PURPOSE 1. Learn about a Master Key System and How it works 2. Learn about Master Levels/Hierarchy 3. Initial Planning 4. Questions to Ask 5. Key Control Best Practices What Is Master Key System? Systematic generation of security codes in a hierarchical structure Why Master Key? • To Protect People (Student and Facility) • To Protect Property (Valuable Assets) • To Protect Data/Information You Do All This: 1. Because it is part of your Responsibility 2. In order not to be determined negligent Basis Master Key Terms: 1. Barrel: Chamber of a core that accepts pin segments which then interact with the depths on keys to provide access control. Cores typically have six or seven barrels. 2. Cut: A single key depth, part of a code, corresponding to pin segments in a core. 3. Code: A sequence of cuts (six or seven) that complete the cutting information for a key and determine the combination of pin segments used in all the barrels of a core. Codes are commonly referred to as keys. The position of cuts in a code are referred to as barrels because of their association with cores. For example, a code of 3476289. There is a 3 cut in the first barrel; a 4 cut in the second barrel; a 7 cut in the third barrel, etc. 4. System Type: Name associated with a set of mathematical principles that determine how codes are generated, what depths are made on keys, and what pin segment types are used in cores. Basis Master Key Terms Cont: • 5. Control (CT): A key/code that extends and retracts the control lug of a core, allowing the core to be installed and removed from the lock. • 6. Grand Master (GM): A key/code that works all of the codes in a system. The GM code generates all other codes in the system. • 7. Master (M): A key/code that works a set portion of codes in the system. • 8. Submaster (SM): a key/code that works a set portion of codes within a Master. • 9. Operating: a key/code that only works its own combination; a single-function code. Example of Master Perimeters • 16,384 • 4,096 • 1,024 • 256 • 64 • 16 • 4 Example of College Hierarchy HIERARCHIES SPECIAL REQUIREMENTS Selectivity? – Definition: Crossing Codes not setup in the normal Hierarchy of the system. Issue: Creates other keys to operate the core other than crosses “Ghost Keys” Increases Liability or Risk • Selectivity (also called Cross-keying) works best if it is planned out before the system is installed • After the fact, it is much more difficult to control • Keep it as simple and limited as possible • Cross-keying can “eat-up” codes reducing the system capacity HIERARCHIES - SPECIAL REQUIREMENTS Reasons to Use Selective Masters 1. A person or group needs access to a lot of doors keyed under several Masters, but not every door under every Master • Decrease the size of your Master Key System • Increase Liability to those Selective Special Keys HIERARCHIES - SPECIAL REQUIREMENTS Selectivity INITIAL PLANNING Build a Security/Safety Team Departments to Consider: Administration Facilities Security/Campus Police Access Control IT Department Note: Keep the Security Team Small. You may not need all the members for Master Key Planning INITIAL PLANNING If possible, obtain copies of the door schedules or floor plans of your campus • This will give you an idea of the top level planning of the Master Key Plan • And Bottom Level Planning Floor to Floor INITIAL PLANNING Complexity can shorten the life of the system • • Strive to make the process & system as simple as possible while still satisfying the customers Plan around Departments not People. People Come and Go Departments and Building Structure Stay. QUESTIONS TO ASK: One system for the entire organization or separate systems? Example: Separate Facilities and Housing How many levels of keying? Masters, Sub Masters, Operator Keys How should we do the exterior doors? Single Key under Bldg Master Ext Door Core to pass all Codes for Master What about Services Rooms Mechanical, Electrical, Janitorial, Data Is electronic access control a better choice for high traffic/turnover areas? How do we key the electronic doors? QUESTIONS TO ASK: CONT Do you care if keys can be duplicated off campus? Difference between Standard or Patented Keyway Do you need different keyways or a multi-keyway system? Larger Campuses Bigger Systems KEY CONTROL BEST PRACTICES • All Support with Key Control has to come from the Top Down. • Grandmasters must have limited distribution. Everyone don’t need a GM. – GM’s are a tremendous liability to the facility if lost. • Good practice to set a Key Approval Structure (GM, Masters, Subs, and Operators etc) – Ex. President (GM), VP (Masters), etc. • • • • One show importance Two Maintain Control. Three Remove the pressure off Key Issuers Four Stop unwarranted key issuances KEY CONTROL BEST PRACTICES • Central Source for Key Cutting and Dispensing (ex Lock shop) • Good Practice to have HR at the Facility involved with the Key Shop (Lock shop) – Change over in personal is the big reason why key records don’t stay current – Piggy backing or keys getting past down without updating records is also part of this reason • Good Practice to have keys where they are needed in a secure location in order to minimize personal from carrying around keys all the time – – – – Example, Building Masters, Mechanical, Electrical, & Data Keys. Manual Key Sign out Retainer Box Setup Electro-mechanical Key Box KEY CONTROL BEST PRACTICES • Need to have Good Records • Know where cores are and what they are keyed to • Key sign out and return agreements • Being able to track who and where • Good Key Control Software – All this an more can be done with Software KEY CONTROL BEST PRACTICES • Make sure you have a plan for Key Changes or Lost Keys – Importance Level – How to administer Key Change – Documentation/Reporting – Liability? – Penalty? • Governing Body?
© Copyright 2024