Professional Retail Store - September/October 2014 - (Page 69)

Key System Management: Five Critical Components Abstracted from "Five Critical Components of Key System Management," by Katie Willie K ey systems can be a daunting task to manage; whether you're starting from scratch or re-vamping your current system, the white paper The Five Critical Components of Key System Management will help you delve into every aspect of key control management. From choosing a system to establishing your policies and procedures, we'll walk you through the difficult tasks as well as ones you probably haven't thought about. Many organizations have key systems in place, but unless they are setup and managed properly, they can become ineffective and/or cost the organization hundreds to thousands of dollars in unnecessary rekeys. There is a gradient of key control, and organizations land somewhere on the scale. Your job is to decide if you are comfortable with where your organization is on that scale. Should you decide to re-evaluate your program, there are five main components to consider: *  ey system philosophy K  * olicies P  * rocedures P  * ekey avenue R  * ecords management R  KEY SYSTEM PHILOSOPHY Before you start evaluating key system options, decide what purpose your key system will serve. Should keys simply lock the doors, or do you want them to be restricted and/or serve as an audit trail? Do you want something that can easily be rekeyed but costs more up-front, or do you want a standard setup that is more costly to rekey? Does your facility require personnel to have access to different doors with the use of a master key system? This determination will establish the foundation for your entire setup and will guide you in selecting a system type and cylinder type. SYSTEM TYPE There are three main types of systems available in today's market: *  nrestricted systems U  * estricted systems R  * roprietary systems P  As you move up the scale from unrestricted to proprietary, your cost will increase; however, so will the level of security. With the increased level of security come a few considerations; however, these considerations are precisely the things that keep your system secure. CYLINDER TYPE Once you select your system type, you will need to determine the type of cylinder you want to use. You will need to choose among three options: * tandard cylinders S  *  I  nterchangeable cylinders *  e  Cylinders Similar to system types, the cost will increase as you move from standard cylinders to eCylinders; however, this increased cost will save money in the long run. Interchangeable cylinders and eCylinders are much easier to rekey than standard cylinders. Be aware that once you select a system type, you are committed. Switching from one type to another, especially from standard to interchangeable and vice versa, often necessitates all new hardware which can be very costly. SYSTEM OPTIONS There are two main options that make both using and administering key systems much easier: user-rekeyable cylinders and master systems. User-rekeyable cylinders allow one to easily swap out a core without ever calling a technician. While more expensive at the onset, this option saves organizations an abundance of time and money. Master key systems eliminate the need for a massive key ring; they allow for different levels of access to each lock. This means that your store manager can carry one key that opens all of the doors, while your shift lead can carry a key that just opens the front door and merchandise case. Likewise, if your DM is tired of keeping track of keys for each of his stores, you can give him one key that will give him entry into all stores in his region (see Figure 2). POLICIES Now that you have your foundation set, it's crucial that you outline policies and implement a structure that will enforce them. Critical policies to develop include but are not limited to: *  ow many keys should be issued per store? H  *  ho is allowed to carry those keys? W  *  ow are key orders placed? H  *  hen is the key system installed on new store openings? W  *  hat do you do with keys when a store closes? W  A key to enforcing these policies is finding a vendor that will partner with you. If your vendor is not willing to adhere to your policies, your system will lose some of its integrity. You need your vendor to help police and enforce the structure you set up. PROCEDURES It is important to note that having key system policies is not enough to maintain your system's integrity. An equally critical component www.prsm.com I SEPTEMBER/OCTOBER 2014 I 69 http://www.prsm.com

Table of Contents for the Digital Edition of Professional Retail Store - September/October 2014

President’s Message
Executive Director’s Column
New PRSM Members
Association 101
Business in Canada
Technology Roundup
PRSM News
Roofing Warranties
Fire Protection for Rolling Doors
Retail Events
Self-Performing Lighting Contractors and the Loch Ness Monster
Boma Every Building Conference
The Need to Reevaluate Network Security
Proper Handling of Hazardous Waste
PRSM Whitepapers
Key System Management
Inside PRSM
Advertisers’ Index

Professional Retail Store - September/October 2014

https://www.nxtbook.com/naylor/PRSS/PRSS0518
https://www.nxtbook.com/naylor/PRSS/PRSS0418
https://www.nxtbook.com/naylor/PRSS/PRSS0318
https://www.nxtbook.com/naylor/PRSS/PRSS0218
https://www.nxtbook.com/naylor/PRSS/PRSS0118
https://www.nxtbook.com/naylor/PRSS/PRSS0617
https://www.nxtbook.com/naylor/PRSS/PRSS0517
https://www.nxtbook.com/naylor/PRSS/PRSS0417
https://www.nxtbook.com/naylor/PRSS/PRSS0317
https://www.nxtbook.com/naylor/PRSS/PRSS0217
https://www.nxtbook.com/naylor/PRSS/PRSS0117
https://www.nxtbook.com/naylor/PRSS/PRSS0616
https://www.nxtbook.com/naylor/PRSS/PRSS0516
https://www.nxtbook.com/naylor/PRSS/PRSS0416
https://www.nxtbook.com/naylor/PRSS/PRSS0316
https://www.nxtbook.com/naylor/PRSS/PRSS0216
https://www.nxtbook.com/naylor/PRSS/PRSS0116
https://www.nxtbook.com/naylor/PRSS/PRSS0615
https://www.nxtbook.com/naylor/PRSS/PRSS0515
https://www.nxtbook.com/naylor/PRSS/PRSS0415
https://www.nxtbook.com/naylor/PRSS/PRSS0315
https://www.nxtbook.com/naylor/PRSS/PRSS0215
https://www.nxtbook.com/naylor/PRSS/PRSS0115
https://www.nxtbook.com/naylor/PRSS/PRSS0614
https://www.nxtbook.com/naylor/PRSS/PRSS0514
https://www.nxtbook.com/naylor/PRSS/PRSS0414
https://www.nxtbook.com/naylor/PRSS/PRSS0314
https://www.nxtbook.com/naylor/PRSS/PRSS0214
https://www.nxtbook.com/naylor/PRSS/PRSS0114
https://www.nxtbook.com/naylor/PRSS/PRSS0613
https://www.nxtbook.com/naylor/PRSS/PRSS0513
https://www.nxtbook.com/naylor/PRSS/PRSS0413
https://www.nxtbook.com/naylor/PRSS/PRSS0313
https://www.nxtbook.com/naylor/PRSS/PRSS0213
https://www.nxtbook.com/nxtbooks/naylor/PRSS0113
https://www.nxtbook.com/nxtbooks/naylor/PRSS0612
https://www.nxtbook.com/nxtbooks/naylor/PRSS0512
https://www.nxtbook.com/nxtbooks/naylor/PRSS0412
https://www.nxtbook.com/nxtbooks/naylor/PRSMBestPractices2012
https://www.nxtbook.com/nxtbooks/naylor/PRSS0312
https://www.nxtbook.com/nxtbooks/naylor/PRSS0212
https://www.nxtbook.com/nxtbooks/naylor/PRSS0112
https://www.nxtbook.com/nxtbooks/naylor/PRSG0011
https://www.nxtbook.com/nxtbooks/naylor/PRSS0611
https://www.nxtbook.com/nxtbooks/naylor/PRSS0511
https://www.nxtbook.com/nxtbooks/naylor/PRSS0411
https://www.nxtbook.com/nxtbooks/naylor/PRSS0311
https://www.nxtbook.com/nxtbooks/naylor/PRSS0211
https://www.nxtbook.com/nxtbooks/naylor/PRSS0111
https://www.nxtbook.com/nxtbooks/naylor/PRSS0610
https://www.nxtbook.com/nxtbooks/naylor/PRSS0510
https://www.nxtbook.com/nxtbooks/naylor/PRSS0410
https://www.nxtbook.com/nxtbooks/naylor/PRSS0310
https://www.nxtbook.com/nxtbooks/naylor/PRSS0210
https://www.nxtbook.com/nxtbooks/naylor/PRSS0110
https://www.nxtbook.com/nxtbooks/naylor/PRSS0609
https://www.nxtbook.com/nxtbooks/naylor/PRSS0509
https://www.nxtbook.com/nxtbooks/naylor/PRSS0409
https://www.nxtbook.com/nxtbooks/naylor/PRSS0309
https://www.nxtbook.com/nxtbooks/naylor/PRSS0209
https://www.nxtbook.com/nxtbooks/naylor/PRSS0109
https://www.nxtbookmedia.com