Printable Version in PDF Format (Get Adobe Acrobat)

Table of Contents

History [top]

  • Business Practice Number: BP.03.003
  • Version: 2
  • Drafted By: Herb Aquino
  • Approved By: Michael Berman
  • Approval Date: 04/24/2013
  • Latest Revision Date:  08/17/2014

Purpose [top]

To assure the confidentiality, integrity, and availability of CSU Channel Islands information assets by controlling physical access to ITS facilities.

Background [top]

The University is required by CSU system-wide policy to protect its information assets. Physical security to sensitive or critical information systems must be limited to authorized persons to prevent theft or espionage. Additionally, access to workstations should also be physically secured to prevent unauthorized use, or theft, of workstations.

The ICSUAM (Integrated CSU Administrative Manual) Policy 8080.0, Physical Security, requires campuses to identify physical areas that must be protected from unauthorized access, and review and document physical access rights annually. This Business Practice is enacted to comply with that policy.

Business Practice [top]

Accountability [top]

  • Manager, ITS Infrastructure
  • Information Security Officer

Applicability [top]

All persons with access to ITS computing facilities, including workstations.

Definition(s) [top]

Text [top]

General

In order to ensure the confidentiality, integrity, and availability of the University's information assets, ITS will implement the following procedures.

Security Sensitive Areas

The Ojai Hall Data Center and all data closets are designated as security sensitive areas. Access to these spaces is permitted only by authorization of the Manager, ITS Infrastructure, and is restricted to those employees who have a demonstrated business need for such access.

Workstations, Laptops and Other Systems not in Security Sensitive Areas

Each person assigned a workstation, laptop, or other information system or asset must take adequate measures to physically secure that asset. "Adequate measures" includes locking the workstation to prevent theft, and locking the screen or logging out of the system when it is unattended. If the workstation's screen cannot be locked, or the workstation cannot be secured in such a way as to prevent theft, physical access to the room or space the workstation is located in must be secured.

Each person assigned a mobile device must take reasonable precautions to prevent the loss or theft of that device.

Employee authorization to access security sensitive areas

Each ITS employee desiring to access security sensitive areas must:

  1. Demonstrate and document a business need for the access privileges to the Manager, ITS Infrastructure,
  2. Complete Data Center Operations Training, and
  3. Complete an OPC Key Request endorsed by the VP for Information Technology Services at the conclusion of their training.

Employees outside of the Division of Academic and Information Technology requesting access to security sensitive areas must:

  1. Demonstrate and document a business need for the access privileges to their Division executive or designee,
  2. Obtain the approval of their Division executive and the Manager, ITS Infrastructure,
  3. Complete Data Center Operations Training, and
  4. Complete an OPC Key Request endorsed by the VP for Information Technology Services at the conclusion of their training.

Guest, Visitor, Vendor and Contractor Access to Computing Facilities

All guests, visitors, vendors and contractors accessing a security sensitive area identified by this business practice must:

  1. Have a legitimate business need for this access,
  2. Present to an authorized employee of ITS, and display upon request while in the security sensitive area, government- or employer-issued photo identification,
  3. Sign into and out of the security sensitive areas in the ITS Visitors Log. This log entry must include:
    1. The guest's sign-in and sign-out times,
    2. The name of the guest, and the name of the guest's employer, or the name of the guest's division and department or program for CI employees or guests,
    3. The name of the employee escorting the guest, and
    4. The reason for the visit.
  4. Be accompanied by an employee of ITS that is permitted to access the security sensitive area at all times.

Business Practice Violations

Violations of this business practice will result in the violator's access to security sensitive areas being immediately revoked until appropriate remediation is completed.

Reviewing Effectiveness

ITS will review the list of persons accessed to authorize security sensitive areas annually, and make adjustments to this business practice as required to maintain physical security.

Exhibit(s) [top]

Data Center Access Request Form (PDF, 59KB)

Assessment History [top]

DescriptionFrequencyRole Assigned
Review access listAnnualManager, ITS Infrastructure
Review of business practice AnnualInformation Security Officer
Back to Top ↑
©