Purpose
This policy was created to establish rules and procedures for access to the server room, the Perak Mufti Department.
Scope
The Server Room at the Perak Mufti Department is a restricted access area. Permission is only granted to employees of the Information Technology Unit, Perak Mufti Department who frequently needs access to the Server Room. Employees are required to fill in the Server Room Visitors Registry, JMNPK to gain access to the server room and the application requires the approval of the Server Room Administrator
Policy Statements
Only one established procedures for access to the Server Room Visitors Registry. Visitors who are allowed in are the staff of the Information Technology Unit, Perak Mufti Department, contractors or authorized service personnel. Procedures are as follows:
This policy was created to establish rules and procedures for access to the server room, the Perak Mufti Department.
Scope
The Server Room at the Perak Mufti Department is a restricted access area. Permission is only granted to employees of the Information Technology Unit, Perak Mufti Department who frequently needs access to the Server Room. Employees are required to fill in the Server Room Visitors Registry, JMNPK to gain access to the server room and the application requires the approval of the Server Room Administrator
Policy Statements
Only one established procedures for access to the Server Room Visitors Registry. Visitors who are allowed in are the staff of the Information Technology Unit, Perak Mufti Department, contractors or authorized service personnel. Procedures are as follows:
- List of Visitors
- Visitors are classified as employees Information Technology Unit, Perak Mufti Department or contractors or other service personnel who are allowed to enter the server room, accompanied by staff who administer the server room. Visitors are required to fill out a Vistors Registry containing server room exit / entry details including the name, identity card number, department / company, date in, time in, date out, time out, the purpose, the visitor's signature and the escort's signature.
Enforcement
Individuals who require access to the server room must comply with all policies that have been established to ensure the safety of the server room.
Individuals who require access to the server room must comply with all policies that have been established to ensure the safety of the server room.