intermediary should isolate the delivery and loading areas where unauthorized persons could enter the premises from data center; 6. The intermediary should site the information processing facilities such as the