ࡱ> @B? 4bjbj[[ 4&994  fffffzzzz,z!0!!!!!!!$"g%R*!f...*!ff?!.ff!.!V@P AD"8 U!0!D %f%P P H%f X W*!*!x !....%  ,: Marywood Office ofInformation Technology Physical Security  Policy Physical Security means providing environmental safeguards for, and controlling physical access to, equipment and data on the Information Technology Network in order to protect information technology resources from Unauthorized Use, in terms of both physical Hardware and data perspectives. Statement: Environmental Safeguards Adequate air conditioning must be operational in Information Technology Network facilities that house information technology resources, to prevent long-term heat damage and equipment failure. All Information Technology Network facilities must have adequate fire extinguishing devices present in the office area. These devices must be inspected by Office of Public Safety personnel. All Information Technology Network information technology resources must be fitted with effective Surge Protectors to prevent power spikes and subsequent damage to data and Hardware. Critical Information Technology Network information technology resources must each be connected to an Uninterrupted Power Supply (UPS) in order to prevent power spikes, brownouts, and subsequent damage to data and Hardware. Electrical outlets must not be overloaded by connecting too many devices. Proper and practical usage of extension cords are to be reviewed annually. Physical Access All Information Technology Network physical Security systems must comply with all regulations, including, but not limited to, building codes and fire prevention codes. Physical access privileges to all Information Technology Network facilities must be documented and managed by Information Technology Security Officer. All facilities that house Information Technology Network information technology resources must be physically protected in proportion to the importance of their function. Access to Information Technology Network restricted facilities will be granted only to University staff and affiliates whose job responsibilities require access to that facility. The process for granting card or key access to Information Technology Network facilities must include approval from the Chief Information Officer. Secured access devices (e.g. access cards, keys, combinations, etc.) must not be shared with or loaned to others by Authorized Users. Lost or stolen Information Technology Network secured access devices must be reported to Information Technology Security Officer immediately. University Employees responsible for Information Technology Network facilities must remove the secured access device rights of individuals that no longer require access. University Visitors and other invitees must be escorted and monitored while in restricted Information Technology Network facilities. All spaces housing information technology resources must be kept locked when not occupied by an Information Technology Employee, in order to reduce the occurrence of unauthorized entry and access. Any piece of Information Technology Network equipment which resides in a public access area must be secured to a piece of furniture, counter-top, or other suitably deterrent object with a theft-inhibiting device. Enforcement Any Authorized User found to be in violation of this policy will be considered an Unauthorized User, and as such are subject to disciplinary action. Only hardware purchased and issued through Information Technology is supported by the University. Determining standards for computer hardware, software, and related equipment is a responsibility of Information Technology. Original Issue Date: June 16, 2010 Last Updated: October 10, 2017 changed OIT to IT -skb  -./@BCKm n y V l  * < K P f ,bx?U-&Zp9D45%Ƕ˫ǣǣǣǣǫǣǣǣǣǣǣǣǣǟǣǟǣǟǣǣǟǛhhd@h 3h 35hB5B*\ph333 hB5CJOJPJQJ\aJhB hot5CJOJPJQJ\aJ hfQq5CJ h0hot hot5CJ hB5CJ( hot5CJ(<,-ivkd$$Ifl0$h044 laytot$ !$Ifa$gdot  !$Ifgdot-./Bww$ !$Ifa$gdotvkd$$Ifl0$h044 laytotBCDKn y R  yyyp^^^^ & Fddd[$\$gdBh`hgdBddd[$\$^gdotddd[$\$gdckdH$$Ifl$h%044 laytot < L 5{9Ye\gd" dd@&[$\$gd"^gd,^,gdBgdB & Fddd[$\$gdBh`hgdB & Fddd[$\$gdB%; -234h]h 3 hrh"h"hrh"5CJ$\aJ$h h 3h 3 34^gd dd[$\$gd"21h:pB/ =!"#$% $$If!vh#vh#v:V l05h5/ / ytot$$If!vh#vh#v:V l05h5/ / / /  ytot$$If!vh#vh%:V l05h%/ / ytotj 666666666vvvvvvvvv66666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nH sH tH J`J BNormal dCJ_HaJmH sH tH d@Bd B Heading 4ddd@&[$\$5CJOJPJQJ\^JaJDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List *W`* `Strong5\6U`6 0 Hyperlink >*B*ph`^@` 0 Normal (Web)ddd[$\$CJOJPJQJ^JaJ(!( doc_link0_10 0 HTML AcronymV@BV otHeaderd!CJOJPJQJ^JaJFoQF ot Header CharCJOJPJQJ^JaJRoaR BHeading 4 Char5CJOJPJQJ\^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] 4&%4 -B 4 L# @0(  B S  ?66=*urn:schemas-microsoft-com:office:smarttags PlaceName 6.26Km 363++Vl*Pf,bx?U- & Z p  4 % ; 36Vl*Pf,bx?U- & Z p  4 % ; 236x9 f‚*~bf^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.*~x9 f\kPbJPbJ_sy|k,]BO 3yB>d@KTHfQq0g&otB"R46@22224@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7.@CalibriA$BCambria Math"hfRZG  !20--3QHX  $P2!xx  Burns, Sr. Kathleen   Oh+'0t  0 < HT\dl  Normal.dotmBurns, Sr. Kathleen5Microsoft Office Word@^в@cU@}sA ՜.+,0 hp|   -  Title  !"#$%&'()*+,-.012345689:;<=>ARoot Entry FyACData 1Table%WordDocument4&SummaryInformation(/DocumentSummaryInformation87CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q