Rooms where servers and other data storing and processing devices are located are protected against unauthorized access via independent protection systems.
Additionally access to all rooms is monitored by System Administrator who gives appropriate and temporary authorizations. It shall be highlighted that entry to Limited Access Zone demands the presence of two persons (guard and administrator) who desactivate separate alarm systems.