1.0 Introduction

The ITS Data Center provides a centralized, environmentally controlled and secure location for URI computing systems.  In order to maintain the security and reliability of the systems, this guideline was developed to manage environmental controls and physical access to the Data Center.

2.0 Physical Controls

The ITS Data Center is a limited access area with locked doors, card swipes, locked cabinets and restricted authorized access. Environmental controls are provided by 3-30ton Liebert HVAC systems. Fire and water sensors are active with fire suppression in place – the Sapphire System by Ansul using 3M Novec 1230 agent. Electrical stability is provided by Schneider Electric UPS systems and a Cummins 450kW Generator.

2.1 Equipment

Equipment located in the Data Center must be rack mountable and 208V compatible for electrical service. It is recommended that equipment be purchased with remote management systems such as DRAC, ILO, IMM, etc. Installation and removal of equipment is coordinated with the Data Center Operations staff.

2.2 Data Center Etiquette

  1. No food, drink, or smoking is allowed in the Data Center
  2. No hazardous materials are allowed within the Data Center
  3. No photos may be taken within the Data Center without prior authorization
  4. Do not install any equipment without prior authorization
  5. All packing materials should be removed from the Data Center as soon as equipment is unpacked. If packing materials are required for a limited period of time, please coordinate a storage space with the Data Center Operations Staff.
  6. Employees authorized to access the Data Center should only access equipment in their designated area which they are responsible for.
  7. Address all problems and questions with Data Center Operations Staff.

3.0 Personnel Access

All personnel requiring access to the Data Center must have proper authorization.

  1. All requests for access to the ITS Data Center must be approved by the Manager of the Data Center.
  2. An Access list of Unrestricted and Limited Access personnel is maintained and reviewed quarterly by ITS Security and the Data Center Manager.
  3. Unrestricted Data Center Access – limited to URI personnel who require access to the ITS Data Center to install, trouble shoot, and maintain the infrastructure of the Data Center. Personnel with unrestricted physical access are allowed un-escorted access as needed including off-hour access.
  4. Limited Authorized Access – limited to URI personnel who require access to the ITS Data Center to maintain specific hosted equipment. Access must be coordinated with ITS Data Center Operations Staff and is limited to staffed working hours. Personnel must sign in/out and show valid identification.
  5. Vendor Access – Vendors are classified as Internal and External.
    • Internal Vendors are University employees that require access per their job function, i.e. police, fire, facilities staff.
    • External Vendors are Contractors that require access for the purpose of equipment repair, installation or other contractual agreement. External Vendors requiring access must have an IT sponsor who makes arrangements with the Data Center Staff prior to the visit. External Vendors must sign in/out, show valid identification and be accompanied by a Data Center staff escort.
  6. Visitor Access – must be coordinated with Manager of the ITS Data Center at least 24 hours prior to visit. Must sign in/out and show valid identification. Must be accompanied by a ITS Data Center Operations Staff member at all times.
  7. Only the the following types of identification will be accepted for anyone seeking entry into the Data Center:
    • Current, valid driver’s license issued by a local, state, or federal agency.
    • Current, valid identification card issued by a local, state, or federal agency.
    • Current, valid military identification card.
    • Current, valid government issued passport or government issued passport card.
    • Current, valid facility issued identification card.
  8. There is no ‘tailgating’, i.e. you may not use your authorization to bring unauthorized individuals into the Data Center. All additional individuals need to be cleared at least 24 hrs prior to visit.
  9. Termination of access will occur when
    • Access is no longer needed to perform job functions
    • Personnel leave the employment of the URI