Facility Access Policy (OTR) |
||||
Article Number: 1349 | Rating: Unrated | Last Updated: Mon, Feb 11, 2019 at 2:13 PM
|
||||
Facility Access Policy (OTR)OverviewThis document outlines how colo clients can gain access to the Nexcess data center in Dearborn, Michigan (OTR). For additional information about Nexcess data center security and safety policies, refer to the DC Manual. Identification policyAll visitors are required to wear visible RFID access cards or visitor badges during their entire visit. Anyone using a temporary visitor badge to gain access must relinquish their badge at the end of their visit. Escort and shared spacesUnless noted otherwise in this document, team members are to escort visitors at all times when not in a shared space. Shared spaces are strictly defined as the lobby, bathrooms, and kitchen.. Access levelsClientClients are individuals with co-located equipment owned by the client and located in one or more Nexcess facilities. Clients have management-approved and assigned access cards that allow direct access to the facility. As long as they wear their access cards, they do not require escorts within the facility or sign in, although a Nexcess Team member will maintain line-of-sight with clients within the data center. Clients without access cards can only gain access by using the procedure provided in the “Visitor access” section below. VisitorVisitors are defined as anyone that does not have an access card. Visitors must carry temporary non-RFID black badges that do not operate any doors, and must be escorted at all times outside of shared spaces by a Nexcess team member or authorized access-card-carrying client. Client accessClients, as defined in the above “Access levels” section, may enter the OTR data center unimpeded. Clients may remove equipment only after the DCOps Team verifies the hardware’s colo ID tag and description match their records. Visitor accessThe procedure below applies to all individuals without RFID access cards.
At the end of the visit, the visitor signs out of the Guest Sign-In System, relinquishes the visitor’s badge, and exits through the main entrance. Guests of colo clientsClients’ guests are considered visitors and are therefore subject to the procedure provided in the “Visitor access” section above. They are also subject to all visitor policies within the DC Manual, and visitors under the age of 18 are not permitted. Clients should schedule their visits whenever possible, though exceptions are permissible. The procedure to do so is as follows: Attention: Unannounced guests are denied access until the Nexcess team calls the Superuser on the account, who must provide both verbal authorization and written authorization within a ticket.
Revision HistoryFor 24-hour assistance any day of the year, contact our Support Team by email or through the Client Portal. |
||||
| ||||
Attachments
![]() There are no attachments for this article.
| ||||
How to flush Redis
Added on Fri, Jan 4, 2019
Colocation Access Card Request Form
Added on Tue, Oct 6, 2015
How to find a development partner
Added on Mon, Feb 11, 2019
How to request and revoke facility access (MEL, TMR)
Added on Wed, Feb 28, 2018
What is SOAP?
Added on Tue, Jan 6, 2015
How to decompress files in gzip
Added on Tue, Jan 6, 2015
What is Git?
Added on Mon, Sep 15, 2014
How to change SSH passwords from the CLI
Added on Thu, Feb 8, 2018
What is the DMCA?
Added on Mon, Feb 11, 2019
How to transfer domains
Added on Wed, Nov 23, 2016
|
|
|