Network Closet and Server Room Access Policy
| Policy Number | ITS-010 |
|---|---|
| Effective Date | September 04, 2025 |
| Responsible Office/Person | Administration & Finance |
| Related Policies |
I. Introduction
The physical IT infrastructure of the University of Massachusetts Dartmouth must be protected from accidental or willful damage or manipulation to ensure a secure and reliable IT infrastructure operation. This policy outlines the access requirements and procedures for all network closets and the central server room, ensuring the security, integrity, and availability of the IT infrastructure.
II. Policy Statement
Only authorized persons are permitted access to spaces containing IT infrastructure such as servers, network/telecom equipment, physical security systems, or audio/video systems.
III. To Whom This Policy Applies
A. General Applicability:
This policy applies to all employees, contractors, vendors, and visitors who require access to network closets or the server room.
B. Definitions:
-
- Authorized Personnel: Staff members explicitly granted access to network infrastructure areas based on their role and responsibilities.
- Visitor: Any individual who is not an authorized employee or contractor with approved access.
IV. Access Control
A. Network Closets
-
- All network closets are secured with electronic card access systems.
- Only authorized IT and Facilities staff are granted card access.
- Access logs are maintained electronically and reviewed periodically.
B. Server Room
-
- The server room is secured with enhanced electronic card access control.
- All entries and exits are logged and auditable.
- Authorization is granted to select IT personnel and data center administrators only.
- Emergency access is available to Campus Police, Facilities, and the local fire department.
C. Access Approval
-
- The supervisor and the Associate Vice Chancellor for Information Technology must approve access to network closets and server rooms. For SMAST, the Dean or delegate must approve access to the server room.
V. Visitor Access
A. General Requirements
-
- An authorized employee must accompany visitors (including vendors, consultants, and non-IT staff or students) at all times.
- Prior approval from the IT department is required for all visitor access.
- All visitors must sign in and out, with their name, affiliation, purpose of visit, and time of access recorded.
B. Escort Responsibilities
-
- The accompanying authorized staff member is responsible for the visitor’s actions while in restricted areas.
- Visitors may not handle equipment, cabling, or devices without prior authorization and direct supervision.
C. Security and Conduct
-
- Unauthorized access, tailgating, or sharing of access credentials is strictly prohibited.
- Doors to network closets and server rooms must remain closed and locked at all times.
- Any suspicious activity or security incidents must be reported immediately via email to it.security@umassd.edu
VI. Enforcement
Violations of this policy may result in disciplinary action up to and including termination, revocation of access privileges, or other corrective measures in accordance with institutional guidelines, applicable collective bargaining agreements, and law.