Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Down with Rekeying

June 11, 2003
Ray Briones of College of the Canyons uses a PDA to reprogram and grab audit trail data from computer-managed stand-alone locks.


Keeping track of keys and rekeying when necessary are real pains in the lock for many facilities. That’s especially true for colleges, universities and schools. But one southern California college solved the challenge by installing computer-managed stand-alone locking systems at many of its doors.

The Santa Clarita Community College District, just north of Los Angeles, is one of the fastest growing community colleges in California and under almost constant construction to keep up with its increasing student population. Already, the College of the Canyons, situated on 153 acres, has more than 8,500 students.

Time to Rethink

According to Ray Briones, an eight-year veteran of the College’s maintenance department, “Three years ago, we were faced with a decision. We hadn’t been rekeyed for quite some time and, to make matters worse, we hadn’t been very good at keeping track of our keys. The College was experiencing rapid growth and wanted to increase its security levels.

“By using computer-managed [CM] locks, we knew we could save money down the road in time and expense of rekeying every door on campus when someone walked off or lost their keys. We were right. Today, I simply reprogram a lock with my PDA by deleting the lost credentials and reissuing a new credential.”

CM stand-alone locking systems, averaging around $1,000 per door including installation costs, are the new workhorses for colleges and universities. They provide features found previously only with online, networked systems. Whatever the credential used, intuitive user-friendly software programs all – the locks, access trim, strikes and magnets – from a laptop or PDA. New users, access points and access privileges can be entered into the system in seconds.

Creativity at Play

With such CM locking systems, security professionals can become very creative. Systems, such as the “Locknetics on Board” CM products line of Schlage CM locks, Von Duprin CM993 exit trim and devices, Locknetics universal controllers and Recognition Systems biometric hand geometry readers facilitate simplified, uniform access control administration. Multiple openings in a facility can be managed with a variety of stand-alone locking systems that share common software.

Without hardwiring, users have the benefits of a networked system without the costs involved. Access and profile management is greatly improved without adding any extra software.

Briones has over 400 Schlage CM unit locks, each installed along with CM exit devices on the perimeter entry points, with the numbers increasing. On selected doors, he uses CM dogging exit devices to hold the doors open electronically.

The equipment is a stand-alone, microprocessor-controlled, electro-mechanical locking system. It’s specifically designed to retrofit existing doors and cover all prior door preps. Powered by four standard AA batteries, it provides more than 80,000 activations.

Operationally, the outside lever is normally locked and the inside lever is always free to allow egress. Electronic access control is achieved by pressing an access credential. The College of the Canyons uses the iButton credential but they could also use a magnetic stripe card, key code via keypad, biometric HandReader or HID proximity card or fob, and any combination, as their needs progress.

Depending on the model used in the series, the lock has various capabilities such as “lock” and “unlock” buttons on the inside escutcheon. For storerooms and classrooms, there is typically the opportunity to unlock the lock via “toggle” credential and relock with the same. A special classroom model features an inside iButton reader. The lock can be toggled unlocked by the iButton plus a PIN for higher security.

Standard features include an up to 1,000 user memory with real-time features including time zones, holidays, auto-unlocks and auto-relocks, plus audit trails of up to 1,000 events. An optional ATK (audit trail – key override) will record any use of the mechanical key on the audit trail report. Both manual and computer programming is supported by all models.

The system operator can easily control both users and access points based on time of day, day of week, credential needed and/or period of time. Reports show audit trails retrieved, access privileges granted and time functions established by either the user or door. With IR Security & Safety’s Locklink software, the system administrator may add or delete users and determine which users can have access to specific doors at specific times throughout the day.

Briones uses a PDA to program his CM locks. He simply downloads information to the locking device and uploads audit trails in one step and moves on the next door. He can perform various functions including momentary and maintained access, lockout, one-time use, supervisor and even linked access, in where a code must be used in tandem with a credential.

“What we especially like is that we can retrofit the CM locks right over the holes that our previous locks leave,” Briones advises.

“We use iButtons exclusively,” says Briones. “All staff, including maintenance, professors, administration and others carry the iButtons. Some students who work at the College also have them. They are used to access personal offices, laboratories, exterior doors and storage areas. At some point, we would like this to be our only locking system.”

Briones appreciates that the iButtons can be programmed to do various functions such as toggling. For instance, an instructor can use the iButton to open the door and then lock the door once she leaves. Custodians have normal access. Their keys unlock the door for eight seconds and then relock it. This eliminates the problem of having doors remaining unlocked during the evening and night. With this system, it’s virtually impossible to leave the door open.

The audit trail is used more than most locksmiths might guess.

“It provides us with accountability,” Briones explains. “It seems that we’re asked all of the time for audits on doors for one reason or another. For instance, we recently had a theft and were able to track who did it because of the lock’s audit trail capabilities. In this instance, it was a person who had left the College and never turned in his key.

“We can also keep track of such things as who cleaned a room and how often. In addition, I think the locks work as a deterrent. If you know your name will appear on an audit trail, you’re less likely to do something wrong.”

In the future, Briones is considering installing CM locks on the storage cabinets in the security office. It’s an application already common in hospitals.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Electronic Access Control Tailors Security Protocols, Boosts User-Friendliness

    Electronic Access Control Tailors Security Protocols, Boosts User-Friendliness

    See More
  • Bank on It

    See More
  • Banks and Finance

    Banking Battlegrounds: Cyber and Physical Security Risks Today

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing