This contract document is also included in the discounted Proposal Kit Professional bundle. Order and download for $199.
Data Center Physical Access Policy is an agreement between the data center owner and individual employees of customers who will be accessing the physical site of the data center. It covers rules of conduct, restrictions, and operating procedures. This is similar to the Data Center Access and Security Policy for companies; however, this version is to be signed by each individual entering the data center.
Document Length: 5 Pages
Business proposal example Trust me,

the days of handshakes are over, and you must protect yourself. I know this first hand for a fact. Sixteen (16) years in the business of dealing with legal matters tells me everyone doing any business should have this in their system just as they have spell check and a thesaurus."

Private Investigator, Author, Web Developer
John Krause
The actual document is delivered in the retail products as an editable template.
Produced by:
Proposal Kit
Category:
Software > Computer Software > Business & Productivity Software
Price:
$199 USD
 
 
Proposal Kit reviews4.9 stars, based on over 700 reviews
Related documents may be used in conjunction with this document depending on your situation. Many related documents are intended for use as part of a contract management system.

Related Documents:
Data Center Physical Access Policy and Agreement
Disclaimers: Proposal Kit, Inc. makes no warranty and accepts no responsibility for suitability of any materials to licensees business. Proposal Kit, Inc. assumes no responsibility or liability for errors or inaccuracies. Licensee accepts all responsibility for results obtained. Information included is not legal advice. Use of any supplied materials constitutes acceptance and understanding of these disclaimers.

Writing the Data Center Physical Access Policy and Agreement document

company name DATA CENTER PHYSICAL ACCESS POLICY THIS AGREEMENT is made on this current day day of current month current year between contract first name contract last name hereafter referred to as the Undersigned or Customer and company name hereafter referred to as Company The purpose of this policy is to set forth the company name Data Center Physical Access Policy DCPAP or Access Policy by which the undersigned will abide while using renting leasing or otherwise making use of Company facilities goods and services Data Center or Contracted Spaces By using Companys Data Center and facilities the undersigned agrees to comply with the following policies. Terms and Conditions As service the standard Data Center Access and Security Policy is provided below.

1. Company and Customer Responsibility. Company is responsible for ensuring that all resources under its control remain physically secure. The Company maintains this access policy to provide framework for Customers to follow for physical security and access to Company facilities and to instruct Customers on the procedures and policies that Company staff and technicians follow. Undersigned agrees to adhere to all posted notices or changes to protocol that the Company makes the Undersigned aware of during its visits to Company facilities. 2. Data Center Habits and Hygiene. Access into Company facilities requires adherence to the following protocols and restrictions on dangerous materials dangerous materials * No smoking or chewing tobacco is allowed.

* No combustible materials may be brought into the data center including lighters hand warmers mace tear gas aerosol cans or compressed air. * No eating or drinking is allowed in the data center. * No drugs or alcohol are permitted in the data center. * No weapons or firearms are allowed in the data center. * No external fire suppression devices are allowed.

* No prohibited hardware is allowed. Insert descriptions into your Contract rather than blanket statement here. * All work related materials must be cleaned up before leaving. * All work related trash or garbage must be disposed of properly. * No illegal activity of any kind is permitted. * Insert Data Center specific policies here recycle bins unattended equipment etc. 3. Access Keycards and Identification.

Company will issue identification badges and access keycards to Undersigned and Undersigneds designated agent s. Company shall maintain list of all authorized personnel issued such access and at no time shall identification badges or access keycards transfer between any other employee or other agent of the Undersigned without pre approved written permission from Company. If at any time Company becomes aware that an access badge has been transferred in violation of this policy revocation of access to the Data Center and contracted space may occur. 4. Data Center Access Procedures. Access to the Company Data Center is gained through the Data Center welcome room or Insert specific manned space here and requires that all Customers sign in with valid signature for Company staff member to grant them access. Customers wishing access must have their identification badge and access keycard available for inspection. Undersigned or Undersigneds Agent will sign in and provide the time of entry to the Data Center and the purpose for their visit. Exit from the Data Center requires that Undersigned or Undersigneds agents sign out with valid signature for each Undersigned or Undersigneds Agent wishing to leave. At no time will Company staff member be authorized to allow exit without each Undersigned or Undersigneds Agent properly signing out from the Data Center. If at any time an Undersigned or Undersigneds agent is allowed by staff member to exit the Undersigned or Undersigneds Agent should immediately demand to sign out of the Data Center and or ask to see Company supervisor. Failure to adhere to the sign in and sign out procedures could result in revocation of access to the space. 4 Visitor Physical Access and Procedures.

Visitor shall mean any individual who is not on an approved Access List on file with the Data Center. All visitors shall enter the Data Center through the Data Center Welcome Room and wait for Staff Member to sign the visitor in. The Undersigned may allow Visitors to gain access to the Data Center subject to the Undersigneds Access Type provided that. 1. All visitors must have their visit scheduled and approved by the Company Data Center Supervisor at least business hours prior to their visit. 2. All visitors shall sign copy of the Data Center Access and Security Policy DCPAP to be kept on file by the Data Center and shall be governed according to the Specifications of the Data Center Contract or Co location Contract between Company and Undersigned. 3. Data Center Employee or Staff Member must accompany Visitor at all times while within the Data Center. 4. All visitors must sign in and sign out when entering or exiting the Data Center. Visitors must wear an identification badge at all times. 5. Upon sign out and exiting the data center visitors are responsible for turning in any identification badges or ID issued to them during their visit. Failure to properly turn in these materials may result in financial penalties or sanctions against Undersigned or Visitor.

6. Any exceptions to any of the above policies must have the written approval of the Data Center Supervisor. 4 Disclosure of Security Access or other Policies Governing the Security of the Data Center. All persons entering the Data Center whether the Undersigned its Agents Employees Vendors or Visitors agree to hold all Proprietary Information including all information related to the security operation policies procedures or any other information they may come in contact with regarding the Data Center in the strictest of confidence and to take the same degree of care to protect such information as they do with their own Proprietary Information. No less than reasonable care shall be maintained by the Undersigned or its agents. Undersigned agrees not to disclose or use any such Proprietary Information or any information derived from Data Center contact to any firm supplier business individual third party or other organization. 5. Data Center Access Types.

For our customers convenience the Company maintains several types of access to the Data Center. Access levels include. 5 Unrestricted Access to All Contracted Space Insert Access Description 5 Restricted Access to Specific Contracted Space Insert Access Description 5 Escorted Access to Contracted Space Insert Access Description The level of access shall be determined and maintained by the Company and Customer according to the Specifications of the Data Center Contract or Co location Contract between Company and Customer.

6. Emergency Access by Personnel Not Currently on Access Lists. Access by Undersigned or Undersigneds Agents not currently on any access lists may be granted only by the Company Data Center supervisor and shall be governed according to the Specifications of the Data Center Contract or Co location Contract between Company and Customer. Access to the Data Center under this condition shall be noted as an emergency access in the Data Center security logs. Any inappropriate use of emergency access may result in access being immediately denied and the requesting Undersigned or Undersigneds Agent being ejected from the Data Center and or Customers emergency access privileges revoked. 7. Modification of Agreement. Company reserves the right to add modify or delete any provision of this Agreement at any time and without notice. Company reserves the right to restrict any access right at any time whether violation of this agreement occurs or not. Company reserves the exclusive right and will be the sole arbiter as to what constitutes violation of any of these provisions. 8. Potentially Tortuous or Illegal Conduct. The following shall be construed as violations of this Agreement and may result in suspension or deletion of Customers account or in termination of this Agreement. a Falsifying any information provided to Company or to other staff members in connection with access to the data center or the use of Company facility product or service. b Allowing access to any restricted area by individual or allowing individuals to gain access to any restricted areas as defined in the Specifications of the Data Center Contract or Co location Contract between Company and Customer. c Allowing any dangerous or restricted materials inside the data center or Company facilities at any time.

9. Data Center System and Network Security. Violations of Data Center system or network security are strictly prohibited and may result in criminal or civil liability. Examples include but are not limited to. allowing unauthorized access to data center; use of any Company product or service that Customer does not have permission to use; use of any equipment hardware connections or other materials that Customer does not have permission to use; disruption or interference with the connectivity and access or otherwise impeding other Customers use of the Company Data Center products or services. 10. Consequences of Violation. If Company becomes aware of an alleged violation of any of the terms contained in this Agreement or any other policy that has been posted on its web site made available to Customer via email or posted in any other form Company shall initiate an investigation. During the investigation Company may restrict Customers access to the Data Center or other Company products and services to prevent further possible unauthorized activity. Company may at its sole discretion restrict suspend or terminate Customers account without notice or refund or pursue civil remedies as it deems necessary. Company shall notify the appropriate law enforcement department of any such violations. Company shall not be responsible for any payment refunds or compensation in any way for service disruptions or termination resulting from violations of this Agreement. The Undersigned represents and warrants that on the date first written above the Undersigned is authorized to enter into this Agreement in its entirety and duly binds its respective principals by the signature below. EXECUTED as of the date first written above. contract first name contract last name

By signator authorized signature or signer. Job title of signator authorized signature or signer. Date when the contact was signed Undersigned Initials

Writing the Data Center Access and Security Policy Template document (alternate or related contract document)

DATA CENTER ACCESS AND SECURITY POLICY DCASP THIS AGREEMENT is made this current day day of current month current year by and between company name hereafter referred to as Customer and company name hereafter referred to as Company The purpose of this policy is to set forth Data Center Access and Security Policy DCASP or Access Policy by which Customer will abide while using renting leasing or otherwise making use of Company facilities goods and services Data Center or Contracted Spaces By using Companys Data Center and facilities Customer agrees to comply with the following policies and assume responsibility for the compliance of all policies by Customer and Customers Agents. Terms and Conditions As service the standard Data Center Access and Security Policy is provided below.

1. Company and Customer Responsibility. Company is responsible for ensuring that the security of all resources under its control remains physically secure. The Company maintains this access policy in order to provide framework for Customers to follow for physical security and access to Company facilities and to instruct Customers on the procedures and policies that Company staff and technicians follow. Customer agrees to adhere to all posted notices or changes to protocol that the Company makes the Customer aware of during its visits to Company facilities. 2. Data Center Habits and Hygiene. Access into Company facilities requires adherence to the following protocols and restrictions on dangerous materials dangerous materials * No smoking or chewing tobacco is allowed. * No combustible materials may be brought into the data center including lighters hand warmers mace tear gas aerosol cans or compressed air. * No eating or drinking is allowed in the data center. * No drugs or alcohol are permitted in the data center. * No weapons or firearms are allowed in the data center.

* No external fire suppression devices are allowed. * No prohibited hardware allowed Insert descriptions into your Contract rather than blanket statement here. * All work related materials must be cleaned up before leaving. * All work related trash or garbage must be disposed of properly. * No illegal activity of any kind is permitted. * Insert Data Center specific policies here recycle bins unattended equipment etc.

3. Access Keycards and Identification. Company will issue identification badges and access keycards to Customer and Customers designated agent s. Company shall maintain list of all authorized personal issued such access and at no time shall identification badges or access keycards transfer between any other employee or other agent of the Customer without pre approved written permission from Company. If at any time Company becomes aware that an access badge has been transferred in violation of this policy revocation of access to the Data Center and contracted space may occur. 4. Data Center Access Procedures. Access to the Company Data Center is gained through the Data Center welcome room or Insert specific manned space here and requires that all Customers sign in with valid signature in order for Company staff member to grant them access. Customers wishing access must have their identification badge and access keycard available for inspection. Customer or Customers Agent will sign in and provide the time of entry to the Data Center and the purpose for their visit. Exit from the Data Center requires that Customer or Customers agents sign out with valid signature for each Customer or Customers Agent wishing to leave. At no time will Company staff member be authorized to allow exit without each Customer or Customers Agent properly signing out from the Data Center. If at any time Customer or Customers agent is allowed by staff member to exit the Customer or Customers Agent should immediately demand to sign out of the Data Center and or ask to see Company supervisor.

Failure to adhere to the sign in and sign out procedures could result in revocation of access to the space. 5. Data Center Access Types. For our customers convenience the Company maintains several types of access to the Data Center. Access levels include. 5 Unrestricted Access to All Contracted Space Insert Access Description 5 Restricted Access to Specific Contracted Space Insert Access Description

5 Escorted Access to Contracted Space Insert Access Description The level of access shall be determined and maintained by the Company and Customer according to the Specifications of the Data Center Contract or Co location Contract between Company and Customer. 6. Emergency Access by Personnel Not Currently on Access Lists. Access by Customer or Customers Agents not currently on any access lists may only be granted by the Company Data Center supervisor and shall be governed according to the Specifications of the Data Center Contract or Co location Contract between Company and Customer. Access to the Data Center under this condition shall be noted as an emergency access in the Data Center security logs. Any inappropriate use of emergency access may result in access being immediately denied and the requesting Customer or Customers Agent being ejected from the Data Center and or Customers emergency access privileges revoked. 7. Modification of Agreement. Company reserves the right to add modify or delete any provision of this Agreement at any time and without notice. Company reserves the right to restrict any access right at any time whether violation of this agreement occurs or not. Company reserves the exclusive right and will be the sole arbiter as to what constitutes violation of any of these provisions.

8. Potentially Tortuous or Illegal Conduct. The following shall be construed as violations of this Agreement and may result in suspension or deletion of Customers account or in termination of this Agreement. a Falsifying any information provided to Company or to other staff members in connection with access to the data center or the use of Company facility product or service. b Allowing access to any restricted area by individual or allowing individuals to gain access to any restricted areas as defined in the Specifications of the Data Center Contract or Co location Contract between Company and Customer. c Allowing any dangerous or restricted materials inside the data center or Company facilities at any time.

9. Data Center System and Network Security. Violations of Data Center system or network security are strictly prohibited and may result in criminal or civil liability. Examples include but are not limited to. allowing unauthorized access to data center use of any Company product or service that Customer does not have permission to use use of any equipment hardware connections or other materials that Customer does not have permission to use disruption or interference with the connectivity and access or otherwise impeding other Customers use of the Company Data Center products or services. 10. Consequences of Violation. If Company becomes aware of an alleged violation of any of the terms contained in this Agreement or any other policy that has been posted on its web site made available to Customer via email or posted in any other form Company shall initiate an investigation. During the investigation Company may restrict Customers access to the Data Center or other Company products and services in order to prevent further possible unauthorized activity. Company may at its sole discretion restrict suspend or terminate Customers account without notice or refund or pursue civil remedies as it deems necessary. Company shall notify the appropriate law enforcement department of any such violations. Company shall not be responsible for any payment refunds or compensation in any way for service disruptions or termination resulting from violations of this Agreement. The undersigned represents and warrants that on the date first written above the undersigned is authorized to enter into this Agreement in its entirety and duly binds respective principals by the signature below. EXECUTED as of the date first written above. company name By signator authorized signature or signer.

Job title of signator authorized signature or signer. Date when the contact was signed Customer Initials

How to write my Subcontractor Short Form Contract document (example of another included contract document)

SUBCONTRACTOR AGREEMENT This Consulting Agreement the Agreement is made this current day day of current month current year by and between company name state or province company hereafter Company and company name hereafter Subcontractor Recitals A. Company is in need of assistance in the following areas for company name client of Companys. Insert areas in need of assistance with. B. Subcontractor has agreed to perform work for Company on this project. Agreements

In consideration of the mutual covenants set forth in this Agreement Company and Subcontractor hereby agree as follows. 1. Specifications. Subcontractor shall be available and shall provide the following efforts and services as requested. Insert description of services to be provided. 2. Compensation. Company will compensate Subcontractor on the following basis. hourly rate flat fee commission other hourly rate

if hourly rate include the following. Subcontractor will submit written signed reports of the time spent performing services under this Agreement itemizing in reasonable detail the date on which services were performed the number of hours spent on such date and brief description of the services rendered. Company will receive reports no less than once per month on or before the first day of each month and the total amount of work will not exceed Insert Maximum Amount of Work Company shall pay Subcontractor all amounts due within days after such reports are received. Company will pay Subcontractor for the following expenses incurred under this Agreement. Insert description of acceptable contractor expenses. Subcontractor shall submit written documentation and receipts itemizing the date on which such expenses were incurred. Company shall pay Subcontractor all amounts due within days after such reports are received.

3. Independent Contractor. Nothing herein shall be construed to create an employer employee relationship between the parties. The consideration set forth above shall be the sole payment due to Subcontractor for services rendered. It is understood that Company will not withhold any amounts for payment of taxes from the compensation of Subcontractor and that Subcontractor will be solely responsible to pay all applicable taxes from said payment including payments owed to its employees and subagents. 4. Insurance. Subcontractor will carry general liability automobile liability workers compensation and employers liability insurance in the amount of Insert Liability Coverage Amount In the event Subcontractor fails to carry such insurance or such insurance coverage lapses while this Agreement is in effect Subcontractor shall indemnify and hold harmless Company its agents and employees from and against any such damages claims and expenses arising out of or resulting from work conducted by Subcontractor and its agents or employees. 5. Standards. All work will be done in competent manner in accordance with applicable standards of the profession and any specific requirements of Company contracts with clients and all services are subject to final approval prior to Companys payment. 6. Warranties.

Subcontractor shall make no representations warranties or commitments binding Company without Companys prior written consent. 7. Confidentiality. In the course of performing services the parties recognize that Subcontractor may come in contact with or become familiar with information which Company or its clients may consider confidential. This information may include but not limited to information pertaining to design methods pricing information or work methods of Company as well as information provided by clients of Company for inclusion in work to be developed for clients which may be of value to competitors of Company or its clients. Subcontractor agrees to keep all such information confidential and not to discuss what evolved any of it to anyone other than appropriate Company personnel or their delegates. The parties agree that in the event of breach of this Agreement damages may be difficult to ascertain or prove. The parties therefore agree that if Client breaches this Agreement Company shall be entitled to seek relief from court of competent jurisdiction including injunctive relief and shall be entitled to an award of liquidated damages in the amount of Insert Liquidation Dollar Amount 8. Term of Agreement. This Agreement shall begin on start date and shall terminate on end date unless terminated for any reason by either party upon thirty days prior written notice.

9. Communication. Any notice or communication permitted or required by this Agreement shall be deemed effective when personally delivered or deposited postage prepaid by first class regular mail addressed to the other partys last known address. 10. Entire Agreement. This Agreement constitutes the entire agreement of the parties with regard to the subject matter hereof and replaces and supersedes all other agreements or understanding whether written or oral. No amendment extension or change of the Agreement shall be binding unless it is in writing and signed by all of the parties hereto. 11. Binding Effect. This Agreement shall be binding upon and shall inure to the benefit of Company and to Companys successors and assigns. Nothing in this Agreement shall be construed to permit the assignment by Subcontractor of any of its rights or obligations hereunder to any third party without Companys prior written consent. 12. Ownership Rights.

All plans ideas improvements or inventions developed by Subcontractor during the term of this Agreement shall belong to Company and or its clients for whom work is being performed by subcontractor. Subcontractor shall however retain the right to display works he creates for Company in their portfolio subject to Companys written approval in advance said approval not to be unreasonably withheld. 13. Non compete. Subcontractor agrees to not perform business for or solicit business from Client for period of two years the date this Agreement is terminated without written permission from Company. 14. Governing Law. This Agreement shall be governed by and construed in accordance with the laws of the State of state or province. Exclusive jurisdiction and venue shall be in the county County state or province Superior Court. The prevailing party shall be entitled to recover its reasonable attorney fees and statutory costs. To any portion of this Agreement declared unenforceable that portion shall be construed to give it the maximum effect possible and the remainder of this Agreement shall continue in full force and effect. Each party represents and warrants that on the date first written above they are authorized to enter into this Agreement in entirety and duly bind their respective principals by their signature below.

EXECUTED as of the date first written above. company name By signator authorized signature or signer. Job title of signator authorized signature or signer. Date when the contact was signed company name By signator authorized signature or signer. Job title of signator authorized signature or signer.

Date when the contact was signed Company Initials Subcontractor Initials

A Document from Contract Pack

The editable Data Center Physical Access Policy and Agreement template - complete with the actual formatting and layout is available in the retail Contract Packs.
Proposal Kit on BBB
Proposal Kit
Proposal Kit on FaceBook
Create winning business proposals & contracts with minimal effort and cost. Downloadable proposal software, proposal templates, legal contracts and sample proposals.
© 1997 - 2018, Proposal Kit, Inc. All rights reserved.
Proposal Kit

Create winning business proposals & contracts with minimal effort and cost. Proposal software, proposal templates, legal contracts and sample proposals.