• §A.5.g / SM2.2.1 covers access up to the rack.
  • Almost there, just need to clarify:
    • who else can get access? BIT has as key!
    • how do Tunix get in?
    Technically, the SM describes, the above are just holes.