Sabey Data Center Properties CONSOLIDATED WORK RULES

Size: px
Start display at page:

Download "Sabey Data Center Properties CONSOLIDATED WORK RULES"

Transcription

1 Sabey Data Center Properties CONSOLIDATED WORK RULES

2 Contents Overview... 2 Building Security... 2 General... 2 Access Badge Display... 2 Security Rounds... 2 Access to Secure Spaces... 2 Emergency Exits... 2 Data Center Access... 2 Access Requests/Tickets... 2 Keys/Access Cards... 2 Data Center Support Infrastructure Management... 3 Site Operations and Maintenance... 3 Procedures... 3 Method of Procedure (MOP)... 3 General Work Rules... 3 Individual Responsibilities... 3 Accidents/Illnesses... 4 Critical Environment Work Rules... 4 Work in Data Center Space (MOP Required)... 4 Tools and Equipment... 4 Housekeeping... 5 Critical Power/Network Connectivity... 5 Circuit Installation (MOP Required)... 5 Standards... 5 Energized Work and Lock-out/Tag-out Procedures (MOP Required)... 6 Mechanical Work (MOP Required)... 6 Safety... 6 Fire Alarm System/Building Evacuation... 6 Emergency Management... 7 How to Report an Emergency... 7 Medical Emergencies... 7 Chemical Storage and Spill Response... 7 Deliveries/Shipments... 7 SDCP Consolidated Work Rules Personal Accountability

3 OVERVIEW This document establishes rules and guidelines for work performance in facilities operated by Sabey Data Center Properties. It provides guidance for staff, suppliers/vendors or anyone else who does work which could impact data center operations. It is imperative that all concerned comply with all applicable provisions for any work that has impact potential to data center operations. Any exception will be considered on a case-by-case basis and determination will be made by local data center management on whether to approve as a one-time event or institute a change in the overall guidelines document. BUILDING SECURITY General Do not seek to defeat security controls (e.g. interlocks). Any person requiring such an action shall contact Security. Access Badge Display All personnel must display an access badge at all times while in the facility. Temporary badges are to be turned in at the Security Desk when a person leaves the site at the end of the work period for the day. Security Rounds The data center security staff conducts rounds of the building. They are authorized to stop work if they feel safety requirements are not being followed or if any threat to data center operations or personnel safety exists. Access to Secure Spaces No tailgating/piggybacking into secured areas is permitted. Every person with an access card that passes through a doorway with a card reader should scan his/her card. Emergency Exits Emergency exits doors are located throughout the facility with appropriate signage and directions. Note: emergency exits are not to be used in non-emergency situations. DATA CENTER ACCESS Access Requests/Tickets All access requests must be generated and approved through the Customer Portal. Once approval is received, individuals are required to present a US government-issued ID to Security in order to be issued with an access card or visitor badge. Keys/Access Cards Contact Sabey Data Center Management for access to any secure areas such as roof, equipment rooms, storerooms, equipment panels, power panels, etc. 2

4 DATA CENTER SUPPORT INFRASTRUCTURE MANAGEMENT Site Operations and Maintenance The onsite facilities operations crew is responsible for the operation, maintenance, safety, and security of the facility. Route any requests for Sabey support services through the Sabey Customer Portal. Procedures To control the risk of unintended failure, all employees, contractors, technicians, etc., must comply with all relevant procedures and processes in the Data Center and other critical environment. Method of Procedure (MOP) A Method of Procedure (MOP) is required for any work in the Data Center and critical infrastructure areas that has potential to impact critical environment operations or degrade redundancy of critical support systems. MOP will be developed by entity performing the work and approved by data center operations management before work commences. Every MOP must identify the equipment/system being worked on, potential risk to other equipment/systems and critical environment operations, mitigation strategies and a back-out plan. GENERAL WORK RULES Individual Responsibilities All vendors, contractors, and other service providers must be appropriately attired and act in a professional manner. No firearms, explosive chemicals, or weapons of any type are allowed on site. No smoking of any kind (including electronic cigarettes) is allowed inside the building. Smoking is restricted to designated areas outside the building, and must comply with local laws. (For example, in Washington State and New York, no smoking is allowed within 25 feet of a building entrance.). Offensive or inappropriate behavior will not be permitted and offenders will be removed from the premises. Absolutely no food and/or drink are permitted in the data center or other critical environment space. It is the responsibility of EVERYONE to ensure that a visitor is escorted at all times Report anything unusual or suspicious to site security immediately. Access controlled and fire rated doors must not be propped open. Do not use emergency exits unless there is a real emergency. Report any leaks from valves, spills, or any other abnormal condition to the Security and/or data center operations immediately. 3

5 Accidents/Illnesses Report all incidents to your supervisor or escort immediately. Seek prompt medical attention. If necessary use the medical facility designated by your employer. File all required claim forms (available in onsite facilities management office). Your supervisor or escort will initiate an accident/incident investigation report Your supervisor or escort will ensure compliance with all corrective actions, as required. CRITICAL ENVIRONMENT WORK RULES Work in Data Center Space (MOP Required) Schedule all work through data center operations All vendors/contractors must announce their arrival at the Security front desk and check in with data center operations before starting work Do not leave tools, equipment, or materials unattended; or placed on top, in front of, or leaned up against infrastructure equipment. To protect finished floors from heavy computer equipment rolling or spot loads, use 1 plywood or tempered masonite taped with 3 duct tape at all seams Maintain containment using proper blanking plates or other measures, as appropriate. Do not change the position of ANY switch or valve without first contacting facilities. Only facilities personnel are PERMITTED TO POWER DOWN ELECTRICAL CIRCUITS, except in an emergency. Do not take photos in data centers or critical work spaces without prior approval from data center management. In the event of an audible alarm or unusual noises on any piece of equipment in the data center, please contact your project manager, building operations, or a Security Officer immediately. Cable management covers and rack skins must be placed flat on the floor outside of travel areas, and not leaned against racks or equipment in the Computer Room. Perform work only during days and times specifically approved under change control procedures. Cutting and/or drilling in the data center is not allowed unless prior approved. When drilling or cutting is performed, an inspected and approved HEPA filtered vacuum cleaner must be used during the drilling to minimize the amount of dust particles and fragments emitted in to the space. Hammer drilling must be performed outside of regular business hours. All work shall require the disabling of the smoke detection system and must be inspected by the Fire Safety Director prior to enabling upon the completion of work. Tools and Equipment Tools or instruments that require calibration must display a dated calibration label. Only "NON UPS" electrical outlets will be used to power maintenance equipment. Observe all warning signs posted in any area of the Data Center. Avoid safety cones, barricades, caution tape, or other safety equipment that have been installed to guide you around hazardous areas. 4

6 Be especially careful around any computer hardware that has had the protective outer metal skin removed. With its covers off, such equipment is usually more susceptible to nearby electrical disturbances or dust. Only work in such equipment when properly grounded (for example, with a grounding wrist strap). Housekeeping Leave the area cleaner than it was when the work commenced. Put all trash or debris in trash bins while working. Do not place liquids in trash bins in or around data halls. Remove and properly dispose all packing materials from computer equipment/components prior to it entering the active data hall space. No cardboard or wood is allowed in the data halls. Customers may neatly store materials only within their leased premises. Any storage in data halls must be in non-flammable containers. Direct any requests for temporary storage to the data center operations team via the Customer Portal. Clean all work areas of tools, equipment, and debris at the end of each shift. Store tools, equipment and materials in designated storage locations or as directed. Clean all work areas using a HEPA vacuum. Only authorized cleaning personnel may use a damp mop in a data hall, with an absolute minimum amount of water and cleaning solution. All moisture containers will be limited to the perimeter area at the ends of the cabinet rows. Broom sweeping and/or the use of unfiltered Shopvacs is not permitted. CRITICAL POWER/NETWORK CONNECTIVITY Circuit Installation (MOP Required) Access to critical power distribution components, including electrical panel boards, RPP s, and PDU s is strictly restricted to building operations or designated personnel. All panel cover removals in critical areas will be performed by two people in order to prevent accidents or incidents. Standards All circuits must be dedicated home runs with no splices or intermediate plugs or connections unless approved by data center operations management. All network cable installations must conform with approved standards Internally connecting power between adjacent racks or cabinets is not permitted. Independent stand-alone micro-ups systems are not permitted in the data center. Lithium-ion batteries are not permitted in the data center, except in use of personal electronic devices (e.g. cell phones). Only authorized personnel can make final power connections. All power cables and receptacles must be tested prior to installation. All power cables must be clearly labeled at both ends with permanent tags. All electrical panel doors must be kept locked at all times. Dual power circuits must originate from two appropriately paired PDU s. 5

7 Panel schedules must be updated on completion of any circuit installation. Provide updated schedules to data center operations for update of the master documentation. Energized Work and Lock-out/Tag-out Procedures (MOP Required) Unless otherwise authorized, complete work after the associated equipment is de-energized with hazardous energy appropriately locked out. If required, only perform energized work after proper planning, including preparation, review and approval of an Energized Work Permit. Follow all precautions contained in the Energized Work Permit. NEVER leave open, energized equipment unattended. All authorized personnel must provide their own equipment locks and tags, and fill out each tag completely and legibly (print with ink). Inform onsite buildings operation team of any component to be locked out and notify building operations before unlocking any tagged out piece of equipment. Log all actions in the site lock-out/tag-out log. Building operations reserves the right to install its own lock during these types of operations. Mechanical Work (MOP Required) The supervising technician/mechanic must notify data center operations before starting any work. Open torches or welding equipment are not permitted in the Data Center unless prior approved. Any such work must follow the Hot Work Permit process, initiated with a request in the Customer Portal. No valves or switches shall be operated without specific previous permission from data center operations. Potentially hazardous work areas (e.g. work overhead) must be cordoned-off with yellow caution tape. Any work which should involve a fire alarm impairment should be initiated via the Customer Portal and follow the appropriate Red Tag permit process. SAFETY Fire Alarm System/Building Evacuation The facility is fully equipped with a comprehensive fire detection and suppression system as required by code. Pre-action water sprinklers, very early smoke detection (VESDA) and smoke purge systems provide added protection in the data halls. If there is any fire or smoke in the facility, the fire alarm system will be activated and there will be audible annunciation and flashing strobe lights throughout the facility. In that situation, do the following: Move directly to the designated assembly area Do not block fire lanes, entrances or exits to buildings. Remain in assembly area until a headcount is taken and you have been released to return into the facility. 6

8 If at any time you are in the facility and notice smoke or fire anywhere, do the following: Contact building security to report fire and activate the building fire alarm system at any nearby pull station. Follow all building announcements and Instructions Use a fire extinguisher to put out a small fire, if you have been trained to do so. Evacuate the building immediately, and move directly to your evacuation assembly area. Remain in the assembly area until a headcount is taken and you are released to return to the building or leave the site. Each building has a designated assembly area. Please familiarize yourself with these areas. Emergency Management The data center operations management (or designate) is the responsible authority during any life safety emergency or abnormal conditions in the data center. He/she will liaise with the emergency responders to resolve or mitigate any emergencies and escalate as necessary. Data center operations staff will serve as backup in the absence of data center operations management. How to Report an Emergency Dial Security (Front Desk), who will obtain information regarding the emergency and dial the local Emergency Services number, or dial 911 directly. Medical Emergencies Dial Security for all medical emergencies, or dial 911 directly. Security will dial the local Emergency Services number and arrange to escort the emergency responders to the victim Stay with the victim until the emergency responders arrive. Remain calm, and be prepared to assist the emergency responders if help is needed. Chemical Storage and Spill Response All chemicals must have the approval of data center management before being brought inside the building. When requesting approval, include the chemical s Safety Data Sheet. All chemicals shall be stored only in designated storage areas. Contents shall be clearly labeled on their exterior. Hazardous waste and spill supplies shall be stored only in designated storage areas. Report any chemical spill or release to data center management. Do not attempt to contain/clean-up any spill or release, unless properly trained to do so. Spills will either be handled by the facilities team, or an outside contractor. DELIVERIES/SHIPMENTS The dock area is for unloading only - no parking is permitted. Any delivery improperly addressed, of suspicious nature or not pre-authorized runs risk of rejection Use the customer portal or make alternate arrangements for receiving shipments. Additional restrictions apply at certain sites. Contact the local data center operations staff for additional information. 7

9 SDCP CONSOLIDATED WORK RULES PERSONAL ACCOUNTABILITY Failure to follow or comply with the preceding Data Center policies and procedures is grounds for immediate removal from the site. All persons allowed access to critical areas must review these Work Rules and demonstrate their knowledge of the procedures most applicable to their activity on site. By signing below you are acknowledging that you have read and understand the Data Center Work Rules and Safety Requirements and agree to comply in full. Name (print) LAST FIRST MI Signature Company Address Date 8

Data Center Work Rules SV1-FAC-FPO-MGT-1427

Data Center Work Rules SV1-FAC-FPO-MGT-1427 Page 1 of 13 Data Center Work Rules Policy 1.0 RESPONSIBILITIES: 1.1 It is the responsibility of all contractors to comply with this policy. 1.2 It is the responsibility of the Project Manager to ensure

More information

PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS

PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS Version 14 November 19, 2014 Digital Realty Table of Contents INTRODUCTION... 3 ACCESS TO THE POP ROOMS, ISP & OSP... 3 PoP- MoP Forms... 3 Who must

More information

FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center

FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center FACILITY USER GUIDE Colocation in Key Info s Agoura Court Data Center Page 1 of 11 Key Info Facilities User Guide v2.4 Table of Contents Welcome... 3 GETTING STARTED... 4 Colocation Access... 4 Proof of

More information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

n+2 DATA CENTER CONTROL POLICY

n+2 DATA CENTER CONTROL POLICY This Data Center Control Policy (the Control Policy ) forms a part of the Master Services Agreement between n+2 LLC ( n+2 ) and Client (the Agreement ), in which this Control Policy is incorporated by

More information

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA) Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental

More information

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

University Facilities Management (UFM) Access Control Procedure (non-residence areas)

University Facilities Management (UFM) Access Control Procedure (non-residence areas) University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure

More information

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN

St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN St. Joseph s General Hospital LOCKDOWN EMERGENCY RESPONSE PLAN ERP Lockdown may be initiated in response to incidents originating within the facility, or incidents occuring in the community that have the

More information

Timico Data Centres: Access Policy

Timico Data Centres: Access Policy Timico Data Centres: Access Policy Timico Ltd 2012 Page: 1 of 6 1 Contents 1 Contents... 2 2 Version control... 2 3 Overview... 3 4 Introduction... 3 5 Rules of conduct... 3 6 Access request procedure...

More information

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives

More information

Robert B. Zajonc Experimental Laboratories

Robert B. Zajonc Experimental Laboratories Robert B. Zajonc Experimental Laboratories The Research Center for Group Dynamics Running experiments in the RCGD Labs What you need to know... http://www.rcgd.isr.umich.edu/rcgdlabs.htm Running in the

More information

UITS Data Center Access Policies and Procedures

UITS Data Center Access Policies and Procedures UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...

More information

MECHANICAL CONTRACTORS ASSOCIATION OF AMERICA, INC. CLEANROOM PIPING AND PROCEDURES BASIC CONSIDERATIONS

MECHANICAL CONTRACTORS ASSOCIATION OF AMERICA, INC. CLEANROOM PIPING AND PROCEDURES BASIC CONSIDERATIONS BASIC CONSIDERATIONS For the mechanical contractor, cleanroom construction involves the installation of high purity piping which support an ultra clean environment. This involves extremely stringent requirements

More information

Injury & Illness. Yes No

Injury & Illness. Yes No Safety Shield Injury & Illness 66. Has the company trained employees about how to report an injury? If yes, please provide the policy AND the training sign-in sheet in the supporting documentation. 67.

More information

Policies & Procedures Effective Date: January 24, Key Control

Policies & Procedures Effective Date: January 24, Key Control LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

To Purchase This Game, Visit BMI Gaming Or Contact International Sales at (USA)

To Purchase This Game, Visit BMI Gaming   Or Contact International Sales at (USA) The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to protect players, visitors and

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Crisp Data Centre Standards 11 November 2008

Crisp Data Centre Standards 11 November 2008 Crisp Data Centre Standards 11 November 2008 This document outlines the standards that are enforced within the Crisp Data Centre, and as amended from time to time. Also specified are the responsibilities

More information

CCBC is equipped with 3 computer rooms, one at each main campus location:

CCBC is equipped with 3 computer rooms, one at each main campus location: Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology

More information

SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc.

SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc. SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES June 2016 STATUS Version 12 NYSE Group, Inc. 2016 Page 1 About This Document The following documents should be read in conjunction

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

V 1.0 ISSUE DATE : Feb.17, 2011

V 1.0 ISSUE DATE : Feb.17, 2011 V 1.0 ISSUE DATE : Feb.17, 2011 The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Data Center Rules & Regulations

Data Center Rules & Regulations Data Center Rules & Regulations VERSION 7.1 AUGUST, 2013 TABLE OF CONTENTS SECTION 11102: TURN-KEY DATACENTER RULES & REGULATIONS... 3 THE PURPOSE OF THESE STANDARDS... 3 DEFINITION OF MISSION CRITICAL

More information

DS-1H05 Ethernet-over-Coax Extender. User Manual

DS-1H05 Ethernet-over-Coax Extender. User Manual DS-1H05 Ethernet-over-Coax Extender User Manual Thank you for purchasing our product. If there is any question or request, please do not hesitate to contact dealer. This manual is applicable to DS-1H05-T,

More information

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness

More information

For Sales + Purchasing Info, Click Page To Visit BMI Gaming (800)

For Sales + Purchasing Info, Click Page To Visit BMI Gaming (800) For Sales + Purchasing Info, Click Page To Visit BMI Gaming www.bmigaming.com + 561-391-7200 (800) 746-2255 The following safety precautions are given throughout this manual. They must be strictly followed

More information

SECTION 9 POLICY AND PROCEDURES

SECTION 9 POLICY AND PROCEDURES SECTION 9 POLICY AND PROCEDURES This section contains links to Clackamas County Employment Policy & Practice (EPP) documents that have particular application to Risk Management. These are the same documents

More information

Information Services IT Security Policies L. Network Management

Information Services IT Security Policies L. Network Management Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security

More information

JHH Online Outage System

JHH Online Outage System JHH Online Outage System Revision 2.6 Page 1 Page 2 Intended Audience This documentation is intended for users of the Facilities Online Outage System. Users include not only The Johns Hopkins Hospital

More information

BOMB THREATS EVACUATION RESPONSE ACTION. LOW RISK THREAT (no evacuation)

BOMB THREATS EVACUATION RESPONSE ACTION. LOW RISK THREAT (no evacuation) BOMB THREATS Even the best contingency plan will not prevent bomb threats from disrupting normal daily activity. It is very important that the people most likely to receive bomb threats be trained to handle

More information

FT-20 Fire Training Fog Machine User Manual English

FT-20 Fire Training Fog Machine User Manual English FT-20 Fire Training Fog Machine User Manual English 2017 Antari Lighting and Effects Ltd. 1 User Manual - English Safety Information Please read the following safety information carefully before operating

More information

Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T

Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Department/School/Division: Effective USC Account Number (Required): 1. General Conditions 1.1. This agreement

More information

FT-20 Fire Training Fog Machine User Manual English

FT-20 Fire Training Fog Machine User Manual English FT-20 Fire Training Fog Machine User Manual English 2018 Antari Lighting and Effects Ltd. 1 User Manual - English Safety Information Please read the following safety information carefully before operating

More information

SERVICE MANUAL Yhu#614 pzz lgkh{laz UG\SGYWX]

SERVICE MANUAL Yhu#614 pzz lgkh{laz UG\SGYWX] SERVICE MANUAL The following safety precautions are given throughout this manual. They must be strictly followed to protect those who install, use or maintain this product as well as to protect players,

More information

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with

More information

2 Mesa Ethernet Dock User s Manual

2 Mesa Ethernet Dock User s Manual owner s manual Mesa Ethernet Dock The Mesa Ethernet Dock is an optional accessory that provides an ethernet port for networking, power input jack, USB client port, and a mounting station for the Mesa Rugged

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Introduction. Related Documentation

Introduction. Related Documentation MDE-4621 Field Installation of TopKAT PCMCIA Kit C06968 October 2006 Introduction Recently the TopKAT Central Processing Unit (CPU, C06741) underwent changes to accommodate a faster processor and a higher

More information

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT IFC SERVICE DESCRIPTION 17 OCTOBER 2016 Page 1 of 9 SERVICE DESCRIPTION 2-14: INTERNATIONAL FALCON CONNECTION SERVICE (IFC Service) 1. THE SERVICE

More information

Operational Safety Procedure (OSP) For The. Laser Bay. At the. Texas Center for High Intensity Laser Science. Document Number TPW-D-0011-A

Operational Safety Procedure (OSP) For The. Laser Bay. At the. Texas Center for High Intensity Laser Science. Document Number TPW-D-0011-A Operational Safety Procedure (OSP) For The Laser Bay At the Texas Center for High Intensity Laser Science Document Number TPW-D-0011-A Texas Center for High Intensity Laser Science Dept. of Physics, The

More information

TEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM

TEA, Inc. CORPORATE HEALTH AND SAFETY PROGRAM CORPORATE HEALTH AND SAFETY PROGRAM Updated June 24, 2013 August 12, 2013 Prepared by 10636 Linkwood Court Baton Rouge, Louisiana 70810 Phone: (225) 767-3880 Fax: (225) 767-3883 TABLE OF CONTENTS Section

More information

Operating instructions

Operating instructions www.lehmann-locks.com GB L033-A01 L033-A02 M300 L033-A01 / -A02 Operating instructions Contents Page General description / Technical data / Safety instructions... 2 Care and maintenance / Factory settings

More information

Firefighter Observation Report

Firefighter Observation Report DeKalb County Fire Department Exhibit 47 Firefighter Observation Report (Supplemental Report Required for Investigations) Date of Incident: Location of the fire scene: GPS coordinates of the scene: N:

More information

University at Buffalo Campus Mail Services

University at Buffalo Campus Mail Services University at Buffalo Campus Mail Services Standard Operating Procedures Guidelines for Handling Mail 9/04 The University at Buffalo Campus Mail operations is located on the University s North Campus,

More information

OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN

OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN LOCATION OF SERVICE REQUIRED 141 Voortrekker road Parow Cape Town Areas: Offices Entrance foyers Balcony Toilets Basements Conference rooms Store rooms

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

Standard: Data Center Security

Standard: Data Center Security Standard: Data Center Security Page 1 Executive Summary The university data centers provide for the reliable operation of SJSU s computing systems, computing infrastructure, and communication systems.

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Obtaining Documentation and Submitting a Service Request, page xvii Safety Warnings, page xvii Safety Guidelines, page xx

Obtaining Documentation and Submitting a Service Request, page xvii Safety Warnings, page xvii Safety Guidelines, page xx Preface Obtaining Documentation and Submitting a Service Request, page xvii Safety s, page xvii Safety Guidelines, page xx Obtaining Documentation and Submitting a Service Request For information on obtaining

More information

Model 2657A-LIM-3 LO Interconnect Module

Model 2657A-LIM-3 LO Interconnect Module Keithley Instruments, Inc. 28775 Aurora Road Cleveland, Ohio 44139 1-888-KEITHLEY http://www.keithley.com Model 2657A-LIM-3 LO Interconnect Module User's Guide Description The Model 2657A-LIM-3 LO Interconnect

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Great Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI)

Great Western Painting Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) Assured Equipment Grounding Conductor Program OR Ground Fault Circuit Interrupter (GFCI) GROUND FAULT CIRCUIT INTERRUPTERS Wiring design and protection. - 1926.404 Our company uses ground fault circuit

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

This 4200-RM Rack Mount Kit is for installation in 4200-CAB series cabinets only.

This 4200-RM Rack Mount Kit is for installation in 4200-CAB series cabinets only. Keithley Instruments, Inc. 28775 Aurora Road Cleveland, Ohio 44139 (440) 248-0400 Fax: (440) 248-6168 www.keithley.com Model 4200-RM Rack Mount Kit Packing List Introduction NOTE This 4200-RM Rack Mount

More information

MHCC Emergency Notification System (ENS) Protocols

MHCC Emergency Notification System (ENS) Protocols MHCC Emergency Notification System (ENS) Protocols Introduction MHCC has an Emergency Notification System (ENS) with multi communication capabilities. MHCC s ENS is intended to rapidly disseminate emergency

More information

CANTEEN 6000 Portable Battery Pack NAP-30. Instruction Manual Please read carefully before use and keep for future reference.

CANTEEN 6000 Portable Battery Pack NAP-30. Instruction Manual Please read carefully before use and keep for future reference. CANTEEN 6000 Portable Battery Pack NAP-30 Instruction Manual Please read carefully before use and keep for future reference. Thank You We know you have many choices when it comes to technology; thank you

More information

Telephone Instructions

Telephone Instructions Telephone Instructions Emergency Telephone Procedures 2 Telephone Features 3 Telephone User Guide 4 Speed Dial Setup 5 Using Your Voicemail 6 Voicemail Shortcuts 6 Voicemail Map 7 Emergency Telephone Procedures

More information

Dude Solutions Business Continuity Overview

Dude Solutions Business Continuity Overview Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....

More information

Guidance for Accident Reporting

Guidance for Accident Reporting Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need

More information

User Guide Microsoft Portable Power (DC-21)

User Guide Microsoft Portable Power (DC-21) User Guide Microsoft Portable Power (DC-21) Issue 1.0 EN-US User Guide Microsoft Portable Power (DC-21) Contents For your safety 3 About your portable charger 4 Keys and parts 5 Charge your portable charger

More information

Disaster Preparedness Community Emergency Response Team

Disaster Preparedness Community Emergency Response Team Disaster Preparedness Community Emergency Response Team Berkeley CERT Disaster Preparedness Unit Objectives Describe the types of hazards to which your community is vulnerable Describe the functions of

More information

Jentafon Wireless Loopset LPS-6 User Guide

Jentafon Wireless Loopset LPS-6 User Guide Jentafon Wireless Loopset LPS-6 User Guide User Guide for Jentafon Wireless Loopset LPS-6 Jentafon Wireless Loopset LPS-6 is a Bluetooth headset for T-coil equipped hearing aid or cochlear implant users.

More information

SECTION N -- ELECTROSTATIC DISCHARGE (ESD)

SECTION N -- ELECTROSTATIC DISCHARGE (ESD) INSTALLATION REQUIREMENTS AT&T January, 2012 Section N, ATT-TP-76300 Revised NA SECTION N -- ELECTROSTATIC DISCHARGE (ESD) CONTENTS PAGE 1. GENERAL... N-1 1.1. Introduction... N-1 1.2. General Requirements...

More information

IXcellerate Moscow One Datacentre - Phase 1 & 2 Overview

IXcellerate Moscow One Datacentre - Phase 1 & 2 Overview Contents 1. Document Purpose... 2 2. Facility Overview... 2 2.1 Technical Space... 2 2.2 Load Density... 2 2.3 Resilience... 2 2.4 Engineering Plant Maintenance & Service Restoration... 3 3. Engineering

More information

Infrastructure Security Overview

Infrastructure Security Overview White Paper Infrastructure Security Overview Cisco IronPort Cloud Email Security combines best-of-breed technologies to provide the most scalable and sophisticated email protection available today. Based

More information

Model 2460-KIT. Screw Terminal Connector Kit. Description / September 2014 *P * 1

Model 2460-KIT. Screw Terminal Connector Kit. Description / September 2014 *P * 1 Keithley Instruments 28775 Aurora Road Cleveland, Ohio 44139 1-800-935-5595 http://www.keithley.com Model 2460-KIT Screw Terminal Connector Kit Description The Model 2460-KIT Screw Terminal Connector Kit

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT ADDENDUM COLOCATION BIT-1 VERSION

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT ADDENDUM COLOCATION BIT-1 VERSION SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT ADDENDUM COLOCATION BIT-1 VERSION 2018-08-09 Table of Contents 1. Definitions...3 1.1. Dew point...3 1.2. Incidents...3 1.3. Service...3 2. SLA...4 3. Service

More information

Hurricane and Storm Commercial Damage Assessment

Hurricane and Storm Commercial Damage Assessment Hurricane and Storm Commercial Continue to follow all evacuation orders. Stay up-to-date on current hurricane and storm information by visiting the U.S. National Hurricane Center. How to Conduct s:. PREPARE

More information

KOIL Park User Guide

KOIL Park User Guide KOIL Park User Guide KOIL Park ( the Facility ) is operated by Mitsui Fudosan Co., Ltd. ( the Company ). KOIL Park members ( Members ) and persons who temporarily use the Facility ( Users ) must observe

More information

Hurricane Florence Response and Recovery. October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO

Hurricane Florence Response and Recovery. October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO Hurricane Florence Response and Recovery October 18, 2018 Miles Lackey, Vice Chancellor of Business Affairs & CFO Event Impact Campus Grounds Approximately 400 downed trees Light poles Power lines Page

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

PR3400 Series 1.4Mp USB Cameras Hardware Guide

PR3400 Series 1.4Mp USB Cameras Hardware Guide PR3400 Series 1.4Mp USB Cameras Hardware Guide Manufactured by: SPOT Imaging Solutions, a division of Diagnostic Instruments, Inc. 6540 Burroughs Ave. Sterling Heights, MI 48314-2133 USA Toll-Free: 866-604-SPOT

More information

User Manual for: Y-Tag PT Product code Version 1.3, March Dyzle

User Manual for: Y-Tag PT Product code Version 1.3, March Dyzle User Manual for: Y-Tag PT 100 1.0 Product code 020 1501 001 Version 1.3, March 2015 2015 Dyzle 2015 Dyzle User Manual for Y-Tag PT 100 1.0, version 1.3, March 2015 1 Foreword This User Manual is intended

More information

Operating Instructions

Operating Instructions 9000 Operating Instructions Contents Introduction 1 Operating Instructions 2-5 Demonstrations 6-8 Storing/Handling/Cleaning 9 Safety Precautions 9-10 Specifications 10 FCC Compliance Statement 11-12 Limited

More information

Examiners/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist

Examiners/Instructors Manual for Practical Examinations For trades of Hairstylist, Esthetician and Electrologist Examiners/Instructors Manual for Practical Examinations INTRODUCTION The purpose of this document is to provide a comprehensive source of information for examiners and instructors regarding the mandatory

More information

Compare Mail Security In Your Organization To Industry Benchmarks

Compare Mail Security In Your Organization To Industry Benchmarks SoBran SafeMail 1 Compare Mail Security In Your Organization To Industry Benchmarks Most companies hold their security operations close to the vest, which can make it difficult to know how your own organization

More information

Site Visitor Requirements Practice

Site Visitor Requirements Practice Health & Safety Site Visitor Requirements Practice Content Owner Custodian H&S Discipline Program COMS Document Number Manager, Health and Safety Solutions Health and Safety Solutions H&S Programs & Projects

More information

PASS Your HMA / HMO Exam Incident Management

PASS Your HMA / HMO Exam Incident Management 1) Who assumes command at a haz mat incident? A) The driver of the first-arriving squad truck B) The first person on the scene or the ranking individual of the first company on the scene C) The first-arriving

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

your one stop sign & display experts Safety Signs Catalogue

your one stop sign & display experts Safety Signs Catalogue your one stop sign & display experts Safety Signs Catalogue Tel: 0113 249 5800 www.aztecsigns.co.uk Signs Page 1 Non-automatic fire equipment should display safety signs in accordance with the Safety Signs

More information

User Guide CentrePoint Insight Watch

User Guide CentrePoint Insight Watch User Guide CentrePoint Insight Watch Activity Monitor: CentrePoint Insight Watch Revision: 0 Released: 0/9/08 User Guide CentrePoint Insight Watch Activity Monitor: CentrePoint Insight Watch Revision:

More information

DUKE UNIVERSITY CONSTRUCTION STANDARDS

DUKE UNIVERSITY CONSTRUCTION STANDARDS 1 00 01 10 Table of Contents DIVISION 00: PROCUREMENT AND CONTRACTING REQUIREMENTS 00 01 10 Table of Contents 06.17.2014 00 21 13 Instructions to Bidders 11.08.2013 00 22 13 Supplementary Instructions

More information

Broadcast Notification solutions

Broadcast Notification solutions Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2

More information

Intelli-M eidc Quick Start Guide. infinias

Intelli-M eidc Quick Start Guide. infinias Intelli-M eidc Quick Start Guide infinias Important Safety Instructions 1. Read these instructions. 2. Keep these instructions. 3. Heed all warnings. 4. Follow all instructions. 5. Do not use this apparatus

More information

Signature: Signed by GNT Date Signed: 5/26/2015

Signature: Signed by GNT Date Signed: 5/26/2015 Atlanta Police Department Policy Manual Standard Operating Procedure Effective Date June 1, 2015 Mobile Video and Audio Recording Applicable To: All employees Approval Authority: Chief George N. Turner

More information

State of Rhode Island Department of Administration Division of Information Technol

State of Rhode Island Department of Administration Division of Information Technol Division of Information Technol 1. Background Physical and environmental security controls protect information system facilities from physical and environmental threats. Physical access to facilities and

More information

HX1 Bluetooth Stereo Headset

HX1 Bluetooth Stereo Headset HX1 Bluetooth Stereo Headset Ref. nr.: 130.115 INSTRUCTION MANUAL V1.1 ENGLISH Congratulations to the purchase of this Max product. Please read this manual thoroughly prior to using the product in order

More information

Brooks Models MT3809G Metal Tube Variable Area Flowmeters HART Handheld DD Installation & Operation Manual

Brooks Models MT3809G Metal Tube Variable Area Flowmeters HART Handheld DD Installation & Operation Manual Installation and Operation Manual Supplement Brooks Models MT3809G Metal Tube Variable Area Flowmeters HART Handheld DD Installation & Operation Manual Installation and Operation Manual Supplement Essential

More information

Installation Instructions

Installation Instructions 50ES, 50EZ, 50GL, 50GS, 50GX, 50JS, 50JX, 50JZ, 50SD, 50SZ, 50VL, 50VT, 50XP, 50XZ 601A, 602A, 602B, 604A, 604B, 604D, 607C, 701A, 702A, 702B, 704A, 704B, 704D, 707C PA1P, PA2P, PA3P, PH1P, PH2P, PH3P

More information

XAVIER UNIVERSITY Building Access Control Policy

XAVIER UNIVERSITY Building Access Control Policy Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,

More information