FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center

Size: px
Start display at page:

Download "FACILITY USER GUIDE. Colocation in Key Info s Agoura Court Data Center"

Transcription

1 FACILITY USER GUIDE Colocation in Key Info s Agoura Court Data Center Page 1 of 11 Key Info Facilities User Guide v2.4

2 Table of Contents Welcome... 3 GETTING STARTED... 4 Colocation Access... 4 Proof of Insurance... 5 Keys & Locks... 5 Access Hours... 6 Staffing at Data Center... 6 Bringing Your Equipment to the Data Center... 6 Installing Equipment... 7 Managed Equipment Install... 7 Remote Hands / Tech Support Trash Removal... 8 WORKING IN THE DATA CENTER... 8 Colocation Space Use... 8 Tech Workspace Area... 9 Smoking Area... 9 Visitor Access to the Data Center... 9 Acknowledgement Facility User Guide Acknowledgment Form Page 2 of 11 Key Info Facilities User Guide v2.4

3 Welcome Thank you for choosing Key Info s colocation service. To simplify your move to our facility and ensure security of all personnel and equipment, this guide was created to explain how to access the data center and the policies that are in place to provide a secure environment. If you have any questions or concerns, do not hesitate to call our Client Support Team at NOTE: This guide may be modified at any time and updates will be posted on our Client Portal and/or distributed via . Page 3 of 11 Key Info Facilities User Guide v2.4

4 Colocation Access GETTING STARTED Prior to accessing the facility, we require a designated primary and secondary contact to be named as Authorized Security Contacts. Those two individuals will be authorized to access the Data Center, add or change personnel who may access the facility, change the status of that access, inquire on security issues, or allow temporary visitors in the Data Center. Only change requests submitted in writing on Company letterhead or via company from the Authorized Security Contacts can authorize those changes. In the case that the Authorized Security Contacts are both unavailable, written changes to authorized personnel and Authorized Security Contacts may be changed by a Legal Officer of the client(i.e. CEO, CFO, CTO). The information to be provided must include each individual s name, organization, position, and contact information including and phone number. Those individuals selected for access will be required to have a hand scan created and be issued a photo badge. If you need to grant access to third-party vendors, you may authorize them through the same process as granting access to your own employees, but we will require each designated vendor or contractor to appear in person to perform a hand scan and have a photo badge issued. Vendors and contractors must meet the same insurance/documentation requirements as specified in our agreement. Hand scans and badges are performed only at our Agoura Hills facility and during normal business hours. An appointment is preferred. If an authorized person no longer needs access (such as employee termination or vendor changes), we request that the primary or secondary Authorized Security Contact immediately contact our Client Support team at to have the access credentials disabled. We also need the change requests submitted in writing on Company letterhead or via company from the Authorized Security Contacts. Page 4 of 11 Key Info Facilities User Guide v2.4

5 Authorized individuals and visitors must have a Key Info issued security badge visible on their person at all times. Security doors may not be propped open. If a door is left open for longer than 60 seconds the alarm will sound and personnel will be summoned. Proof of Insurance All colocation clients must procure and maintain the following insurance coverage during their time of occupation of any colocation space in our Data Centers. The client must also add Key Info as additionally insured to their general liability insurance policy: 1. Worker s Compensation in compliance with all applicable local statutes. A. Employer s Liability with limits of $500,000 for each accident. 2. Commercial general liability with combined single limits of $1,000,000 each occurrence. A. All Risk property insurance covering all of the customer s personal property located in the Colocation space. These coverages must be provided before performance a hand scan and issuing badges. Keys & Locks Key Info Colocation cabinets and cages are secured individually, either with combination or keyed locks. If a key lock is used, Key Info will provide two sets of keys at no charge. Keys are stamped as DO NOT DUPLICATE. If you require additional key(s) contact your Sales representative. All keyed locks will be rekeyed by Key Info upon vacancy of the colocation space. If you require your locks to be changed contact our Support group. It is required that all cabinets and cages remain locked while you are not on site. Page 5 of 11 Key Info Facilities User Guide v2.4

6 Access Hours The Data Center is available for clients to access at any time 24x365. Staffing at Data Center The Data Center is manned 7am-6pm Monday-Friday. An on-call Client Support team member can be reached at any time at Bringing Your Equipment to the Data Center Once the hand scan and badge process is complete, and the cabinet combination or keys have been issued, equipment can be moved into your Colocation space at any time, If the Colocation space is not yet available, equipment can be placed in our secure temporary on-site storage. The Client Support team will provide notification once the colocation space is available. Key Info will accept and hold any shipment that is sent to the Data Center on a short term basis. If equipment is being shipped to the Data Center, please notify the Client Support team that equipment is coming. Please have all shipped equipment sent to: (Your company name) c/o Key Information Systems Agoura Court, First Floor Agoura Hills, CA Please make sure to include your primary contact information somewhere on the shipping label. If you are personally transporting large equipment to the Data Center, it is strongly recommended that you schedule the delivery of this equipment with our Client Support team. Page 6 of 11 Key Info Facilities User Guide v2.4

7 Installing Equipment Key Info maintains a hot and cold row designation for thermal efficiency. All equipment, including networking equipment, must be installed in accordance with the row designations. As such, all equipment intakes must be mounted facing the cold row and all equipment exhausts must vent to the hot row. Managed Equipment Install Our Professional Services team will install your equipment if agreed to in the contract. A Managed Equipment Installation will be handled in the same way as described above. All equipment should be shipped to the Data Center, and our Professional Services Team will physically install that equipment in the assigned racks and/or cages, provide power, and configure the network. In order for our Professional Services team to properly install your equipment, we ask that you provide the following details (preferably in electronic form) when you schedule this service: Equipment list with quantities and descriptions Detailed cabling instructions Physical equipment rack diagrams Power requirements Network preferences Contact information Any other special instructions This will require an SOW prepared by PSG We request you send all documentation/directions to our Client Support team. We also ask that you clearly identify your equipment with your company name on the shipping boxes to ensure the proper identification of what is being shipped. Page 7 of 11 Key Info Facilities User Guide v2.4

8 Remote Hands / Tech Support. Key Info offers technical support to colocation clients as an additional offering. A Client Support team member performing Remote Hands will perform simple equipment troubleshooting and configuration assistance such as: Restarts / Reboots of Servers Card or Disk Drive Swaps Our Professional Services team can provide more extensive support to our clients that require Testing Diagnostic Services Trash Removal In order to maintain a clean and efficient data center, empty equipment boxes must be removed from the Data Center. Empty cardboard must be removed from the Data Center and cannot be stored in any part of the Data Center. WORKING IN THE DATA CENTER Colocation Space Use The Colocation space is only to be used for the placement and maintenance of computer and telecommunications equipment. No food or drinks are allowed in the Colocation facility. Firearms, drugs and alcohol are completely prohibited at all times. Additional policies are as follows: Page 8 of 11 Key Info Facilities User Guide v2.4

9 1. Cabling must not be installed or altered in the existing signal and power trays, or on top of cabinets. 2. Floor tiles must not be moved and no attempts to penetrate the tile should be made. 3. Equipment must be secured before, during and after physical installation. Please notify a Client Support team member if equipment needs to be secured overnight. 4. The Client Support team is the single point of contact for all questions and issues. If an on-site technician is needed the on-call technician will contact them to make arrangements. Tech Workspace Area Key Info offers a workspace for customers to use on a first-come, first-serve basis. The workspace is equipped with telephones and Internet access as well as a workbench for setup/configuration/diagnostic work that would otherwise obstruct aisles and exits. The workspace is available for you to use; however, you cannot drill, solder, or saw in the workspace areas. Key Info does offer private conference rooms that are available during normal business hours with prior reservation. The workspace is intended for temporary daily use only. Please remove all materials in the workspace when you leave. Smoking Area Smoking is not allowed in the Data Center/Colocation areas. This includes the use of vaporizers and similar products. Air sampling equipment is in active use for smoke/fire detection within the Data Center. Smoking is permitted outside the building, away from entrances. Please deposit cigarette butts and other waste in appropriate receptacles. Visitor Access to the Data Center The Primary or Secondary contact must give prior notice to the Client Support team when visitors plan to access the Colocation facility. Visitors will not be allowed to access the Colocation areas unless escorted by an Page 9 of 11 Key Info Facilities User Guide v2.4

10 authorized Client or Client Support team member. During business hours all visitors must sign in at the front desk. A government photo ID will be held in exchange for a visitor badge. Visitor badges must be returned to Key Info personnel at the end of each visit. Acknowledgement I acknowledge that I have read, understood, and will adhere to the policies above. This Facilities User Guide is available at: By signing page 11 of the Agoura Court Facilities User Guide, I acknowledge that I will review the document annually to be aware of all current rules. Page 10 of 11 Key Info Facilities User Guide v2.4

11 Facility User Guide Acknowledgment Form I further acknowledge that I have received a copy of the Key Info Facility User Guide and understand that it contains important information on the company's general Data Center and Card Key Access policies. SIGNATURE DATE NAME (TYPED OR PRINTED) Page 11 of 11 Key Info Facilities User Guide v2.4

n+2 DATA CENTER CONTROL POLICY

n+2 DATA CENTER CONTROL POLICY This Data Center Control Policy (the Control Policy ) forms a part of the Master Services Agreement between n+2 LLC ( n+2 ) and Client (the Agreement ), in which this Control Policy is incorporated by

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

Timico Data Centres: Access Policy

Timico Data Centres: Access Policy Timico Data Centres: Access Policy Timico Ltd 2012 Page: 1 of 6 1 Contents 1 Contents... 2 2 Version control... 2 3 Overview... 3 4 Introduction... 3 5 Rules of conduct... 3 6 Access request procedure...

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS

PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS PoP ROOM: INSIDE AND OUTSIDE PLANT RULES & REGULATIONS Version 14 November 19, 2014 Digital Realty Table of Contents INTRODUCTION... 3 ACCESS TO THE POP ROOMS, ISP & OSP... 3 PoP- MoP Forms... 3 Who must

More information

CenturyLink Data Center North American Facility User Guide

CenturyLink Data Center North American Facility User Guide CenturyLink Data Center North American Facility User Guide page 1 of 18 NORTH AMERICAN FACILITY USER GUIDE Table of Contents 1.0 - Welcome... 3 1.1 - CenturyLink Data Center Facility Classifications...

More information

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

Colocation Area shall mean the location within a A2000 owned or leased Facility in which Space ordered by Customer is located.

Colocation Area shall mean the location within a A2000 owned or leased Facility in which Space ordered by Customer is located. Colocation Agreement This Service Schedule is applicable only where Customer orders Data Center Services and associated services. Data Center Facility Services may also be designated as A2000 Colocation

More information

MASTER SERVICE AGREEMENT DATA CENTER POLICIES & PROCEDURES

MASTER SERVICE AGREEMENT DATA CENTER POLICIES & PROCEDURES Access to CoreSpace facilities may be used only for the purpose intended and in accordance with specific instructions. CoreSpace s Colocation Customer ( Customer ) and its representatives agree to observe

More information

UITS Data Center Access Policies and Procedures

UITS Data Center Access Policies and Procedures UITS Data Center Access Policies and Procedures Revision 5: 2/15/2017 2/15/17 Page 1 Author: Len Sousa, UConn/UITS Contents... 1 UITS Data Center Access Policies and Procedures... 1 1. Introduction...

More information

SECTION 15 KEY AND ACCESS CONTROLS

SECTION 15 KEY AND ACCESS CONTROLS 15.1 Definitions A. The definitions in this section shall apply to all sections of the part unless otherwise noted. B. Definitions: Access Badge / Card a credential used to gain entry to an area having

More information

Policies & Procedures Effective Date: January 24, Key Control

Policies & Procedures Effective Date: January 24, Key Control LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

26 th Annual Taste of Morgan Hill 2015 Presented by the Morgan Hill Chamber of Commerce Downtown Morgan Hill September 26 &

26 th Annual Taste of Morgan Hill 2015 Presented by the Morgan Hill Chamber of Commerce Downtown Morgan Hill September 26 & 26 th Annual Taste of Morgan Hill 2015 Presented by the Morgan Hill Chamber of Commerce Downtown Morgan Hill September 26 & 27 2015 Pre-packaged/Food Sample Booth Vendor Application GENERAL INFORMATION:

More information

Policies & Procedures Facility User Guide

Policies & Procedures Facility User Guide Policies & Procedures Facility User Guide April 2017 Table of Contents 1.0 WELCOME... 3 2.0 SECURITY POLICIES... 5 2.1 AUTHORIZING YOUR ACCESS... 5 2.2 REQUESTING ACCESS... 5 2.3 CUSTOMER S VENDOR AND

More information

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental

More information

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA) Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning

More information

AIMS CUSTOMER HAND BOOK THANK YOU FOR CHOOSING AIMS AS YOUR PREFERRED SERVICE PROVIDER.

AIMS CUSTOMER HAND BOOK THANK YOU FOR CHOOSING AIMS AS YOUR PREFERRED SERVICE PROVIDER. AIMS CUSTOMER HAND BOOK THANK YOU FOR CHOOSING AIMS AS YOUR PREFERRED SERVICE PROVIDER. It is our pleasure to provide you with the fullest of Informations to enable you to obtain the best from our services.

More information

CCBC is equipped with 3 computer rooms, one at each main campus location:

CCBC is equipped with 3 computer rooms, one at each main campus location: Policy: Computer Room Procedures Policy: Draft 12/14/2009 1.0 Purpose The purpose of this document is to establish procedures for the Community College of Baltimore County (CCBC) Information Technology

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Sabey Data Center Properties CONSOLIDATED WORK RULES

Sabey Data Center Properties CONSOLIDATED WORK RULES Sabey Data Center Properties CONSOLIDATED WORK RULES Contents Overview... 2 Building Security... 2 General... 2 Access Badge Display... 2 Security Rounds... 2 Access to Secure Spaces... 2 Emergency Exits...

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Digital Intelligence Systems, LLC PeopleSoft Guide Vendors

Digital Intelligence Systems, LLC PeopleSoft Guide Vendors Digital Intelligence Systems, LLC PeopleSoft Guide Vendors Version 1.0 July 2016 CONTENTS INTRODUCTION... 3 1.1 Change Password... 3 PROFILE INFORMATION... 5 2.1 Identifying Information... 6 2.2 Address...

More information

SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc.

SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES. June Version 12 STATUS. NYSE Group, Inc. SFTI & COLOCATION US US LIQUIDITY CENTER OPERATING POLICIES & PROCEDURES June 2016 STATUS Version 12 NYSE Group, Inc. 2016 Page 1 About This Document The following documents should be read in conjunction

More information

WELCOME HEADQUARTERS TO THE NEW GENCO. 700 Cranberry Woods Drive Cranberry Township, PA INSIDE:

WELCOME HEADQUARTERS TO THE NEW GENCO. 700 Cranberry Woods Drive Cranberry Township, PA INSIDE: WELCOME TO THE NEW GENCO HEADQUARTERS 700 Cranberry Woods Drive Cranberry Township, PA 16066 INSIDE: Arriving on Day 1 Page 2 Parking Page 2 Entrances Page 2 Badges & Access Page 3 Security Page 3 Setting

More information

ARTS & CRAFTS APPLICATON

ARTS & CRAFTS APPLICATON ARTS & CRAFTS APPLICATON Located in beautiful historic downtown Morgan Hill, California, the Taste of Morgan Hill is held the last weekend in September each year. Attendance estimates are about 50,000

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Data Center Colocation Service Level Agreement

Data Center Colocation Service Level Agreement Data Center Colocation Service Level Agreement Contents Terminology... 2 Service Description... 2 Power... 2 Conditioned Space... 3 Fire Suppression... 3 Service Reporting... 3 Hardware Replacement...

More information

SPECTRUM ENTERPRISE. Colocation Services Addendum

SPECTRUM ENTERPRISE. Colocation Services Addendum LEGAL SPECTRUM ENTERPRISE Colocation Services Addendum This Colocation Services Addendum ( Colocation Addendum ) governs the Spectrum Enterprise Colocation Service ( Colocation Service ) and constitutes

More information

Statement of Work for Support Line for Cisco

Statement of Work for Support Line for Cisco Statement of Work for Support Line for Cisco This Statement of Work specifies an optional Service selected by you on the Schedule of a related IBM Service Suite Statement of Work (SOW). This Statement

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Lake County Housing Authority North U.S. Highway 45 Grayslake, IL 60030

Lake County Housing Authority North U.S. Highway 45 Grayslake, IL 60030 Proposal for Services Security Camera Replacement Must be received by 10:00 a.m. on March 30, 2018 Services to be provided at Shiloh Towers 1525 27 th St. Zion, IL A Mandatory Pre-bid Meeting will be held

More information

SERVICE DESCRIPTION COLOCATION

SERVICE DESCRIPTION COLOCATION Contents Service Overview.... 3 Key Features... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Internal Kick-Off... 6 Customer Kick-Off... 7 Provisioning & Testing.... 7 Billing....

More information

Server Colocation Standards

Server Colocation Standards Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke

More information

2018 PO BOX 604, BANNING, CA STAGECOACHDAYS.ORG SEPTEMBER 6-9 VENDOR APPLICATION

2018 PO BOX 604, BANNING, CA STAGECOACHDAYS.ORG SEPTEMBER 6-9 VENDOR APPLICATION Vendor Name: Contact Person: Address: City: 2018 PO BOX 604, BANNING, CA 92220 STAGECOACHDAYS.ORG SEPTEMBER 6-9 VENDOR APPLICATION State: Zip Code: Phone: ( ) - Cell: ( ) - CDL#: Email: VENDOR TYPE: Check

More information

KOIL Park User Guide

KOIL Park User Guide KOIL Park User Guide KOIL Park ( the Facility ) is operated by Mitsui Fudosan Co., Ltd. ( the Company ). KOIL Park members ( Members ) and persons who temporarily use the Facility ( Users ) must observe

More information

United Council for Neurologic Subspecialties Examination Registration and Testing Guidelines

United Council for Neurologic Subspecialties Examination Registration and Testing Guidelines United Council for Neurologic Subspecialties Examination Registration and Testing Guidelines VERY IMPORTANT INFORMATION This message serves as your notification to register for the 2018 UCNS Behavioral

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

The Recovery and Monitoring Program of New Jersey (Keep this sheet for your files)

The Recovery and Monitoring Program of New Jersey (Keep this sheet for your files) Welsh Commons, 1364 Welsh Road, Suite C-2, North Wales, PA 19454-1913, USA 800-732-DRUG (3784) Fax: 215371-1126 Internet: http://www.firstlab.com E-mail: mail@firstlab.com The Recovery and Monitoring Program

More information

Dude Solutions Business Continuity Overview

Dude Solutions Business Continuity Overview Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....

More information

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...

More information

1.0 Executive Summary

1.0 Executive Summary Statement of Work - 1 - Power and Cooling Assessment for Data Center Professional Services Service 1.0 Executive Summary Table of Contents 1.0 Executive Summary 2.0 Features & Benefits 3.0 Details of Service

More information

Table of Contents. SV3 Visitor Registration Tenant Job Aid. 1. Introduction Accessing the SV3 Portal Schedule Visitor...

Table of Contents. SV3 Visitor Registration Tenant Job Aid. 1. Introduction Accessing the SV3 Portal Schedule Visitor... Table of Contents 1. Introduction... 2 2. Accessing the SV3 Portal... 2 3. Schedule Visitor... 3 1. Introduction This Job Aid is for entering registered visitors into SV3 using the new user experience

More information

PRODUCT DESCRIPTION PRODUCT FEATURES

PRODUCT DESCRIPTION PRODUCT FEATURES Page 1 2003-02-26 PRODUCT FEATURES! PRODUCT AND USAGE " Information signage to facility occupants and visitors. " Identifying important locations while maintaining facility decor and theme. " Flexible

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

HPE Hardware Support Exchange Service

HPE Hardware Support Exchange Service Data sheet HPE Hardware Support Exchange Service HPE Contractual Support Services Hewlett Packard Enterprise offers a reliable and fast hardware exchange service for eligible HPE and multivendor products.

More information

Autodesk Professional Certification & Authorized Certification Center

Autodesk Professional Certification & Authorized Certification Center Autodesk Professional Certification & Authorized Certification Center Global Program Guide Version 9 January, 2013 Autodesk has set these standards, which are applicable at the date of issue of this document.

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

NVMS Frequently Asked Questions

NVMS Frequently Asked Questions NVMS Frequently Asked Questions General and Profile Information 1. What types of services does NVMS request? 2. How do I get work from NVMS? 3. What information and forms does NVMS need in order for me

More information

Data Center HANDBOOK

Data Center HANDBOOK Data Center HANDBOOK 1.0 Introduction 4 2.0 Facilities 4 2.1 Access to Facilities 4 2.2 Shipping Equipment to the Data Center 5 2.3 Data Center Addresses 5 2.4 Shipping Equipment from the Data Center 5

More information

Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T

Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Information Technology Services UNMANAGED CO-LOCATION S E R V I C E L E V E L A G R E E M E N T Department/School/Division: Effective USC Account Number (Required): 1. General Conditions 1.1. This agreement

More information

July 11, To: Prospective Vendors

July 11, To: Prospective Vendors July 11, 2018 To: Prospective Vendors The City of Oakley will be hosting the 6th Annual Heart of Oakley event on Saturday, September 22nd, 2018. We invite you to join us to sell your wares, market your

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.

More information

COVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM

COVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM This document outlines all features and functions available to Entity Business Contacts in the Certification Portal. It details the functions that you as an Entity User have including the account registration

More information

RFQ OIT-1 Q&A. Questions and Answers, in the order received.

RFQ OIT-1 Q&A. Questions and Answers, in the order received. Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring

More information

Alcohol Event Registration User Guide

Alcohol Event Registration User Guide Alcohol Event Registration User Guide Contents Introduction... 1 Form Completion... 1 Form Initiation... 1 Saving to Complete Later... 5 Student Affairs Reviewer Submission... 6 Primary Social Host Submission...

More information

TOTAL NUMBER OF UNITS: # NUMBER OF BUILDINGS: # AVERAGE OCCUPANCY RATE: % IS MOTEL SEASONAL? YES NO IF YES, # OF MONTHS OPENED?

TOTAL NUMBER OF UNITS: # NUMBER OF BUILDINGS: # AVERAGE OCCUPANCY RATE: % IS MOTEL SEASONAL? YES NO IF YES, # OF MONTHS OPENED? 1411 SW Morrison Street, Suite 400 Portland, OR 97205-1945 800-527-7397 Fax 800-742-5176 BUSINESS NAME: APPLICANT S NAME: LOCATION OF PREMISES: YEARS OWNED? OWNER MANAGED? IF NO, DESCRIBE MANAGEMENT: YEARS

More information

Access Procedures. 1.2 The University Archives Centre is open free of charge by appointment for use by staff, students and external researchers.

Access Procedures. 1.2 The University Archives Centre is open free of charge by appointment for use by staff, students and external researchers. Access Procedures 1 Introduction 1.1 London South Bank University Archives Centre collects, preserves and makes accessible the original and unique archives created and accumulated by the University, its

More information

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018 SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina

More information

Privacy Act; System of Records; Amendment of the EPA Personnel Emergency

Privacy Act; System of Records; Amendment of the EPA Personnel Emergency ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OEI-2016-0235; FRL-9954-87-OLEM] This document is scheduled to be published in the Federal Register on 11/03/2016 and available online at https://federalregister.gov/d/2016-26487,

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

SPECIAL EVENT PERMIT APPLICATION

SPECIAL EVENT PERMIT APPLICATION SPECIAL EVENT PERMIT APPLICATION Complete the application and return to Neighborhood & Community Services. Email: emily.angel@bgky.org Mail-in: Attn: Neighborhood Services Fax-in: 270-393-3077 P.O. Box

More information

OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN

OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN OUTSOURCED FACILITIES MANAGEMENT SERVICES CAPE TOWN LOCATION OF SERVICE REQUIRED 141 Voortrekker road Parow Cape Town Areas: Offices Entrance foyers Balcony Toilets Basements Conference rooms Store rooms

More information

Sc r a n t o n Wi lk e s-ba r r e

Sc r a n t o n Wi lk e s-ba r r e Telephone (570) 562-0600 Fax # (570)562-1344 Welcome to Scranton Wilkes-Barre Auto Dealers Exchange. Please fill out all information on the dealer application. An incomplete application will not be considered

More information

Colocation Specific Terms and Conditions

Colocation Specific Terms and Conditions Colocation Specific Terms and Conditions 1 DEFINITIONS These Specific Terms and Conditions are to be read in conjunction with our General Terms and Conditions. All definitions contained within these Specific

More information

Tender Number: 4638 Date Created : April 3, 2017 Contact Person: John Brennan Telephone: (902)

Tender Number: 4638 Date Created : April 3, 2017 Contact Person: John Brennan Telephone: (902) Tender Number: 4638 Date Created : April 3, 2017 Contact Person: John Brennan Telephone: (902) 368-5138 Email jebrennan@gov.pe.ca Procurement Services Request for Quotation (RFQ) Tender Source: PROCUREMENT

More information

Colocation Service Terms

Colocation Service Terms Colocation Service Terms Last Updated: March 24, 2017 The following Service Terms apply only to the specific Services to which the Service Terms relate. In the event of a conflict between the terms of

More information

APPLICATION DEADLINE Postmarked by January 12, 2018

APPLICATION DEADLINE Postmarked by January 12, 2018 APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Marketplace Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Process Serving Information Sheet

Process Serving Information Sheet Process Serving Information Sheet Thanks for your interest in process service through our company. The following information explains some of the processes involved in completing your service: 1. To serve

More information

University Facilities Management (UFM) Access Control Procedure (non-residence areas)

University Facilities Management (UFM) Access Control Procedure (non-residence areas) University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure

More information

Level 1 Interconnection Services at MIX Annex A Technical and Organizational Specifications

Level 1 Interconnection Services at MIX Annex A Technical and Organizational Specifications Level 1 Interconnection Services at MIX Annex A Technical and Organizational Specifications Page 1 of 8 DOCUMENT CODE : MIX-109E VERSION : 3.0 ENGLISH TRANSLATION DEPARTMENT : BOARD OF DIRECTORS STATUS

More information

SOLICITATION AMENDMENT

SOLICITATION AMENDMENT North Dakota University System Core Technology Services 4349 James Ray Dr. Grand Forks, ND 58202 September 29, 2014 Solicitation Number and Title: CTS-14-001 Datacenter Operations, Monitoring and Maintenance

More information

Installation Service. 1.0 Executive Summary. Factory Trained Technician Train Customer Support Staff On Basic Operation Of The Equipment

Installation Service. 1.0 Executive Summary. Factory Trained Technician Train Customer Support Staff On Basic Operation Of The Equipment Installation Service Statement of Work Start-up Service for Cooling Start-up - 1 - Service for Cooling Service 1.0 Executive Summary Table of Contents 1.0 Executive Summary 2.0 Features & Benefits 3.0

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Number: 403 Effective: 9/19/05 Supercedes: 7/10/02 Page: 1 of 15 Subject: LOCK/KEY CONTROL POLICY 1.0. PURPOSE: To establish the policy and procedures for the coordination of a

More information

2018 Bourse Application Packet

2018 Bourse Application Packet 2018 Bourse Application Packet Version 1.0 October 29, 2018 Welcome to the Baltimore Stamp and Coin Show! It is my pleasure to host the show and serve you during the show. I think it is only fair that

More information

Data Center Work Rules SV1-FAC-FPO-MGT-1427

Data Center Work Rules SV1-FAC-FPO-MGT-1427 Page 1 of 13 Data Center Work Rules Policy 1.0 RESPONSIBILITIES: 1.1 It is the responsibility of all contractors to comply with this policy. 1.2 It is the responsibility of the Project Manager to ensure

More information

Supplier Registration Guide

Supplier Registration Guide 2016 Supplier Registration Guide SODIC eprocurement Portal https://eprocurement.sodic.com 6/1/2016 Supplier User Guide Register on the Portal Dear Valued Supplier, Welcome to SODIC eprocurement Portal

More information

Greater TEXAS Federal Credit Union 6411 North Lamar Blvd. Austin, TX (512) Toll Free: (800) Fax: (512)

Greater TEXAS Federal Credit Union 6411 North Lamar Blvd. Austin, TX (512) Toll Free: (800) Fax: (512) Terms and Conditions for Remote Deposit This Remote Deposit Capture Agreement contains the terms and conditions that govern the use of Remote Deposit Capture provided to you by Greater Texas Federal Credit

More information

THE SLAC ARCHIVES AND HISTORY OFFICE PURPOSE

THE SLAC ARCHIVES AND HISTORY OFFICE PURPOSE Archives and History Office Service Level Agreement 2015/2016 THE SLAC ARCHIVES AND HISTORY OFFICE PURPOSE The SLAC Archives and History Office exists to support the archival needs of the laboratory, as

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

South Carolina Environmental Certification Board Computerized Certification Examination Information

South Carolina Environmental Certification Board Computerized Certification Examination Information South Carolina Environmental Certification Board Computerized Certification Examination Information The South Carolina Environmental Certification Board examinations are delivered at three locations in

More information

SDBOR Technology Control Plan (TCP) Project Title:

SDBOR Technology Control Plan (TCP) Project Title: SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?

More information

Installation Guide for Flex Tap

Installation Guide for Flex Tap Installation Guide for Flex Tap 800-0216-001 Rev. A 9/12 Contents Introduction....1 Key Features....2 About This Guide....3 Unpacking and Inspection....3 Rack Mounting the Flex Tap Panel....3 Loading the

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

<PROJECT NAME> IMPLEMENTATION PLAN

<PROJECT NAME> IMPLEMENTATION PLAN IMPLEMENTATION PLAN Version VERSION HISTORY [Provide information on how the development and distribution of the Project Implementation Plan was controlled and tracked.

More information

City of Santa Rosa SPECIAL EVENT PERMIT APPLICATION

City of Santa Rosa SPECIAL EVENT PERMIT APPLICATION City of Santa Rosa SPECIAL EVENT PERMIT APPLICATION Return To: Recreation & Parks Department speventpermit@srcity.org 55 Stony Point Road Phone: (707) 543-4512 Santa Rosa, CA 95401 Fax: (707) 543-3288

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

VACCINES FOR CHILDREN ANNUAL ENROLLMENT IN FLORIDA SHOTS

VACCINES FOR CHILDREN ANNUAL ENROLLMENT IN FLORIDA SHOTS Florida SHOTS VACCINES FOR CHILDREN ANNUAL ENROLLMENT IN FLORIDA SHOTS Contact Information www.flshots.com Free help desk: 877-888-SHOT (7468) Monday Friday, 8 A.M. to 5 P.M. Eastern STEP 1: Log onto Florida

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information

Robert B. Zajonc Experimental Laboratories

Robert B. Zajonc Experimental Laboratories Robert B. Zajonc Experimental Laboratories The Research Center for Group Dynamics Running experiments in the RCGD Labs What you need to know... http://www.rcgd.isr.umich.edu/rcgdlabs.htm Running in the

More information

SERVICE DESCRIPTION DEDICATED SERVER

SERVICE DESCRIPTION DEDICATED SERVER Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

Network Infrastructure, Desktop, and Server Support Service Level Agreement

Network Infrastructure, Desktop, and Server Support Service Level Agreement Network Infrastructure, Desktop, and Server Support Service Level Agreement INTRODUCTION This service level agreement ( SLA ) describes the core services provided to customers by Micro- Management Systems,

More information