0% found this document useful (0 votes)
1K views2 pages

Data Center Access Log

This document contains visitor logs for two server rooms - DC1 in A Block and DC2 in G Block. The logs record the name of the key holder, non-key visitor and their purpose, date, time in and time out. Access to the server rooms requires prior written permission from either the Chief Technology Officer or General Manager stating the reasons for and estimated duration of the visit.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

Data Center Access Log

This document contains visitor logs for two server rooms - DC1 in A Block and DC2 in G Block. The logs record the name of the key holder, non-key visitor and their purpose, date, time in and time out. Access to the server rooms requires prior written permission from either the Chief Technology Officer or General Manager stating the reasons for and estimated duration of the visit.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

IT Server Rooms Visitor Entry Log

DC1 in A Block (Server Room)


Record of Entry
Name of Key Name of Non-Key Holder Non-Key
No. Key Holder
Holder and Purpose (*) Date Time In Time Out Holder
Signature
Signature

10

11

12

13

14

15

16

17

18

19

20

(*) A written request to either the Chief Technology Officer or the General Manager stating the reasons
for that access, the estimated time in and time out, and the purpose of the access is to be made, and
permission obtained before access.
IT Server Rooms Visitor Entry Log

DC2 in G Block (Server Room)


Record of Entry
Name of Key Name of Non-Key Holder Non-Key
No. Key Holder
Holder and Purpose (*) Date Time In Time Out Holder
Signature
Signature

10

11

12

13

14

15

16

17

18

19

20

(*) A written request to either the Chief Technology Officer or the General Manager stating the reasons
for that access, the estimated time in and time out, and the purpose of the access is to be made, and
permission obtained before access.

You might also like