key control & accountability

30
Key Control & Accountability

Upload: mari-compton

Post on 31-Dec-2015

27 views

Category:

Documents


0 download

DESCRIPTION

Key Control & Accountability. Rich Hassard. Introduce speakers Purpose Plan of action Program Overview – Simple K Key Policy Key Architecture. Team Members. Rich Hassard – North Carolina State University General Manager/Trade Shops - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Key Control & Accountability

Key Control & Accountability

Page 2: Key Control & Accountability

Rich Hassard

• Introduce speakers• Purpose • Plan of action • Program Overview – Simple K• Key Policy• Key Architecture

Page 3: Key Control & Accountability

Team Members• Rich Hassard – North Carolina State University

General Manager/Trade Shops • Tara Williams – North Carolina State University

Locksmith• Pat Ferguson – North Carolina State University

Locksmith• Blake Holmes – North Carolina State University

Facilities Maintenance Coordinator

Page 4: Key Control & Accountability

Purpose & Action plan

• The Purpose of key control and accountability is to help protect the life, property and security of the facility and all it’s occupants.

• Our action plan is to integrate a patented keyway system with a data base for key management software which will help us attain our goal .

Page 5: Key Control & Accountability

Key Control

• A system to control key distribution down to the key holder level.

• Patented keyway system

• Campus expectations are moving towards higher security systems.

• Purpose, what is a key worth?

Page 6: Key Control & Accountability

Key Accountability

• Lock shop accounts for key codes and Master key system layout.

• Campus Police are responsible for high level security access and key distribution.

• Departments account for key’s.

Page 7: Key Control & Accountability

Key Policy Development• Security levels, perimeters and devices. Combination, Card Reader & Key Override• Overall safety and security goals.• Establish roles and responsibilities.• Document approval levels.• Accountability and audit.• Establish financial responsibilities.• Define Staff, Student, Contractor and Affiliate access at the lowest level possible.

Page 8: Key Control & Accountability

Key Architecture• Key approval matrix• Key approval type and distribution

• Audits

• Building and service key ring locations

• Long term contractor rings

• Key ring content

• Forms

Page 9: Key Control & Accountability

Access Control Key Representative

Key Control Software

Lock ShopCut Keys

Deliver Keys to Access Control Key

Representative

Issue Keys to Key Holder

Campus PoliceEHPSSAT

Key Request is Made

Determine Security Level

Routine Key High Security

Approved for High Security

Keys Delivered to Campus Police

Page 10: Key Control & Accountability

Tara Williams

• Building Layout – Current Floor Plans

• Holding a Key Meeting

• Planning a System

• Patented Keyway

• Keeping the Re-key cost under $8,500• Issuing Keys at the Lowest Level Possible

– NO Grand Masters

• Types of Accountability

Page 11: Key Control & Accountability

Building Layout – Floor Plans: Department Usage

• How the departments are configured in the building

• Determine any common spaces for all departments

Tip:At the Keying

meetings:

Having a floor plan will give the

department a visual of the

rooms in their area and you will be able to make any changes on the plans your

records .

Page 12: Key Control & Accountability

A building layout will identify these points, if needed to add them to the files

• Location of the Card Access Entries – Records who & when after hours

• Are there any exterior Service Doors that have interior doors into the building?

Who will have access to the perimeter key?

Is there a policy about this topic in place?

PERIMETER DOORS:

Page 13: Key Control & Accountability

• Storage Areas

In this example, would this be on the service key system or on a perimeter key system?

Changing the lock around at door G118 was an option. The Life Safety codes and the AHJ were consulted and the decision was made to leave G118 as a safe egress path into the building from this mechanical area and the perimeter doors remained at the exterior of the building.

“PERIMETER DOORS”

SERVICES:

• Mechanical

• Electrical

• Elevator Machine Rooms

• Zone Shop

• Telecom

• Roof Access

• Card Access

HOUSEKEEPING

• Closets

• Offices

Swinging and Roll up doors

are considered Perimeter access.

Page 14: Key Control & Accountability

HOLDING A KEYING MEETING

Invite the decision makers and persons responsible for the record keeping. Delays in any change decisions can be avoided if these people are at the meeting(s).

The purpose of a keying meeting is to determine how the department operates within the building and plan the keying system accordingly.

Buildings should NOT be keyed to the convenience of the people in the department.

• Convenience vs. Security: One key, two keys or More…

TOPICS TO COVER:

• Card access points: Records perimeter access after hours • Interaction between offices / labs: Keyed alike or Keyed differently• Interaction between departments: Common for all / Specified use

• Keys: Faculty & Staff, Students, Campus Police, Fire Protection, Services• Take Home keys & Work Keys

At the initial key meeting, explain the possibility of more than one meeting:•One to outline•Another to assign•One to authorize notes and layout for the work to begin.

Cross keying destroys a keying system and security - Offer different solutions!

Page 15: Key Control & Accountability

THINGS TO BRING WITH YOU:• Building Layout / Floor Plans (copies for everyone at the meeting)

• Business Cards with your contact information

• Paper for Notes

Page 16: Key Control & Accountability

Planning a SystemSecurity vs. Convenience

Source: ASSA ABLOY Master Key System Design Guide

Keeping it Simple

Cross keying complicates the system and reduces security.

Planning around personnel inevitably shortens the life span of a system.

Do not expand key systems beyond a single building.

Achieving Balance

Page 17: Key Control & Accountability

Patented Keyway• Patent-protected keying systems are an essential part of access control as security becomes more in demand, managers strive to prevent the unauthorized duplication of keys. • The patent ensures that keys can only be manufactured by the specific manufacturer who will only sell keys to end user customers after verifying that the individual is an authorized purchaser.

Page 18: Key Control & Accountability

Keeping the cost of rekey under $8,500Issuing keys on a lower level helps to limit the cost of rekeying.

Re-keying a portion of a system due to a lost key vs.

Replacing a complete system for the loss of a grand master.

Page 19: Key Control & Accountability

Issuing Keys

Top Master Key Level

In any system, security is only as good as your capability to maintain and control:

Issuing keys on a lowest level helps to maintain more of the available resources for future needs, thus,

extending the life of the system.

allocation, distribution and use.

Page 20: Key Control & Accountability

TYPES OF ACCOUNTABILITY

A $3.00 key can open: an office, a building, your home, your lab, your safety deposit box…

In a 100% rekey project, there is total key accountability.

TOTAL REKEY:

EXISTING KEY INFORMATION:

Different access for different people. Is there a procedure if a key is not returned to the key rep, who pays for the rekey?

Rekeyed Exterior doors: NO Keys given & Access through Card Reader Doors

Each key is accounted for from the beginning

Only good as the information brought forward

Who has what key?Over the years people come & go, keys get left in desks or given to someone to pass on, etc.

What access do they have?

ACCOUNTABILITY:

Who has what key? What can they access?

What is that key really worth? Wouldn’t you want to get that key back?

MODIFIED EXISTING INFORMATION: Existing Key & Bldg Records for interior

Page 21: Key Control & Accountability

Blake Holmes

• Unique Key Identifiers• Discovering Problem Areas• Web Based Software

Page 22: Key Control & Accountability

Unique Identifiers•Existing Key Systems

• Key Code Displayed at Top of Key• Uniquely Identified using alpha-numeric symbol, Our Program is using “K-1, K-2, …”• Entered into Key Tracking Software as key inventory meetings are held.• Example: E1C4B5-A7, E1C4B5-A8, etc

•New Key Systems• No Key Code Displayed on Key• Uniquely Identified with Premarked Sequential Numbers, to avoid number duplication• Entered into Key Tracking Software at time that key is cut• Prevents users from finding lost keys and knowing where they allow access• Restricted Keyway – Only allows keys to be cut and ordered by University Authorized Personnel• Example: 0000111, 0000112, 0000113, etc

PREMARKED SEQUENTIAL NUMBERINGALPHA-NUMERIC SYMBOL

Page 23: Key Control & Accountability
Page 24: Key Control & Accountability
Page 25: Key Control & Accountability
Page 26: Key Control & Accountability

Discovering Problem Areas•Existing Key Systems

• All Doors that get inventoried have the changekey entered for tracking purposes• Any cross keying can be added in the“Additional Keys” Field• All accidental Ghost Keys that work in this door are shown.

•Example• Key Inventory and Purge shows door with 3different keys crossed into single core• Software shows that in addition to 3 intendedkeys, an additional 25 keys would work that door.• Security has been reduced to allow for easyaccess into this space.

Page 27: Key Control & Accountability

•Key Tracking Software• Individual Key Identification Markings (Sequential Numbering) – Allow to track life of individual key• All keys assigned to individual holder, including date in which those keys were assigned• Notes indicating location key is intended to work. We include this information for the Key Representative to view which helps in reissuing keys previously assigned to departed faculty members• Only shows keys that belong to a Holder under the key representative or on doors within that Representatives assigned area.

Page 28: Key Control & Accountability

•Request Keys for a Specific Holder• Allows for University Lock Shop and Campus Security to determine Security Level• Can Assign Holder to key prior to issuance, allows University to know will have access to areas on campus

•Request By Door – Not By Key Code• Can limit access to building areas by issuing lowest level possible for the individual key request• Previously, people would request Master Keys for access to individual office, allows too many people in secure areas• University “High Security Areas” have been identified, and any requests for these areas must get appropriate clearance prior to issuance of keys.

Page 29: Key Control & Accountability

•Key Holder Inventory• Track Individual Holders Keys

• Checklist To Take Back Keys Upon Separation• Return Lost Key(s) to Proper Owner• Determine Access To High Security Areas• Increase Holder Accountability

Page 30: Key Control & Accountability

We will now open up the panel for any questions.

Thank You !!!