Data collection and distribution are essential for today’s business. Regardless of the product or service, data is required for every step of the business model, from initial product development to final sale completion.
As data moves from one point to another, companies must meet the requirements for Personally Identifiable Information (PII) at their location, while protecting the data from third-party interception and tampering.
The best defense against these potential threats is a secure and flexible IT cabling network that establishes a physical layer of protection between data and unauthorized access or service disruption.
To assist property owners and facility teams in upgrading or designing a secure cabling network for a property or client, consider the following key points.
IT Network Basics
A cabling network encompasses all the components used for capturing, transferring, and storing digital data. This includes the data cable, routers, modems, repeaters, switches, and public or private access points. Most IT networks fall into one of the following classifications.
An ad-hoc cabling network, although less common than its permanent wireless counterpart, is a temporary, decentralized network formed by directly connecting two or more devices (such as computers) using Ethernet cables. An ad-hoc system doesn’t require a centralized router or access point, making it ideal for file sharing or setting up a small network for a specific task.
A structured cabling network refers to the organized collection of copper and fiber wiring that comprises a building’s data cabling infrastructure and wireless connectivity. Much like a power management system, it runs throughout the building and connects network servers to the routers, devices, and switches.
Ethernet, coax, and fiber optic cables are all used for data transmission, but they differ significantly in their construction, performance, and applications.
Ethernet Cables (Cat5e, Cat6, Cat7) utilize multiple twisted pairs of copper wires enclosed in a protective jacket to deliver transfer rates ranging from 10 Mbps to 10 Gbps. Ethernet cable is widely used for connecting devices in local area networks (LANs), such as computers, routers, and switches. However, they are susceptible to electromagnetic interference (EMI).
Coaxial Cables feature a central copper conductor surrounded by layers of insulation, a metallic shield, and an outer jacket. Most often used for cable TV and internet connections, coaxial cable provides asymmetrical speeds (faster download, slower upload) of up to 1 Gbps or less. Due to potential signal interference and degradation, coaxial cable is not ideal for long-distance applications.
Fiber Optic Cables utilize thin strands of glass or plastic to transmit data as light pulses, offering significantly higher bandwidth and data transfer rates (potentially terabits per second). While more expensive than Ethernet or coax, they can transmit data over very long distances with minimal signal loss, making them ideal for high-speed connectivity, demanding network environments, and long-distance telecommunications.
Security and Privacy Protocols
In the United States, there isn’t one single, comprehensive federal law governing all Personally Identifiable Information (PII). Instead, a patchwork of federal and state laws, along with sector-specific regulations and industry best practices, collectively address security and privacy protocols.
These typically include:
- The Gramm-Leach-Bliley Act (GLBA) governs the privacy of consumer financial information.
- The Federal Trade Commission Act (FTCA) addresses deceptive marketing practices involving Personally Identifiable Information (PII).
- The Health Insurance Portability and Accountability Act (HIPAA) outlines the guidelines for healthcare providers and related entities to handle sensitive patient health information.
- The PCI Security Standards Council (PCI SSC) is a global forum that brings together payments industry stakeholders to develop and drive the adoption of data security standards and resources for safe payments worldwide.
ISO/IEC 27001 is an internationally recognized standard that provides a framework for organizations to establish, implement, maintain, and continually improve their Information Security Management System (ISMS). It ensures the security of information assets, thereby maintaining confidentiality, integrity, and availability.
State laws must also be considered when designing and building a secure IT cabling system for clients.
California’s Consumer Privacy Act (CCPA), now the California Privacy Rights Act (CPRA), is a notable example that influences national standards due to California’s significant economic influence.
Virginia’s Consumer Data Protection Act (CDPA) is another significant state law that covers the collection of PII.
Access points can pose another challenge for facility teams, as they can be used to breach the cabling network system physically. During the design process, teams should attempt to identify potential insider and disruption threats. Sensitive networks should be independently isolated from one another to further reduce security risks. Additional security measures could include.
- Secure MDF/IDF rooms
- Locked wiring closets and panels
- Access control systems such as keypads, badges, or biometrics,
- Surveillance systems (CCTV)
- Lockable rack cabinets
- Secure switch configurations
- Secure wall jacks
- Port-level network access control (802.1X)
While this is not an exhaustive list of security measures and related laws, it should provide a reasonable starting point for property owners, facility managers, and clients.
Cable Management Options
For decades, the construction industry has relied on cable trays concealed above the ceiling to run data cables from one point to another. However, it is also worth noting that adding, deleting, or making changes to the cabling is expensive and time-consuming.
To reduce future maintenance and construction expenses, many commercial properties are replacing their cable trays with raised access flooring systems.
One example is the award-winning Gridd® Adaptive Cabling Distribution System®, whichis available in two profile heights (1.6 and 2.75”). The minimal impact on headspace means that Gridd works equally well in historic buildings or new construction projects.
Gridd’s modular units are made from steel, which provides superior strength and durability throughout the building’s lifespan. Steel is also one of the most recycled materials on the planet, which enhances a building’s LEED (Leadership in Energy and Environmental Design) scores while contributing to a circular economy business model.
Building a secure IT cabling network can be challenging due to privacy and security requirements. While cable trays do work, they can’t provide the future flexibility, reduced construction costs, and ease of access that a raised access flooring system offers.
If you’re ready to upgrade an existing data cabling system, or design one for a new property or client, a raised access flooring system could provide the security and structure needed for the most demanding projects. To learn more about designing or building a secure IT cabling network, please contact a Gridd Advisor.