Key Control and Data Security: Protecting Your Customer's Files
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
2340-002-ASSA ABLOY Key Control Design Guide
Key Control Design Guide Increase the Safety and Security of Your Facility A security solution from ASSA ABLOY Group brands: CORBIN RUSSWIN | MEDECO | SARGENT | YALE Contents I. Introduction . 2 II. Recommended Companion Document . 3 III. Comprehensive Model Key Control Policy a. Purpose. 4 b. Specification. 5 c. Enforcement . 6 d. Elements of a Key Control Policy . 7 Key Control Authority (KCA). 7 Storage. 7 Key Management Formats . 8 Record Keeping . 10 Policies and Procedures . 10 1. Identifying Keys and Keying 2. Issuing Keys 3. Returning Keys 4. Non-returned key policy 5. Administration of the Master Key System 6. Audits 7. Transfer/Temporary use Forms. 13 Servicing . 15 IV. Condensed Model Key Control Policy . 16 V. Specific Applications: a. Educational K-12. 18 b. Healthcare Facilities . 19 c. Colleges and Universities . 21 d. Office Buildings. 22 VI. Glossary of Terms and Definitions. 23 © ASSA ABLOY SALES & MARKETING GROUP INC. 2005, 2006, 2007. All rights reserved. 3 Introduction This “Key Control Design Guide” is brought to you by ASSA ABLOY, the world’s leading group of manufacturers and suppliers of locking solutions, dedicated to satisfying end-users’ needs for security and safety. Providing key systems and associated hardware is only the beginning. For end-users to successfully enjoy the benefits of the products we furnish, and to extend the life and value of a key system, proper policies must be in place. The policies and procedures suggested in this manual can play an essential part in increasing the safety and security of any facility. This manual should be used as a model or guide only. -
LOCKSMITH Dictionary
LOCKSMITH Dictionary Copyright , 1982 by the ALOA Sponsored National Task Group for Certified Training Programs, Master Keying Study Group Copyright , 1983 by the ALOA Sponsored National Task Group for Certified Training Programs, Master Keying Study Group Revised June, 1984 Copyright , 1996 by the Lock Industry Standards and Training Council, Master Keying Study Group Copyright , 1997 by the Lock Industry Standards and Training Council Copyright , 2000 by the Lock Industry Standards and Training Council Copyright , 2001 by the Lock Industry Standards and Training Council Copyright , 2002 by the Lock Industry Standards and Training Council Copyright , 2003 by the Lock Industry Standards and Training Council Copyright , 2004 by the Lock Industry Standards and Training Council Copyright , 2005 by the Lock Industry Standards and Training Council Copyright , 2006 by the Lock Industry Standards and Training Council Copyright , 2007 by the Lock Industry Standards and Training Council Copyright , 2009 by the Lock Industry Standards and Training Council Copyright , 2010 by the Lock Industry Standards and Training Council Copyright , 2011 by the Lock Industry Standards and Training Council Copyright , 2012 by the Lock Industry Standards and Training Council Study group and LIST Council members have included: Jerome Andrews Vaughan Armstrong Jimmy Benvenutti Greg Brandt Breck H. Camp Joe Cortie Billy B. Edwards Jr. Ken Ehrenreich G.L. Finch Dorothy Friend Kristine Gallo Ray Hern A.J. Hoffman Wiegand Jensen David J. Killip Mike Kirkpatrick William Lynk Gordon S. Morris Dan Nicholson Don O'Shall Brian O'Dowd Lloyd Seliber Jon Payne Sharon Smith John Truempy Roger Weitzenkamp Jym Welch All rights reserved. Permission is hereby granted to reprint terms and definitions contained herein with the following stipulations: 1. -
7000-0581: Government Products Price List
Effective November 15, 2019 z Government Products Price List Security Products Made To Meet Exacting U.S. Government Standards MAKE-TO-ORDER CAPABILITY SECURITY PRODUCTS BUILT AND KEYED TO YOUR REQUIREMENTS 1 SHACKLE OPTIONS Choose extra length shackles 2 KEYING FLEXIBILITY Over 60 padlock, door hardware and interchangeable core keyways available Choose keying – KD, KA, MK, GMK 3 CHOOSE CUSTOM LASER ENGRAVING ON SOLID BRASS LOCKS EDGE® KEY CONTROL ADVANCED CYLINDER Prevents unauthorized TECHNOLOGY duplication of keys Excellent protection against lock bumping To learn more about Government Table of Contents security products and accessories, Terms of Sale 3 contact your dealer or visit Ordering Information 3 americanlock.com and BumpStop® 4 masterlock.com Government Products 5 American Lock - Build Your Lock 6 - New NSN Listing 8 - Existing NSN Listing 9 24/7 On-Line Ordering Master Lock & Quoting Resource* - Build Your Lock 10 MasterLockShop.com - NSN Listing 11 Accurately enter orders, - Resettable Combination Locks 13 validate key numbers and - Key Cabinets 14 create laser engraved orders. Service Parts 14 * A Master Lock account number is required to use this system. No minimum order size. TERMS OF SALE THE MASTER LOCK COMPANY TERMS OF SALE – EFFECTIVE NOVEMBER 2019 All orders are subject to acceptance by Master Lock Company LLC, Milwaukee, Wisconsin, USA PRICES: ■ Concealed damages must be reported within five business days of ■ All prices are stated in US dollars ($). receipt of merchandise in order to determine liability. ■ Orders are subject to prevailing prices on order acceptance date. ■ All carriers’ claims on Prepaid (or Prepay & Add) shipments are filed by ■ 10% will be added for less than Master Carton quantities per customer Master Lock Company LLC. -
Regulatory Guide 5.12, Revision 1
U.S. NUCLEAR REGULATORY COMMISSION October 2016 OFFICE OF NUCLEAR REGULATORY RESEARCH Revision 1 Technical Lead A. Tardiff REGULATORY GUIDE REGULATORY GUIDE 5.12 (Draft was issued as DG-5027, dated January 2015) GENERAL USE OF LOCKS IN THE PROTECTION AND CONTROL OF: FACILITIES, RADIOACTIVE MATERIALS, CLASSIFIED INFORMATION, CLASSIFIED MATTER, AND SAFEGUARDS INFORMATION A. INTRODUCTION Purpose This regulatory guide (RG) describes methods and procedures that the staff of the U.S. Nuclear Regulatory Commission (NRC) considers acceptable for the selection, use, and control of locking devices. Locks can be used in the protection of: areas, facilities, certain radioactive materials, and specific types of information (e.g., classified matter, National Security Information (NSI), Restricted Data (RD), Formerly Restricted Data (FRD), Safeguards Information (SGI)). Applicable Regulations • U.S. Code of Federal Regulations, “Domestic Licensing of Production and Utilization Facilities,” Part 50, Chapter I, Title 10, “Energy” (10 CFR Part 50), (Ref. 1). Specifically Section 10 CFR 50.34 "Contents of applications" requires under (c)(1) that "[e]ach applicant for an operating license for a production or utilization facility that will be subject to §§ 73.50 and 73.60 of this chapter must include a physical security plan" and under (c)(2) "[e]ach applicant for an operating license for a utilization facility that will be subject to the requirements of § 73.55 of this chapter must include a physical security plan…" • 10 CFR Part 50, Appendix R, “Fire Protection Program for Nuclear Power Facilities Operating Prior to January 1, 1979,” requires under III.N.4, that the fire brigade leader shall have ready access to keys for any locked fire doors. -
Table of Contents
Table of Contents Ordering Information .....................................A1 General Information .......................................A3 New Products ..........................................B5 Kwikset Signature Series ........................C19 Handlesets ....................................................C20 Levers ............................................................C21-22 Knobs ............................................................C23-24 Combo Packs ................................................C25 Deadbolts ......................................................C26 Kwikset ...................................................D27 Handlesets ....................................................D28 Levers ...........................................................D29 Knobs ............................................................D30-31 Combo Packs ................................................D32 Project Packs ................................................D33 Deadbolts ......................................................D34 Electronic Locks ......................................E35 Deadbolts ......................................................E35 Levers ...........................................................E35 Light Commerical ....................................F37 Key Control Deadbolt ...................................F37 Parts & Accessories ................................ Latches ..........................................................G39 Rekeying Kit & Parts ......................................G40 -
Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions
Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions Effective January 1, 2017 TABLE OF CONTENTS Introduction 1 Large Format Interchangeable Cores 54 How to Order 4 Knob, Lever and Deadbolt Replacement Cylinders 55 Multiple Platforms – A Security Level for Every Need 6 Foreign Cylinders 65 MT5®+ Platform Introduction 7 Deadbolts & Deadlatches 68 Interactive®+ Platform Introduction 8 Grade 1 Hercular® Deadbolts 69 ClassicPro™ Platform Introduction 9 Hercular® Anti-Ligature & Latch Locks 72 Access Control, Keyless Entry & Smart Solutions 10 Grade 2 Cronus® Deadbolts 74 CLIQ® E-Cylinders & Smart Key Solutions 11 Locksets & Hardware 75 SMARTair® Access Control Solutions 17 Rim Locks 76 SMARTair® E-Motion Electronic Cabinet & Locker Locks 23 Mortise Locks 77 DONNA™ Multifamily and Hospitality 25 Lever & Knob Locks 78 Code-It™ Electronic Pushbutton Levers 27 Utility, Furniture & Retail Locks 80 KonnectLock™ (Formerly WatchLock™) 29 Padlocks 86 Traka® Key & Asset Management Solutions 32 ArmaD Locks 92 ENTR™ Smart Lock Solution 34 Mul-T-Lock Junior 95 GotU®+ Digital Door Viewers 37 Mul-T-Lock Parts 97 Yale® Real Living™ Residential Digital Locks 39 Cylinder Parts - Pins 100 Mul-T-Lock Keys, Keying Options & Services 41 Cylinder Parts 114 MT5®+ Keys & Cards 42 Hercular® Deadbolt Parts 152 Interactive®+ Keys & Cards 43 Anti-Ligature Deadbolt & Gate Latch Lock Parts 156 Old Interactive Keys 43 Top Guard® Parts 157 ClassicPro™ Keys & Cards 44 Utility & Furniture Lock Parts 158 Classic / Integrator® Keys & Cards 44 Padlock Parts 174 Services 46 Key Cutting Machine Parts 186 Machinery, Pinkits & Tools 47 Standard Ordering Form 190 Locksmith Tools 48 Master Keying Information 191 Cylinders 50 Key & Cylinder Maintenance 194 Mortise Cylinders 51 Warranty 196 Mogul Cylinders 51 Conditions of Sale 198 Rim Cylinders 53 Available Finishes 203 Established in 1973, Mul-T-Lock is a worldwide leader in the developing, manufacturing, and marketing of high security products for Institutional, Commercial, Industrial, and Residential customers. -
1 Opening Locks by Bumping in Five Seconds Or Less: Is It Really a Threat to Physical Security? a Technical Analysis of The
A Technical Analysis of Bumping © 2006 Marc Weber Tobias and Investigative Law Offices Document 060922107 OPENING LOCKS BY BUMPING IN FIVE SECONDS OR LESS: IS IT REALLY A THREAT TO PHYSICAL SECURITY? A TECHNICAL ANALYSIS OF THE ISSUES Released on April 4, 2006 on http://www.security.org © 2006 Marc Weber Tobias, Investigative Law Offices The information contained in this report appears as part of a comprehensive treatment of bumping in the 2006 version of LSS+, the Multimedia Edition of Locks, Safes and Security by the same author. Appreciation is expressed to Barry Wels and Han Fey for their technical input and assistance in developing certain materials for this document. Our office is consulting with manufacturers to develop standards for testing cylinders against bumping. Currently, testing laboratories are not adequately addressing this issue. Videos that demonstrate the vulnerability of public and private mailbox locks are available to law enforcement agencies. The author may be contacted at +1.605.334.1155 or [email protected]. Many standard five and six pin tumbler locks can be opened rapidly through a technique known as bumping with a key similar to that shown above. Some high security locks can also be opened with this technique. These diagrams show how the bump key operates in a pin tumbler lock. One technique requires that the key (left) be withdrawn by one tumbler position and then slammed into the lock. This will cause the top pins (right) to bounce and separate from the bottom pins, thereby creating a gap at the shear line that will allow the plug to turn. -
About Locks and Ways to Low Tech Hack Them 3
CHAPTER More about locks and ways to low tech hack them 3 INFORMATION IN THIS CHAPTER • A Little More about Locks and Lock Picking • Forced Entry—And Other Ways to Cheat! • Let’s Break into a Semi–High Security Room • Keys and Key Control • Bait and Switch War Story That Could Happen to You • Some Places to Go to Learn and Have Some Fun • More about Keys and How to Make One If You Don’t Have One • Ways to Make a Key If You Didn’t Bring a Key Machine • One Final Lock to Talk about and Then We’re Done As I was preparing to write this chapter, I found myself thinking back over the past 45 years of my life. I consider myself one of the most blessed people on the planet when I think about all the things that I’ve been able to do and learn. I be- came somewhat of a techno geek while attending vocational-technical high school back in the mid-sixties. I’ve found electronics to be absolutely fascinating. In my senior year I was able to design a variable-speed (computerized) control for a synchronous motor using a handful of transistors. It was considered by the school to be their first computerized control of an AC synchronous motor. When I visited the school about 10 years later, I was pleasantly surprised to see that they were still using the training manual that I had written describing how to construct this comput- erized control. It had taken me weeks to figure out how to do this. -
Visit Us Online! Catalog No
PRODUCTS VISIT US ONLINE! CATALOG WWW.MOVENSTORE.COM NO. 41 About Move ‘N Store MOVE ’N STORE is one of the oldest and largest national suppliers of moving and storage, packaging and security products to the world-wide self-storage and self-move industries. Whether you operate one facility, a handful or hundreds, Move ’N Store’s unparalleled products, service and delivery can help you increase retail sales and profits, streamline the ordering process and insure your customers’ satisfaction. MOVE ’N STORE PRODUCTS Move ’N Store offers a full line of self-storage/self move retail products including: • Padlocks • Mattress and furniture covers • Moving and storage boxes (in selected markets) • Moving tools and accessories • Packing materials All Move ’N Store moving and storage products, including boxes and packaging materials, carry our Professional Movers Grade seal, your guarantee of quality and product reliability. These products are certified by Move ’N Store to meet or exceed the rigorous quality and performance standards demanded by moving industry professionals. In addition to retail products, Move ’N Store also offers facility maintenance products such as keyed-alike padlocks, lock removal tools, shelving and replacement door hardware, as well as exclusive products including the MiniWrite manual bookkeeping system, Everbrite™ protective door coatings and Ideal Shield bumper post sleeves. SERVICE COMMITMENT All Move ’N Store Customer Account Representatives, distribution specialist and customer service personnel, are experienced industry professionals who are committed to your complete satisfaction. And we guarantee it. If there’s ever a problem with an order, a delivery or a Move ’N Store product, we’ll make it right...right away. -
VA HANDBOOK 0730/4 Washington, DC 20420 Transmittal Sheet March 29, 2013
Department of Veterans Affairs VA HANDBOOK 0730/4 Washington, DC 20420 Transmittal Sheet March 29, 2013 SECURITY AND LAW ENFORCEMENT 1. REASON FOR ISSUE: This Handbook establishes mandatory procedures for protecting lives and property within VA's jurisidiction, by updating Appendix B, "Physical Security Requirements and Options." This issue provides updated requirements for securing temporary storage facilities of information technology equipment, and providing other updated physical security requirements. 2. SUMMARY OF CONTENTS AND MAJOR CHANGES: a. Summary. This replaces Appendix B of VA Handbook 0730, August 11, 2000. This Appendix sets forth specific requirements and options for protecting VA people and assets. b. Major Changes (1) Inserted physical security requirements specific to protecting VA information technology assets in temporary storage or staging areas. (2) Inserted a policy requirement for annual physical security surveys of key activities and spaces withinVA's jurisdiction. (3) Corrected errata and misnumbered paragraph items in the previous version of this Handbook. 3. RELATED DIRECTIVES: VA Directive 0730, May 27, 2010. 4. RESPONSIBLE OFFICE: The Police Service (07B), Office of Security and Law Enforcement, Office of Operations, Security, and Preparedness is responsible for the material contained in this handbook. 5. RESCISSION: Appendix B of VA Handbook 0730/2 May 27, 2010 is rescinded and replaced with this version. CERTIFIED BY: BY DIRECTION OF THE SECRETARY OF VETERANS AFFAIRS: lsI lsI Stephen W. Warren Jose D. Riojas -
7000-0575: Commercial Price List November 2018
Effective November 1, 2018 Electronic Update November 2018 2018 Commercial Security Price List Master Lock offers the widest range of high quality, customizable, security products available. Businesses and facilities have security needs that require strong, durable products with the ability to adapt to unique applications as well as multiple users. Master Lock continues to expand its commercial products and services to provide customers security solutions for all security points. And, all products are backed by our dedicated Customer Service and Sales teams. MAKE-TO-ORDER CAPABILITY SECURITY PRODUCTS BUILT AND KEYED TO YOUR REQUIREMENTS 1 SHACKLE OPTIONS Choose different shackle materials and extra length shackles 2 KEYING FLEXIBILITY Dept. 502 Over 60 padlock, door hardware and interchangeable core keyways available Choose keying – KD, KA, MK, GMK 3 CHOOSE CUSTOM MARKING Laser engraving, hard stamping and pad printing EDGE® KEY CONTROL ADVANCED CYLINDER SERVICE PARTS Prevents unauthorized TECHNOLOGY Support for dealers duplication of keys Excellent protection against lock bumping 24/7 On-Line Customer Service Online Resources Ordering & & Sales Support MasterLock.com * Quoting Resource 1-800-308-9242 MasterLockShop.com MasterLockShop.com Over 75 dedicated and Masterease.com Accurately enter orders, knowledgeable employees BuildYourLock.com validate key numbers ready to serve you. MasterLockImages.com and create laser engraved orders. * A Master Lock account number is required to use this system. No minimum order size. TERMS OF SALE THE MASTER LOCK COMPANY TERMS OF SALE – EFFECTIVE NOVEMBER 2018 All orders are subject to acceptance by Master Lock Company LLC, Milwaukee, Wisconsin, USA PRICES: ■ Concealed damages must be reported within five business days of ■ All prices are stated in US dollars ($). -
ELECTRONIC KEYCARD ACCESS LOCKS Presented by Fred A
ELECTRONIC KEYCARD ACCESS LOCKS Presented by Fred A. Crum, AHC,MHS SAFLOK 2608 Manor Oak Drive Valrico, FL 33594 Telephone ~ 813-643-3344 Email ~ [email protected] AUGUST 3, 2005 YESTERDAY WAS MECHANICAL Manual Key Control Pinning charts Manual record keeping Inventory of keyways “DO NOT DUPLICATE” Key cutting machine Keys cut improperly Today is Electronic Computerized Key Control Electronic Database Automatic record keeping Inventory of keycards User name assigned to the keycard Keycard Encoder Keycard code verified when encoded New keycard recodes lock upon insertion PRIMARY BENEFITS Lock is re-keyed upon insertion of new Keycard Stand alone battery power eliminates hard wiring Lower installation cost since there’s no wires to pull Keycards are identified by NAME or NUMBER Memory keycards remember where they have been Control entry by assigning specific times Lock captures date, time, and ID of who entered Multiple levels of Master Keying available Permits mechanical key override using IC Cores HISTORY 1970’s First battery powered locks arrive Used Optic Technology Punched hole cards Easily duplicated Small Microprocessor 8k 8 Keycard levels 1980’s First Magnetic Keycards arrive Magnetic Stripe eliminated keycard duplication Keycards became reusable Audit trail is added with 14 audits Relative time is added Keycard ID is added Microprocessor grows 32k 16 keycard levels MORE HISTORY Microprocessor grows to 64K Audit trail grows to 40 audits Time parameters are added 1990’s Hardware becomes available to