PHYSICAL SECURITY FOR IT RESOURCES POLICY


Title: Physical Security for IT Resources
Subject: Information Resources and Technology
Policy No: ISO:2016:02
Applies: University-wide
Issuing Authority: Information Security Office - Chief Information Security Officer
Responsible Officer: Vice President for Information Resources and Chief Information Officer
Date Adopted: 04-01-2016
Last Revision: 05-25-2016
Last Review: 05-25-2016

I. PURPOSE
The purpose for this policy is to outline physical security measures to safeguard all Rowan University information technology resources against unlawful and unauthorized physical intrusion, as well as fire, flood and other physical threats.

  1. ACCOUNTABILITY


Under the direction of the President, the Chief Information Officer, IRT Director(s) and Departments, Schools and Business Units, the Information Security Office (ISO) shall implement and ensure compliance with this policy.

  1. APPLICABILITY


This policy to all employees, as it addresses threats to critical IT resources that result from unauthorized access to facilities owned or leased by Rowan University, including facilities containing critical IT resources or sensitive information, data centers, network closets, and similar areas that are used to house such resources.

  1. DEFINITIONS


  1. Principle of Least Privileges: the practice of limiting access to the minimal level required for someone to perform their job responsibilities.


  1. POLICY
  2. Rowan University locations that include computers and other types of information technology resources must be safeguarded against unlawful and unauthorized physical intrusion, as well as fire, flood and other physical threats. This includes but is not limited to the use of; security doors, card access, external doors that are locked from closing until opening of the building, locked and/or barred windows, security cameras, registration of visitors at entrances, security guards, and fire protection. Information Security issues to be considered are:


  1. All information resource facilities must be physically protected in proportion to the criticality or importance of their function. Physical access procedures must be documented, and access to such facilities must be controlled. Access lists must be reviewed at least semi-annual by the Information Security Office (ISO) or more frequently depending on the nature of the systems that are being protected.
  2. Use of Secure Areas to Protect Data and Information
  1. Physical Access Management to protect data and information
  1. Non-Compliance and Sanctions


By Direction of the CIO:

__________________________________
Mira Lalovic-Hand,
VP and Chief Information Officer