Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

TITAN Group …….Managing Site Build up for the telecom sector TICS Telecom Projects Consultancy Pvt. Ltd.
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
WELCOME Keyscans Access Control KIMA SECURITY INC.
GCSE ICT Networks & Security..
The Monash Experience The complete solution Presented by Glenn Martin - Business Development Manager - Unicard Systems Pty Ltd Trevor Smith – Security.
Role of Security Services at McMaster University
SECAM Systems Product Presentation SECAM Systems © 2010.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Charms landing page Features Benefits How Does ChARMS Work/Demo Additional Information Contact Us ChARMS is a remote inventory management system with a.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Chapter 17 Controls and Security Measures
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Microsoft Technology Associate
References. Moscow SafeCity Over 175,000 CCTV cameras in Moscow, controlling over doorways and mass circulation areas in ten districts. Vandal-resistant.
8.02 Discuss considerations for safety and security.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Westminster Christian Fellowship Buzzcard Access Control System Benjamin Davis Nathan Firesheets Mark Whitmer May 3, 2010 School of Electrical and Computer.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Real Estate Principles and Practices Chapter 15 Property Management © 2014 OnCourse Learning.
Information Technology Services Technical Support Services Summer 2009 Accomplishments Fall 2009 Current Projects.
Solution Overview for NIPDEC- CDAP July 15, 2005.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Security and backups GCSE ICT.
SBSTECH SBSTech (SBS Technical Services)SBSTech (SBS Technical Services) provides innovative, reliable and accessible technology.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Clemson’s Improved Printing System 1. Vision  Work towards a more sustainable future for Clemson.  Create an environment that transforms the campus.
Databases and Database Management Systems
1 Strategic Plan for Digital Archives Programme DAP PROJECT SCOPE OVERVIEW STATUS.
1 The Paperless Office: Myth or Reality? City of Phoenix Finance Tax Division May 23, 2013.
IT PBA December Accountability  Major successes –wireless for campus more than double the users –UVU migrations ( , web, Banner,
Cctv Management Solution - CMS From – Intelitech Solutions Pvt. Limited. [ ITSPL Group ]
Moving Your Paperwork Online Western Washington University E-Sign Web Forms.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
An ASSA ABLOY Group Company ASSA ABLOY ABLOY SECURITY, INC. The Maximum Solution for Gaming Key Control ABLOY SECURITY, INC. presents Click each slide.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
NDSU Personal Safety and Security Assist. Project Introduction Leverages: –People and Partnerships –Philosophies –Centralized and Integrated Systems.
Real Estate Principles and Practices Chapter 15 Property Management © 2010 by South-Western, Cengage Learning.
Staff Assessment Technology Services Department Palmyra Area School District.
CCTV SECURITY & MONITORING SERVICES DAY SEVEN TECHNOLOGY CONSULT DSTC Monitoring Services Ltd DSTC.
Why Use a Professional Locksmith? We’d like to take a few moments of your time to explain the benefits to you, of using the services of a professional.
ATMeye.iQ Video security monitoring and dispute management solution ATMeye.iQ.
Access Control Jeff Wicklund Computer Security Fall 2013.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Managed IT Services JND Consulting Group LLC
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
8.02 Discuss considerations for safety and security.
8.02 Discuss considerations for safety and security.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
BNU - HKBU United International College 信息科技服务中心 Information Technology Services Centre.
SCSU Technology Update Spring Resources for All Campus Constituents Access to Information and Technology.
LCPS Department of Safety & Security
COSEC ARC IP based Access Control Panel.
What is the RowanCard? The RowanCard is your official Rowan University ID. It is used for identification purposes, door access, meal plans, and other monetary.
Technology Department Annual Report
APPLICATION RISK AND CONTROLS
County HIPAA Review All Rights Reserved 2002.
Security of Data  
8.02 Discuss considerations for safety and security.
Presentation transcript:

Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation

Project Objectives Minimize key duplication - exterior doors Minimize unauthorized access to buildings Eliminate costs of emergency re-keying Provide ability to change access rapidly Meet safety concerns of staff & students Enhance theft control/supervision in computer labs Control and reduce door props Provide door alarms to University Police

RFP Requirements 14 Residence Halls and 8 Academic Buildings Proximity smart card readers integrated with student/staff ID cards Card access on 22 computer lab doors and selected exterior doors Use of electric strikes on doors, fail secure. Retain existing key system and hardware as an override CCTV cameras and local VCR recorders in computer labs Door alarms and access transactions networked to University Police Central Server networked to user workstations

System selected Millenium Online Security Management System by Ilco Unican Pty Ltd Fulfilled requirements of the RFP Provides for remote programmable locking and unlocking of buildings

System description –Server and Database –Workstations –Building Controllers –Door Control Devices –Electric Strikes, Contacts, PIR detectors System Overview

System Architecture

Proximity Cards Details of new SUNY Card stock: integrated smart chip containing card number, meal plan, and library access on mag strips on the same card Mag strips are encoded with ISO number, which is read by swipe card meters RF reader activates smart chip and broadcasts card number

Project Schedule For the 14 Residence Hall buildings, the bulk of installation and phase-in took place during fall semester 2000 Installation was relatively non-intrusive Installation for the 8 Academic buildings was carried out over a 3 month period Implementation and phase-in process is ongoing in Academic buildings and expected to be completed by Dec 2001

Implementation process Consultative work - information sessions Physical installation of hardware Card operation to issue new card stock Determination of access requirements Training and information sessions Phase-in period - cards and keys Cards only - change cylinder cores

Budget figures System Manager New employee line Head End Costs (fixed)$25,000 Smart card stock 7,000$32,000 Residence Halls For an average 200 bed Hall$22,000 Academic Buildings Approximate cost per door$2,600 ( If door is equipped with card reader )

Potential Savings Rekeying costs if keys are lost, stolen, not returned No cutting keys - time and money saving University police patrols - targeted and more efficient Costs of opening and locking buildings Theft deterrence Computer lab supervision costs Potential liability in civil litigation is reduced

Lessons learned System requires a single administrator System users require ongoing training Technical problems with the use of electric strikes Archives of access records and privacy Use of CCTV cameras and privacy Proximity card failures 5-8% The system is convenient, flexible and popular with those using it on a day to day basis

Privacy Policy Reasons for access record retrieval Criminal investigation, emergencies, etc. General system Maintenance Permission to retrieve records President or Designee for other than general system maintenance. Maintain maximum two months records Reporting of record retrieval Monthly to Presidents Office