EasyManuals Logo
Home>Fujitsu>Server>M10 Series

Fujitsu M10 Series User Manual

Fujitsu M10 Series
136 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #122 background imageLoading...
Page #122 background image
104 C120-H007-08EN
CHAPTER 8 Security Actions
8.2.4 Burglary
Disasters caused by malicious acts, such as subversive activities, burglary, and
obstructive activities, require protection, because these acts are entirely unpredictable.
(1) Environmental maintenance
To keep unauthorized personnel away from the building or the computer room,
ideally, keep the spaces surrounding the building and the computer room clear of
obstacles for good visibility, and maintain a monitoring plan and alarms to detect any
trespassers immediately. In most situations, however, the detection of unauthorized
personnel is made difficult by the fact that buildings are located close to one another
with poor visibility and that general-purpose buildings are open to access by many
people. Thorough access management is required, including the reinforcement of
outside walls on the lower floors, the removal of windows from the lower floors, the
elimination of places where unauthorized personnel could hide, and patrols by guards.
(2) Access management
Have only one regular use door, and have full-time guards verify the identity and
belongings of persons entering and leaving the facility. When persons enter the
facility, issue badges to them to wear while they are in the facility and ensure that they
return the badges when they leave the facility. Visitors should be led to a meeting or
reception room for identification by the employee visited. Employees should wear a
distinct badge to distinguish themselves from visitors.
(3) Occupant identification
Access to designated zones, such as the computer room and the data storage room,
should be restricted to a pre-registered set of persons. Such access restrictions may be
maintained by using occupant identification equipment that works with magnetic
cards or similar. Identification equipment should, among other things, control the
opening and closing of the door, keep a record of the occupants, and issue alarms to
deny access to unauthorized personnel. One drawback is that more than one person
may enter or leave the room while the door is open once. To prevent this, double
checking the number of people using a photoelectric counter or the like is
recommended.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Fujitsu M10 Series and is the answer not in the manual?

Fujitsu M10 Series Specifications

General IconGeneral
BrandFujitsu
ModelM10 Series
CategoryServer
LanguageEnglish

Related product manuals