Oklahoma State University
Division of Information Technology
*Note: Information Technology Policies are in the process of
review and will be updated throughout the year*
Document #: 2003XXXType of Document: Policy Source:Business Continuity
Title: Access to Central Computing ComplexEffective Date: _______________
Replaces: ___________ Approved by: _________________ Date: _______
This document establishes the operational standard and procedures governing access to the Division
of Information Technology (IT) central computing complex of Oklahoma State University (OSU). This document is a required part
of the Security policy. Physical access control and procedures as outlined in this document apply to all persons, (including
employees, guests, vendors, maintenance and repair personnel, etc.) who may have occasion or necessity to enter the central
computing complex and its associated environs.
The standard contains both requirements, indicated by use of the word "must" in sentences appearing in italics,
and recommended safeguards, indicated by use of the word "should."
2. Control of Entry/Exit to complex – employees
2.1 Routine Entry/Exit to complex - employees
IT employees, who need routine access to MS011, as a requirement of their proper job role will be added
to the card swipe/access control list. Mike Bode or Gary Kearns, IT Operations, will make the necessary arrangements for central
complex employee access when a request is received from the employee's Director.
2.2 Supplemental Security Log
A Security Log (Log) document will be established and maintained to record the entry and exit of individuals into the central
computing complex. This Log will be a supplement to the electronic logging accomplished through the use of card swipe controlled
doorways in the complex.
2.3 Standard Operating Procedure for Entry/Exit to Central Complex
All IT employees desiring access to MS011 (Operations, Machine Room, etc.) must use the ID-card readers when entering and
exiting the premises. Each employee must swipe his/her card individually – NO PIGGY-BACKING OR GROUP-ENTRY WILL BE ALLOWED.
2.4 Access without proper identification/issuance of temporary identification
Any employee not in possession of the proper identification must fill out a Security Log entry and will be issued a temporary ID
badge before being admitted; the Log must be updated and the badge surrendered before the employee will be allowed to exit.
3. Control of Entry/Exit to complex – non employees
3.1 Guest and other authorized access
All guests (including tour participants), vendors and technicians/repairmen will be required to complete the Log AND be
accompanied by an IT employee before being issued a badge and admitted. Once issued a badge, these individuals may re-enter
and exit - with assistance from IT Operations employees - as often as necessary in order to complete their tasks. Final-exit
procedures are identical to those for IT employees without IDs. (See Item 2.4 above).
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
6.0 Revision History