1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

INTERNAL CONTROLS.
Michigan Electronic Grants System Plus
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
“Web Based Access Control and Integration to BAS” March 2007
OSHA Office of Training and Education
PHYSICAL SECURITY A basic overview of some specific things that can be done by our general campus population to help ensure the Physical Security of our.
bright blue. So Smart, Its Simple! To the Presenter:
INTRUSION ALARM TECHNOLOGY
1 The smart card slot! Sara Eyre Head of IT Customer Services Or how to produce an attendance monitoring system using the access.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Eligibility, Benefits, and Pre-certifications
Configuration management
Let’s watch a DVD… DVD Instructor Notes
Course Registration Overrides SLCM_WP_220 1SLCM_WP_220 Overrides.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
1 of 27 DA1241 Archive Companies Last updated: March-2004 DA1241 Archive Companies.
1 Procuring a Design Project engineers perspective on starting the design process and establishing the A/E scope of work Frank C. Quigley General Engineer.
A Successful Help Desk Process for all IT Support
Background Information. 2 Scope: Computer Hardware  Tablets, Laptops, Embedded Systems  Desktops, Servers, Supercomputers  Peripherals and Accessories:
Tools for Help Desk Management: Assessment & Guidance Karen Pothering Elinor Pennsylvania State University "Copyright.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Addition 1’s to 20.
25 seconds left…...
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
1. Purchase Decal Movement Maintenance Inventory Utilization Disposition 2.
Week 1.
1 1999/Ph 514: Channel Access Concepts EPICS Channel Access Concepts Bob Dalesio LANL.
© Prentice Hall CHAPTER 15 Managing the IS Function.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Step 1: Enter your “21 Character Employee Id Or Alternate User Id” Step 2: Enter Personal Password & Click Login NOTE : (First use password is “21 Character.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
User Friendly Item Relationship Maintenance A Family of Enhancements For iSeries 400 DMAS from  Copyright I/O International, 2006, 2007, 2008, 2010 Skip.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Cost-Effective Monitoring of Classroom Technology at UNT Maurice Leatherbury Executive Director of Information Technology and Academic Computing Copyright.
Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Welcome! 1 Safe Harbor - Safe Schools, LLC - all rights reserved 2012.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Providing Scalable 24/7 Support Track 3: Harborside Ballroom E Tuesday, January 15 th 2:30 to 3:15 pm Ronald Ardron, Jr., Manager of Technical Support.
3/20/20071 IT Strategy and Leadership in Higher Education: Two Case Studies Case 1: Roberts Wesleyan College. Presented by Pradeep (Peter) Saxena, CIO.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Western Illinois University - Electronic Student Services Copyright Statement Copyright Western Illinois University – Electronic Student Services 2001.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Managing a computerised PO Operating environment 1.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
NDSU - VPFA Training NDSU Policy: Section 708: Campus Maintenance and Service Requests Request For Estimate Fill.
1 Access Services Training for New Faculty and Staff Processes, Procedures And A Step By Step Guide For Access.
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
A Collaborative Blueprint for Classroom Design Barbara Brandt, ITD Carole Meyers, Emory College Emory University Copyright Barbara Brandt and Carole Meyers.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
A Collaborative Blueprint for Classroom Design
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Presentation transcript:

1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona

2 Copyright Edward C. Hohmann, John J. Rotunni, Lisa M. Rotunni This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.

3 Getting the Most from a Card Access System Increase space sharing Reduce loss & damage Ensure safety after hours Allow use anytime, 24 x 7 Encourage use by more people Establish user responsibility 4,200 Students - 63 Lab Suites - 253,000 ft 2 College of Engineering, Cal Poly Pomona

4 What Can an Access System Do? Lock and unlock doors on a schedule Provide card-swipe access for individuals Grant different types of access – pass/toggle Allow time-of-day-based and calendar-based access controls and alarm conditions Monitor door status Issue alarms Control special equipment and systems Record access activity

5 Designing Spaces Typical elements Single card-swiped entry door Other non-swiped exit only doors Emergency exit only door Roll-up door Monitoring & tracking requirements Cover all doors Do not issue keys Doors locked or unlocked by key may not respond to system locks & unlocks Uncontrolled door leaves space uncontrolled

6 Card Access Door Components Position sensor Sounder Request-to-exit sensor Electric lock Card swipe We purchased a DSX Access System and components through Electro Specialty Systems

7 Time & Calendar-based Controls Time Zones control weekly operations Scheduled automatic lock/unlock & Time determined card-reader response Academic operations Vary by day of week M – Th open for evening courses Close early on Fridays Closed on weekends Vary by day of year Special open days – Hol 1 Business hours during term breaks – Hol 2 Closed academic holidays – Hol 3 1 of 22 Time zones Locks/unlocks outside doors

8 Granting Card Access Establish identity – ID card with photo Assign Access Level – define which readers grant access & during what Time Zone Determine special access needs – toggle, return to schedule Set expiration – automatic or manual Access response can be changed from Toggle to Pass for a particular card based on Time Zone

9 Who Needs Access? Faculty & Staff – year-round users Students – frequently changing needs Request form requires approval by advisor, chair Standard Access Levels for ease of assignment Expiration date required – end of term or year Others – frequently changing population VIP visitors Vendors/contractors Workshop & seminar participants Faculty & Staff who have misplaced their campus ID Guest cards needed to provide temporary access

10 School Hours After Hours Classrooms & Labs Work RoomsDept Offices Pass Tech Staff Pass Students Pass Toggle Flexible by Room, Person, Time Pass Only Pass Only Faculty Office Staff

11 Two Years Experience 165 Control Points 1,000+ Users

12 Behind The Scenes Hardware Real-time database interface Distributed door controllers Master / slave networked Two Door Slave Module & Battery Backup Master Module & Battery Backup Workstation Memory in each module contains authorized access info & user data Workstation Location 1 Location 2

13 Behind The Scenes Software System interfaces & actions – DSX Database Establishing configuration Authorizing card access Operator interfaces – DSX Workstation Monitoring & ad hoc remote control Displaying real-time status Management reports – MS Access Showing configuration Tracking usage Use campus systems for card data

14

15 Why Cards or Metal Keys? Cards permit instant updating & flexibility Immediate withdrawal of use Time & calendar specific access Keys have lower cost & management workload Individual unused keys are often shared Keys become less secure over time through loss Mix systems appropriately & synchronize Consider number of users & security requirements Use card access groups to mimic master key levels Restrict master & sub-master key distribution to minimize loss Weigh total cost – install, maintenance, effectiveness

16 Controlling Special Devices Unique requirements Elevator – activate buttons & rear doors Gates Equipment (projectors) – theft protection Beyond access toward building operations Lights – hallway & display areas Air conditioning External inputs trigger system response Fire alarm – opens gates

17 Security, Not Surveillance Philosophy of encouraging access More use by more people People working will help maintain facility Operator/police response to alarms Expected only during off-hours Security weaknesses – reduce with cameras Open air spaces Attractive nuisance areas Card-swipes recorded but not monitored Data accessible when losses occur

18 Tips & Tricks Use dual-swipes – two control points for a gate Place card swipe near main configuration station Give two cards to the same person – normal pass access plus special toggle card Install doors with no outside handles – no card or key, sounder discourages all but emergency exit Have a portable control station – laptop with software and network connectivity Assure network connectivity adjacent to hardware – facilitates troubleshooting and emergency control

19 Whats Happening Now? Struggles Doors propped open – adding sounders Workload from frequently changing users – standardizing access assignments, developing tools Building system synchronizations limited by only on-off control Expansion Rapidly adding additional swipes in older buildings Installing vehicle gate control for surrounding areas Working with building engineers for control options

20 Why Do Users Like It? Quick changes give flexibility Remote control allows ad hoc adjustments Building lockdown promotes peace of mind Calendar-based controls automate schedules Students enjoy working on their own time schedules

21 Access Us at Cal Poly Pomona Web: John Rotunni Lisa Rotunni Edward Hohmann