Key Cabinets
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Medeco Product Catalog
2021 Product Catalog U.S. Prices Effective May 1, 2021 2021 Product Catalog 3 Table of Contents Medeco Mechanical Technologies Key Control ..............................................................................4 Medeco 4 High Security Locking System .........................67 How to Order ..........................................................................8 BiLevel Technology ................................................................68 Online Tools ............................................................................9 Medeco X4 Technology ........................................................69 Record of Authorization (ROA) User Guide .....................10 Shipping and Returns Policy ...............................................13 Medeco B Technology ..........................................................113 Warranty .................................................................................15 Architectural Specifications ................................................16 Mechanical Products Professional Services ............................................................19 Rim and Mortise Cylinders ..................................................71 Intelligent Key Systems Key-In-Knob/Lever Cylinders ..............................................82 Interchangeable Cores .........................................................104 Medeco XT...............................................................................23 LFIC ..........................................................................................................104 -
Keying Systems and Nomenclature
KEYING SYSTEMS AND NOMENCLATURE Keying Procedures, Systems, and and the authors of the previous FOREWORD Nomenclature was first published in editions should take pride in the 1965, revised in 1969, 1975 and again results. in 1978. It introduced a procedural There are still some misapplications system of keying terminology radically and misunderstandings of the system different from that commonly used and it is the purpose of this edition to prior to 1965. The need for standard clarify the system to avoid terminology was clear but the misunderstanding. With this in mind, acceptance of the new system was text and format changes have been slow. made with the aim of introducing Manufacturers, Distributors, Building criteria in their order of complexity, to Owners, and Operators were make the manual an even better frustrated over the use of various and instructional tool for those progressing differing terms. Among those using the through basic, intermediate, and terms, different meanings and advanced study of the subject. interpretations were applied. As a Since the manual does not cover result, errors were made, and frequent actual keying procedures, the title of correspondence occurred between the manual has been changed. For manufacturers and distributors, those interested in the actual seeking clarification. The consumer techniques of keying or the sometimes had a sketchy mathematics of setting up a key understanding of the key system he system, many fine books and had purchased. publications are offered by the lock- Since its inception, the procedures smithing industry. outlined in this manual have been taught at the DHI Technical Programs Robert Perry, AHC/CDC John R. -
Keys a Key Is an Instrument That Is Used to Operate a Lock
CSCLA PRESS September 19th Time 7:00pm At the Church CSCLA CSCLA President Secretary Mike Middick, CML Pete Henley Middick’s Locksmith Shop Henley's Key Service 1422 Royal Gorge Blvd. 117 E Boulder St. Canon City CO 81212-3908 Colorado Springs CO 80903 Ph. 719-275-7787 Fax 719-275-3278 719 338-0889 Email - captkeyman@ gmail.com Email - [email protected] Vice-President Members at Large Paul Arens 141 E Navajo Carl Price Colorado Springs CO 80906-2255 Ron Cox 719-632-5085 Steve Cormier Email - [email protected] Treasurer Newsletter Editor Barry Meyer, CPL Acoma Locksmith Service Could be you. 421 Perry St. Now awaiting for you to volunteer! Castle Rock CO 80104-2442 303-688-4104 Send info to the president. Email - [email protected] CSCLA STATEMENT OF MISSION & PURPOSE The mission and purpose is to encourage, promote, aid in and affect the voluntary interchange, among members of the CSCLA, of data, information, experience, ideas, knowledge, methods and techniques relating to the field of Locksmithing. Central & Southern Colorado Locksmith Association Founded 1991 DISCLAIMER The CSCLA Press is the publication of the Central & Southern Colorado Locksmiths Association. Other locksmith organizations may use or copy the CSCLA Press (except text taken from copyrighted publications) without written consent, provided it is used to better the industry and proper credit is given. We reserve the right to edit articles for clarity and space, and contributions remain the property of CSCLA. Any articles or opinions expressed in this publication unless identified by the author’s name or contributing organization are solely those of the editor. -
2340-002-ASSA ABLOY Key Control Design Guide
Key Control Design Guide Increase the Safety and Security of Your Facility A security solution from ASSA ABLOY Group brands: CORBIN RUSSWIN | MEDECO | SARGENT | YALE Contents I. Introduction . 2 II. Recommended Companion Document . 3 III. Comprehensive Model Key Control Policy a. Purpose. 4 b. Specification. 5 c. Enforcement . 6 d. Elements of a Key Control Policy . 7 Key Control Authority (KCA). 7 Storage. 7 Key Management Formats . 8 Record Keeping . 10 Policies and Procedures . 10 1. Identifying Keys and Keying 2. Issuing Keys 3. Returning Keys 4. Non-returned key policy 5. Administration of the Master Key System 6. Audits 7. Transfer/Temporary use Forms. 13 Servicing . 15 IV. Condensed Model Key Control Policy . 16 V. Specific Applications: a. Educational K-12. 18 b. Healthcare Facilities . 19 c. Colleges and Universities . 21 d. Office Buildings. 22 VI. Glossary of Terms and Definitions. 23 © ASSA ABLOY SALES & MARKETING GROUP INC. 2005, 2006, 2007. All rights reserved. 3 Introduction This “Key Control Design Guide” is brought to you by ASSA ABLOY, the world’s leading group of manufacturers and suppliers of locking solutions, dedicated to satisfying end-users’ needs for security and safety. Providing key systems and associated hardware is only the beginning. For end-users to successfully enjoy the benefits of the products we furnish, and to extend the life and value of a key system, proper policies must be in place. The policies and procedures suggested in this manual can play an essential part in increasing the safety and security of any facility. This manual should be used as a model or guide only. -
Key Machines & Parts
ORDER ONLINE www.SouthernLock.com KEY MACHINES & PARTS SECTION 8 Section Table of Contents C KEY MACHINES & PARTS Code Cards .................................. 407 For Key Programming Systems D see Section 1 - Automotive Deburring Brush ............................. 419 F Futura Pro ................................... 412 I ITL Key Machines ........................... 420 K Key Cutters ................ 411, 413, 419, 426 Key Machines ........................... 420–426 Key Punch .................. 402, 408, 423, 425 M Marking Devices.... 401–402, 404-412, 421-426 P Punch Machines ........... 402, 408, 423, 425 T Tubular Key Machines .......... 402, 403, 410 Vendors Bianchi ................................ 421–422 Framon ............................... 402–404 HPC .................................... 404–413 Ilco .................................... 401–402 Intralock ................................... 420 Keyline ..................................... 421 Laser Key Products ...................... 422 Medeco ............................... 420–421 Mul-T-Lock ................................ 423 Pro-Lok ............................... 423–424 Rytan .................................. 424–425 KEY MACHINES & PARTS Call, Toll Free Prices may not reflect recent price increases or manufacturer’s surcharges 1.800.282.2837 Section 8 - 400 Call, Toll Free 1.800.282.2837 KEY MACHINES & PARTS KEY MARKING DEVICES ™ ™ Engrave•It Engrave•It PRO Engrave-It is the perfect complement to This unit is capable of marking keys, typical lock cylinders (in- key -
September/October 2010 Issu E 24 – $14.00 TILJ Janfeb10:TILJ 1/20/10 12:38 PM Page 2
The I nde pe nd en t September/October 2010 L Issue 24 – $14.00 o c k s m i t h h h J J J o o o u u u r r r n n n a a a l l l TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 2 PETERSON DOES IT AGAIN! Introducing the PCT-7: Peterson Carbide Coring Tool Peterson’s new set of vending lock penetration tools make quick work of vending type lock openings including VAN lock, ABA DUO, ABLOY, BATON, 380 Tubular, 360 Tubular and 340 Tubular. The adaptor guides to a preset cutting dept insuring success every time! www.ThinkPeterson.com Standard Price: $224.95 585-264-1199 585-586-2425 (fax) Special Offer: ONLY $179.95 10am-6pm Eastern Time (Special pricing ends April 1, 2010) WE will open them — But YOU have to put them back together! TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 NOTE FROM THE EDITOR'S DESK Greetings from the editor’s desk!!! Note From The Editor’s Desk There is a lot of news in this issue. First I would like to give a great vote of thanks for the efforts of Mike Pecorella as he substituted for Don DennisNote after Don’s From sudden health The issues. (Don Editor’s still struggles at times,Desk but I happily notice continued improvement in him). Season’s greetings from the Editor’s desk! I hope all of our readers had a safe and enjoyable Mike Season’sstepped up greetingsto the plateholiday. -
Regulatory Guide 5.12, Revision 1
U.S. NUCLEAR REGULATORY COMMISSION October 2016 OFFICE OF NUCLEAR REGULATORY RESEARCH Revision 1 Technical Lead A. Tardiff REGULATORY GUIDE REGULATORY GUIDE 5.12 (Draft was issued as DG-5027, dated January 2015) GENERAL USE OF LOCKS IN THE PROTECTION AND CONTROL OF: FACILITIES, RADIOACTIVE MATERIALS, CLASSIFIED INFORMATION, CLASSIFIED MATTER, AND SAFEGUARDS INFORMATION A. INTRODUCTION Purpose This regulatory guide (RG) describes methods and procedures that the staff of the U.S. Nuclear Regulatory Commission (NRC) considers acceptable for the selection, use, and control of locking devices. Locks can be used in the protection of: areas, facilities, certain radioactive materials, and specific types of information (e.g., classified matter, National Security Information (NSI), Restricted Data (RD), Formerly Restricted Data (FRD), Safeguards Information (SGI)). Applicable Regulations • U.S. Code of Federal Regulations, “Domestic Licensing of Production and Utilization Facilities,” Part 50, Chapter I, Title 10, “Energy” (10 CFR Part 50), (Ref. 1). Specifically Section 10 CFR 50.34 "Contents of applications" requires under (c)(1) that "[e]ach applicant for an operating license for a production or utilization facility that will be subject to §§ 73.50 and 73.60 of this chapter must include a physical security plan" and under (c)(2) "[e]ach applicant for an operating license for a utilization facility that will be subject to the requirements of § 73.55 of this chapter must include a physical security plan…" • 10 CFR Part 50, Appendix R, “Fire Protection Program for Nuclear Power Facilities Operating Prior to January 1, 1979,” requires under III.N.4, that the fire brigade leader shall have ready access to keys for any locked fire doors. -
Locksmithstudyguide
State of Illinois Locksmith Licensing Examination Study Guide The State of Illinois Locksmith License Examination consists of 305 questions in multiple choice and true/false format. The Locksmith License Examination is offered in March and September of the calendar year. The examination is 4 hours long. The State of Illinois Locksmith License Examination covers the following subjects: Originating Keys by Code and the use of Code Equipment Candidates will need to know the correct terms used in codes, popular code series, a working knowledge of the methods of producing keys by code, types of codes, codebooks, code machines, and the proper use of a micrometer. Pin and Disc Cylinder Servicing Candidate should be familiar with lock cylinder terminology, be able to identify the parts of a cylinder and describe their functions and identify the parts of a key using the appropriate terminology. Common service malfunctions and the methods by which pin, and disc tumbler locks are master keyed should be studied. Some emphasis should be placed on professional methods of keying and pin kit types. The results of poor service procedures should be understood. Key Blank Identification Candidate should be familiar with the different types of keys in use today (i.e., barrel, bit, flat and cylinder) and be able to identify their parts. The four basic milling configurations and milling run-out must be understood. A good working knowledge of key blank numbers, both original and non-original, should be developed. Candidate should be able to correctly identify some common key silhouettes and sections. Candidate should be able to use a key blank cross-reference catalog. -
Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions
Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions Effective January 1, 2017 TABLE OF CONTENTS Introduction 1 Large Format Interchangeable Cores 54 How to Order 4 Knob, Lever and Deadbolt Replacement Cylinders 55 Multiple Platforms – A Security Level for Every Need 6 Foreign Cylinders 65 MT5®+ Platform Introduction 7 Deadbolts & Deadlatches 68 Interactive®+ Platform Introduction 8 Grade 1 Hercular® Deadbolts 69 ClassicPro™ Platform Introduction 9 Hercular® Anti-Ligature & Latch Locks 72 Access Control, Keyless Entry & Smart Solutions 10 Grade 2 Cronus® Deadbolts 74 CLIQ® E-Cylinders & Smart Key Solutions 11 Locksets & Hardware 75 SMARTair® Access Control Solutions 17 Rim Locks 76 SMARTair® E-Motion Electronic Cabinet & Locker Locks 23 Mortise Locks 77 DONNA™ Multifamily and Hospitality 25 Lever & Knob Locks 78 Code-It™ Electronic Pushbutton Levers 27 Utility, Furniture & Retail Locks 80 KonnectLock™ (Formerly WatchLock™) 29 Padlocks 86 Traka® Key & Asset Management Solutions 32 ArmaD Locks 92 ENTR™ Smart Lock Solution 34 Mul-T-Lock Junior 95 GotU®+ Digital Door Viewers 37 Mul-T-Lock Parts 97 Yale® Real Living™ Residential Digital Locks 39 Cylinder Parts - Pins 100 Mul-T-Lock Keys, Keying Options & Services 41 Cylinder Parts 114 MT5®+ Keys & Cards 42 Hercular® Deadbolt Parts 152 Interactive®+ Keys & Cards 43 Anti-Ligature Deadbolt & Gate Latch Lock Parts 156 Old Interactive Keys 43 Top Guard® Parts 157 ClassicPro™ Keys & Cards 44 Utility & Furniture Lock Parts 158 Classic / Integrator® Keys & Cards 44 Padlock Parts 174 Services 46 Key Cutting Machine Parts 186 Machinery, Pinkits & Tools 47 Standard Ordering Form 190 Locksmith Tools 48 Master Keying Information 191 Cylinders 50 Key & Cylinder Maintenance 194 Mortise Cylinders 51 Warranty 196 Mogul Cylinders 51 Conditions of Sale 198 Rim Cylinders 53 Available Finishes 203 Established in 1973, Mul-T-Lock is a worldwide leader in the developing, manufacturing, and marketing of high security products for Institutional, Commercial, Industrial, and Residential customers. -
About Locks and Ways to Low Tech Hack Them 3
CHAPTER More about locks and ways to low tech hack them 3 INFORMATION IN THIS CHAPTER • A Little More about Locks and Lock Picking • Forced Entry—And Other Ways to Cheat! • Let’s Break into a Semi–High Security Room • Keys and Key Control • Bait and Switch War Story That Could Happen to You • Some Places to Go to Learn and Have Some Fun • More about Keys and How to Make One If You Don’t Have One • Ways to Make a Key If You Didn’t Bring a Key Machine • One Final Lock to Talk about and Then We’re Done As I was preparing to write this chapter, I found myself thinking back over the past 45 years of my life. I consider myself one of the most blessed people on the planet when I think about all the things that I’ve been able to do and learn. I be- came somewhat of a techno geek while attending vocational-technical high school back in the mid-sixties. I’ve found electronics to be absolutely fascinating. In my senior year I was able to design a variable-speed (computerized) control for a synchronous motor using a handful of transistors. It was considered by the school to be their first computerized control of an AC synchronous motor. When I visited the school about 10 years later, I was pleasantly surprised to see that they were still using the training manual that I had written describing how to construct this comput- erized control. It had taken me weeks to figure out how to do this. -
VA HANDBOOK 0730/4 Washington, DC 20420 Transmittal Sheet March 29, 2013
Department of Veterans Affairs VA HANDBOOK 0730/4 Washington, DC 20420 Transmittal Sheet March 29, 2013 SECURITY AND LAW ENFORCEMENT 1. REASON FOR ISSUE: This Handbook establishes mandatory procedures for protecting lives and property within VA's jurisidiction, by updating Appendix B, "Physical Security Requirements and Options." This issue provides updated requirements for securing temporary storage facilities of information technology equipment, and providing other updated physical security requirements. 2. SUMMARY OF CONTENTS AND MAJOR CHANGES: a. Summary. This replaces Appendix B of VA Handbook 0730, August 11, 2000. This Appendix sets forth specific requirements and options for protecting VA people and assets. b. Major Changes (1) Inserted physical security requirements specific to protecting VA information technology assets in temporary storage or staging areas. (2) Inserted a policy requirement for annual physical security surveys of key activities and spaces withinVA's jurisdiction. (3) Corrected errata and misnumbered paragraph items in the previous version of this Handbook. 3. RELATED DIRECTIVES: VA Directive 0730, May 27, 2010. 4. RESPONSIBLE OFFICE: The Police Service (07B), Office of Security and Law Enforcement, Office of Operations, Security, and Preparedness is responsible for the material contained in this handbook. 5. RESCISSION: Appendix B of VA Handbook 0730/2 May 27, 2010 is rescinded and replaced with this version. CERTIFIED BY: BY DIRECTION OF THE SECRETARY OF VETERANS AFFAIRS: lsI lsI Stephen W. Warren Jose D. Riojas -
ELECTRONIC KEYCARD ACCESS LOCKS Presented by Fred A
ELECTRONIC KEYCARD ACCESS LOCKS Presented by Fred A. Crum, AHC,MHS SAFLOK 2608 Manor Oak Drive Valrico, FL 33594 Telephone ~ 813-643-3344 Email ~ [email protected] AUGUST 3, 2005 YESTERDAY WAS MECHANICAL Manual Key Control Pinning charts Manual record keeping Inventory of keyways “DO NOT DUPLICATE” Key cutting machine Keys cut improperly Today is Electronic Computerized Key Control Electronic Database Automatic record keeping Inventory of keycards User name assigned to the keycard Keycard Encoder Keycard code verified when encoded New keycard recodes lock upon insertion PRIMARY BENEFITS Lock is re-keyed upon insertion of new Keycard Stand alone battery power eliminates hard wiring Lower installation cost since there’s no wires to pull Keycards are identified by NAME or NUMBER Memory keycards remember where they have been Control entry by assigning specific times Lock captures date, time, and ID of who entered Multiple levels of Master Keying available Permits mechanical key override using IC Cores HISTORY 1970’s First battery powered locks arrive Used Optic Technology Punched hole cards Easily duplicated Small Microprocessor 8k 8 Keycard levels 1980’s First Magnetic Keycards arrive Magnetic Stripe eliminated keycard duplication Keycards became reusable Audit trail is added with 14 audits Relative time is added Keycard ID is added Microprocessor grows 32k 16 keycard levels MORE HISTORY Microprocessor grows to 64K Audit trail grows to 40 audits Time parameters are added 1990’s Hardware becomes available to