Key Control & Accountability

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Home Owners Insurance Basics What is it and why do we need it.
Tips to a Successful Monitoring Visit
This presentation was designed to guide you through the InstaKey Key Control Program. This presentation was designed to guide you through the InstaKey.
Designated Authority Training Parking & Access Control July 2009.
Organise Workplace Information
Parking solution designed for hotels – Providing one card solution to hotel management. Richard Hsieh Tel: Ext. 128 Fax:
Emergency Evacuation Zayed University, Dubai Campus.
PantherSoft Financials Smart Internal Billing. Agenda  Benefits  Security and User Roles  Definitions  Workflow  Defining/Modifying Items  Creating.
Creating a Safety Culture How Does One Create a “Safety Culture” in the Laboratory? Start by Making Safe Science as Important as Good Science.
Review Questions Business 205
PHOTO. NO.DATE: 01/20/14 REVISIONS Construction Services 170 Long Lane Middletown, CT WESLEYAN U N I V E R S I T Y P CHURCH STREET OLIN.
EMERGENCY CONTACT AND ACCESS DATA FOR LABORATORIES Accurate and up-to-date data is invaluable in terms of securing YOUR interests by ensuring the right.
AN OVERVIEW OF THE KEY MANAGEMENT SYSTEM Peggy Matta Cornell University Police Department KMS and Access Control Administrator.
AUSTEN’S LOCK CO (PTY.) LTD MASTER KEY SYSTEMS Prepared by : Sean Dowie.
Ground Vehicle Operations Training April 16, 2014.
CASH HANDLING Training Presentation
1 Cash Handling – It’s my job Whether you take in lots of money or … you collect “pennies”
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Examine Quality Assurance/Quality Control Documentation
Network security policy: best practices
A PRODUCT COPYRIGHT © 2014 PATENT PENDING
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
The UF Directory Project Project Leader: Warren Curry, Information Systems Project Project Web Site:
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
GUIDE TO SMALL BUSINESS RECORDKEEPING. CONTENTS INTRODUCTION BASIC CONSIDERATIONS FURTHER CONSIDERATIONS WHAT TO KEEP & FOR HOW LONG SETTING UP YOUR BOOKKEEPING.
The Islamic University of Gaza
2015 ANNUAL TRAINING By: Denise Goff
Configuration Management T3 Webinar Feb 21, 2008 Chuck Larsen ITS Program Coordinator Oregon Department of Transportation.
Commissioning of Fire Protection and Life Safety Systems Presented by: Charles Kilfoil Bechtel National Waste Treatment Plant Richland WA.
MSF Requirements Envisioning Phase Planning Phase.
Internet Bank Product Presentation Processes drive businesses, We drive processes.
Segregation of Duties for Infor-Lawson Software 1.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 Access Services Training for New Faculty and Staff Processes, Procedures And A Step By Step Guide For Access.
Evacuation Units Training [school’s name here]. Evacuation Policy When a threat comes in, it is assessed by our Threat Assessment Team. The Team then.
2011 NPMA Conference Series III National Capital Area Conference Leaders in Asset Management National Capitol Area Conference Charles L. Robinson, Director.
Introduction to the Requirements Document
Access Online Cardholder Transaction Approval Training 1 Client Logo.
WEBINAR Presentation for Fleet Coordinators October 3, 2006.
Module 9 Configuring Messaging Policy and Compliance.
Environment, Health and Safety OARS Online Accident Reporting System A guide to the University of Calgary’s new web- based On-line Accident Reporting System.
2013 Texas Ad Astra Summit Monday, July 22 nd Role Play: Fresh Ideas for Setting Up Security Roles in Astra 7.5 Truman Glenn University of Houston
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
An ASSA ABLOY Group Company ASSA ABLOY ABLOY SECURITY, INC. The Maximum Solution for Gaming Key Control ABLOY SECURITY, INC. presents Click each slide.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Chapter 10 Creating a Template for an Online Form Microsoft Word 2013.
SUPRA Conversion Greensboro Regional REALTORS® Association, Inc.
1 Equipment Maintenance Service Maintenance Form.
Project management Topic 8 Configuration Management.
Why Use a Professional Locksmith? We’d like to take a few moments of your time to explain the benefits to you, of using the services of a professional.
ELISTING How to use eListing to conveniently and quickly file your personal property listing online. DEPARTMENT OF ASSESSMENTS King County To navigate.
Keys to a Successful Records Management Implementation One Firm, One Place for Records Presented by: Joanna Pashos.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
- HEMIC Facility Inspections. Common Losses A fire breaks out in a 16 story office building An employee had the tips of two fingers amputated Could these.
Amerikey Locksmith Licensed & Insured Fast Response 24/ Coney Island Avenue, 3rd floor, Brooklyn, NY
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Cash Handling – It’s my job
Lock Out & Tag Out.
Implementation of Computer Maintenance Management system - CMMS
WEBINAR Presentation for Fleet Coordinators
Field Inventory Services-Sanofi Inventory and Audit Training
Standard Operating Procedure
Cash Handling – It’s my job
WELCOME!.
Presentation transcript:

Key Control & Accountability

Rich Hassard Introduce speakers Purpose Plan of action Program Overview – Simple K Key Policy Key Architecture

Team Members Rich Hassard – North Carolina State University General Manager/Trade Shops Tara Williams – North Carolina State University Locksmith Pat Ferguson – North Carolina State University Locksmith Blake Holmes – North Carolina State University Facilities Maintenance Coordinator

Purpose & Action plan The Purpose of key control and accountability is to help protect the life, property and security of the facility and all it’s occupants. Our action plan is to integrate a patented keyway system with a data base for key management software which will help us attain our goal .

Key Control Purpose, what is a key worth? Campus expectations are moving towards higher security systems. A system to control key distribution down to the key holder level. Patented keyway system

Key Accountability Lock shop accounts for key codes and Master key system layout. Campus Police are responsible for high level security access and key distribution. Departments account for key’s.

Key Policy Development Security levels, perimeters and devices. Combination, Card Reader & Key Override Overall safety and security goals. Establish roles and responsibilities. Document approval levels. Accountability and audit. Establish financial responsibilities. Define Staff, Student, Contractor and Affiliate access at the lowest level possible.

Key Architecture Key approval matrix Key approval type and distribution Audits Building and service key ring locations Long term contractor rings Key ring content Forms

Access Control Key Representative Key Request is Made Key Control Software Determine Security Level Routine Key High Security Campus Police EHPS SAT Lock Shop Cut Keys Approved for High Security Keys Delivered to Campus Police Deliver Keys to Access Control Key Representative Issue Keys to Key Holder

Tara Williams Building Layout – Current Floor Plans Holding a Key Meeting Planning a System Patented Keyway Keeping the Re-key cost under $8,500 Issuing Keys at the Lowest Level Possible – NO Grand Masters Types of Accountability

Building Layout – Floor Plans: Department Usage How the departments are configured in the building Determine any common spaces for all departments Tip: At the Keying meetings: Having a floor plan will give the department a visual of the rooms in their area and you will be able to make any changes on the plans your records .

PERIMETER DOORS: A building layout will identify these points, if needed to add them to the files Location of the Card Access Entries – Records who & when after hours Are there any exterior Service Doors that have interior doors into the building? Who will have access to the perimeter key? Is there a policy about this topic in place?

Swinging and Roll up doors are considered Perimeter access. “PERIMETER DOORS” SERVICES: Mechanical Swinging and Roll up doors are considered Perimeter access. Electrical Zone Shop Telecom Roof Access Card Access Elevator Machine Rooms In this example, would this be on the service key system or on a perimeter key system? Changing the lock around at door G118 was an option. The Life Safety codes and the AHJ were consulted and the decision was made to leave G118 as a safe egress path into the building from this mechanical area and the perimeter doors remained at the exterior of the building. HOUSEKEEPING Closets Offices Storage Areas

HOLDING A KEYING MEETING The purpose of a keying meeting is to determine how the department operates within the building and plan the keying system accordingly. Buildings should NOT be keyed to the convenience of the people in the department. Invite the decision makers and persons responsible for the record keeping. Delays in any change decisions can be avoided if these people are at the meeting(s). TOPICS TO COVER: Convenience vs. Security: One key, two keys or More… Cross keying destroys a keying system and security - Offer different solutions! Keys: Faculty & Staff, Students, Campus Police, Fire Protection, Services Take Home keys & Work Keys Interaction between departments: Common for all / Specified use Interaction between offices / labs: Keyed alike or Keyed differently Card access points: Records perimeter access after hours At the initial key meeting, explain the possibility of more than one meeting: One to outline Another to assign One to authorize notes and layout for the work to begin.

THINGS TO BRING WITH YOU: Building Layout / Floor Plans (copies for everyone at the meeting) Paper for Notes Business Cards with your contact information

Planning a System Security vs. Convenience Keeping it Simple Cross keying complicates the system and reduces security. Planning around personnel inevitably shortens the life span of a system. Do not expand key systems beyond a single building. Achieving Balance Source: ASSA ABLOY Master Key System Design Guide

Patented Keyway Patent-protected keying systems are an essential part of access control as security becomes more in demand, managers strive to prevent the unauthorized duplication of keys. The patent ensures that keys can only be manufactured by the specific manufacturer who will only sell keys to end user customers after verifying that the individual is an authorized purchaser.

Keeping the cost of rekey under $8,500 Issuing keys on a lower level helps to limit the cost of rekeying. Re-keying a portion of a system due to a lost key vs. Replacing a complete system for the loss of a grand master.

Issuing Keys In any system, security is only as good as your capability to maintain and control: allocation, distribution and use. Issuing keys on a lowest level helps to maintain more of the available resources for future needs, thus, extending the life of the system. Top Master Key Level

TYPES OF ACCOUNTABILITY What access do they have? Who has what key? What can they access? A $3.00 key can open: an office, a building, your home, your lab, your safety deposit box… What is that key really worth? Wouldn’t you want to get that key back? TOTAL REKEY: Each key is accounted for from the beginning In a 100% rekey project, there is total key accountability. EXISTING KEY INFORMATION: Only good as the information brought forward Over the years people come & go, keys get left in desks or given to someone to pass on, etc. Who has what key? Different access for different people. Is there a procedure if a key is not returned to the key rep, who pays for the rekey? What access do they have? MODIFIED EXISTING INFORMATION: Existing Key & Bldg Records for interior Rekeyed Exterior doors: NO Keys given & Access through Card Reader Doors

Blake Holmes Unique Key Identifiers Discovering Problem Areas Web Based Software

PREMARKED SEQUENTIAL NUMBERING Unique Identifiers Existing Key Systems Key Code Displayed at Top of Key Uniquely Identified using alpha-numeric symbol, Our Program is using “K-1, K-2, …” Entered into Key Tracking Software as key inventory meetings are held. Example: E1C4B5-A7, E1C4B5-A8, etc New Key Systems No Key Code Displayed on Key Uniquely Identified with Premarked Sequential Numbers, to avoid number duplication Entered into Key Tracking Software at time that key is cut Prevents users from finding lost keys and knowing where they allow access Restricted Keyway – Only allows keys to be cut and ordered by University Authorized Personnel Example: 0000111, 0000112, 0000113, etc ALPHA-NUMERIC SYMBOL PREMARKED SEQUENTIAL NUMBERING

Discovering Problem Areas Existing Key Systems All Doors that get inventoried have the change key entered for tracking purposes Any cross keying can be added in the “Additional Keys” Field All accidental Ghost Keys that work in this door are shown. Example Key Inventory and Purge shows door with 3 different keys crossed into single core Software shows that in addition to 3 intended keys, an additional 25 keys would work that door. Security has been reduced to allow for easy access into this space.

Key Tracking Software Individual Key Identification Markings (Sequential Numbering) – Allow to track life of individual key All keys assigned to individual holder, including date in which those keys were assigned Notes indicating location key is intended to work. We include this information for the Key Representative to view which helps in reissuing keys previously assigned to departed faculty members Only shows keys that belong to a Holder under the key representative or on doors within that Representatives assigned area.

Request Keys for a Specific Holder Allows for University Lock Shop and Campus Security to determine Security Level Can Assign Holder to key prior to issuance, allows University to know will have access to areas on campus Request By Door – Not By Key Code Can limit access to building areas by issuing lowest level possible for the individual key request Previously, people would request Master Keys for access to individual office, allows too many people in secure areas University “High Security Areas” have been identified, and any requests for these areas must get appropriate clearance prior to issuance of keys.

Key Holder Inventory Track Individual Holders Keys Checklist To Take Back Keys Upon Separation Return Lost Key(s) to Proper Owner Determine Access To High Security Areas Increase Holder Accountability

We will now open up the panel for any questions. Thank You !!!