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS Version 14 November 19, 2014 Digital Realty Table of Contents INTRODUCTION... 3 ACCESS TO THE POP ROOMS, ISP & OSP... 3 PoP- MoP Forms... 3 Who must
More informationFACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center
FACILITY USER GUIDE Colocation in Key Info s Agoura Court Data Center Page 1 of 11 Key Info Facilities User Guide v2.4 Table of Contents Welcome... 3 GETTING STARTED... 4 Colocation Access... 4 Proof of
More informationCenteris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information
Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationCommunications Room Policy
Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents
More informationPhysical and Environmental Security Standards
Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...
More informationn+2 DATA CENTER CONTROL POLICY
This Data Center Control Policy (the Control Policy ) forms a part of the Master Services Agreement between n+2 LLC ( n+2 ) and Client (the Agreement ), in which this Control Policy is incorporated by
More informationData Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)
Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning
More informationData Centers and Mission Critical Facilities Access and Physical Security Procedures
Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities
More informationPhysical and Environmental Security Policy Document Number: OIL-IS-POL-PES
Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental
More informationData Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
More informationUniversity Facilities Management (UFM) Access Control Procedure (non-residence areas)
University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure
More informationSt. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN
St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the
More informationTimico Data Centres: Access Policy
Timico Data Centres: Access Policy Timico Ltd 2012 Page: 1 of 6 1 Contents 1 Contents... 2 2 Version control... 2 3 Overview... 3 4 Introduction... 3 5 Rules of conduct... 3 6 Access request procedure...
More informationIS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
More informationRobert B. Zajonc Experimental Laboratories
Robert B. Zajonc Experimental Laboratories The Research Center for Group Dynamics Running experiments in the RCGD Labs What you need to know... http://www.rcgd.isr.umich.edu/rcgdlabs.htm Running in the
More informationUITS Data Center Access Policies and Procedures
UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...
More informationMECHANICAL CONTRACTORS ASSOCIATION OF AMERICA, INC. CLEANROOM PIPING AND PROCEDURES BASIC CONSIDERATIONS
BASIC CONSIDERATIONS For the mechanical contractor, cleanroom construction involves the installation of high purity piping which support an ultra clean environment. This involves extremely stringent requirements
More informationInjury & Illness. Yes No
Safety Shield Injury & Illness 66. Has the company trained employees about how to report an injury? If yes, please provide the policy AND the training sign-in sheet in the supporting documentation. 67.
More informationPolicies & Procedures Effective Date: January 24, Key Control
LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationTo Purchase This Game, Visit BMI Gaming Or Contact International Sales at (USA)
The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to protect players, visitors and
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationCrisp Data Centre Standards 11 November 2008
Crisp Data Centre Standards 11 November 2008 This document outlines the standards that are enforced within the Crisp Data Centre, and as amended from time to time. Also specified are the responsibilities
More informationCCBC is equipped with 3 computer rooms, one at each main campus location:
Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology
More informationSFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc.
SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES June 2016 STATUS Version 12 NYSE Group, Inc. 2016 Page 1 About This Document The following documents should be read in conjunction
More informationFacility Security Policy
1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,
More informationV 1.0 ISSUE DATE : Feb.17, 2011
V 1.0 ISSUE DATE : Feb.17, 2011 The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationData Center Rules & Regulations
Data Center Rules & Regulations VERSION 7.1 AUGUST, 2013 TABLE OF CONTENTS SECTION 11102: TURN-KEY DATACENTER RULES & REGULATIONS... 3 THE PURPOSE OF THESE STANDARDS... 3 DEFINITION OF MISSION CRITICAL
More informationDS-1H05 Ethernet-over-Coax Extender. User Manual
DS-1H05 Ethernet-over-Coax Extender User Manual Thank you for purchasing our product. If there is any question or request, please do not hesitate to contact dealer. This manual is applicable to DS-1H05-T,
More informationThe Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness
More informationFor Sales + Purchasing Info, Click Page To Visit BMI Gaming (800)
For Sales + Purchasing Info, Click Page To Visit BMI Gaming www.bmigaming.com + 561-391-7200 (800) 746-2255 The following safety precautions are given throughout this manual. They must be strictly followed
More informationSECTION 9 POLICY AND PROCEDURES
SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents
More informationInformation Services IT Security Policies L. Network Management
Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security
More informationJHH Online Outage System
JHH Online Outage System Revision 2.6 Page 1 Page 2 Intended Audience This documentation is intended for users of the Facilities Online Outage System. Users include not only The Johns Hopkins Hospital
More informationBOMB THREATS EVACUATION RESPONSE ACTION. LOW RISK THREAT (no evacuation)
BOMB THREATS Even the best contingency plan will not prevent bomb threats from disrupting normal daily activity. It is very important that the people most likely to receive bomb threats be trained to handle
More informationFT-20 Fire Training Fog Machine User Manual English
FT-20 Fire Training Fog Machine User Manual English 2017 Antari Lighting and Effects Ltd. 1 User Manual - English Safety Information Please read the following safety information carefully before operating
More informationInformation Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T
Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Department/School/Division: Effective USC Account Number (Required): 1. General Conditions 1.1. This agreement
More informationFT-20 Fire Training Fog Machine User Manual English
FT-20 Fire Training Fog Machine User Manual English 2018 Antari Lighting and Effects Ltd. 1 User Manual - English Safety Information Please read the following safety information carefully before operating
More informationSERVICE MANUAL Yhu#614 pzz lgkh{laz UG\SGYWX]
SERVICE MANUAL The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to protect players,
More information(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy
Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with
More information2 Mesa Ethernet Dock User s Manual
owner s manual Mesa Ethernet Dock The Mesa Ethernet Dock is an optional accessory that provides an ethernet port for networking, power input jack, USB client port, and a mounting station for the Mesa Rugged
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationIntroduction. Related Documentation
MDE-4621 Field Installation of TopKAT PCMCIA Kit C06968 October 2006 Introduction Recently the TopKAT Central Processing Unit (CPU, C06741) underwent changes to accommodate a faster processor and a higher
More informationREVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT
REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT IFC SERVICE DESCRIPTION 17 OCTOBER 2016 Page 1 of 9 SERVICE DESCRIPTION 2-14: INTERNATIONAL FALCON CONNECTION SERVICE (IFC Service) 1. THE SERVICE
More informationOperational Safety Procedure (OSP) For The. Laser Bay. At the. Texas Center for High Intensity Laser Science. Document Number TPW-D-0011-A
Operational Safety Procedure (OSP) For The Laser Bay At the Texas Center for High Intensity Laser Science Document Number TPW-D-0011-A Texas Center for High Intensity Laser Science Dept. of Physics, The
More informationTEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM
CORPORATE HEALTH AND SAFETY PROGRAM Updated June 24, 2013 August 12, 2013 Prepared by 10636 Linkwood Court Baton Rouge, Louisiana 70810 Phone: (225) 767-3880 Fax: (225) 767-3883 TABLE OF CONTENTS Section
More informationOperating instructions
www.lehmann-locks.com GB L033-A01 L033-A02 M300 L033-A01 / -A02 Operating instructions Contents Page General description / Technical data / Safety instructions... 2 Care and maintenance / Factory settings
More informationFirefighter Observation Report
DeKalb County Fire Department Exhibit 47 Firefighter Observation Report (Supplemental Report Required for Investigations) Date of Incident: Location of the fire scene: GPS coordinates of the scene: N:
More informationUniversity at Buffalo Campus Mail Services
University at Buffalo Campus Mail Services Standard Operating Procedures Guidelines for Handling Mail 9/04 The University at Buffalo Campus Mail operations is located on the University s North Campus,
More informationOUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN
OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN LOCATION OF SERVICE REQUIRED 141 Voortrekker road Parow Cape Town Areas: Offices Entrance foyers Balcony Toilets Basements Conference rooms Store rooms
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationStandard: Data Center Security
Standard: Data Center Security Page 1 Executive Summary The university data centers provide for the reliable operation of SJSU s computing systems, computing infrastructure, and communication systems.
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationObtaining Documentation and Submitting a Service Request, page xvii Safety Warnings, page xvii Safety Guidelines, page xx
Preface Obtaining Documentation and Submitting a Service Request, page xvii Safety s, page xvii Safety Guidelines, page xx Obtaining Documentation and Submitting a Service Request For information on obtaining
More informationModel 2657A-LIM-3 LO Interconnect Module
Keithley Instruments, Inc. 28775 Aurora Road Cleveland, Ohio 44139 1-888-KEITHLEY http://www.keithley.com Model 2657A-LIM-3 LO Interconnect Module User's Guide Description The Model 2657A-LIM-3 LO Interconnect
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationGreat Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI)
Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) GROUND FAULT CIRCUIT INTERRUPTERS Wiring design and protection. - 1926.404 Our company uses ground fault circuit
More informationData Sharing Agreement. Between Integral Occupational Health Ltd and the Customer
Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services
More informationThis 4200-RM Rack Mount Kit is for installation in 4200-CAB series cabinets only.
Keithley Instruments, Inc. 28775 Aurora Road Cleveland, Ohio 44139 (440) 248-0400 Fax: (440) 248-6168 www.keithley.com Model 4200-RM Rack Mount Kit Packing List Introduction NOTE This 4200-RM Rack Mount
More informationMHCC Emergency Notification System (ENS) Protocols
MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency
More informationCANTEEN 6000 Portable Battery Pack NAP-30. Instruction Manual Please read carefully before use and keep for future reference.
CANTEEN 6000 Portable Battery Pack NAP-30 Instruction Manual Please read carefully before use and keep for future reference. Thank You We know you have many choices when it comes to technology; thank you
More informationTelephone Instructions
Telephone Instructions Emergency Telephone Procedures 2 Telephone Features 3 Telephone User Guide 4 Speed Dial Setup 5 Using Your Voicemail 6 Voicemail Shortcuts 6 Voicemail Map 7 Emergency Telephone Procedures
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationGuidance for Accident Reporting
Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need
More informationUser Guide Microsoft Portable Power (DC-21)
User Guide Microsoft Portable Power (DC-21) Issue 1.0 EN-US User Guide Microsoft Portable Power (DC-21) Contents For your safety 3 About your portable charger 4 Keys and parts 5 Charge your portable charger
More informationDisaster Preparedness Community Emergency Response Team
Disaster Preparedness Community Emergency Response Team Berkeley CERT Disaster Preparedness Unit Objectives Describe the types of hazards to which your community is vulnerable Describe the functions of
More informationJentafon Wireless Loopset LPS-6 User Guide
Jentafon Wireless Loopset LPS-6 User Guide User Guide for Jentafon Wireless Loopset LPS-6 Jentafon Wireless Loopset LPS-6 is a Bluetooth headset for T-coil equipped hearing aid or cochlear implant users.
More informationSECTION N -- ELECTROSTATIC DISCHARGE (ESD)
INSTALLATION REQUIREMENTS AT&T January, 2012 Section N, ATT-TP-76300 Revised NA SECTION N -- ELECTROSTATIC DISCHARGE (ESD) CONTENTS PAGE 1. GENERAL... N-1 1.1. Introduction... N-1 1.2. General Requirements...
More informationIXcellerate Moscow One Datacentre - Phase 1 & 2 Overview
Contents 1. Document Purpose... 2 2. Facility Overview... 2 2.1 Technical Space... 2 2.2 Load Density... 2 2.3 Resilience... 2 2.4 Engineering Plant Maintenance & Service Restoration... 3 3. Engineering
More informationInfrastructure Security Overview
White Paper Infrastructure Security Overview Cisco IronPort Cloud Email Security combines best-of-breed technologies to provide the most scalable and sophisticated email protection available today. Based
More informationModel 2460-KIT. Screw Terminal Connector Kit. Description / September 2014 *P * 1
Keithley Instruments 28775 Aurora Road Cleveland, Ohio 44139 1-800-935-5595 http://www.keithley.com Model 2460-KIT Screw Terminal Connector Kit Description The Model 2460-KIT Screw Terminal Connector Kit
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationSERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT ADDENDUM COLOCATION BIT-1 VERSION
SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT ADDENDUM COLOCATION BIT-1 VERSION 2018-08-09 Table of Contents 1. Definitions...3 1.1. Dew point...3 1.2. Incidents...3 1.3. Service...3 2. SLA...4 3. Service
More informationHurricane and Storm Commercial Damage Assessment
Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE
More informationKOIL Park User Guide
KOIL Park User Guide KOIL Park ( the Facility ) is operated by Mitsui Fudosan Co., Ltd. ( the Company ). KOIL Park members ( Members ) and persons who temporarily use the Facility ( Users ) must observe
More informationHurricane Florence Response and Recovery. October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO
Hurricane Florence Response and Recovery October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO Event Impact Campus Grounds Approximately 400 downed trees Light poles Power lines Page
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationHIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationPR3400 Series 1.4Mp USB Cameras Hardware Guide
PR3400 Series 1.4Mp USB Cameras Hardware Guide Manufactured by: SPOT Imaging Solutions, a division of Diagnostic Instruments, Inc. 6540 Burroughs Ave. Sterling Heights, MI 48314-2133 USA Toll-Free: 866-604-SPOT
More informationUser Manual for: Y-Tag PT Product code Version 1.3, March Dyzle
User Manual for: Y-Tag PT 100 1.0 Product code 020 1501 001 Version 1.3, March 2015 2015 Dyzle 2015 Dyzle User Manual for Y-Tag PT 100 1.0, version 1.3, March 2015 1 Foreword This User Manual is intended
More informationOperating Instructions
9000 Operating Instructions Contents Introduction 1 Operating Instructions 2-5 Demonstrations 6-8 Storing/Handling/Cleaning 9 Safety Precautions 9-10 Specifications 10 FCC Compliance Statement 11-12 Limited
More informationExaminers/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist
Examiners/Instructors Manual for Practical Examinations INTRODUCTION The purpose of this document is to provide a comprehensive source of information for examiners and instructors regarding the mandatory
More informationCompare Mail Security In Your Organization To Industry Benchmarks
SoBran SafeMail 1 Compare Mail Security In Your Organization To Industry Benchmarks Most companies hold their security operations close to the vest, which can make it difficult to know how your own organization
More informationSite Visitor Requirements Practice
Health & Safety Site Visitor Requirements Practice Content Owner Custodian H&S Discipline Program COMS Document Number Manager, Health and Safety Solutions Health and Safety Solutions H&S Programs & Projects
More informationPASS Your HMA / HMO Exam Incident Management
1) Who assumes command at a haz mat incident? A) The driver of the first-arriving squad truck B) The first person on the scene or the ranking individual of the first company on the scene C) The first-arriving
More informationISSP Network Security Plan
ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...
More informationyour one stop sign & display experts Safety Signs Catalogue
your one stop sign & display experts Safety Signs Catalogue Tel: 0113 249 5800 www.aztecsigns.co.uk Signs Page 1 Non-automatic fire equipment should display safety signs in accordance with the Safety Signs
More informationUser Guide CentrePoint Insight Watch
User Guide CentrePoint Insight Watch Activity Monitor: CentrePoint Insight Watch Revision: 0 Released: 0/9/08 User Guide CentrePoint Insight Watch Activity Monitor: CentrePoint Insight Watch Revision:
More informationDUKE UNIVERSITY CONSTRUCTION STANDARDS
1 00 01 10 Table of Contents DIVISION 00: PROCUREMENT AND CONTRACTING REQUIREMENTS 00 01 10 Table of Contents 06.17.2014 00 21 13 Instructions to Bidders 11.08.2013 00 22 13 Supplementary Instructions
More informationBroadcast Notification solutions
Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2
More informationIntelli-M eidc Quick Start Guide. infinias
Intelli-M eidc Quick Start Guide infinias Important Safety Instructions 1. Read these instructions. 2. Keep these instructions. 3. Heed all warnings. 4. Follow all instructions. 5. Do not use this apparatus
More informationSignature: Signed by GNT Date Signed: 5/26/2015
Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner
More informationState of Rhode Island Department of Administration Division of Information Technol
Division of Information Technol 1. Background Physical and environmental security controls protect information system facilities from physical and environmental threats. Physical access to facilities and
More informationHX1 Bluetooth Stereo Headset
HX1 Bluetooth Stereo Headset Ref. nr.: 130.115 INSTRUCTION MANUAL V1.1 ENGLISH Congratulations to the purchase of this Max product. Please read this manual thoroughly prior to using the product in order
More informationBrooks Models MT3809G Metal Tube Variable Area Flowmeters HART Handheld DD Installation & Operation Manual
Installation and Operation Manual Supplement Brooks Models MT3809G Metal Tube Variable Area Flowmeters HART Handheld DD Installation & Operation Manual Installation and Operation Manual Supplement Essential
More informationInstallation Instructions
50ES, 50EZ, 50GL, 50GS, 50GX, 50JS, 50JX, 50JZ, 50SD, 50SZ, 50VL, 50VT, 50XP, 50XZ 601A, 602A, 602B, 604A, 604B, 604D, 607C, 701A, 702A, 702B, 704A, 704B, 704D, 707C PA1P, PA2P, PA3P, PH1P, PH2P, PH3P
More informationXAVIER UNIVERSITY Building Access Control Policy
Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,
More information