Common use of Site Controls Clause in Contracts

Site Controls. On-site Data Center Security Operation. Google’s data centers maintain an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor closed circuit TV (CCTV) cameras and all alarm systems. On-site security operation personnel perform internal and external Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors On-site Data Center Security Devices. Google’s data centers employ an electronic card key and biometric access control system that is linked to a system alarm. The access control system monitors and records each individual’s electronic card key and when they access

Appears in 1 contract

Sources: Data Processing and Security Terms

Site Controls. On-site Data Center Security Operation. Google’s data centers maintain an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor closed circuit TV (CCTV) cameras and all alarm systems. On-site security operation personnel perform internal and external patrols of the data center regularly. Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors On-site Data Center Security Devicesare allowed entry to the data centers. Google’s data centers employ an Only authorized employees and contractors are permitted to request electronic card key and biometric access control system that is linked to a system alarmthese facilities. The access control system monitors and records each individual’s Data center electronic card key access requests must be made through e-mail, and when require the approval of the ▇▇▇▇▇▇▇▇▇’s manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they accesswish to visit;

Appears in 1 contract

Sources: G Cloud 13 Terms of Service

Site Controls. On-site Data Center Security Operation. Google’s data centers maintain an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor closed circuit TV (CCTV) cameras and all alarm systems. On-site security operation personnel perform internal and external patrols of the data center regularly. Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors On-site Data Center Security Devicesare allowed entry to the data centers. Google’s data centers employ an Only authorized employees and contractors are permitted to request electronic card key and biometric access control system that is linked to a system alarmthese facilities. The access control system monitors and records each individual’s Data center electronic card key access requests must be made through e-mail, and when they accessrequire the approval of the requestor’s manager and the data center director. All other entrants requiring temporary data center access must:

Appears in 1 contract

Sources: Data Processing Amendment