Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Protective Locks, Keys and Cabinet

Locks and Keys

The best defense against lock picking and making of key by impression is the installation of special pick
resistant, impression-resistant lock cylinders. Generally speaking, locks are the cheapest security investment
that can be made. Locking device is simply a mechanism that extends the door and window into a wall that hold
them. If, therefore, the wall or the door itself is weak or easily destructible, the lock will not be effective. It must
be recognized that any lock will eventually yield to attack. They must be considered only as delaying devices,
but this delay is of primary importance.

The longer the intruder is stalled in an exposed position while he works to gain entry, the greater the
chances of discovery. Even the highest locking devices are only one part of door and entrance security locks,
cylinders, doors and frame construction, and key control are inseparable element; all must be equally being
effective. If one element is weak, the system will breakdown.

Lock- a mechanical, electrical, hydraulic or electronic device to prevent entry into a building, room, container
or hiding place and to prevent the removal of items without the consent of the owner.

Padlock- a portable and detachable lock having a sliding hasp which passes through a staple ring or the
like and is then made fast or secured.

Peterman- an English term used to describe a lock picker.

Types of Locks

1. Warded Locks- offer very little security. This type of lock must therefore be used only to have privacy
but not to provide a high degree of security.
2. Disc Tumbler Locks- designed for the use in automobile industry and are in general used in car doors
today. Because this lock is easy and cheap to be manufactures, its use has expanded to other areas such
as desks, files and [padlocks. The delay afforded is approximately ten minutes.

3. Lever Locks- these are difficult to define in terms of security since they vary greatly in their
effectiveness. They are being used in safe deposit boxes and for all practical purposes, pick proof. The
least of these locks are used in desks, lockers and cabinets and generally less secure than pin tumbler
lock.

4. Combination Locks- these are difficult to defeat, since they cannot be picked because few experts can
manipulate the device to discover the combination. Most of these locks have three dials which must be
aligned in the proper order before the lock will open. Some locks may have four dials for greater
security.

5. Code-Operated Locks- these are combination type locks and that no key is being used. Pressing the
series of numbered button in the proper sequence opens them. Some of them are equipped to alarm if
wrong sequence is being pressed. These are high security locking device.
6. Electromagnetic Locks- these are devices holding a door by magnetism. These are electrical units
consisting of the electromagnetic on metal holding sequence. When the power is secured on the door,
they will resist pressure of up to 1000 pounds.

7. Card operated locks- are electronically or more usually magnetic. Coded card notched, embossed or
containing an embedded patter of copper locks are used to ‘operate such locks. These are frequently
fitted with recording device, which registers time of use and the identity of the user.

Types of Keys

1. Change Key- a specific key which operates the lock and has a particular combination of cuts which
match the tumblers in the lock.
2. Sub-master Key- a key that will open all the lock within a particular area or grouping in a particular
facility.
3. Master Key- a special key that will capable of opening a series of locks.
4. Grand Master Key- a type of key that will open everything in a system involving two or more
master key groups.

Key Control

Once an effective key control has been installed, positive control of all keys must be gained and
maintained. This can be accomplished only if it is in conjunction with the new locking devices. The
following can be utilized to maintain effectively key control.

1. Key Cabinet- a well- constructed cabinet will have to be produced. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system, therefore it should be locked at all
times.
2. Key Records- some administrative means must be set up to record code number of the locks and to
whom the keys of a specific locks was issued.
3. Inventories- periodic account must be made of all duplicates and original keys in the hands of the
employees whom the keys of a specific locks was issued.
4. Audits- in addition to periodic inventories, an unannounced audit should be made of all the key
control records and procedures by a member of the management.
5. Daily Report- a regular report must be made by the person responsible for the key control from the
personnel department indicating all persons who have left or will be leaving the department or the
company. In the event that a key was issued steps should be made to recover the key.

Protective Cabinet

The final line of defense at any facility is in the high security storage area where records, papers,
plans or cashable instruments, precious metals or others especially valuable assets are protected, these
security cabinets will be of a sized and quantity which the nature of the business dictates.
1. Safe- this is a metallic container used for safekeeping of documents or small items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the use and
need.
2. Vault- Heavily constructed fire and burglar resistance container usually a part the building structure
used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but
smaller than a security file room.
3. File Room- a cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.

Security Laws, Education, Investigation and Training

Three Major Types of Security

Communication System
In any plant or industrial complex, inter and intra communications is indispensable not only in security
work but also in the plant operation itself. It is a good management policy that security should have its own
communication lines to the officers within the installations and to the outside.
The security force needs a communication landline to call local law enforcement agencies, the fire
departments, ambulance, mobile patrol and other governmental agencies, the telephone is also needed to
contact the agency main office or security force outposts. The following are some means of communication that
can be a useful part of the protective system;
1. Local telephone exchange
2. Commercial telephone service
3. Inter-communications
4. Two-way radios for security
5. Security supervising system
6. Paging and recall system
7. Megaphones
8. Loud speaker system

You might also like