Access Control System - 30.05.2024
Access Control System - 30.05.2024
Date: 31.05.2024
Page | 2
INDEX
13, 14,
5 Access Control System Compliance Document.
15,16,17
Action Plan: - Shifting of Existing CCTV Monitoring System from Data Centre to
the dedicated room at first floor as per MOI.
As per CEO’s directive, to enhance efficiency and centralize operations of CCTV and Access
control system within the Administration department, please find the proposal encompassing an
action plan, cost estimate, scope of work, and related details for your review and approval. The
administration will assume full responsibility for managing both the CCTV system and access
control system in alignment with Ministry of Interior guidelines.
Responsible
Sl.
Description Unit/ Service
No.
Provider
Preparation Phase
Admin and
● Review existing CCTV system layout and requirements. CCTV Service
1 Provider
● Determine the new location and layout for the CCTV
(with the
equipment room.
support of IT
● Procure necessary materials and equipment for the shifting team)
process.
3
● Configure UPS units according to MOI requirements for
Admin and
● Plan the network layout and configuration for the CCTV and
CCTV MOI
4 access control systems in the proposed equipment room.
approved
● Inventory all switches and Network Video Recorders Service
equipment room.
5 obstacles.
(with the
● Use appropriate cable management techniques to organize support of IT
and secure the data cables along the route. team)
7 CCTV Service
● Verify backup system functionality by running tests. Provider
Supply building layout drawings for the 1st and 10th floors,
indicating the placement of CCTV systems for reference and
planning.
Grant access to the Server Room & 10th Floor IT room for
the removal of the existing CCTV System in the presence of
IT staff, ensuring a smooth transition.
floor NVR.
approval.
9
● Saturday full day from Morning 9 Am to 6 Pm (Testing &
Commissioning) IT Team
Cost Formal
proposal shall
10
● AED: 15,000.00 Approximately obtain once
the proposal
approved
1. Introduction
This document outlines the process for managing, accessing, and ensuring the security and
compliance of the Closed-Circuit Television (CCTV) system within our organization. The
admin department is designated as the system owner, responsible for overseeing the operation
and security of the CCTV system.
Our CCTV system operates within the legal framework established by UAE data privacy laws
and Ministry of Interior (MOI) guidelines. Restricting access protects sensitive data and ensures
compliance with these regulations.
Page | 8
● Authorized Personnel Only: Access to the CCTV system is strictly limited to authorized
personnel within the admin department, as per UAE laws and MOI regulations.
● Third-Party Access: Third-party access is strictly prohibited except in exceptional
circumstances. This requires explicit written authorization from designated authorities
for specific purposes and under strict supervision.
● Dedicated Room: The CCTV system shall be housed in a dedicated, secure room with
restricted access to prevent unauthorized entry.
● Uninterruptible Power Supply (UPS): A dedicated UPS will ensure uninterrupted power
supply for the CCTV system, guaranteeing continuous surveillance operations.
3. Data Security
3.1 Data Encryption: All CCTV data will be encrypted at rest and in transit to protect against
unauthorized access or interception.
The CCTV vendor will be responsible for all maintenance and backup activities as outlined in a
Service Level Agreement (SLA). The SLA will specify:
● Response Times: Defines how quickly the vendor must respond to maintenance
requests and system outages.
● Specific Services: Clearly details the specific maintenance and backup services included in
the agreement.
Page | 9
5. Network Uptime
The admin department will collaborate with the IT department (or network administrators) to
ensure network stability and address any issues that may affect CCTV system performance.
5.2 Responsibilities:
6. Data Retention
CCTV footage will be retained for a period of 30 days in accordance with UAE data privacy
laws and organizational policies.
Requests for authorized access to CCTV footage will be handled according to a defined
procedure, complying with UAE data privacy regulations.
8. Training
Authorized personnel using the CCTV system will receive training on proper operation
procedures and data privacy regulations. This ensures proper handling of the system and
compliance with regulations.
9. Conclusion
1. Restricted Access to Data Center for CCTV System Daily Health Checkup:
The current setup limits access to the data center, making it challenging for the admin
team to perform daily health checks on the CCTV system.
3. Data Backup Issues: There are recurring issues with data backup, including instances
of backup corruption, which compromise the integrity and reliability of the CCTV
footage.
5. Delay/Lag in Real Time Streaming: There are significant delays and lags in real time
streaming of CCTV footage, attributed to hard disk issues, which hinder effective
monitoring.
6. 10th Floor New Office 1003 Cameras Not configured: The new cameras
installed in the 10thfloor office (room 1003) have not yet been configured in the
Network Video Recorder (NVR) located on the 1st floor.
7. Need for Configuration and ADMCC Approval: The new cameras in the
10thfloor office (room 1003) need to be configured in the 1stfloor NVR and obtain
approval from the ADMCC to ensure compliance and functionality.
As per CEO’s directive, to enhance efficiency and centralize operations of access control
systems within the Administration department, please find the proposal encompassing an action
plan, cost estimate, scope of work, and related details for your review and approval. The
administration will assume full responsibility for managing the Access Control System.
Page | 12
Responsible
Sl. No. Description Unit/Service
Provider
requirements.
maintenance.
IT Dept Scope
Introduction
This document outlines the procedures and responsibilities for accessing and maintaining the
access control system in Siraj Finance.
Scope
The scope of this document encompasses the collective responsibilities of all stakeholders
involved in ensuring the smooth operation and effective management of the access control
system within the organization. The IT Department is tasked with maintaining the technical
infrastructure supporting the system, conducting regular backups, and monitoring uptime, while
also tracking administrative activities and conducting annual audits. As the system owner, the
Admin Department manages Matrix user access, documents changes, and ensures compliance
with policies, collaborating closely with the HR Department to process access requests and
adjustments. The HR Department provides employee details for access management, initiates
access requests, and ensures terminated employees lose system access during audits. Together,
these stakeholders work collaboratively to uphold security, compliance, and operational
efficiency in access control management.
Responsibilities
Page | 15
Admin Department
● Track and document all changes made to the access control system.
● Communicate with HR regarding new hires and terminations for access adjustments.
HR Department
● Collaborate with the Admin Department to ensure access adjustments are made
IT Department
● Maintain only the server and network infrastructure for the access control system.
● Provide necessary remote access to the admin team to manage the access control
● Conduct quarterly audits to review access to the management software and the
servers.
● Submit a formal access request to the Admin Department for new employees or
● Submit a request to the admin team for any changes in employee status so they can
● Use the Access Request Form (Approval workflow system) to submit requests to the
Review Requests:
Grant Access:
● Add new employees to the access control system based on their shift hours.
● Update the access control system to reflect any changes in employee status (e.g.,
● Monitor the server and network to ensure they are functioning correctly.
● Send email notifications to the Admin Manager/All stakeholders for any critical updates
or issues.
● All maintenance should be based on prior approval from the system owners (ADMIN
● Implement and execute security audits on servers and matrix software. Server event
audits should be implemented at the domain level, and a password policy should be in
Page | 18
place to ensure enhanced security for the system (For example. Strong Passwords,
Password Expiry every 180 days etc.)
● All the above needs to be implemented as a separate Security Audit & Change
● Log all changes made to the access control system. (Servers, Network and data
backups)
● All maintenance activities or planned downtimes related to servers and Matrix software
must be conducted with prior approval from the respective system owners.
● Document the audit findings and submit them to the system owner (Admin Manager)
for review.
● The IT manager is responsible for submitting system-level audit reports to the Admin
● The HR team must ensure that any terminated or resigned employees do not retain
Compliance
All stakeholders must adhere to the procedures outlined in this document to ensure the
security and integrity of the access control system. Noncompliance will be addressed according
to the company’s IT security policy.
Page | 20
Inadequate access
Lack of door access privileges for controls Assign access privileges based on
entry and exit compromising roles and responsibilities
security
Incomplete device
Certain devices not appearing in the
visibility impacting Needs be to be added in
software device list i.e. Data center
monitoring and Matrix Software
IT Room and IT staff (10th Floor)
management
Page | 22
Recommendati
Name Position Date Signature
ons & Approvals
Chief Operating
Amjad Hijazi 30.05.2024
Officer
Reviewed By Chief
Fazal Mohamed Governance
30.05.2024
Nassim and Compliance
Officer