Request Access to the Data Center/Communication Room

Data Center/Communication Room Access Request

Purpose of the Data Center/Communication Room Access Request

The CSI-J Information Security Policy, Section 8080_0, requires physical areas where information assets containing protected data are stored to be protected from unauthorized access. One level of control requires all individuals whose job duties mandate that work be performed in this restricted area to complete and submit this request for review and approval.

Instructions

Faculty: staff or administrators should use the form "Request Access to Data Center/ Communication Room" to request authorized access to a data center, switch room, telephone closet or other communications room managed by University IT Services.  Once the form is submitted, your department chair or director will be contacted to obtain their required approval signatures followed by an associate Dean's approval. Once it has both administrative approvals it will go to the University IT Security team for final approval. Failure to fill out this form completely and accurately may result in a delay in processing your request. Employees will be notified if or when their requests are approved.

Note: Except under strictly defined conditions, third-party service providers or consultants may not apply for data center/communication room access. To enter a data center or communication, and to handle its contents, third parties must be accompanied by authorized University employees. Read User Guidelines for Data Center and Communication Room Access for more information. 

 
Request Access to the Data Center/Communication Room

Related Articles (4)

Commissioning and decommissioning equipment
Facility access, safety, conditions, operating, auditing, changes, standards.
IT Services maintains data center facilities for hosting important campus IT resources.
Rack standards and row standards with examples