Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Down with Rekeying

June 11, 2003
Ray Briones of College of the Canyons uses a PDA to reprogram and grab audit trail data from computer-managed stand-alone locks.


Keeping track of keys and rekeying when necessary are real pains in the lock for many facilities. That’s especially true for colleges, universities and schools. But one southern California college solved the challenge by installing computer-managed stand-alone locking systems at many of its doors.

The Santa Clarita Community College District, just north of Los Angeles, is one of the fastest growing community colleges in California and under almost constant construction to keep up with its increasing student population. Already, the College of the Canyons, situated on 153 acres, has more than 8,500 students.

Time to Rethink

According to Ray Briones, an eight-year veteran of the College’s maintenance department, “Three years ago, we were faced with a decision. We hadn’t been rekeyed for quite some time and, to make matters worse, we hadn’t been very good at keeping track of our keys. The College was experiencing rapid growth and wanted to increase its security levels.

“By using computer-managed [CM] locks, we knew we could save money down the road in time and expense of rekeying every door on campus when someone walked off or lost their keys. We were right. Today, I simply reprogram a lock with my PDA by deleting the lost credentials and reissuing a new credential.”

CM stand-alone locking systems, averaging around $1,000 per door including installation costs, are the new workhorses for colleges and universities. They provide features found previously only with online, networked systems. Whatever the credential used, intuitive user-friendly software programs all – the locks, access trim, strikes and magnets – from a laptop or PDA. New users, access points and access privileges can be entered into the system in seconds.

Creativity at Play

With such CM locking systems, security professionals can become very creative. Systems, such as the “Locknetics on Board” CM products line of Schlage CM locks, Von Duprin CM993 exit trim and devices, Locknetics universal controllers and Recognition Systems biometric hand geometry readers facilitate simplified, uniform access control administration. Multiple openings in a facility can be managed with a variety of stand-alone locking systems that share common software.

Without hardwiring, users have the benefits of a networked system without the costs involved. Access and profile management is greatly improved without adding any extra software.

Briones has over 400 Schlage CM unit locks, each installed along with CM exit devices on the perimeter entry points, with the numbers increasing. On selected doors, he uses CM dogging exit devices to hold the doors open electronically.

The equipment is a stand-alone, microprocessor-controlled, electro-mechanical locking system. It’s specifically designed to retrofit existing doors and cover all prior door preps. Powered by four standard AA batteries, it provides more than 80,000 activations.

Operationally, the outside lever is normally locked and the inside lever is always free to allow egress. Electronic access control is achieved by pressing an access credential. The College of the Canyons uses the iButton credential but they could also use a magnetic stripe card, key code via keypad, biometric HandReader or HID proximity card or fob, and any combination, as their needs progress.

Depending on the model used in the series, the lock has various capabilities such as “lock” and “unlock” buttons on the inside escutcheon. For storerooms and classrooms, there is typically the opportunity to unlock the lock via “toggle” credential and relock with the same. A special classroom model features an inside iButton reader. The lock can be toggled unlocked by the iButton plus a PIN for higher security.

Standard features include an up to 1,000 user memory with real-time features including time zones, holidays, auto-unlocks and auto-relocks, plus audit trails of up to 1,000 events. An optional ATK (audit trail – key override) will record any use of the mechanical key on the audit trail report. Both manual and computer programming is supported by all models.

The system operator can easily control both users and access points based on time of day, day of week, credential needed and/or period of time. Reports show audit trails retrieved, access privileges granted and time functions established by either the user or door. With IR Security & Safety’s Locklink software, the system administrator may add or delete users and determine which users can have access to specific doors at specific times throughout the day.

Briones uses a PDA to program his CM locks. He simply downloads information to the locking device and uploads audit trails in one step and moves on the next door. He can perform various functions including momentary and maintained access, lockout, one-time use, supervisor and even linked access, in where a code must be used in tandem with a credential.

“What we especially like is that we can retrofit the CM locks right over the holes that our previous locks leave,” Briones advises.

“We use iButtons exclusively,” says Briones. “All staff, including maintenance, professors, administration and others carry the iButtons. Some students who work at the College also have them. They are used to access personal offices, laboratories, exterior doors and storage areas. At some point, we would like this to be our only locking system.”

Briones appreciates that the iButtons can be programmed to do various functions such as toggling. For instance, an instructor can use the iButton to open the door and then lock the door once she leaves. Custodians have normal access. Their keys unlock the door for eight seconds and then relock it. This eliminates the problem of having doors remaining unlocked during the evening and night. With this system, it’s virtually impossible to leave the door open.

The audit trail is used more than most locksmiths might guess.

“It provides us with accountability,” Briones explains. “It seems that we’re asked all of the time for audits on doors for one reason or another. For instance, we recently had a theft and were able to track who did it because of the lock’s audit trail capabilities. In this instance, it was a person who had left the College and never turned in his key.

“We can also keep track of such things as who cleaned a room and how often. In addition, I think the locks work as a deterrent. If you know your name will appear on an audit trail, you’re less likely to do something wrong.”

In the future, Briones is considering installing CM locks on the storage cabinets in the security office. It’s an application already common in hospitals.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hands on laptop

    Thrive in a down market by aligning with business priorities

    See More
  • Bandage over cracked pavement

    Breaking Down Burnout: Healing Cyber Teams with the Right Tools and Strategies

    See More
  • Going Down with the Ship

    Going Down with the Ship

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing