Datacenter Physical Access Sample Clauses
The Datacenter Physical Access clause establishes rules and restrictions regarding who can physically enter and access the premises of a datacenter. Typically, it outlines requirements such as limiting entry to authorized personnel, implementing security measures like key cards or biometric scanners, and maintaining visitor logs. This clause is essential for protecting sensitive equipment and data from unauthorized access, thereby reducing the risk of physical breaches and ensuring compliance with security standards.
POPULAR SAMPLE Copied 1 times
Datacenter Physical Access. The information processed here is normally deemed critical to American Express operations and is of a sensitive nature in terms of confidentiality issues. Correspondingly, access controls to the datacenter require a high level of personnel restriction and authentication to safeguard the information processed therein. Normal access control standards utilized within datacenters must include: * * * * * * * * *
Datacenter Physical Access. The information processed here is normally deemed critical to American Express operations and is of a sensitive nature in terms of confidentiality issues. Correspondingly, access controls to the datacenter require a high level of personnel restriction and authentication to safeguard the information processed therein. Normal access control standards utilized within datacenters must include: • Controlled access for authorized individuals to gain entrance. • Logging of access for audit trail purposes. • Regular review of the authorization list for datacenter access. • A visitor access log to record non-datacenter personnel visits including vendor, maintenance, and cleaning crew people. All visitors must be escorted while in the datacenter. • Internal monitoring of datacenter activity by security guards, and closed circuit television (CCTV). • Entrance/Exit alarms to warn against unauthorized access attempts. Intrusion detection alarm systems must be used for installations which may be left unattended. These must either be part of 24 hour security control or connected to a security company or law enforcement agencies. Alarm systems must be checked periodically. • Appropriate physical construction standards to discourage unauthorized access attempts such as: • Either true floor to ceiling datacenter perimeter walls or motion detectors in the drop ceiling (and under the raised floor) to detect unauthorized access attempts. • The absence of entrance vulnerabilities such as windows or external hinges on entrance doors to the datacenter.
