Key Control Guide: Developing & Managing Key Control Policies & Procedures

This guide, presented by Medeco and ASSA ABLOY, offers comprehensive strategies for developing and managing effective key control policies and procedures. It is designed to enhance the security, safety, and convenience of facilities by providing best practices and actionable steps.

The document represents years of expertise from ASSA ABLOY, a global leader in door opening solutions, and Medeco Security Locks, a market leader in mechanical and electronic locks.

Disclaimer: This guide is intended for reference and as a model. Facilities are encouraged to adapt recommendations to their specific needs. ASSA ABLOY does not warrant fitness for any purpose beyond reference; use is solely at the adopting facility's discretion and responsibility.

I. Introduction

This manual is brought to you by ASSA ABLOY, the world's leading group of manufacturers and suppliers of locking solutions, dedicated to satisfying end-users' needs for security, safety, and convenience. It represents hundreds of years of best practices developed and observed by providing the world's finest key systems.

This manual recognizes that providing key systems and associated hardware is only the beginning. For customers to successfully enjoy the benefits of the products furnished, and to extend the life and value of a key system, a proper key management system must be in place. The policies and procedures suggested in this manual can play an essential part in increasing the safety and security of any facility.

This manual should be used as a model or guide only. End users are encouraged to adopt all or part of the recommendations as appropriate to meet their individual needs.

II. Comprehensive Model Key Control Policy

A. Purpose

The purpose of this Key Management Policy is to help protect the life, property, and security of a facility and all its occupants. It serves as the framework by which all keys and access credentials will be managed, issued, duplicated, stored, controlled, returned, replaced, and accounted for by the Key Control Authority (“KCA”). This policy applies to all keys for spaces, office equipment, vehicles, padlocks, lockers, safes, etc., owned, operated, or controlled by the facility. It seeks to establish a recorded chain of accountability and access for all credentials, keyholders, and locations, and to implement and preserve a proper key control process.

B. Specification

A facility shall use a key control system and adopt administrative policies that facilitate the enforcement of Key Management Procedures. Key control specifications should include:

C. Enforcement

The key control policy must be adopted by universal consent and administrative mandate. Keyholders have specific responsibilities:

D. Elements of a Key Control Policy

Key Control Authority—“KCA”

The facility shall appoint a Key Control Authority with the power and authority to develop all policies and procedures related to the facility's key management system. The KCA may appoint or become a Key Control Manager responsible for implementing, executing, and enforcing these policies, issuing and returning keys, and supervising storage and key cutting.

Storage

Keys, credentials, and key records must be stored securely, protected by lock and key or vault. Keys should be in a locked cabinet or container in a secured area. Temporary use key rings should be tamper-resistant. Non-centralized storage options include sequence locks or emergency key storage boxes. Computerized key cabinets with access control are also an option. Key records must be stored securely against fire and theft, with data files password-protected and encrypted.

Key Management Formats

Key management systems can be maintained in either a manual or computerized format. Both formats require detailed information on keys (blind codes, serial numbers, authority), keyholders (name, ID, contact, deposit), locations (room/door numbers, security level), and hardware (locksets, cylinders, hinges). Computerized formats must use password-protected and data-encrypted software. Both formats must allow for fully searchable cross-referencing (e.g., Keys x Location, Keyholder x Keys).

Record Keeping

All key records must be kept current, secure, and confidential. Transactions must be recorded in a timely manner, and standardized forms should be used.

Policies and Procedures

1. Identifying Keys and Keying
2. Issuing Keys
3. Returning Keys
4. Non-returned Key Policy
5. Administration of the Master Key System
6. Audits
7. Transfer/Temporary Use

Keys shall not be transferred between individuals without proper authorization and record-keeping from the KCA.

Forms

It is recommended that forms be developed to document all key transactions. Basic elements for forms include:

All forms should include key holder information, signatures, key identification, location, transaction type, authorization, and date.

Servicing

III. Condensed Model Key Control Policy

This section provides a condensed version of a key control policy, serving as a guide for formatting and developing a facility-specific policy. It emphasizes protecting life, property, and security, requiring a key control system, appointing a KCA, and defining responsibilities for key issuance, return, and storage.

Policy and Procedures

Issuing of Keys

All keys remain the property of the facility. Keys must be authorized by signature before issuance by a designated individual, based on defined policies and procedures. Keys should be issued only to those with a legitimate need, and the number of master keys issued should be limited.

Returning Keys

All keys must be returned to the issuing department by the keyholder. Lost or stolen keys must be reported immediately to the KCA, and affected cylinders recombinated. Found keys must be returned to the KCA.

Employee Responsibilities

Employees shall use keys only for assigned work areas, lock doors when leaving secured areas, and ensure keys are safeguarded and properly used. Unauthorized possession, use, or reproduction of a key may constitute theft or misappropriation and may lead to disciplinary action.

IV. Specific Applications

Key control policies need to be tailored to specific environments. The following sections provide considerations for different types of facilities:

1. Educational K-12

K-12 facilities require heightened management due to vulnerable populations. Policies must restrict key distribution and ensure retrieval. Access through entrance doors must be tightly controlled. Threats include drugs, kidnappings, vandalism, terrorism, violence, and abuse. Considerations include lockdown procedures, managing keys during school year extensions or closures, community usage requirements, and unique keyholder types (teachers, substitutes, administration, maintenance).

2. Healthcare Facilities

Healthcare facilities (HCFs) have unique demands, protecting vulnerable populations like children, the aged, and those with infectious or mental impairments. A strong KCA is crucial. HIPAA privacy requirements must be met. Different departments have varying security needs (e.g., Obstetrics, Pediatric Wards, Psychiatric areas, Emergency Rooms, Pharmacy). HCFs often allow broad access for visitors but require strict control within the building. Unique keyholder types include doctors, nurses, administrators, cleaning staff, and researchers.

3. Colleges and Universities

These institutions require heightened security for faculty, staff, and students. Policies must balance physical security with other access control measures. Different security needs exist for academic buildings, housing, administrative areas, and contracted services. Threats include theft, vandalism, and protests. Keyholders include administrators, staff, professors, students, and contracted services. Managing keys during extended breaks or closures is also a consideration.

4. Office Buildings

Key control for office buildings involves managing tenant space versus core space. Tenant spaces change frequently, while core spaces (mechanical, public areas) are foundational. Tenants may request independent key systems. Key structure can be floor-based or tenant-based. High traffic flow during the day requires different controls than limited after-hours access. Vacant spaces and high tenant turnover also present challenges.

V. Glossary of Terms and Definitions

This glossary defines terms related to key control policies and systems. Definitions adopted from ALOA's publication are indicated by an asterisk (*).

Some definitions are adapted from ALOA's "The Professional Glossary of Terms Relating to Cylinders, Keys, and Master Keying." Non-asterisked terms represent terms evolved at ASSA ABLOY AMERICA.

PDF preview unavailable. Download the PDF instead.

medeco-key-control-policy-guide QuarkXPress(tm) 6.5 QuarkXPress(tm) 6.5

Related Documents

PreviewMedeco Key Control Guide: Developing and Managing Policies & Procedures
A comprehensive guide from Medeco (ASSA ABLOY) on developing and managing effective key control policies and procedures for facilities, covering purpose, specifications, enforcement, elements, formats, record keeping, and specific applications.
PreviewMedeco Key Control Guide: Developing and Managing Policies & Procedures
A comprehensive guide from Medeco Security Locks and ASSA ABLOY on establishing and managing effective key control policies and procedures for facilities, covering purpose, specifications, enforcement, and specific applications.
PreviewMedeco XT Key System User Manual
Comprehensive user manual for the Medeco XT key system, covering key import, assignment, audit settings, generations, status, LED indications, and firmware updates. Learn how to manage access control with Medeco XT keys.
PreviewMedeco Key System Conversion Guide: Enhance Security & Efficiency
A quick reference guide from Medeco (ASSA ABLOY) detailing common reasons for key system failure, emerging threats like 3D printing, challenges in system conversion, and a step-by-step implementation process. Includes planning considerations and product highlights.
PreviewMedeco 2020 Product Catalog: Comprehensive Security Solutions
Explore the Medeco 2020 Product Catalog, featuring a wide range of high-security locks, intelligent key systems, and mechanical solutions. Discover key control programs, ordering information, and online tools designed for enhanced security and efficiency.
PreviewMedeco 2020 Product Catalog: Comprehensive Guide to Security Solutions
Explore the Medeco 2020 Product Catalog, featuring a wide range of high-security locks, key control systems, and intelligent access solutions from ASSA ABLOY. Discover detailed product information, ordering guides, and key management tools.
PreviewMedeco 2019 Product Catalog: Comprehensive Security Solutions
Explore the Medeco 2019 Product Catalog, featuring a wide range of high-security locks, key systems, and access control solutions from ASSA ABLOY. Discover Medeco's advanced technologies including Medeco³, Medeco X4, and CLIQ systems for enhanced key control and security.
PreviewMedeco 2025 Product Catalog: Comprehensive Security Solutions
Explore the Medeco 2025 Product Catalog for a wide range of high-security locking systems, intelligent key solutions, and mechanical products. Discover key control programs, ordering information, and technical specifications.