(1) This procedure specifies appropriate physical security measures to be used to protect computer systems, personnel, and data and communications systems located in secure locations. Access to such areas must be restricted to those who have an approved need to be there. (2) All critical and sensitive information handling activities must take place in areas that are physically secured and protected against unauthorised access, interference, damage and to minimise equipment theft. (3) Servers, routers, switches, PABX and related hardware, shall be located in a room with appropriate levels of access control. Monitoring of access and removal of equipment is a requirement, as other security controls (e.g. passwords) can be bypassed if physical security is not maintained. (4) The scope of this Procedure: (5) Nil (6) Nil (7) A controlled area at VU is: (8) Security Access to Controlled Areas in IT Procedures: (9) NilInformation Security - Security Access to Controlled IT Areas Procedure
Section 1 - Purpose / Objectives
Section 2 - Scope / Application
Top of PageSection 3 - Definitions
Section 4 - Policy Statement
Section 5 - Procedures
Roles/Responsibilities
Roles
Responsibility
Information Technology Services
- Maintain a register of authorised visitors to controlled areas. Provide training and induction programs for individuals authorised to access controlled areas.
- Maintain a register/log of persons approved to access controlled areas.
- Provide authorization for the relocation or removal of equipment from controlled areas.
Infrastructure Services Manager
Communications Infrastructure Manager
Staff entering secure areas
- Never permit an unauthorised person to enter the facility in their company.
ITS Contractors
- Carry work orders (or similar) indicating the area of the University that they are working in and any related OHS risks and responsibilities.
- Wear ID at all times.Procedures
Top of Page
Section 6 - Guidelines
View Document
This is not a current document. It has been repealed and is no longer in force.
- Maintain a register of authorised equipment installed or removed from controlled areas.
- Ensure IT Security policies and procedures are followed for access to Data Centres.
- Ensure IT Security policies and procedures are followed for access to Communication Rooms.
- Comply with all VU policies and procedures regarding the handling of information at all times.
- Complete appropriate induction and training programs.