T 2.6 Unauthorised admission to rooms requiring protection

All rooms in which information requiring protection is stored or processed or in which devices requiring protection are operated are considered to be rooms requiring protection for this reason. Examples of these types of rooms are office rooms, but also archives in which data media and files are stored centrally. This also includes the technology distribution rooms containing central components such as power distributors, network switching elements, and servers.

Unauthorised persons can cause damage deliberately (e.g. through manipulation or vandalism), but also inadvertently due to human error (due to a lack of skills or the knowledge required, for example). Even when there is apparently no immediate damage, operations can still be disrupted if it is necessary to examine how such an event was possible or whether or not damage occurred or data or devices were manipulated.

Intruders could have, for example, reset passwords, accessed the servers directly, or manipulated active network components. In addition, they could have stolen or altered sensitive information stored on paper or on data media.

Not only the rooms on the company premises must be protected against unauthorised access, but also the rooms in private homes used for company purposes. Safeguards against burglary (e.g. lockable window handles, security locks, and locking bolts and safety glass on entry doors) are often not implemented in home workplaces due to the cost. This results in less protection against break-ins at the telecommuter workplaces than at the company or government agency.

Examples: