Home SiteMap Contact
 
 
 

Is Your Wireless Network Compliant with Industry Guidelines?  Oberon can help your installation meet important industry guidelines.

pdfOberon Industry-Specific Information


National Electric Code (NEC)

In addition to providing added safety, convenience, and the security of a locked door, Oberon enclosures also help installations meet the National Electric Code (N.E.C.) article 300.22 requirements for installing equipment above a suspended ceiling.

Payment Card Industry Data Security Standard (PCI-DSS)

Payment Card Industry Data Security Standard (PCI-DSS) requirement 9.1.3 states that the operator must “restrict physical access to wireless access points, gateways, and handheld devices,” and “verify that physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines is appropriately restricted.”

Federal Information Processing Standard (FIPS)

Government/DoD Directive 8100.2 mandates FIPS 140-2 compliance, wherein FIPS 140-2 paragraph 4.5 requires “physical security mechanisms” to be applied.  Oberon enclosures feature locking doors and are secured to the building structure, providing physical security while remaining virtually transparent to wireless signals for optimum performance.

Infection Control Risk Assessment (ICRA)

The Joint Commission on Hospital Accreditation has established procedures for mitigating the spread of infectious disease and contamination.  Infection Control Risk Assessment (ICRA) will have a serious impact on cabling installation, moves, adds, and changes.  Oberon enclosures provide access to wireless LAN access points and telecom equipment without entering the air handling space, a key factor in risk mitigation.

Health Insurance Portability and Accountability Act (HIPAA) Requirements

§ 164.310 Physical safeguards. A covered entity must, in accordance with 164.306: (a)(1) Standard: Facility access controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.