Upload
phamxuyen
View
219
Download
0
Embed Size (px)
Citation preview
PURPOSE
1. Learn about a Master Key System and How it works
2. Learn about Master Levels/Hierarchy
3. Initial Planning
4. Questions to Ask
5. Key Control Best Practices
What Is Master Key System?
Systematic generation of security codes in a hierarchical structure
Why Master Key?
• To Protect People (Student and Facility)
• To Protect Property (Valuable Assets)
• To Protect Data/Information
You Do All This:
1. Because it is part of your Responsibility
2. In order not to be determined negligent
Basis Master Key Terms:
1. Barrel: Chamber of a core that accepts pin segments which then interact with the depths on keys to provide access control. Cores typically have six or seven barrels.
2. Cut: A single key depth, part of a code, corresponding to pin segments in a core.
3. Code: A sequence of cuts (six or seven) that complete the cuttinginformation for a key and determine the combination of pin segmentsused in all the barrels of a core. Codes are commonly referred to as keys.The position of cuts in a code are referred to as barrels because of theirassociation with cores. For example, a code of 3476289. There is a 3 cut inthe first barrel; a 4 cut in the second barrel; a 7 cut in the third barrel, etc.
4. System Type: Name associated with a set of mathematical principles thatdetermine how codes are generated, what depths are made on keys, andwhat pin segment types are used in cores.
Basis Master Key Terms Cont:
• 5. Control (CT): A key/code that extends and retracts the control lug of a core, allowing the core to be installed and removed from the lock.
• 6. Grand Master (GM): A key/code that works all of the codes in a system. The GM code generates all other codes in the system.
• 7. Master (M): A key/code that works a set portion of codes in the system.
• 8. Submaster (SM): a key/code that works a set portion of codes within a Master.
• 9. Operating: a key/code that only works its own combination; a single-function code.
Example of Master Perimeters
• 16,384
• 4,096
• 1,024
• 256
• 64
• 16
• 4
Example of College Hierarchy
Selectivity?
– Definition: Crossing Codes not setup
in the normal Hierarchy of the system.Issue: Creates other keys to operate the core
other than crosses “Ghost Keys”
Increases Liability or Risk
• Selectivity (also called Cross-keying) works best if it is planned out before the system is installed
• After the fact, it is much more difficult to control
• Keep it as simple and limited as possible
• Cross-keying can “eat-up” codes reducing the system capacity
HIERARCHIES - SPECIAL REQUIREMENTS
Reasons to Use Selective Masters
1. A person or group needs access to a lot of doors keyed under several Masters, but not every door under every Master
• Decrease the size of your Master Key System
• Increase Liability to those Selective Special Keys
HIERARCHIES - SPECIAL REQUIREMENTS
Selectivity
HIERARCHIES - SPECIAL REQUIREMENTS
INITIAL PLANNING
Build a Security/Safety Team Departments to Consider:
AdministrationFacilitiesSecurity/Campus PoliceAccess ControlIT DepartmentNote: Keep the Security Team Small.
You may not need all the members for Master Key Planning
INITIAL PLANNING
If possible, obtain copies of the door schedules or floor plans of your campus
• This will give you an idea of the top level planning of the Master Key Plan
• And Bottom Level Planning Floor to Floor
INITIAL PLANNING
Complexity can shorten the life of the system• Strive to make the process & system as simple as possible
while still satisfying the customers• Plan around Departments not People. People Come and Go
Departments and Building Structure Stay.
QUESTIONS TO ASK:One system for the entire organization
or separate systems? Example: Separate Facilities and Housing
How many levels of keying?Masters, Sub Masters, Operator Keys
How should we do the exterior doors?Single Key under Bldg Master
Ext Door Core to pass all Codes for Master
What about Services RoomsMechanical, Electrical, Janitorial, Data
Is electronic access control a better choice for high traffic/turnover areas?How do we key the electronic doors?
QUESTIONS TO ASK: CONT
Do you care if keys can be duplicated off campus?
Difference between Standard or Patented Keyway
Do you need different keyways or a multi-keyway system?
Larger Campuses Bigger Systems
KEY CONTROL BEST PRACTICES
• All Support with Key Control has to come from the Top Down.
• Grandmasters must have limited distribution. Everyone don’t need a GM.– GM’s are a tremendous liability to the facility if lost.
• Good practice to set a Key Approval Structure (GM, Masters, Subs, and Operators etc)– Ex. President (GM), VP (Masters), etc.
• One show importance • Two Maintain Control. • Three Remove the pressure off Key Issuers• Four Stop unwarranted key issuances
KEY CONTROL BEST PRACTICES
• Central Source for Key Cutting and Dispensing (ex Lock shop)• Good Practice to have HR at the Facility involved with the Key Shop
(Lock shop)– Change over in personal is the big reason why key records don’t stay
current – Piggy backing or keys getting past down without updating records is
also part of this reason
• Good Practice to have keys where they are needed in a secure location in order to minimize personal from carrying around keys all the time– Example, Building Masters, Mechanical, Electrical, & Data Keys.– Manual Key Sign out– Retainer Box Setup– Electro-mechanical Key Box
KEY CONTROL BEST PRACTICES
• Need to have Good Records
• Know where cores are and what they are keyed to
• Key sign out and return agreements
• Being able to track who and where
• Good Key Control Software
– All this an more can be done with Software
KEY CONTROL BEST PRACTICES
• Make sure you have a plan for Key Changes or Lost Keys
– Importance Level
– How to administer Key Change
– Documentation/Reporting
– Liability?
– Penalty?
• Governing Body?