Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A Locking Pathway

April 1, 2005
Programmable electronic locks provide one choice for facilities with a limited number of users and access points.
Electronic locks allow organizations to retrofit doors to become part of an overall system, using the same credentials throughout a facility or even multiple facilities. Electronic systems even allow intermixing of credentials, using systems as simple as the electronic PIN-enabled lock, or as sophisticated as online wireless configurations that connect doors or even elevators to existing access control systems.

While it might seem a daunting task to make the transition to total integrated access control, there’s a comfortable pathway.

The first priority for any access control plan is to establish control over the origination and duplication of mechanical keys. Whether it’s a storage closet, research lab, computer room, office or records room, a programmable locking system can eliminate the distribution of keys. If the need is to provide controlled access to multiple users sharing access to multiple openings, programmable electronic locks and trims are the first step in a migration from mechanical key systems to fully electronic access control.

Keypad locks are usually limited to a 17- or 19-code capacity, while electronic locking systems are also at a price point of mechanical single-code locks. With such devices, staff can quickly program up to 120 individual user codes, right at the keypad. Administrators can add or delete users in about 10 seconds. Electronic programmable locking systems operate on four AA alkaline batteries, which provide 80,000-plus cycles – approximately three years of use.

Computer-managed locking systems are networked through software to

provide audit-trail capability and time-based scheduling for restricting access.

Recently introduced programmable locks additionally feature iButton (Dallas Semiconductor/Maxim, Dallas) ports, 12-button keypads and standard builder’s cylinders.

Because codes can be added or deleted, security can be enhanced by increasing the frequency with which codes are changed, while also cutting down on the labor time and cost to accomplish this. This also helps reduce liability; the moment an employee who knows an access code leaves the company, security is at risk if steps to prevent future access are not taken. As soon as an employee quits the company or a new employee joins the organization, administrators can immediately delete an old code/credential or add a new code/credential at the keypad to maintain increased security. This prevents the building from having to continually re-key a lock whenever an employee leaves or mechanical keys go missing.

South Carolina’s Rock Hill School District No. 3 employs these types of electronic locks to protect students, teachers and staff on several of its 33 campuses. Currently, the school district has about 25 electronic locks installed at eight campuses, used to secure outside doors at elementary schools, lock buildings when teachers and students go outside for recess, and ensure that doors aren’t left propped open. An electronic lock is also installed on a lab to protect expensive equipment.

“I’ve worked very hard to get electronic locks in the district, and so far everyone is really liking them,” said Mike Robbins, a locksmith for the Rock Hill School District for the past 18 years. “The initial cost may be more, but you spend more money rekeying a facility if someone loses a key. Plus, you can change the code and your facility is secure again in a matter of minutes. When you use mechanical keys, you have to go around and rekey all the doors. The electronic locks are easy to program and use and require almost no maintenance.”

Dan Lee of Canadian Blood Services uses security technology.

Computer-managed systems

The first step in an intelligent migration from mechanical locks to total integrated access control can involve computer-managed (CM) locking systems. CM locking systems offer many of the same benefits as a networked, hardwired system, without the higher cost and additional care associated with routing network cable when retrofitting an existing facility with electronic access control. These standalone locks are networked through software to provide audit-trail capability and time-based scheduling for restricting access.

Current software can manage most any type of credential, while controlling the locks, access trim and offline hard-wired controllers, which manage strikes and magnets, from a laptop or PDA. New users, access points and access privileges can be entered into the system in seconds. They also provide an audit trail capability.

One CM lock is currently installed on a fitness room for teachers and students. Teachers are given the code, so students can only access it when a teacher is present. Eventually teachers will be able to use their ID badges to access the lock. The district plans to install more CM locks that will work with proximity cards.

Similarly, Canadian Blood Services is using CM locking systems to restrict access to high-security areas of its Vancouver facility. “Our building is a very tight security building,” said Dan Lee, facilities coordinator for the company’s British Columbia and the Yukon areas. “Only a certain number of staff are allowed to go through the doors secured with the CM locks.”

Lee manages 15 CM locks that control access to the lab area, the administration areas, the archives and a supply warehouse. The center employs about 200 people and only a handful of staff members are allowed access to high security areas. The company uses HID proximity cards with the battery-operated, standalone CM locking systems. Using just one proximity card credential, staff members can be granted access to any combination, or none, of the high-security areas. Prior to installing the CM locks, the Vancouver facility used mechanical keys.

“The locks are really easy to program,” said Lee, who uses a laptop computer and LockLink software, but plans to purchase a handheld computer or PDA in the near future. The company also has plans to add more CM locks at the Vancouver location in the coming months, as the facility undergoes a renovation.

System operators can control both users and access points based on time of day, day of week, credential needed and/or period of time. Reports show audit trails retrieved, access privileges granted and time functions established by either the user or door. An administrator goes to the opening, plugs in the interface to the locking system right at the door, and uploads new access instructions to the lock while downloading audits of who has been through the door and when. This function can also be used to assign access rights by credential and/or time.

Selectable functions include time zones, time activation and expiration, auto unlock time scheduling, first-person-in and holiday scheduling. A variety of reports are available to help manage a facility more efficiently, including audit trail data, access privileges data, and time function schedules by user or door.

Whatever the credential, administrators can perform various functions including momentary and maintained access, lockout, one-time use, supervised and linked access, in which a code must be used in tandem with a credential such as at a bank’s ATM. Linked access reduces the probability of lost or stolen credentials from providing unauthorized access.

Third parties

Beyond CM locking systems are the hardwired locks, which let users use a CM-type lock to monitor door openings with their own existing, third party access control panels and software. Such an open architecture platform connects the door lock to a panel interface board (PIB), and subsequently any present access control panel. There is no need for separate components or multiple manufacturers’ products. Users access the lock with either magnetic stripe or HID proximity cards.

As a result, credential data and door status information required by the access control panel, such as door position or request-to-exit status, are passed via RS-485 communication from the lock to the panel via the PIB provided with the locks. The access control panel maintains control of the lock status and status indication on the locks as it does with present electric strike or electromagnetic locking systems. All monitoring is captured at the remote station.

The business case for deploying the wireless systems in networked openings is quite compelling, given an inherently lower installed cost than an online access control system. Wireless systems use less hardware and install five to ten times faster than those that require running cable. Usually, a wireless system can integrate into existing access control systems while allowing employees to continue to use their existing keys or ID credentials.

When planning the move from the mechanical world to electronic, networked or wireless locking systems, the transition does not have to take place overnight, nor does not need to be total. Adding electronic locking systems to access points as time and budgets allow could be a sensible migration plan for most any organization.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Locking Up a Catalog

    See More
  • Padlock on keyboard

    Locking out ransomware: A new way to look at security strategy

    See More
  • Pathway to Reality: The Establishment of the Homeland Security Intelligence Academy

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing