Lunr Management Model and Employee Handbook
  • 👋Welcome to LUNR!
  • About us
    • 🚀Vision, Mission & Focus
      • Vision
      • Mission
      • Pillars
  • How We Make Decisions
    • 🚀Strategy
      • Context, not control
      • Strategic management
      • Culture code
    • 🏹Leadership
      • Managers
      • Tech leads
      • Traits of leadership
      • Leaders Performance
    • 👭Team management
      • Team Structure Designed for Success
      • Embracing Effective Ceremonies
      • Strategic Sessions: Empowering Innovation
  • How we build processes and a great product
    • ⚙️Operations and roles
      • How We Navigate Growth and Complexity
      • Our Responsibility Assignment Matrixes: RACI & CODE-KS
    • 📚Knowledge management
      • Knowledge Categories
      • Knowledge Accountability Index
      • Confluence
      • Learning day
      • Company Knowledge Centricity Level
      • Realms
    • 👨‍💻Engineering culture
      • Engineering culture
      • Team culture
      • Engineering Process and Roles
      • Team Events and Processes
        • Scrum Events
        • Ongoing Meetings
        • Concepts
  • How we ensure people’s growth
    • 📈Performance
      • Paths
        • Individual Contributors Path
          • Individual Contributors Levels - Software Engineering
          • Individual Contributors Steps
        • Management Path
          • Level 1 - Our Pace setters
          • Level 2 - Our Coaches
          • Level 3 – Our visionaries and servant leaders
          • Level 4 – Our transformational leaders
          • Key concepts
      • Performance evaluation
      • 360 Evaluation Matrix
      • K-POC
      • CAP
      • Management Model Golden Rules
    • 💰Compensation
      • IC Frameworks
        • 👨‍💻Android Development
        • 📱Android OS Development
        • 🔐Assets security
        • 👨‍💼Business Development
        • 📧Digital marketing
        • 💻Front-end web development
        • ⌨️Full Stack Web Development
        • 🏢Facility cleaning
        • 🔑Information security
        • ↗️Marketing automation
        • 🐞QA automation
        • 👾Quality assurance
        • 🧍Recruiting Operations
        • 📖Technical Training
        • 🤦Technical recruitment
        • 🤖WordPress Developers
        • 👩‍🎨UX/UI
      • MGT Frameworks
        • 👨‍💻Application support management
        • ➗Accounting&Finance Management
        • 👯HR Operations Management
        • 🔒Information Security Management
        • 📧Marketing Management
        • 📞NOC&Support management
        • 🚵Operations management (logistics)
        • 🤦‍♀️Operations management (administration)
        • 🖥️Product owner
        • 🔩Product Engineering Management
        • 🤝Product Marketing Management
        • 👨‍💼Project Management (Business)
        • 👨‍💻Project Management (Software)
        • 🛒Sales Management
        • 📳Software Engineering Management
        • 🌟Strategic Business Development Management
        • 💟Strategic Human Resources Management
        • 🚟Supply Chain Management
        • 👌Technical Account Management
        • ☎️Technical Support Management
        • 📜Technical Training Management
    • 🌟Empowering Growth through Transparent Management: Your Path to Success
  • Policies
    • 🎹Internal rules
      • Employee Probationary Period
      • Employee Code of Conduct
      • Physical Access Control
      • Cybersecurity and digital devices
        • Internet usage
        • Cellphone
        • Corporate e-mail
        • Social media
        • Conflict of interest
        • Workplace measures
        • Employee relations
        • Solicitation and Distribution
      • Substance Abuse and Drug Testing Policy
      • Employee Attendance and Working Hours Policy
      • Shiftwork Policy
      • Overtime policy
      • Employee Time Off Policy
      • Remote office policy
      • Smoke-free office policy
      • Employee Referral Program Policy
      • Moonlighting Policy
      • Anti-discrimination Policy
      • Violence In The Workplace Policy
      • Workplace Harassment Policy
      • Source Code Policy
      • Data Protection and Privacy Policy
      • Employee Confidentiality Policy
      • Business Trips Policy Policy
      • Company Equipment Policy
      • Event Participation Policy
      • Training Benefit Policy
      • Termination of Employment Policy
      • Disciplinary Action Policy
      • Corrective Action Plan (CAP) Policy
    • 💵Salaries
    • 📖LUNR knowledge
    • 🧙Sources
    • 📑Glossary
  • ©️License
Powered by GitBook
On this page
  1. Policies
  2. Internal rules

Physical Access Control

Policy brief & purpose

Our Access Control policy outlines our rules for receiving visitors at our premises. We want to ensure that visitors will not:

  • Pose threats to our premises and property

  • Distract employees from their work

  • Be exposed to danger

Scope

The policy applies to all employees, contractors, trainees, partners, customers and all other visitors. The access control is granted by one Employee - the Assets Security Agent. In their absence - by the Office Manager. Employees, except the Security Guard and the Office Manager may not allow access to our building to unauthorized visitors.

Policy Elements

  • Access of Employees

Each Employee shall access the premises with their own access chip. In case of a forgotten or lost chip, you should approach immediately the Assets Security Agent or, in their absence, - the Office Manager. Employees are not allowed to let in their colleagues, that do not have their own access chip on the premises or to exchange their access chips. Each access chip is unique and personal.

  • Access of Contractors / Freelancers - Temporary assignments

When arrives, the visitor is registered in the visitor's software Teems by the Assets Security Agent and receives a personal chip for the day. At the end of the working hours, the visitor shall return the chip to the Assets Security Agent.

  • Access of visitors - Partners / Customers / Candidates

Each visit shall be registered by the Assets Security Agent in the visitor software Teem, where the visitor signs an NDA / GDPR agreement. At each visitor registration, the host should be selected in the Platform. Then, the host receives an email and should accompany their visitors from the Lobby to the premises of the meeting. When the visit is over, the Employee is responsible for accompanying the visitor back to the lobby. For each visitor, a badge is printed containing the name of the person and a photo of them. The visitors shall wear the badge throughout their visit to the office. No visitors are allowed to walk on the premises by themselves.

  • Access of couriers

Couriers are not allowed to enter on the office floors, except for huge packages. All Company packages and correspondence should be accepted by the Assets Security Agent and then dispatched twice a day by the Office Manager. Couriers that dispatch personal orders of Employees, should contact directly the employees and wait for them to pick up the packages in the lobby.

  • Validate Visitor's Identity

Visitor shall provide their ID card to Assets Security Agent in order for their identity to be validated. This data won't be stored or kept by LUNR.

  • Pre-approved Visitors

Guests of the Managing Directors, Government or other institutional representatives or other special guests may pass without having to register. For these cases, the person that invites them shall fill in a pre-registration form at the moment they create the meeting.

Policy Violation

In case the employee does not follow this policy, the following action will be taken:

  • Disciplinary action / Other administrative actions if the behavior of the Employee led to a security breach that had negative consequences for the company.

PreviousEmployee Code of ConductNextCybersecurity and digital devices

Last updated 11 months ago

🎹