Maintenance 2 Understanding Master Key Structures

Preview:

Citation preview

PURPOSE

1. Learn about a Master Key System and How it works

2. Learn about Master Levels/Hierarchy

3. Initial Planning

4. Questions to Ask

5. Key Control Best Practices

What Is Master Key System?

Systematic generation of security codes in a hierarchical structure

Why Master Key?

• To Protect People (Student and Facility)

• To Protect Property (Valuable Assets)

• To Protect Data/Information

You Do All This:

1. Because it is part of your Responsibility

2. In order not to be determined negligent

Basis Master Key Terms:

1. Barrel: Chamber of a core that accepts pin segments which then interact with the depths on keys to provide access control. Cores typically have six or seven barrels.

2. Cut: A single key depth, part of a code, corresponding to pin segments in a core.

3. Code: A sequence of cuts (six or seven) that complete the cuttinginformation for a key and determine the combination of pin segmentsused in all the barrels of a core. Codes are commonly referred to as keys.The position of cuts in a code are referred to as barrels because of theirassociation with cores. For example, a code of 3476289. There is a 3 cut inthe first barrel; a 4 cut in the second barrel; a 7 cut in the third barrel, etc.

4. System Type: Name associated with a set of mathematical principles thatdetermine how codes are generated, what depths are made on keys, andwhat pin segment types are used in cores.

Basis Master Key Terms Cont:

• 5. Control (CT): A key/code that extends and retracts the control lug of a core, allowing the core to be installed and removed from the lock.

• 6. Grand Master (GM): A key/code that works all of the codes in a system. The GM code generates all other codes in the system.

• 7. Master (M): A key/code that works a set portion of codes in the system.

• 8. Submaster (SM): a key/code that works a set portion of codes within a Master.

• 9. Operating: a key/code that only works its own combination; a single-function code.

Example of Master Perimeters

• 16,384

• 4,096

• 1,024

• 256

• 64

• 16

• 4

Example of College Hierarchy

Selectivity?

– Definition: Crossing Codes not setup

in the normal Hierarchy of the system.Issue: Creates other keys to operate the core

other than crosses “Ghost Keys”

Increases Liability or Risk

• Selectivity (also called Cross-keying) works best if it is planned out before the system is installed

• After the fact, it is much more difficult to control

• Keep it as simple and limited as possible

• Cross-keying can “eat-up” codes reducing the system capacity

HIERARCHIES - SPECIAL REQUIREMENTS

Reasons to Use Selective Masters

1. A person or group needs access to a lot of doors keyed under several Masters, but not every door under every Master

• Decrease the size of your Master Key System

• Increase Liability to those Selective Special Keys

HIERARCHIES - SPECIAL REQUIREMENTS

Selectivity

HIERARCHIES - SPECIAL REQUIREMENTS

INITIAL PLANNING

Build a Security/Safety Team Departments to Consider:

AdministrationFacilitiesSecurity/Campus PoliceAccess ControlIT DepartmentNote: Keep the Security Team Small.

You may not need all the members for Master Key Planning

INITIAL PLANNING

If possible, obtain copies of the door schedules or floor plans of your campus

• This will give you an idea of the top level planning of the Master Key Plan

• And Bottom Level Planning Floor to Floor

INITIAL PLANNING

Complexity can shorten the life of the system• Strive to make the process & system as simple as possible

while still satisfying the customers• Plan around Departments not People. People Come and Go

Departments and Building Structure Stay.

QUESTIONS TO ASK:One system for the entire organization

or separate systems? Example: Separate Facilities and Housing

How many levels of keying?Masters, Sub Masters, Operator Keys

How should we do the exterior doors?Single Key under Bldg Master

Ext Door Core to pass all Codes for Master

What about Services RoomsMechanical, Electrical, Janitorial, Data

Is electronic access control a better choice for high traffic/turnover areas?How do we key the electronic doors?

QUESTIONS TO ASK: CONT

Do you care if keys can be duplicated off campus?

Difference between Standard or Patented Keyway

Do you need different keyways or a multi-keyway system?

Larger Campuses Bigger Systems

KEY CONTROL BEST PRACTICES

• All Support with Key Control has to come from the Top Down.

• Grandmasters must have limited distribution. Everyone don’t need a GM.– GM’s are a tremendous liability to the facility if lost.

• Good practice to set a Key Approval Structure (GM, Masters, Subs, and Operators etc)– Ex. President (GM), VP (Masters), etc.

• One show importance • Two Maintain Control. • Three Remove the pressure off Key Issuers• Four Stop unwarranted key issuances

KEY CONTROL BEST PRACTICES

• Central Source for Key Cutting and Dispensing (ex Lock shop)• Good Practice to have HR at the Facility involved with the Key Shop

(Lock shop)– Change over in personal is the big reason why key records don’t stay

current – Piggy backing or keys getting past down without updating records is

also part of this reason

• Good Practice to have keys where they are needed in a secure location in order to minimize personal from carrying around keys all the time– Example, Building Masters, Mechanical, Electrical, & Data Keys.– Manual Key Sign out– Retainer Box Setup– Electro-mechanical Key Box

KEY CONTROL BEST PRACTICES

• Need to have Good Records

• Know where cores are and what they are keyed to

• Key sign out and return agreements

• Being able to track who and where

• Good Key Control Software

– All this an more can be done with Software

KEY CONTROL BEST PRACTICES

• Make sure you have a plan for Key Changes or Lost Keys

– Importance Level

– How to administer Key Change

– Documentation/Reporting

– Liability?

– Penalty?

• Governing Body?

Recommended