TSP Door Lock Management - Bandung Office
Objective
To establish a standardized process for managing user access to the Bandung Office’s door lock system, including card and fingerprint registration and termination. Users are required to sign the Security Access Acknowledgment Form upon registration and again upon leaving the company. Additionally, the policy provides a procedure for requesting door lock logs for security and auditing purposes.
Scope
This policy applies to all authorized personnel responsible for managing user access to the door lock system, users registering their card and fingerprint, and the process of signing and verifying the Security Access Acknowledgement Form.
Procedure
1. User Access Management
A. Only authorized personnel are permitted to manage user access to the door lock system.
B. New users’ access can be added through card and fingerprint registration.
C. To register a new card:
- Obtain the new user’s card.
- Access the door lock system interface.
- Input the necessary user details and associate the card with the user.
D. To register a new fingerprint:
- Ensure the user is present.
- Access the door lock system interface.
- Capture and register the user’s fingerprint.
E. Upon card and fingerprint registration, users must sign the Security Access Acknowledgment Form (Appendix A) , acknowledging their understanding of the security measures and responsibilities associated with access.
F. Authorized personnel are responsible for terminating access for users who no longer require entry. This includes removing associated cards and fingerprints.
2. Door Lock Logs Request
A. Requester is to complete the Door Lock Logs Request Form (Appendix B) , specifying the purpose of the request and the date and time range for the required logs.
B. Requester is to send the completed form to the IT Operations team via email it_support@thesoftwarepractice.com. The IT Operations team will seek approval from The Management.
C. The management will review the request for validity and compliance with organizational policies.
D. Approved requests are to be processed by the IT Operations team responsible for managing door lock logs. The door lock log is then verified by the IT Operations team to ensure accuracy.
E. The requester is granted access to the secured storage of the requested door lock logs for viewing and analysis purposes.
F. The requester is responsible for ensuring the privacy of individuals not relevant to the investigation during access and analysis.
G. If the logs reveal pertinent information, the requester is required to provide a detailed report to be sent to email operations@thesoftwarepractice.com within 2 weeks after the door lock log is granted to the requester.