DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

TA2000 データシートの表示(PDF) - Unspecified

部品番号
コンポーネント説明
メーカー
TA2000 Datasheet PDF : 164 Pages
First Prev 21 22 23 24 25 26 27 28 29 30 Next Last
18 TA2000 Remote Transfer Agent Processing System SAS 70
For both Winchester and AWD Data Centers, visitors, vendors and non-essential
individuals are required to sign in with the security guards in the lobby.
Access to the Winchester and AWD Data Centers requires a key card obtained from
DST Human Resources. Access to Winchester requires that the key card is scanned
when both entering and exiting the facility; the AWD Data Center requires key card
scanning upon entering the facility, the lower level and the computer room floor.
Winchester has installed “anti-pass back” technology on the front doors, displaying a
message at the security station and denying entrance and exit to anyone who did not
scan their key card on their previous trip through the door. If an individual attempts to
exit the building by opening a door at the main entrance without scanning a card, the
doors remain locked and are held shut by magnets while an alarm sounds.
To enter the computer rooms at either site, the individual is authenticated using a
biometric fingerprint reader which reads their fingerprints and detects a pulse and
temperature. The reader verifies that the key card and fingerprints match, and
determines that the individual has been authorized before allowing passage through
the door. There is also a sign-in sheet inside the AWD Data Center Computer
Operations Room, where visitors and vendors are required to sign-in their name,
company affiliation and purpose prior to accessing the AWD Data Center floor.
At the Winchester Data Center, one type of key card is used to gain access to all
secured locations. This key card includes a chip, which the card reader recognizes
when the cardholder passes it in front of the scanner. Winchester limits access to
employees based on where they work on the premises and their associated job
responsibilities. Key cards are coded for various time limitations and also color coded
based on the type of building access granted. If entering the building between the
hours of 5:30pm and 6:00am, all cardholders must sign in at the security station
regardless of their access privileges. There is only one entry point to the Winchester
computer room which is always locked and requires the individual have authorized
access
Key Card Administration
Request forms for key card access to the data centers are submitted to DST Human
Resources. Request forms must contain the access requirements needed and approval
from data center management. If access to the computer room is required, a business
reason must be documented on the request form.
When an associate with access to either data center terminates, the associate‟s
manager reports the termination to Human Resources by completing an Associate
Data Change (ADC) form. Human Resources schedules and conducts exit interviews
with the terminated associate and collects company property including the key card.
Human Resources deactivates or removes physical access for all terminated associates
within one business day of notification. Human Resources also distributes reports of
users with access to each data center, at least quarterly. A designated data center
manager reviews the user access listing, indicates any revisions and certifies the
appropriateness of indicated access.
Copyright © 2010 DST Systems, Inc.

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]