Page:of 4 50% 300% Automatic Zoom 75% 400% 100% Actual Size 125% Page Fit 150% Page Width 200% Reprinted with permission of the eRiskHub® and the author(s). All rights reserved. Copyright belongs to the author(s). DISCLAIMER: This template is prov ided as general information for the consideration in drafting a custom policy on the subject matter described herein. The information is not intended to serve as legal advice nor is there any warranty that use of such a template will satisfy any legal obligations y ou or your company may have. This templat e is provided “as is” without any representations or warranties, express or implied. Faruki Ireland and Cox P.L.L. makes no representations or warranties in relation to the legal information in this template . Do not rely on the information in this templat e as an alternative to legal advice from your attorney or other legal services provider. If you have any specific questions about any legal matter you should consu lt your attorney or other legal services provider. The following is a template designed to assist in the policy development governing the protection of company computer systems and assets. As with all templates, this document provides a basic framework for the broad topics for consideration. Footnotes pr ovide prompts for other general considerations and points for discussion. Each organization has unique risks and considerations that necessarily require customization. For more information, contact Ron Raether or Scot Ganow at (937) 227 3733 or rraether@ficlaw.com and sganow@ficlaw.com . Physical Security Policy (Template) Purpose The purpose of this policy is to provide a safe and secure working environment and promote t he protection of our assets. We must maintain the security of our confidential information (such as Company Sensitive Information and personally identifiable information (“PII”) ), as well as the information shared with us by our customers and COMPANY Cons ultants. We strive to maintain customer friendly procedures to ensure only authorized employees, administrative consultants, contractors, and visitors have access to our facilities. Scope This policy applies to the physical areas where information assets are kept. These areas include server rooms, telecom closets and certain office areas that may contain Company Sensitive Information or PII 1 . These areas must be physically secured to prevent theft, tampering or tapping, or damage. Policy Facility Access Control It is every employee’s responsibility to work toward, maintain and preserve a secure physical work environment. 1 As with all information privacy and security related policies, it is important that protected information be properly defined at the data element level to ensure consistent, compliant handling throughout the company. Supervisors are responsible for ensuring that proper building security practices are maintained and that their employees follow access control policies and procedures. The Human Resources Department (“Human Resources”) 2 will authorize the issuance of badges ( COMPANY photo badge) to new employees granting them appropriate facility access beginning on the date of hire. Employees shall wea r their issued badges at all time while on COMPANY premises. The Loss Prevention Department (“Loss Prevention”) is responsible for printing and activating all badges and providing them to the employees or long term contractors. Security officers are resp onsible for providing visitor badges. All employees are to enter the building at the facility’s designated employee entrance. At termination, all employees must return their badges to their supervisor. At termination, it is the supervisor’s responsibility to retrieve the badge from the terminated employee and return it to Loss Prevention for deactivation and shredding. Loss Prevention develops and maintains procedures to follow when employees forget or lose their badges. Loss Prevention develops and mainta ins a vis i tor sign in procedure. No individual will be permitted to access our facilities beyond the main reception area without an appropriate badge worn visibly . Loss Prevention is responsible for developing procedures to control the use and disseminatio n of building keys. Lost and stolen keys must be reported to Loss Prevention immediately. Effective Building Security Effective building security is possible through the cooperative efforts of Loss Prevention, Facilities Management and the building’s occ upants. The following rules apply: Keys and badges are not to be left unattended in plain view or carried in a way that makes them easy to lose or be stolen. 2 As with all policies and implementation, all departments should be involved in finalizing any polic y to ensure existing policies are complimentary and that operational compliance is possible.